Vulnerability scans are performed using Nessus Professional. Some additional tools are also used to supplement the Nessus findings.


Overall risk (highest found): CRITICAL


Targetted systems

Number scanned: 161
Number with WAF: 1 (1%)
Down: 0
New: 0


View systems >>>

Vulnerability types in each risk class

Critical
2
High
10
Medium
35
Low
7
Info
2
CRITICAL2
HIGH10
MEDIUM35
LOW7
INFO2


View vulnerabilities >>>

Systems in each risk class

Critical
40
High
2
Medium
71
Low
4
Info
25
CRITICAL40
HIGH2
MEDIUM71
LOW4
INFO25


View systems >>>


Major Findings:

Risk RatingFinding
CRITICAL
The remote host contains an unsupported version of a web application scripting language.
CRITICAL
The operating system running on the remote host is no longer supported.
HIGH
The remote web server is affected by multiple vulnerabilities.
HIGH
The remote web server is affected by multiple vulnerabilities.
HIGH
The remote service encrypts traffic using a protocol with known weaknesses.
HIGH
The remote web server is affected by multiple vulnerabilities.
HIGH
The remote name server is affected by an assertion failure vulnerability.
HIGH
The remote Samba server is potentially affected by multiple vulnerabilities.
HIGH
The remote web server is affected by a vulnerability.
HIGH
The remote web server is affected by multiple vulnerabilities.
HIGH
The remote web server is affected by multiple vulnerabilities.
HIGH
The remote web server is affected by multiple vulnerabilities.
MEDIUM
The remote web server is affected by multiple vulnerabilities.
MEDIUM
The remote web server is affected by a denial of service vulnerability.
MEDIUM
The remote web server is affected by multiple vulnerabilities.
MEDIUM
The remote web server is affected by multiple vulnerabilities.
MEDIUM
The SSL certificate chain for this service ends in an unrecognized self-signed certificate.
MEDIUM
The remote web server is affected by multiple vulnerabilities.
MEDIUM
Debugging functions are enabled on the remote web server.
MEDIUM
The remote service encrypts traffic using an older version of TLS.
MEDIUM
The SSL certificate for this service cannot be trusted.
MEDIUM
An SSL certificate in the certificate chain has been signed using a weak hash algorithm.
MEDIUM
The remote name server is affected by a denial of service vulnerability.
MEDIUM
The remote name server is affected by Service Downgrade / Reflected DoS vulnerabilities.
MEDIUM
The remote web server is affected by an information disclosure vulnerability.
MEDIUM
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.
MEDIUM
The remote web server is affected by multiple vulnerabilities.
MEDIUM
The remote NTP server responds to mode 6 queries.
MEDIUM
The remote web server is affected by multiple vulnerabilities.
MEDIUM
The version of PHP running on the remote web server is affected by multiple vulnerabilities.
MEDIUM
It is possible to obtain sensitive information from the remote host with SSL/TLS-enabled services.
MEDIUM
The remote service supports the use of the RC4 cipher.
MEDIUM
The SSL certificate for this service is for a different host.
MEDIUM
The remote service supports the use of medium strength SSL ciphers.
MEDIUM
The remote host has IP forwarding enabled.
MEDIUM
Signing is not required on the remote SMB server.
MEDIUM
The version of PHP running on the remote web server is affected by an email header injection vulnerability.
MEDIUM
The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.
MEDIUM
The remote web server is affected by multiple vulnerabilities.
MEDIUM
The remote web server is affected by an information disclosure vulnerability.
MEDIUM
The remote server's SSL certificate has already expired.
MEDIUM
The remote web server is affected by an information disclosure vulnerability.
MEDIUM
The remote web server is affected by multiple cross site scripting vulnerability.
MEDIUM
The remote web server is affected by a vulnerability.
MEDIUM
The remote web server is affected by a vulnerability.
MEDIUM
The remote NTP server is affected by a denial of service vulnerability.
MEDIUM
The remote DNS server is vulnerable to cache snooping attacks.

View all vulnerabilities >>>

This table summarizes each of the detected vulnerabilities. Please use the drop down selector in the table header to switch between management summaries and detailed technical information.

ChangesRisk RatingReferences

CRITICAL

CVSS3:

10.0

CVSS:

10.0

The remote host contains an unsupported version of a web application scripting language.
Je nach Version wird die Installation von PHP auf dem Remote-Host nicht mehr unterstützt. Mangelnder Support bedeutet, dass vom Hersteller keine neuen Sicherheitspatches für das Produkt veröffentlicht werden. Infolgedessen ist es wahrscheinlich, dass es Sicherheitslücken enthält.
According to its version, the installation of PHP on the remote host is no longer supported.

Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it is likely to contain security vulnerabilities.

Upgrade to a version of PHP that is currently supported.

Finding IDAffected System
356172.21.17.13
357172.21.17.14
172.21.221.31

CVE:

N/A

CWE:

N/A

VPR:

N/A

CRITICAL

CVSS3:

10.0

CVSS:

10.0

The operating system running on the remote host is no longer supported.
According to its self-reported version number, the Unix operating system running on the remote host is no longer supported.

Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it is likely to contain security vulnerabilities.

Upgrade to a version of the Unix operating system that is currently supported.

Finding IDAffected System
157172.21.0.2
158172.21.0.16
160172.21.11.121
163172.21.172.146
164172.21.173.11
172.21.198.230
172.21.220.11
167172.21.220.12
169172.21.221.9
172.21.221.26
172.21.221.45
172.21.221.52
173172.21.221.53
174172.21.221.54
172.21.221.55
172.21.221.56
178172.21.221.59
179172.21.221.61
180172.21.221.62
182172.21.221.65
183172.21.221.66
184172.21.221.67
185172.21.221.68
186172.21.221.69
187172.21.221.70
188172.21.221.71
189172.21.221.72
190172.21.221.73
191172.21.221.74
192172.21.221.76
193172.21.221.78
194172.21.221.162
195172.21.221.211
196172.21.221.233
197172.21.221.240
198172.21.221.241
199172.21.221.243

CVE:

N/A

CWE:

N/A

VPR:

N/A

HIGH

CVSS3:

8.8

CVSS:

9.0

The remote Samba server is potentially affected by multiple vulnerabilities.
Die Version von Samba, die auf dem Remote-Host eingesetzt wird, ist 4.13.x vor 4.13.17, 4.14.x vor 4.14.12 oder 4.15.x vor 4.15.5. Es ist daher von mehreren Schwachstellen betroffen: 1. Out-of-Bounds Heap-Lese-/Schreibschwachstelle im VFS-Modul vfs_fruit die die Ausführung von Code ermöglicht. (CVE-2021-44142); 2. Informationsleck über Symlinks über die Existenz von Dateien oder Verzeichnissen außerhalb der exportierten Freigabe. (CVE-2021-44141); 3. Samba AD-Benutzer mit der Berechtigung, in ein Konto zu schreiben, können sich als beliebige Dienste ausgeben (CVE-2022-0336). Beachten Sie, dass Nessus nicht auf diese Probleme getestet hat, sondern sich nur auf die selbst gemeldete Versionsnummer der Anwendung verlassen hat.
The version of Samba running on the remote host is 4.13.x prior to 4.13.17, 4.14.x prior to 4.14.12, or 4.15.x prior to 4.15.5.  It is, therefore, affected by multiple vulnerabilities:

  - Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution. (CVE-2021-44142)

  - Information leak via symlinks of existence of	files or directories outside of the exported share. (CVE-2021-44141)

  - Samba AD users with permission to write to an account can impersonate arbitrary services. (CVE-2022-0336)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Upgrade to Samba version 4.13.17, 4.14.12, or 4.15.5 or later.

Finding IDAffected System
810172.21.21.11

CVE:

CVE-2021-44141

CVE-2021-44142

CVE-2022-0336

CWE:

N/A

VPR:

8.4

HIGH

CVSS3:

7.5

CVSS:

7.8

The remote name server is affected by an assertion failure vulnerability.
A denial of service (DoS) vulnerability exists in ISC BIND versions 9.11.18 / 9.11.18-S1 / 9.12.4-P2 / 9.13 / 9.14.11 / 9.15 / 9.16.2 / 9.17 / 9.17.1 and earlier. An unauthenticated, remote attacker can exploit this issue, via a specially-crafted message, to cause the service to stop responding.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Upgrade to the patched release most closely related to your current version of BIND.

