WARNING: This plugin will generate false positive and is purely informative:
regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb57296fd5a4c8b25a34c8b25a34c8b25a34c8b25a3
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_9.7 FreeBSD-20240806 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
WARNING: This plugin will generate false positive and is purely informative:
regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb57296fd5a4c8b25a34c8b25a34c8b25a34c8b25a3
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_9.7 FreeBSD-20240806 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
Open service 213.189.58.89:80 · lyalinkr.direct.quickconnect.to
2026-01-09 03:35
Open service 213.189.58.89:443 · lyalinkr.direct.quickconnect.to
2026-01-08 21:42
Open service 213.189.58.89:80 · lyalinkr.direct.quickconnect.to
2026-01-02 07:05
Open service 213.189.58.89:443 · lyalinkr.direct.quickconnect.to
2026-01-01 21:50
Open service 213.189.58.89:443 · lyalinkr.direct.quickconnect.to
2025-12-30 06:18
Open service 213.189.58.89:80 · lyalinkr.direct.quickconnect.to
2025-12-22 17:22
Open service 213.189.58.89:443 · lyalinkr.direct.quickconnect.to
2025-12-22 07:24
Open service 213.189.58.89:80 · lyalinkr.direct.quickconnect.to
2025-12-20 21:08
Open service 213.189.58.89:443 · lyalinkr.direct.quickconnect.to
2025-12-20 08:07