openresty
tcp/80
Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767de22ea8c3df372350c09f9adf87608f91866f421c866f421c
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON print$ shared IPC$ nobody
Open service 82.67.46.227:445
2025-01-01 00:27
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 82.67.46.227:445
2024-12-24 00:40
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 82.67.46.227:445
2024-12-22 00:59
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 82.67.46.227:445
2024-12-20 00:35
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 82.67.46.227:445
2024-12-18 01:49
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 82.67.46.227:80
2024-12-17 19:47
HTTP/1.1 404 Not Found Server: openresty Date: Tue, 17 Dec 2024 19:47:11 GMT Content-Type: text/html Content-Length: 552 Connection: close Page title: 404 Not Found <html> <head><title>404 Not Found</title></head> <body> <center><h1>404 Not Found</h1></center> <hr><center>openresty</center> </body> </html> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page --> <!-- a padding to disable MSIE and Chrome friendly error page -->
Open service 82.67.46.227:445
2024-12-15 23:53
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 82.67.46.227:445
2024-12-14 00:04
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 82.67.46.227:445
2024-12-12 00:58
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0