Finding IDAffected System
639172.21.0.16

CVE:

CVE-2020-8617

CWE:

N/A

VPR:

5.1

HIGH

CVSS3:

9.8

CVSS:

7.5

The remote web server is affected by multiple vulnerabilities.
Die auf dem Remote-Host installierte Version von Apache httpd (2.4) liegt vor 2.4.47. Es ist daher von mehreren Schwachstellen betroffen, auf die im Changelog 2.4.47 verwiesen wird. (CVE-2021-30641, CVE-2020-35452, CVE-2021-26691, CVE-2021-26690, CVE-2020-13950, CVE-2020-13938, CVE-2019-17567) Beachten Sie, dass die Schwachstellen nicht auf diese Probleme getestet wurden, sondern diese Meldung nur wegen der selbst gemeldeten Versionsnummer der Anwendung angezeigt wird.
The version of Apache httpd installed on the remote host is prior to 2.4.47. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.47 changelog:

  - Unexpected <Location> section matching with 'MergeSlashes OFF' (CVE-2021-30641)

  - mod_auth_digest: possible stack overflow by one nul byte while validating the Digest nonce. (CVE-2020-35452)

  - mod_session: Fix possible crash due to NULL pointer dereference, which could be used to cause a Denial of Service     with a malicious backend server and SessionHeader. (CVE-2021-26691)

  - mod_session: Fix possible crash due to NULL pointer dereference, which could be used to cause a Denial of Service.
    (CVE-2021-26690)

  - mod_proxy_http: Fix possible crash due to NULL pointer dereference, which could be used to cause a Denial of     Service. (CVE-2020-13950)

  - Windows: Prevent local users from stopping the httpd process (CVE-2020-13938)

  - mod_proxy_wstunnel, mod_proxy_http: Handle Upgradable protocols end-to-end negotiation. (CVE-2019-17567)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.47 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2019-17567

CVE-2020-13938

CVE-2020-13950

CVE-2020-35452

CVE-2021-26690

CVE-2021-26691

CVE-2021-30641

CWE:

N/A

VPR:

6.7

HIGH

CVSS3:

9.8

CVSS:

7.5

The remote web server is affected by a vulnerability.
Die auf dem Remote-Host installierte Version von Apache httpd (2.4) liegt vor 2.4.49. Es ist daher von mehreren Schwachstellen betroffen, auf die im Changelog 2.4.49 verwiesen wird. (CVE-2021-39275, CVE-2021-34798) Beachten Sie, dass die Schwachstellen nicht auf diese Probleme getestet wurden, sondern diese Meldung nur wegen der selbst gemeldeten Versionsnummer der Anwendung angezeigt wird.
The version of Apache httpd installed on the remote host is prior to 2.4.49. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.49 changelog.

  - ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass     untrusted data to these functions, but third-party / external modules may. (CVE-2021-39275)

  - Malformed requests may cause the server to dereference a NULL pointer. (CVE-2021-34798)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.49 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2021-34798

CVE-2021-39275

CWE:

N/A

VPR:

6.7

HIGH

CVSS3:

9.8

CVSS:

7.5

The remote web server is affected by multiple vulnerabilities.
Die auf dem Remote-Host installierte Version von Apache httpd (2.4) liegt vor 2.4.52. Es ist daher von mehreren Sicherheitsanfälligkeiten betroffen, auf die in der Empfehlung 2.4.52 verwiesen wird. (CVE-2021-44224, CVE-2021-44790) Beachten Sie, dass die Schwachstellen nicht auf diese Probleme getestet wurden, sondern diese Meldung nur wegen der selbst gemeldeten Versionsnummer der Anwendung angezeigt wird.
The version of Apache httpd installed on the remote host is prior to 2.4.52. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.52 advisory.

  - A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL     pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for     requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This     issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included). (CVE-2021-44224)

  - A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser     (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the     vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and     earlier. (CVE-2021-44790)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.52 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2021-44224

CVE-2021-44790

CWE:

N/A

VPR:

9.0

HIGH

CVSS3:

9.8

CVSS:

7.5

The remote web server is affected by multiple vulnerabilities.
Die auf dem Remote-Host installierte Version von Apache httpd liegt vor 2.4.53. Es ist daher von mehreren Sicherheitsanfälligkeiten betroffen, auf die in der Empfehlung 2.4.53 verwiesen wird. (CVE-2022-22719, CVE-2022-22720, CVE-2022-22721, CVE-2022-23943) Beachten Sie, dass die Schwachstellen nicht auf diese Probleme getestet wurden, sondern diese Meldung nur wegen der selbst gemeldeten Versionsnummer der Anwendung angezeigt wird.
The version of Apache httpd installed on the remote host is prior to 2.4.53. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.53 advisory.

  - mod_lua Use of uninitialized value of in r:parsebodyA carefully crafted request body can cause a read to a     random memory area which could cause the process to crash.  This issue affects Apache HTTP Server 2.4.52     and earlier. Acknowledgements: Chamal De Silva (CVE-2022-22719)

  - HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlierApache HTTP Server 2.4.52 and     earlier fails to close inbound connection when errors are encountered discarding the request body,     exposing the server to HTTP Request Smuggling Acknowledgements: James Kettle <james.kettle     portswigger.net> (CVE-2022-22720)

  - core: Possible buffer overflow with very large or unlimited LimitXMLRequestBodyIf LimitXMLRequestBody is     set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow     happens which later causes out of bounds writes.  This issue affects Apache HTTP Server 2.4.52 and     earlier. Acknowledgements: Anonymous working with Trend Micro Zero Day Initiative (CVE-2022-22721)

  - mod_sed: Read/write beyond boundsOut-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows     an attacker to overwrite heap memory with possibly attacker provided data.  This issue affects Apache HTTP     Server 2.4 version 2.4.52 and prior versions. Acknowledgements: Ronald Crane (Zippenhop LLC)     (CVE-2022-23943)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.53 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2022-22719

CVE-2022-22720

CVE-2022-22721

CVE-2022-23943

CWE:

N/A

VPR:

5.9

HIGH

CVSS3:

9.8

CVSS:

7.5

The remote web server is affected by multiple vulnerabilities.
According to its banner, the version of Apache running on the remote host is 2.2.x prior to 2.2.33-dev or 2.4.x prior to 2.4.26. It is, therefore, affected by the following vulnerabilities :

  - An authentication bypass vulnerability exists due to     third-party modules using the ap_get_basic_auth_pw()     function outside of the authentication phase. An     unauthenticated, remote attacker can exploit this to     bypass authentication requirements. (CVE-2017-3167)

  - A NULL pointer dereference flaw exists due to     third-party module calls to the mod_ssl     ap_hook_process_connection() function during an HTTP     request to an HTTPS port. An unauthenticated, remote     attacker can exploit this to cause a denial of service     condition. (CVE-2017-3169)

  - A NULL pointer dereference flaw exists in mod_http2 that     is triggered when handling a specially crafted HTTP/2     request. An unauthenticated, remote attacker can exploit     this to cause a denial of service condition. Note that     this vulnerability does not affect 2.2.x.
    (CVE-2017-7659)

  - An out-of-bounds read error exists in the     ap_find_token() function due to improper handling of     header sequences. An unauthenticated, remote attacker     can exploit this, via a specially crafted header     sequence, to cause a denial of service condition.
    (CVE-2017-7668)

  - An out-of-bounds read error exists in mod_mime due to     improper handling of Content-Type response headers. An     unauthenticated, remote attacker can exploit this, via a     specially crafted Content-Type response header, to cause     a denial of service condition or the disclosure of     sensitive information. (CVE-2017-7679)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.2.33-dev / 2.4.26 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2017-3167

CVE-2017-3169

CVE-2017-7659

CVE-2017-7668

CVE-2017-7679

CWE:

N/A

VPR:

6.7

HIGH

CVSS3:

9.8

CVSS:

7.5

The remote web server is affected by multiple vulnerabilities.
The version of Apache httpd installed on the remote host is prior to 2.4.46. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.46 advisory.

  - Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info     disclosure and possible RCE (CVE-2020-11984)

  - Apache HTTP Server versions 2.4.20 to 2.4.43 When     trace/debug was enabled for the HTTP/2 module and on     certain traffic edge patterns, logging statements were     made on the wrong connection, causing concurrent use of     memory pools. Configuring the LogLevel of mod_http2     above info will mitigate this vulnerability for     unpatched servers. (CVE-2020-11993)

  - Apache HTTP Server versions 2.4.20 to 2.4.43. A     specially crafted value for the 'Cache-Digest' header in     a HTTP/2 request would result in a crash when the server     actually tries to HTTP/2 PUSH a resource afterwards.
    Configuring the HTTP/2 feature via H2Push off will     mitigate this vulnerability for unpatched servers.
    (CVE-2020-9490)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.46 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2020-9490

CVE-2020-11984

CVE-2020-11993

CWE:

N/A

VPR:

8.4

HIGH

CVSS3:

7.8

CVSS:

7.2

The remote web server is affected by multiple vulnerabilities.
According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.39. It is, therefore, affected by multiple vulnerabilities:

  - A privilege escalation vulnerability exists in     module scripts due to an ability to execute arbitrary     code as the parent process by manipulating the     scoreboard. (CVE-2019-0211)

  - An access control bypass vulnerability exists in     mod_auth_digest due to a race condition when running     in a threaded server. An attacker with valid credentials     could authenticate using another username. (CVE-2019-0217)

  - An access control bypass vulnerability exists in     mod_ssl when using per-location client certificate     verification with TLSv1.3. (CVE-2019-0215)

In addition, Apache httpd is also affected by several additional vulnerabilities including a denial of service, read-after-free and URL path normalization inconsistencies. 

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.39 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2019-0196

CVE-2019-0197

CVE-2019-0211

CVE-2019-0215

CVE-2019-0217

CVE-2019-0220

CWE:

N/A

VPR:

7.4

HIGH

CVSS3:

7.5

CVSS:

7.1

The remote service encrypts traffic using a protocol with known weaknesses.
Der Remotedienst akzeptiert Verbindungen, die mit SSL 2.0 und/oder SSL 3.0 verschlüsselt wurden. Diese Versionen von SSL sind von mehreren kryptografischen Fehlern betroffen, darunter: 1. Ein unsicheres Auffüllungsschema mit CBC-Chiffren; 2. Unsichere Neuverbindungen und Wiederaufnahme einer Session. Ein Angreifer kann diese Fehler ausnutzen, um Man-in-the-Middle-Angriffe durchzuführen oder die Kommunikation zwischen dem betroffenen Dienst und Clients zu entschlüsseln. Obwohl SSL/TLS über ein sicheres Mittel zur Auswahl der am höchsten unterstützten Version des Protokolls verfügt (so dass diese Versionen nur verwendet werden, wenn der Client oder Server nichts Besseres unterstützt), implementieren viele Webbrowser dies auf eine unsichere Weise, die es einem Angreifer ermöglicht, eine Verbindung herunterzustufen (z. B. in POODLE). Daher wird empfohlen, diese Protokolle vollständig zu deaktivieren. NIST hat festgestellt, dass SSL 3.0 für eine sichere Kommunikation nicht mehr akzeptabel ist. Ab dem Datum der Durchsetzung in PCI DSS v3.1 entspricht keine SSL-Version der Definition von PCI SSC für "starke Kryptografie".
The remote service accepts connections encrypted using SSL 2.0 and/or SSL 3.0. These versions of SSL are affected by several cryptographic flaws, including:

  - An insecure padding scheme with CBC ciphers.

  - Insecure session renegotiation and resumption schemes.

An attacker can exploit these flaws to conduct man-in-the-middle attacks or to decrypt communications between the affected service and clients.

Although SSL/TLS has a secure means for choosing the highest supported version of the protocol (so that these versions will be used only if the client or server support nothing better), many web browsers implement this in an unsafe way that allows an attacker to downgrade a connection (such as in POODLE). Therefore, it is recommended that these protocols be disabled entirely.

NIST has determined that SSL 3.0 is no longer acceptable for secure communications. As of the date of enforcement found in PCI DSS v3.1, any version of SSL will not meet the PCI SSC's definition of 'strong cryptography'.

Consult the application's documentation to disable SSL 2.0 and 3.0. Use TLS 1.2 (with approved cipher suites) or higher instead.

Finding IDAffected System
149172.21.221.211

CVE:

N/A

CWE:

N/A

VPR:

N/A

MEDIUM

CVSS3:

9.8

CVSS:

6.8

The remote web server is affected by multiple vulnerabilities.
According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.33. It is, therefore, affected by multiple vulnerabilities:

  - An out of bounds write vulnerability exists in mod_authnz_ldap     with AuthLDAPCharsetConfig enabled. An unauthenticated, remote     attacker can exploit this, via the Accept-Language header value,     to cause the application to stop responding. (CVE-2017-15710)  
  - An arbitrary file upload vulnerability exists in the FilesMatch     component where a malicious filename can be crafted to match the     expression check for a newline character. An unauthenticated,     remote attacker can exploit this, via newline character, to     upload arbitrary files on the remote host subject to the     privileges of the user. (CVE-2017-15715)

  - A session management vulnerability exists in the     mod_session component due to SessionEnv being enabled and     forwarding it's session data to the CGI Application. An     unauthenticated, remote attacker can exploit this, via     tampering the HTTP_SESSION and using a session header, to     influence content. (CVE-2018-1283)

  - An out of bounds access vulnerability exists when the size limit     is reached. An unauthenticated, remote attacker can exploit this,     to cause the Apache HTTP Server to crash. (CVE-2018-1301)

  - A write after free vulnerability exists in HTTP/2 stream due to     a NULL pointer being written to an area of freed memory. An     unauthenticated, remote attacker can exploit this to execute     arbitrary code. (CVE-2018-1302)   
  - An out of bounds read vulnerability exists in mod_cache_socache.
    An unauthenticated, remote attacker can exploit this, via a     specially crafted HTTP request header to cause the application     to stop responding. (CVE-2018-1303)

  - A weak digest vulnerability exists in the HTTP digest     authentication challenge.  An unauthenticated, remote attacker     can exploit this in a cluster of servers configured to use a     common digest authentication, to replay HTTP requests across     servers without being detected. (CVE-2018-1312)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.33 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2017-15710

CVE-2017-15715

CVE-2018-1283

CVE-2018-1301

CVE-2018-1302

CVE-2018-1303

CVE-2018-1312

CWE:

N/A

VPR:

7.4

MEDIUM

CVSS3:

9.0

CVSS:

6.8

The remote web server is affected by a vulnerability.
Die auf dem Remote-Host installierte Version von Apache httpd (2.4) liegt vor 2.4.49. Es ist daher von mehreren Schwachstellen betroffen, auf die im Changelog 2.4.49 verwiesen wird. (CVE-2021-39275, CVE-2021-34798) Beachten Sie, dass die Schwachstellen nicht auf diese Probleme getestet wurden, sondern diese Meldung nur wegen der selbst gemeldeten Versionsnummer der Anwendung angezeigt wird.
The version of Apache httpd installed on the remote host is prior to 2.4.49. It is, therefore, affected by a vulnerability as referenced in the 2.4.49 changelog.

  - A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the   remote user. (CVE-2021-40438)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.49 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2021-40438

CWE:

N/A

VPR:

10.0

MEDIUM

CVSS3:

9.1

CVSS:

6.4

The remote web server is affected by multiple vulnerabilities.
The version of Apache httpd installed on the remote host is prior to 2.4.41. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.41 advisory, including the following:

  - A limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could     cause the link on the error page to be malformed and instead point to a page of their choice. This would     only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way     that the Proxy Error page was displayed. (CVE-2019-10092)

  - HTTP/2 (2.4.20 through 2.4.39) very early pushes, for example configured with H2PushResource, could lead     to an overwrite of memory in the pushing request's pool, leading to crashes. The memory copied is that     of the configured push link header values, not data supplied by the client. (CVE-2019-10081)

  - Some HTTP/2 implementations are vulnerable to unconstrained internal data buffering, potentially leading     to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint;
    however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the     wire. The attacker then sends a stream of requests for a large response object. Depending on how the     servers queue the responses, this can consume excess memory, CPU, or both. (CVE-2019-9517)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.41 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2019-9517

CVE-2019-10081

CVE-2019-10082

CVE-2019-10092

CVE-2019-10097

CVE-2019-10098

CWE:

N/A

VPR:

5.9

MEDIUM

CVSS3:

6.5

CVSS:

6.4

The SSL certificate for this service cannot be trusted.
Das X.509 Zertifikat des Servers ist nicht vertrauenswürdig. Dies kann zum Beispiel daran liegen, dass das Zertifikat ein Selbst-signiertes ist oder die Informationen des Zertifikats passen nicht zu der eingesetzten Domain.
The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below :

  - First, the top of the certificate chain sent by the     server might not be descended from a known public     certificate authority. This can occur either when the     top of the chain is an unrecognized, self-signed     certificate, or when intermediate certificates are     missing that would connect the top of the certificate     chain to a known public certificate authority.

