Malicious users exploiting this vulnerability may be able to read and/or write information to shared directories.
This may also include IPC services and lead to remote code execution.
Severity: high
Fingerprint: 22420ce026fa767de22ea8c365d2a51d78e64115c6c75c62c6c75c62c6c75c62
Found open SMB shares with NT AUTHORITY/ANONYMOUS LOGON IPC$ data giannis
WARNING: This plugin will generate false positive and is purely informative:
regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb59487dae3f5826adef5826adef5826adef5826ade
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_10.0 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
Open service 83.212.114.108:445
2026-01-08 13:57
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 83.212.114.108:22
2026-01-08 12:30
Open service 83.212.114.108:445
2026-01-01 18:49
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 83.212.114.108:22
2026-01-01 12:46
Open service 83.212.114.108:445
2025-12-30 01:56
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 83.212.114.108:22
2025-12-29 21:25
Open service 83.212.114.108:22
2025-12-24 01:28
Open service 83.212.114.108:445
2025-12-22 03:05
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 83.212.114.108:22
2025-12-22 00:13
Open service 83.212.114.108:445
2025-12-20 04:10
SMB NTLMSSP handshake results: Found non-Windows 6.1 build 0
Open service 83.212.114.108:22
2025-12-20 02:39