Apache
tcp/5005 tcp/5006 tcp/8000
Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767de22ea8c365d2a51d65d2a51d65d2a51d65d2a51d65d2a51d
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON IPC$
Severity: high
Fingerprint: 22420ce026fa767de22ea8c30c6df3bde7491273e7491273e7491273e7491273
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON usbshare5 IPC$
Open service 114.32.137.50:5006
2024-09-12 03:49
HTTP/1.1 404 Not Found Date: Thu, 12 Sep 2024 03:49:24 GMT Server: Apache Content-Length: 198 Connection: close Content-Type: text/html; charset=iso-8859-1 Page title: 404 Not Found <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL / was not found on this server.</p> </body></html>
Open service 114.32.137.50:443 ยท bonjaynas.myds.me
2024-09-12 00:09
HTTP/1.1 307 Temporary Redirect Location: https://login.bonjayrt.myds.me:443/ Date: Thu, 12 Sep 2024 00:09:19 GMT Connection: close Transfer-Encoding: chunked
Open service 114.32.137.50:8000
2024-09-11 12:16
HTTP/1.1 302 Moved temporarily Date: Wed, 11 Sep 2024 12:16:23 GMT Server: Apache Cache-control: no-store Location: https://114.32.137.50:8001 Content-Length: 0 Connection: close Content-Type: text/plain
Open service 114.32.137.50:5005
2024-09-11 10:54
HTTP/1.1 404 Not Found Date: Wed, 11 Sep 2024 10:54:59 GMT Server: Apache Content-Length: 198 Connection: close Content-Type: text/html; charset=iso-8859-1 Page title: 404 Not Found <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL / was not found on this server.</p> </body></html>
Open service 114.32.137.50:443
2024-09-11 01:16
HTTP/1.1 307 Temporary Redirect Location: https://login.bonjayrt.myds.me:443/ Date: Wed, 11 Sep 2024 01:16:43 GMT Connection: close Transfer-Encoding: chunked
Open service 114.32.137.50:21
2024-09-09 18:29
220 BonJayNAS FTP server ready. 500 GET / HTTP/1.1: command not understood. 500 CONNECTION: close: command not understood. 500 HOST: 114.32.137.50: command not understood. 500 : command not understood. 214- The following commands are recognized (* =>'s unimplemented). USER LPRT MODE MSOM* RNTO SITE RMD SIZE AUTH PASS EPRT RETR MSAM* ABOR SYST XRMD MDTM PBSZ ACCT* PASV STOR MRSQ* DELE STAT PWD MLST PROT SMNT* LPSV APPE MRCP* CWD HELP XPWD MLSD CCC REIN* EPSV MLFL* ALLO XCWD NOOP CDUP MFMT QUIT TYPE MAIL* REST LIST MKD XCUP FEAT PORT STRU MSND* RNFR NLST XMKD STOU OPTS 214 Direct comments to ftp-bugs@BonJayNAS. 500 EHLO 3131342e33322e3133372e3530.net: command not understood. 500 ?: command not understood. 500 : command not understood.