  - Second, the certificate chain may contain a certificate     that is not valid at the time of the scan. This can     occur either when the scan occurs before one of the     certificate's 'notBefore' dates, or after one of the     certificate's 'notAfter' dates.

  - Third, the certificate chain may contain a signature     that either didn't match the certificate's information     or could not be verified. Bad signatures can be fixed by     getting the certificate with the bad signature to be     re-signed by its issuer. Signatures that could not be     verified are the result of the certificate's issuer     using a signing algorithm that Nessus either does not     support or does not recognize.

If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host.

Purchase or generate a proper SSL certificate for this service.

Finding IDAffected System
172.21.11.11
229172.21.11.12
230172.21.11.14
231172.21.11.15
172.21.11.20
234172.21.11.22
235172.21.11.121
236172.21.11.122
237172.21.11.145
238172.21.11.221
239172.21.11.230
172.21.11.250
245172.21.172.24
247172.21.172.45
249172.21.172.100
250172.21.172.105
251172.21.172.106
252172.21.172.146
253172.21.172.240
254172.21.173.11
255172.21.173.111
256172.21.173.112
257172.21.173.121
258172.21.174.31
260172.21.174.33
172.21.198.5
172.21.198.31
172.21.198.230
264172.21.199.19
172.21.199.201
172.21.220.11
268172.21.220.12
172.21.221.45
270172.21.221.53
271172.21.221.54
172.21.221.56
273172.21.221.58
274172.21.221.59
275172.21.221.61
276172.21.221.62
277172.21.221.64
278172.21.221.65
279172.21.221.66
280172.21.221.67
281172.21.221.68
282172.21.221.69
283172.21.221.70
284172.21.221.71
285172.21.221.72
286172.21.221.73
287172.21.221.74
172.21.221.76
290172.21.221.78
291172.21.221.162
292172.21.221.211
293172.21.221.238
294172.21.221.250

CVE:

N/A

CWE:

N/A

VPR:

N/A

MEDIUM

CVSS3:

9.1

CVSS:

6.4

The remote web server is affected by multiple vulnerabilities.
According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.27. It is, therefore, affected by the following vulnerabilities :

  - A denial of service vulnerability exists in httpd due to     a failure to initialize or reset the value placeholder     in [Proxy-]Authorization headers of type 'Digest' before     or between successive key=value assignments by     mod_auth_digest. An unauthenticated, remote attacker can     exploit this, by providing an initial key with no '='     assignment, to disclose sensitive information or cause a     denial of service condition. (CVE-2017-9788)

  - A read-after-free error exists in httpd that is     triggered when closing a large number of connections. An     unauthenticated, remote attacker can exploit this to     have an unspecified impact. (CVE-2017-9789)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.27 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2017-9788

CVE-2017-9789

CWE:

N/A

VPR:

6.0

MEDIUM

CVSS3:

N/A

CVSS:

6.4

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.
Die X.509-Zertifikatkette für den HTTPS-Dienst ist nicht von einer anerkannten Zertifizierungsstelle signiert. Wenn der betroffene Host öffentlich in der Produktion ist, wird die sichere Verwendung von SSL ausgehebelt, da ein Man-in-the-Middle-Angriff wieder möglich wird.
The X.509 certificate chain for this service is not signed by a recognized certificate authority.  If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack against the remote host. 

Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority.

Purchase or generate a proper SSL certificate for this service.

Finding IDAffected System
295172.21.11.11
297172.21.11.22
298172.21.11.121
299172.21.11.122
300172.21.11.230
172.21.11.250
307172.21.172.45
309172.21.172.100
310172.21.172.105
311172.21.172.106
312172.21.172.146
313172.21.172.240
314172.21.173.11
315172.21.173.111
316172.21.173.112
317172.21.173.121
318172.21.174.31
320172.21.174.33
172.21.198.230
322172.21.199.19
172.21.220.11
325172.21.220.12
172.21.221.45
327172.21.221.53
328172.21.221.54
172.21.221.56
330172.21.221.58
331172.21.221.59
332172.21.221.61
333172.21.221.62
334172.21.221.64
335172.21.221.65
336172.21.221.66
337172.21.221.67
338172.21.221.68
339172.21.221.69
340172.21.221.70
341172.21.221.71
342172.21.221.72
343172.21.221.73
344172.21.221.74
172.21.221.76
347172.21.221.78
348172.21.221.162
349172.21.221.211
350172.21.221.238
351172.21.221.250

CVE:

N/A

CWE:

N/A

VPR:

N/A

MEDIUM

CVSS3:

6.5

CVSS:

6.1

The remote service encrypts traffic using an older version of TLS.
The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like 1.2 and 1.3 are designed against these flaws and should be used whenever possible.

As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors.

PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any known exploits.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

Finding IDAffected System
509172.21.11.11
510172.21.11.12
511172.21.11.14
512172.21.11.15
172.21.11.20
515172.21.11.22
516172.21.11.121
517172.21.11.122
518172.21.11.145
519172.21.11.230
520172.21.11.250
524172.21.172.37
525172.21.172.45
527172.21.172.100
528172.21.172.105
529172.21.172.106
530172.21.172.146
531172.21.172.240
532172.21.173.11
533172.21.173.111
534172.21.173.112
535172.21.173.121
536172.21.174.31
538172.21.174.33
172.21.198.5
172.21.198.230
541172.21.199.19
172.21.199.201
172.21.220.11
544172.21.220.12
172.21.221.45
546172.21.221.53
547172.21.221.54
172.21.221.56
549172.21.221.58
550172.21.221.59
551172.21.221.61
552172.21.221.62
553172.21.221.64
554172.21.221.65
555172.21.221.66
556172.21.221.67
557172.21.221.68
558172.21.221.69
559172.21.221.70
560172.21.221.71
561172.21.221.72
562172.21.221.73
563172.21.221.74
564172.21.221.76
565172.21.221.78
566172.21.221.162
567172.21.221.211
568172.21.221.238
569172.21.221.250

CVE:

N/A

CWE:

N/A

VPR:

N/A

MEDIUM

CVSS3:

6.5

CVSS:

5.8

The remote host has IP forwarding enabled.
Auf dem Remotehost ist die IP-Weiterleitung aktiviert. Ein Angreifer kann dies ausnutzen, um Pakete durch den Host zu leiten und möglicherweise einige Firewalls / Router zu umgehen. Sofern es sich bei dem Remotehost nicht um einen Router handelt, wird empfohlen, die IP-Weiterleitung zu deaktivieren.
The remote host has IP forwarding enabled. An attacker can exploit this to route packets through the host and potentially bypass some firewalls / routers / NAC filtering.

Unless the remote host is a router, it is recommended that you disable IP forwarding.

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

Finding IDAffected System
214172.21.172.21
216172.21.172.45
217172.21.172.46
218172.21.172.47
219172.21.172.100
220172.21.172.101
221172.21.172.105
222172.21.172.106
223172.21.172.146
224172.21.172.147
225172.21.172.200
226172.21.172.240

CVE:

CVE-1999-0511

CWE:

N/A

VPR:

4.0

MEDIUM

CVSS3:

6.1

CVSS:

5.8

The remote web server is affected by multiple vulnerabilities.
The version of Apache httpd installed on the remote host is prior to 2.4.42. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.42 advisory.

