nginx
tcp/443 tcp/80
WARNING: This plugin will generate false positive and is purely informative:
regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb563aa8aa9f94cd0d0f94cd0d0f94cd0d0f94cd0d0
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_9.2p1 Debian-2+deb12u7 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb581e37d999e6d93209e6d93209e6d93209e6d9320
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_9.6p1 Ubuntu-3ubuntu13.12 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
Open service 83.166.246.140:80 · btcpay.vesfo.tech
2026-01-08 14:19
HTTP/1.1 301 Moved Permanently Server: nginx Date: Thu, 08 Jan 2026 14:19:17 GMT Content-Type: text/html Content-Length: 162 Connection: close Location: https://btcpay.vesfo.tech/ Page title: 301 Moved Permanently <html> <head><title>301 Moved Permanently</title></head> <body> <center><h1>301 Moved Permanently</h1></center> <hr><center>nginx</center> </body> </html>
Open service 83.166.246.140:443 · btcpay.vesfo.tech
2026-01-08 14:19
HTTP/1.1 400 Bad Request Server: nginx Date: Thu, 08 Jan 2026 14:19:16 GMT Content-Type: text/html Content-Length: 248 Connection: close Strict-Transport-Security: max-age=31536000 Page title: 400 The plain HTTP request was sent to HTTPS port <html> <head><title>400 The plain HTTP request was sent to HTTPS port</title></head> <body> <center><h1>400 Bad Request</h1></center> <center>The plain HTTP request was sent to HTTPS port</center> <hr><center>nginx</center> </body> </html>
Open service 83.166.246.140:22
2026-01-08 13:12
Open service 83.166.246.140:22
2025-12-29 22:29
Open service 83.166.246.140:22
2025-12-24 00:24
Open service 83.166.246.140:22
2025-12-21 21:56
Open service 83.166.246.140:22
2025-12-19 21:41