WARNING: This plugin will generate false positive and is purely informative:
regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb5ffe8ab2b0c11d8260c11d8260c11d8260c11d826
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_4.3 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
Open service 49.212.2.243:22
2024-10-31 23:16
Open service 49.212.2.243:22
2024-10-30 00:34
Open service 49.212.2.243:443
2024-10-28 21:18
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>400 Bad Request</title> </head><body> <h1>Bad Request</h1> <p>Your browser sent a request that this server could not understand.<br /> Reason: You're speaking plain HTTP to an SSL-enabled server port.<br /> Instead use the HTTPS scheme to access this URL, please.<br /> <blockquote>Hint: <a href="https://www.web8lab.info/"><b>https://www.web8lab.info/</b></a></blockquote></p> <hr> <address>Apache/2.2.3 (CentOS) Server at www.web8lab.info Port 443</address> </body></html>
Open service 49.212.2.243:22
2024-10-21 23:37
Open service 49.212.2.243:22
2024-10-19 23:31
Open service 49.212.2.243:22
2024-10-17 23:32
Open service 49.212.2.243:22
2024-10-16 00:28
Open service 49.212.2.243:22
2024-10-01 23:26
Open service 49.212.2.243:22
2024-09-29 23:37
Open service 49.212.2.243:22
2024-09-27 23:30