  - In Apache HTTP Server 2.4.0 to 2.4.41, mod_proxy_ftp may     use uninitialized memory when proxying to a malicious     FTP server. (CVE-2020-1934)

  - In Apache HTTP Server 2.4.0 to 2.4.41, redirects     configured with mod_rewrite that were intended to be     self-referential might be fooled by encoded newlines and     redirect instead to an unexpected URL within the     request URL. (CVE-2020-1927)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.42 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2020-1927

CVE-2020-1934

CWE:

N/A

VPR:

3.8

MEDIUM

CVSS3:

7.5

CVSS:

5.0

An SSL certificate in the certificate chain has been signed using a weak hash algorithm.
The remote service uses an SSL certificate chain that has been signed using a cryptographically weak hashing algorithm (e.g. MD2, MD4, MD5, or SHA1). These signature algorithms are known to be vulnerable to collision attacks. An attacker can exploit this to generate another certificate with the same digital signature, allowing an attacker to masquerade as the affected service.

Note that this plugin reports all SSL certificate chains signed with SHA-1 that expire after January 1, 2017 as vulnerable. This is in accordance with Google's gradual sunsetting of the SHA-1 cryptographic hash algorithm.

Note that certificates in the chain that are contained in the Nessus CA database (known_CA.inc) have been ignored.

Contact the Certificate Authority to have the SSL certificate reissued.

Finding IDAffected System
201172.21.11.11
202172.21.11.230
203172.21.11.250
206172.21.221.211

CVE:

CVE-2004-2761

CWE:

310

VPR:

6.1

MEDIUM

CVSS3:

8.6

CVSS:

5.0

The remote name server is affected by Service Downgrade / Reflected DoS vulnerabilities.
According to its self-reported version, the instance of ISC BIND 9 running on the remote name server is affected by performance downgrade and Reflected DoS vulnerabilities. This is due to BIND DNS not sufficiently limiting the number fetches which may be performed while processing a referral response.

An unauthenticated, remote attacker can exploit this to cause degrade the service of the recursive server or to use the affected server as a reflector in a reflection attack.

Upgrade to the ISC BIND version referenced in the vendor advisory.

Finding IDAffected System
637172.21.0.16

CVE:

CVE-2020-8616

CWE:

N/A

VPR:

5.2

MEDIUM

CVSS3:

7.5

CVSS:

5.0

The remote web server is affected by multiple vulnerabilities.
According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.34. It is, therefore, affected by the following vulnerabilities:

  - By specially crafting HTTP/2 requests, workers would be     allocated 60 seconds longer than necessary, leading to     worker exhaustion and a denial of service. (CVE-2018-1333)

  - By specially crafting HTTP requests, the mod_md challenge     handler would dereference a NULL pointer and cause the     child process to segfault. This could be used to DoS the     server. (CVE-2018-8011)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.34 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2018-1333

CVE-2018-8011

CWE:

N/A

VPR:

3.6

MEDIUM

CVSS3:

7.5

CVSS:

5.0

The remote web server is affected by multiple vulnerabilities.
According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.28. It is, therefore, affected by an HTTP vulnerability related to the <Limit {method}> directive in an .htaccess file.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.28 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2017-9798

CWE:

N/A

VPR:

6.1

MEDIUM

CVSS3:

5.3

CVSS:

5.0

Debugging functions are enabled on the remote web server.
The remote web server supports the TRACE and/or TRACK methods. TRACE and TRACK are HTTP methods that are used to debug web server connections.

Disable these HTTP methods. Refer to the plugin output for more information.

Finding IDAffected System
172.21.11.12
172.21.221.211

CVE:

CVE-2003-1567

CVE-2004-2320

CVE-2010-0386

CWE:

16

200

VPR:

4.0

MEDIUM

CVSS3:

5.3

CVSS:

5.0

The remote DNS server is vulnerable to cache snooping attacks.
The remote DNS server responds to queries for third-party domains that do not have the recursion bit set. 

This may allow a remote attacker to determine which domains have recently been resolved via this name server, and therefore which hosts have been recently visited. 

For instance, if an attacker was interested in whether your company utilizes the online services of a particular financial institution, they would be able to use this attack to build a statistical model regarding company usage of that financial institution.  Of course, the attack can also be used to find B2B partners, web-surfing patterns, external mail servers, and more.

Note: If this is an internal DNS server not accessible to outside networks, attacks would be limited to the internal network. This may include employees, consultants and potentially users on a guest network or WiFi connection if supported.

Contact the vendor of the DNS software for a fix.

Finding IDAffected System
133172.21.0.2
134172.21.0.16
136172.21.11.5
172.21.198.5

CVE:

N/A

CWE:

N/A

VPR:

N/A

MEDIUM

CVSS3:

7.5

CVSS:

5.0

The remote web server is affected by multiple vulnerabilities.
According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.38. It is, therefore, affected by multiple vulnerabilities:

  - A denial of service (DoS) vulnerability exists in HTTP/2 steam     handling. An unauthenticated, remote attacker can exploit this     issue, via sending request bodies in a slow loris way to plain     resources, to occupy a server thread. (CVE-2018-17189)

  - A vulnerability exists in mod_sesion_cookie, as it does not     properly check the expiry time of cookies. (CVE-2018-17199) 

  - A denial of service (DoS) vulnerability exists in mod_ssl when     used with OpenSSL 1.1.1 due to an interaction in changes to     handling of renegotiation attempts. An unauthenticated, remote     attacker can exploit this issue to cause mod_ssl to stop     responding. (CVE-2019-0190)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.38 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2018-17189

CVE-2018-17199

CVE-2019-0190

CWE:

N/A

VPR:

3.6

MEDIUM

CVSS3:

5.8

CVSS:

5.0

The remote NTP server responds to mode 6 queries.
Der vom Server eingesetzte NTP Dienst weist eine Schwachstelle auf, die von Angreifern für eine Denial of Service Attacke genutzt werden kann. Der Dienst sollte umkonfiguriert werden, um dies zu verhindern.
The remote NTP server responds to mode 6 queries. Devices that respond to these queries have the potential to be used in NTP amplification attacks. An unauthenticated, remote attacker could potentially exploit this, via a specially crafted mode 6 query, to cause a reflected denial of service condition.

Restrict NTP mode 6 queries.

Finding IDAffected System
502172.21.221.250

CVE:

N/A

CWE:

N/A

VPR:

N/A

MEDIUM

CVSS3:

7.5

CVSS:

5.0

The remote NTP server is affected by a denial of service vulnerability.
In der Version von ntpd, die auf dem Remote-Host ausgeführt wird, ist der Befehl "monlist" aktiviert. Dieser Befehl gibt eine Liste mit IP-Adressen zurück, die eine Verbindung mit dem Dienst hergestellt haben. Diese Version des ntpd ist verwundbar und ermöglicht einem nicht authentifizierten Remoteangreifer, den Netzwerkverkehr mithilfe gefälschter Anfragen zu manipulieren. Darüber hinaus kann ein Angreifer dieses Problem ausnutzen, um Aufklärungs- oder Distributed-Denial-of-Service-Angriffe (DDoS) durchzuführen.
The version of ntpd running on the remote host has the 'monlist' command enabled. This command returns a list of recent hosts that have connected to the service. However, it is affected by a denial of service vulnerability in ntp_request.c that allows an unauthenticated, remote attacker to saturate network traffic to a specific IP address by using forged REQ_MON_GETLIST or REQ_MON_GETLIST_1 requests.
Furthermore, an attacker can exploit this issue to conduct reconnaissance or distributed denial of service (DDoS) attacks.

If using NTP from the Network Time Protocol Project, upgrade to NTP version 4.2.7-p26 or later. Alternatively, add 'disable monitor' to the ntp.conf configuration file and restart the service. Otherwise, limit access to the affected service to trusted hosts, or contact the vendor for a fix.

Finding IDAffected System
436172.21.221.250

CVE:

CVE-2013-5211

CWE:

N/A

VPR:

4.4

MEDIUM

CVSS3:

7.5

CVSS:

5.0

The version of PHP running on the remote web server is affected by multiple vulnerabilities.
Gemäß der selbst gemeldeten Versionsnummer liegt die php-Version, die auf dem Remote-Webserver ausgeführt wird, vor 7.3.24. Es ist daher von mehreren Schwachstellen betroffen.
According to its self-reported version number, the version of PHP running on the remote web server is prior to 7.3.24. It is, therefore affected by multiple vulnerabilities

Upgrade to PHP version 7.3.24 or later.

