Apache 2.4.62
tcp/443 tcp/80
WARNING: This plugin will generate false positive and is purely informative:
regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb50d52828d37a3aa8437a3aa8437a3aa8437a3aa84
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_9.6p1 Ubuntu-3ubuntu13.5 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
Open service 207.29.232.185:8443 · www.mathewbinkley.org
2024-12-22 04:31
Open service 207.29.232.185:8443 · www.mathewbinkley.org
2024-12-20 05:21
Open service 207.29.232.185:8443 · www.mathewbinkley.org
2024-12-19 02:57
Open service 207.29.232.185:443 · www.mathewbinkley.org
2024-12-15 03:40
HTTP/1.1 200 OK Date: Sun, 15 Dec 2024 03:40:48 GMT Server: Apache/2.4.62 (Debian) Link: <https://www.mathewbinkley.org/index.php?rest_route=/>; rel="https://api.w.org/" Vary: Accept-Encoding Connection: close Transfer-Encoding: chunked Content-Type: text/html; charset=UTF-8
Open service 207.29.232.185:8443 · www.mathewbinkley.org
2024-12-15 03:40
Open service 207.29.232.185:80 · www.mathewbinkley.org
2024-12-15 03:40
HTTP/1.1 200 OK Date: Sun, 15 Dec 2024 03:40:40 GMT Server: Apache/2.4.62 (Debian) Last-Modified: Thu, 11 May 2023 18:01:23 GMT ETag: "4f-5fb6ec6c002c0" Accept-Ranges: bytes Content-Length: 79 Vary: Accept-Encoding Connection: close Content-Type: text/html <meta http-equiv="Refresh" content="0; url='https://www.mathewbinkley.org'" />
Open service 207.29.232.185:8443 · www.mathewbinkley.org
2024-12-14 07:35
Open service 207.29.232.185:8443 · www.mathewbinkley.org
2024-12-12 12:24
Open service 207.29.232.185:8443 · www.mathewbinkley.org
2024-12-03 04:58
Open service 207.29.232.185:8443 · www.mathewbinkley.org
2024-11-30 23:45
Open service 207.29.232.185:8443 · www.mathewbinkley.org
2024-11-28 21:04
Open service 207.29.232.185:8443 · www.mathewbinkley.org
2024-11-26 20:06
Open service 207.29.232.185:8443 · www.mathewbinkley.org
2024-11-20 21:20