BunnyCDN-AMS1-883
tcp/443 tcp/80
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
Open service 84.17.46.54:443 · storeone.app
2026-01-11 07:05
HTTP/1.1 200 OK Date: Sun, 11 Jan 2026 07:05:15 GMT Content-Type: text/html; charset=utf-8 Transfer-Encoding: chunked Connection: close Vary: Accept-Encoding Server: BunnyCDN-AMS1-883 CDN-PullZone: 4636719 CDN-RequestCountryCode: DE Cache-Control: max-age=3600 Expires: Fri, 17 Oct 2025 17:20:55 GMT Last-Modified: Sat, 15 Feb 2025 17:18:25 GMT X-Powered-By: PHP/8.3.14 CDN-ProxyVer: 1.39 CDN-RequestPullSuccess: True CDN-RequestPullCode: 200 CDN-CachedAt: 10/17/2025 16:20:55 CDN-EdgeStorageId: 1056 CDN-RequestId: 97c67ecdc3521c70258c5f269b6d9983 CDN-Cache: HIT CDN-Status: 200 CDN-RequestTime: 0
Open service 84.17.46.54:80 · storeone.app
2026-01-11 07:05
HTTP/1.1 301 Moved Permanently Date: Sun, 11 Jan 2026 07:05:15 GMT Content-Type: text/html Content-Length: 166 Connection: close Server: BunnyCDN-AMS1-883 CDN-PullZone: 4636719 CDN-RequestCountryCode: NL Location: https://storeone.app/ CDN-RequestId: 3504512bffd2b95430f8097bba398834 CDN-RequestTime: 0 Page title: 301 Moved Permanently <html> <head><title>301 Moved Permanently</title></head> <body> <center><h1>301 Moved Permanently</h1></center> <hr><center>openresty</center> </body> </html>