Finding IDAffected System
172.21.17.13
172.21.17.14
172.21.221.31

CVE:

N/A

CWE:

N/A

VPR:

N/A

MEDIUM

CVSS3:

5.3

CVSS:

5.0

The SSL certificate for this service is for a different host.
Das Attribut 'commonName' (CN) des SSL-Zertifikats ist nicht für den angebotenen Dienst ausgestellt.
The 'commonName' (CN) attribute of the SSL certificate presented for this service is for a different machine.

Purchase or generate a proper SSL certificate for this service.

Finding IDAffected System
213172.21.199.19

CVE:

N/A

CWE:

N/A

VPR:

N/A

MEDIUM

CVSS3:

7.5

CVSS:

5.0

The remote web server is affected by a vulnerability.
Die auf dem Remote-Host installierte Version von Apache httpd ist größer als 2.4.17 und kleiner 2.4.49. Es ist daher von einer Schwachstelle betroffen, auf die im Changelog 2.4.49 verwiesen wird. Eine gestaltete Methode, die über HTTP/2 gesendet wird, umgeht die Validierung und wird von mod_proxy weitergeleitet, was zu Anforderungsaufteilung oder Cache-Poisoning führen kann. Beachten Sie, dass die Schwachstellen nicht auf diese Probleme getestet wurden, sondern diese Meldung nur wegen der selbst gemeldeten Versionsnummer der Anwendung angezeigt wird.
The version of Apache httpd installed on the remote host is greater than 2.4.17 and prior to 2.4.49. It is, therefore, affected by a vulnerability as referenced in the 2.4.49 changelog. A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.49 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2021-33193

CWE:

N/A

VPR:

5.1

MEDIUM

CVSS3:

5.3

CVSS:

5.0

Signing is not required on the remote SMB server.
Signing is not required on the remote SMB server. An unauthenticated, remote attacker can exploit this to conduct man-in-the-middle attacks against the SMB server.

Enforce message signing in the host's configuration. On Windows, this is found in the policy setting 'Microsoft network server: Digitally sign communications (always)'. On Samba, the setting is called 'server signing'. See the 'see also' links for further details.

Finding IDAffected System
352172.21.21.11
353172.21.199.211

CVE:

N/A

CWE:

N/A

VPR:

N/A

MEDIUM

CVSS3:

5.3

CVSS:

5.0

The version of PHP running on the remote web server is affected by an email header injection vulnerability.
Gemäß der selbst angegebenen Versionsnummer liegt die php-Version, die auf dem Remote-Webserver ausgeführt wird, vor 7.3.28. Es ist daher von einer E-Mail-Header-Injection-Schwachstelle betroffen, die auf ein Versäumnis zurückzuführen ist, die CR-LF-Sequenzen in Header-Feldern ordnungsgemäß zu verarbeiten. Ein nicht authentifizierter, entfernter Angreifer kann dies ausnutzen, indem er Zeilenvorschubzeichen in E-Mail-Header einfügt, um die volle Kontrolle über den Inhalt von E-Mail-Headern zu erhalten.
According to its self-reported version number, the version of PHP running on the remote web server is prior to 7.3.28.
It is, therefore affected by an email header injection vulnerability, due to a failure to properly handle CR-LF sequences in header fields. An unauthenticated, remote attacker can exploit this, by inserting line feed characters into email headers, to gain full control of email header content.

Upgrade to PHP version 7.3.28 or later.

Finding IDAffected System
172.21.17.13
172.21.17.14
172.21.221.31

CVE:

N/A

CWE:

N/A

VPR:

N/A

MEDIUM

CVSS3:

7.5

CVSS:

5.0

The remote service supports the use of medium strength SSL ciphers.
Auf dem Webserver verwendete Verfahren erlauben Zugriff auf einige Sicherungsdateien. Es sollte sichergestellt werden, daß diese keine sensitiven Informationen enthalten, wie Passwörter für Datenbanken. Nicht benötigte Dateien sollten gelöscht werden.
The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses the 3DES encryption suite.

Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same physical network.

Reconfigure the affected application if possible to avoid use of medium strength ciphers.

Finding IDAffected System
209172.21.199.19
172.21.220.11
211172.21.221.76
212172.21.221.211

CVE:

CVE-2016-2183

CWE:

N/A

VPR:

4.4

MEDIUM

CVSS3:

5.3

CVSS:

5.0

The remote server's SSL certificate has already expired.
Das vom Webdienst verwendete SSL Zertifikat ist nicht mehr gültig. Der Dienst sollte umgehend konfiguriert und ein neues Zertifikat verwendet werden.
This plugin checks expiry dates of certificates associated with SSL- enabled services on the target and reports whether any have already expired.

Purchase or generate a new SSL certificate to replace the existing one.

Finding IDAffected System
172.21.11.145
145172.21.172.24
172.21.199.201
172.21.220.11
147172.21.221.76
148172.21.221.211

CVE:

N/A

CWE:

N/A

VPR:

N/A

MEDIUM

CVSS3:

5.3

CVSS:

5.0

The remote web server is affected by an information disclosure vulnerability.
The Apache web server running on the remote host is affected by an information disclosure vulnerability. An unauthenticated, remote attacker can exploit this, by sending a crafted request, to display a listing of a remote directory, even if a valid index file exists in the directory.

For Apache web server later than 1.3.22, review listing directory configuration to avoid disclosing sensitive information

Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.

Finding IDAffected System
804172.21.11.145
172.21.11.250
172.21.172.105
127172.21.172.146

CVE:

CVE-2001-0731

CWE:

N/A

VPR:

2.2

MEDIUM

CVSS3:

5.3

CVSS:

4.3

The remote web server is affected by an information disclosure vulnerability.
Laut dem Server-Antwort-Header liegt die installierte Version von nginx vor 1.17.7. Es ist daher von einer Schwachstelle zur Offenlegung von Informationen betroffen.
According to its Server response header, the installed version of nginx is prior to 1.17.7. It is, therefore, affected by an information disclosure vulnerability.

Upgrade to nginx version 1.17.7 or later.

Finding IDAffected System
172.21.11.221
624172.21.198.20
625172.21.198.21
172.21.198.22
627172.21.198.23
172.21.198.31
172.21.198.110
172.21.198.111
631172.21.198.112
172.21.198.113
172.21.198.250
172.21.198.251

CVE:

CVE-2019-20372

CWE:

N/A

VPR:

1.4

MEDIUM

CVSS3:

3.7

CVSS:

4.3

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.
Die Webanwendung auf dem Remote-Host ist von einer Cross-Site-Scripting-Schwachstelle betroffen, die auf eine anfällige Version von Apache Struts 2 zurückzuführen ist, die die Parameter in den Tags "s:a" und "s:url" nicht richtig kodiert. Ein entfernter Angreifer kann dies ausnutzen, indem er einen Benutzer dazu verleitet, eine Seite mit beliebigem Skriptcode anzufordern. Dies kann Konsequenzen haben, z. B. gestohlene Anmeldeinformationen für die Authentifizierung.
The web application on the remote host is affected by a cross-site scripting vulnerability due to a vulnerable version of Apache Struts 2 that fails to properly encode the parameters in the 's:a' and 's:url' tags.

A remote attacker can exploit this by tricking a user into requesting a page with arbitrary script code injected. This could have consequences such as stolen authentication credentials.

