sw-cp-server
tcp/8443
WARNING: This plugin will generate false positive and is purely informative:
regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb583e3d39f683fe95a683fe95a683fe95a683fe95a
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_8.9p1 Ubuntu-3ubuntu0.1 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
Open service 81.169.170.202:22
2024-12-22 01:00
Open service 81.169.170.202:22
2024-12-20 00:35
Open service 81.169.170.202:22
2024-12-18 01:48
Open service 81.169.170.202:8443
2024-12-17 18:19
HTTP/1.1 303 See Other Server: sw-cp-server Date: Tue, 17 Dec 2024 18:19:27 GMT Content-Type: text/html; charset=UTF-8 Transfer-Encoding: chunked Connection: close Expires: Fri, 28 May 1999 00:00:00 GMT Last-Modified: Tue, 17 Dec 2024 18:19:27 GMT Cache-Control: no-store, no-cache, must-revalidate Cache-Control: post-check=0, pre-check=0 Pragma: no-cache P3P: CP="NON COR CURa ADMa OUR NOR UNI COM NAV STA" X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Location: https://81.169.170.202/login.php X-Content-Type-Options: nosniff
Open service 81.169.170.202:22
2024-12-15 23:53
Open service 81.169.170.202:22
2024-12-14 00:03
Open service 81.169.170.202:22
2024-12-12 01:00
Open service 81.169.170.202:22
2024-12-02 01:19
Open service 81.169.170.202:22
2024-11-30 00:33
Open service 81.169.170.202:22
2024-11-28 00:26