Host 91.107.137.138
Germany
Hetzner Online GmbH
  • SSH is potenitally vulnerable
    IP: 91.107.137.138
    Port: 22
    First seen 2024-07-03 21:06
    Last seen 2024-07-25 20:43
    Open for 21 days
  • MongoDB is publicly available
    First seen 2024-04-23 04:25
    Last seen 2024-04-30 19:58
    Open for 7 days
    • Severity: medium
      Fingerprint: 436d217a47ab4258fc75df94e9b383964ce909204e6f39da5748fae5dae2ada0

      Collections: 3, document count: 2, size: 432 B
      HTTP/1.0 200 OK
      Connection: close
      Content-Type: text/plain
      Content-Length: 85
      
      
      It looks like you are trying to access MongoDB over HTTP on the native driver port.
      Found collection READ__ME_TO_RECOVER_YOUR_DATA.README  with 1 documents (373 B)
      Found collection admin.system.version  with 1 documents (59 B)
      Found collection config.system.sessions  with 0 documents (0 B)
      
      Found on 2024-04-30 19:58
      432 Bytes 2 rows
  • Git configuration and history exposed
    First seen 2023-01-31 14:09
    • Severity: medium
      Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a65227eddc385

      [core]
      	repositoryformatversion = 0
      	filemode = true
      	bare = false
      	logallrefupdates = true
      [remote "origin"]
      	url = https://github.com/wulabing/3DCEList.git
      	fetch = +refs/heads/*:refs/remotes/origin/*
      [branch "master"]
      	remote = origin
      	merge = refs/heads/master
      
      Found on 2023-01-31 14:09
      265 Bytes
Data leak
Size
432 B
Collections
3
Rows
2
Domain summary