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

Finding IDAffected System
172.21.17.11
172.21.17.12
172.21.17.13
172.21.17.14

CVE:

CVE-2008-6682

CWE:

79

VPR:

1.4

MEDIUM

CVSS3:

6.8

CVSS:

4.3

It is possible to obtain sensitive information from the remote host with SSL/TLS-enabled services.
Der Remotehost ist von einer Man-in-the-Middle-Angriff (MitM) betroffen, die als POODLE bezeichnet wird. Die Sicherheitsanfälligkeit ist auf die Art und Weise zurückzuführen, wie SSL 3.0 beim Entschlüsseln von Nachrichten, die mit Blockchiffren verschlüsselt wurden, im CBC-Modus (Cipher Block Chaining, Verschlüsselung) verarbeitet. MitM-Angreifer können ein ausgewähltes Byte eines Chiffretextes in nur 256 Versuchen entschlüsseln, wenn sie die betroffene Applikation zwingen können, wiederholt dieselben Daten über neu erstellte SSL 3.0-Verbindungen zu senden. Solange sowohl ein Client als auch ein Dienst SSLv3 unterstützen, kann eine Verbindung auf SSLv3 "zurückgesetzt" werden, auch wenn TLSv1 oder neuer vom Client und Dienst unterstützt wird. Der TLS Fallback SCSV-Mechanismus verhindert "Versions-Rollback"-Angriffe, ohne Legacy-Clients zu beeinträchtigen. Verbindungen können jedoch nur geschützt werden, wenn Client und Dienst den Mechanismus unterstützen. Websites, die SSLv3 nicht sofort deaktivieren können, sollten diesen Mechanismus aktivieren. Dies ist eine Schwachstelle in der SSLv3-Spezifikation, nicht in einer bestimmten SSL-Implementierung. Das Deaktivieren von SSLv3 ist die einzige Möglichkeit, die Schwachstelle vollständig zu verringern.
The remote host is affected by a man-in-the-middle (MitM) information disclosure vulnerability known as POODLE. The vulnerability is due to the way SSL 3.0 handles padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode.
MitM attackers can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections.

As long as a client and service both support SSLv3, a connection can be 'rolled back' to SSLv3, even if TLSv1 or newer is supported by the client and service.

The TLS Fallback SCSV mechanism prevents 'version rollback' attacks without impacting legacy clients; however, it can only protect connections when the client and service support the mechanism. Sites that cannot disable SSLv3 immediately should enable this mechanism.

This is a vulnerability in the SSLv3 specification, not in any particular SSL implementation. Disabling SSLv3 is the only way to completely mitigate the vulnerability.

Disable SSLv3. Services that must support SSLv3 should enable the TLS Fallback SCSV mechanism until SSLv3 can be disabled.

Finding IDAffected System
437172.21.221.211

CVE:

CVE-2014-3566

CWE:

N/A

VPR:

5.7

MEDIUM

CVSS3:

N/A

CVSS:

4.3

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.
Die vom Webdienst verwendeten Verschlüsselungsalgorithmen weisen Konfigurationsschwächen auf. Die Konfiguration sollte geändert und arcfour Algorithmen gelöscht werden.
Nessus has detected that the remote SSH server is configured to use the Arcfour stream cipher or no cipher at all. RFC 4253 advises against using Arcfour due to an issue with weak keys.

Contact the vendor or consult product documentation to remove the weak ciphers.

Finding IDAffected System
456172.21.0.4
457172.21.0.9
458172.21.0.10
459172.21.0.15
460172.21.0.16
461172.21.17.11
462172.21.17.12
463172.21.17.13
464172.21.17.14
466172.21.147.1
467172.21.172.22
468172.21.172.37
469172.21.173.11
172.21.221.4
471172.21.221.9
172.21.221.24
473172.21.221.27
172.21.221.31
475172.21.221.32
172.21.221.36
477172.21.221.37
478172.21.221.40
479172.21.221.41
480172.21.221.42
481172.21.221.46
172.21.221.47
172.21.221.48
172.21.221.50
485172.21.221.200
486172.21.221.201
487172.21.221.211
488172.21.221.233
489172.21.221.240
490172.21.221.241
491172.21.221.243

CVE:

N/A

CWE:

N/A

VPR:

N/A

MEDIUM

CVSS3:

5.3

CVSS:

4.3

The remote web server is affected by an information disclosure vulnerability.
The remote web server is affected by an information disclosure vulnerability due to the ETag header providing sensitive information that could aid an attacker, such as the inode number of requested files.

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

Finding IDAffected System
439172.21.0.16
172.21.17.11
172.21.17.12
172.21.17.14
442172.21.221.9
172.21.221.24
444172.21.221.32
172.21.221.36
446172.21.221.37
447172.21.221.40
448172.21.221.41
449172.21.221.42
172.21.221.47
451172.21.221.211
452172.21.221.233
453172.21.221.240
454172.21.221.241
455172.21.221.243

CVE:

CVE-2003-1418

CWE:

200

VPR:

1.4

MEDIUM

CVSS3:

5.9

CVSS:

4.3

The remote service supports the use of the RC4 cipher.
Die vom Webdienst verwendeten Verschlüsselungsalgorithmen weisen Konfigurationsschwächen auf. Die Konfiguration sollte geändert und RC4 gelöscht werden.
The remote host supports the use of RC4 in one or more cipher suites.
The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small biases are introduced into the stream, decreasing its randomness.

If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of millions) ciphertexts, the attacker may be able to derive the plaintext.

Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.

Finding IDAffected System
172.21.220.11
362172.21.221.76
363172.21.221.211

CVE:

CVE-2013-2566

CVE-2015-2808

CWE:

N/A

VPR:

3.6

MEDIUM

CVSS3:

6.1

CVSS:

4.3

The remote web server is affected by multiple cross site scripting vulnerability.
Gemäß der selbstberichteten Version im Skript ist die auf dem Remotewebserver gehostete Version von JQuery größer oder gleich 1.2 und vor 3.5.0. Es ist daher von mehreren Cross-Site-Scripting-Schwachstellen betroffen. Beachten Sie, dass die Schwachstellen, auf die in diesem Plugin verwiesen wird, keine Sicherheitsauswirkungen auf PAN-OS haben und/oder die szenarien, die für eine erfolgreiche Ausnutzung erforderlich sind, auf Geräten, auf denen eine PAN-OS-Version ausgeführt wird, nicht vorhanden sind.
According to the self-reported version in the script, the version of JQuery hosted on the remote web server is greater than or equal to 1.2 and prior to 3.5.0. It is, therefore, affected by multiple cross site scripting vulnerabilities.

Note, the vulnerabilities referenced in this plugin have no security impact on PAN-OS, and/or the scenarios required for successful exploitation do not exist on devices running a PAN-OS release.

Upgrade to JQuery version 3.5.0 or later.

Finding IDAffected System
641172.21.11.121
172.21.17.13

CVE:

CVE-2020-11022

CVE-2020-11023

CWE:

N/A

VPR:

5.7

MEDIUM

CVSS3:

5.9

CVSS:

4.3

The remote web server is affected by a denial of service vulnerability.
According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.35. It is, therefore, affected by the following vulnerability:

  - By sending continuous SETTINGS frames of maximum size an ongoing   HTTP/2 connection could be kept busy and would never time out. This   can be abused for a DoS on the server. This only affect a server   that has enabled the h2 protocol.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Upgrade to Apache version 2.4.35 or later.

Finding IDAffected System
172.21.11.12

CVE:

CVE-2018-11763

CWE:

N/A

VPR:

3.6

MEDIUM

CVSS3:

6.5

CVSS:

4.0

The remote name server is affected by a denial of service vulnerability.
According to its self-reported version number, the installation of ISC BIND running on the remote name server is version 9.x prior to 9.11.22, 9.12.x prior to 9.16.6 or 9.17.x prior to 9.17.4. It is, therefore, affected by a denial of service (DoS) vulnerability due to an assertion failure when attempting to verify a truncated response to a TSIG-signed request. An authenticated, remote attacker can exploit this issue by sending a truncated response to a TSIG-signed request to trigger an assertion failure, causing the server to exit.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version   number.

Upgrade to BIND 9.11.22, 9.16.6, 9.17.4 or later.

Finding IDAffected System
648172.21.0.16

CVE:

CVE-2020-8622

CWE:

N/A

VPR:

4.4

LOW

CVSS3:

N/A

CVSS:

N/A

The X.509 certificate chain used by this service contains certificates with RSA keys shorter than 2048 bits.
Mindestens eines der vom Remotehost gesendeten X.509-Zertifikate hat einen Schlüssel, der kürzer als 2048 Bit ist. Gemäß den vom Certification Authority/Browser (CA/B) Forum festgelegten Industriestandards müssen Zertifikate, die nach dem 1. Januar 2014 ausgestellt wurden, mindestens 2048 Bit groß sein. Einige Browser-SSL-Implementierungen können Schlüssel mit weniger als 2048 Bit nach dem 1. Januar 2014 ablehnen. Darüber hinaus können einige SSL-Zertifikatanbieter Zertifikate mit weniger als 2048 Bit vor dem 1. Januar 2014 widerrufen.
At least one of the X.509 certificates sent by the remote host has a key that is shorter than 2048 bits. According to industry standards set by the Certification Authority/Browser (CA/B) Forum, certificates issued after January 1, 2014 must be at least 2048 bits.

