nginx
tcp/443 tcp/80
WARNING: This plugin will generate false positive and is purely informative:
regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb563aa8aaf4222caca4222caca4222caca4222caca
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_9.2p1 Debian-2+deb12u1 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
Open service 122.155.17.109:8443 · webmail.zp12766.tld.122.155.17.109.no-domain.name
2026-01-09 07:31
Open service 122.155.17.109:8443 · webmail.zp12766.tld.122.155.17.109.no-domain.name
2026-01-02 13:51
Open service 122.155.17.109:8443 · webmail.zp12766.tld.122.155.17.109.no-domain.name
2025-12-22 18:59
Open service 122.155.17.109:80 · webmail.zp12766.tld.122.155.17.109.no-domain.name
2025-12-20 21:23
HTTP/1.1 403 Forbidden Server: nginx Date: Sat, 20 Dec 2025 21:23:20 GMT Content-Type: text/html Content-Length: 146 Connection: close Page title: 403 Forbidden <html> <head><title>403 Forbidden</title></head> <body> <center><h1>403 Forbidden</h1></center> <hr><center>nginx</center> </body> </html>
Open service 122.155.17.109:443 · webmail.zp12766.tld.122.155.17.109.no-domain.name
2025-12-20 21:23
HTTP/1.1 200 OK Server: nginx Date: Sat, 20 Dec 2025 21:23:21 GMT Content-Type: text/html Content-Length: 47 Connection: close Last-Modified: Sun, 03 Dec 2023 16:07:03 GMT ETag: "2f-60b9d3133fc5a" Accept-Ranges: bytes Vary: User-Agent <html>webserver is functioning normally</html>
Open service 122.155.17.109:8443 · webmail.zp12766.tld.122.155.17.109.no-domain.name
2025-12-20 21:23
Open service 122.155.17.109:8443 · webmail.zp12766.tld.122.155.17.109.no-domain.name
2025-12-20 12:57