Some browser SSL implementations may reject keys less than 2048 bits after January 1, 2014. Additionally, some SSL certificate vendors may revoke certificates less than 2048 bits before January 1, 2014.

Note that Nessus will not flag root certificates with RSA keys less than 2048 bits if they were issued prior to December 31, 2010, as the standard considers them exempt.

Replace the certificate in the chain with the RSA key less than 2048 bits in length with a longer key, and reissue any certificates signed by the old certificate.

Finding IDAffected System
364172.21.172.24
172.21.220.11
366172.21.221.76

CVE:

N/A

CWE:

N/A

VPR:

N/A

LOW

CVSS3:

5.9

CVSS:

2.6

The remote service supports the use of anonymous SSL ciphers.
Der Remote-Host unterstützt die Verwendung anonymer SSL-Verschlüsselung. Auf diese Weise kann ein Administrator einen Dienst einrichten, der den Datenverkehr verschlüsselt, ohne dass SSL-Zertifikate generiert und konfiguriert werden müssen. Er bietet jedoch keine Möglichkeit, die Identität des Remotehosts zu überprüfen und macht den Dienst anfällig für Man-in-the-Middle-Angriffe.
The remote host supports the use of anonymous SSL ciphers. While this enables an administrator to set up a service that encrypts traffic without having to generate and configure SSL certificates, it offers no way to verify the remote host's identity and renders the service vulnerable to a man-in-the-middle attack.

Note: This is considerably easier to exploit if the attacker is on the same physical network.

Reconfigure the affected application if possible to avoid use of weak ciphers.

Finding IDAffected System
150172.21.11.22
151172.21.172.37
152172.21.174.31
154172.21.174.33
172.21.220.11
156172.21.221.76

CVE:

CVE-2007-1858

CWE:

N/A

VPR:

4.4

LOW

CVSS3:

N/A

CVSS:

2.6

The remote POP3 daemon allows credentials to be transmitted in cleartext.
The remote host is running a POP3 daemon that allows cleartext logins over unencrypted connections. An attacker can uncover user names and passwords by sniffing traffic to the POP3 daemon if a less secure authentication mechanism (eg, USER command, AUTH PLAIN, AUTH LOGIN) is used.

Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.

Finding IDAffected System
138172.21.11.11
139172.21.11.12
140172.21.11.14
141172.21.11.15
142172.21.11.17
143172.21.11.20
172.21.198.5

CVE:

N/A

CWE:

N/A

VPR:

N/A

LOW

CVSS3:

3.7

CVSS:

2.6

The remote SSH server is configured to allow weak key exchange algorithms.
The remote SSH server is configured to allow key exchange algorithms which are considered weak.

This is based on the IETF draft document Key Exchange (KEX) Method Updates and Recommendations for Secure Shell (SSH) draft-ietf-curdle-ssh-kex-sha2-20. Section 4 lists guidance on key exchange algorithms that SHOULD NOT and MUST NOT be enabled. This includes:

  diffie-hellman-group-exchange-sha1

  diffie-hellman-group1-sha1

  gss-gex-sha1-*

  gss-group1-sha1-*

  gss-group14-sha1-*

  rsa1024-sha1

Note that this plugin only checks for the options of the SSH server, and it does not check for vulnerable software versions.

Contact the vendor or consult product documentation to disable the weak algorithms.

Finding IDAffected System
694172.21.0.4
695172.21.0.9
696172.21.0.10
697172.21.0.15
698172.21.0.16
699172.21.17.11
700172.21.17.12
701172.21.17.13
702172.21.17.14
704172.21.147.1
705172.21.172.22
706172.21.172.37
172.21.198.171
172.21.198.181
709172.21.198.182
172.21.221.4
711172.21.221.9
172.21.221.24
713172.21.221.27
172.21.221.31
715172.21.221.32
172.21.221.36
717172.21.221.37
718172.21.221.40
719172.21.221.41
720172.21.221.42
721172.21.221.46
172.21.221.47
172.21.221.48
172.21.221.50
725172.21.221.200
726172.21.221.201
727172.21.221.211
728172.21.221.233
729172.21.221.240
730172.21.221.241
731172.21.221.243

CVE:

N/A

CWE:

N/A

VPR:

N/A

LOW

CVSS3:

N/A

CVSS:

2.6

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow either MD5 or 96-bit MAC algorithms, both of which are considered weak.

Note that this plugin only checks for the options of the SSH server, and it does not check for vulnerable software versions.

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

Finding IDAffected System
401172.21.0.4
402172.21.0.9
403172.21.0.10
404172.21.0.15
405172.21.0.16
406172.21.17.11
407172.21.17.12
408172.21.17.13
409172.21.17.14
411172.21.147.1
412172.21.172.22
413172.21.172.37
172.21.221.4
415172.21.221.9
172.21.221.24
417172.21.221.27
172.21.221.31
419172.21.221.32
172.21.221.36
421172.21.221.37
422172.21.221.40
423172.21.221.41
424172.21.221.42
425172.21.221.46
172.21.221.47
172.21.221.48
172.21.221.50
429172.21.221.200
430172.21.221.201
431172.21.221.211
432172.21.221.233
433172.21.221.240
434172.21.221.241
435172.21.221.243

CVE:

N/A

CWE:

N/A

VPR:

N/A

LOW

CVSS3:

N/A

CVSS:

2.6

The SSH server is configured to use Cipher Block Chaining.
The SSH server is configured to support Cipher Block Chaining (CBC) encryption.  This may allow an attacker to recover the plaintext message from the ciphertext. 

Note that this plugin only checks for the options of the SSH server and does not check for vulnerable software versions.

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

Finding IDAffected System
367172.21.0.4
368172.21.0.9
369172.21.0.10
370172.21.0.15
371172.21.0.16
372172.21.17.11
373172.21.17.12
374172.21.17.13
375172.21.17.14
377172.21.147.1
378172.21.172.37
172.21.221.4
380172.21.221.9
172.21.221.24
382172.21.221.27
172.21.221.31
384172.21.221.32
172.21.221.36
386172.21.221.37
387172.21.221.40
388172.21.221.41
389172.21.221.42
390172.21.221.46
172.21.221.47
172.21.221.48
172.21.221.50
394172.21.221.200
395172.21.221.201
396172.21.221.211
397172.21.221.233
398172.21.221.240
399172.21.221.241
400172.21.221.243

CVE:

CVE-2008-5161

CWE:

200

VPR:

2.5

LOW

CVSS3:

N/A

CVSS:

2.6

The remote service has a configuration that may make it vulnerable to the CRIME attack.
Der Remotedienst verfügt über eine von zwei Konfigurationen, von denen bekannt ist, dass sie für den CRIME-Angriff erforderlich sind: 1. SSL / TLS-Komprimierung ist aktiviert 0der 2. TLS kündigt das SPDY-Protokoll vor Version 4 an.
The remote service has one of two configurations that are known to be required for the CRIME attack :

  - SSL / TLS compression is enabled.

  - TLS advertises the SPDY protocol earlier than version 4.

Note that Nessus did not attempt to launch the CRIME attack against the remote service.

Disable compression and / or the SPDY service.

Finding IDAffected System
360172.21.221.211

CVE:

CVE-2012-4929

CVE-2012-4930

CWE:

N/A

VPR:

5.9

INFO

CVSS3:

0.0

CVSS:

0.0

An ONC RPC portmapper is running on the remote host.
The RPC portmapper is running on this port.

The portmapper allows someone to get the port number of each RPC service running on the remote host by sending either multiple lookup requests or a DUMP request.

n/a

Finding IDAffected System
104172.21.0.2
105172.21.0.4
106172.21.0.10
107172.21.0.15
108172.21.0.16
109172.21.0.23
110172.21.0.24
111172.21.0.25
112172.21.0.250
113172.21.174.31
115172.21.174.33
116172.21.174.220
117172.21.198.240
172.21.198.250
172.21.198.251
172.21.199.201

CVE:

CVE-1999-0632

CWE:

N/A

VPR:

N/A

INFO

CVSS3:

0.0

CVSS:

0.0

It is possible to determine the exact time set on the remote host.
The remote host answers to an ICMP timestamp request.  This allows an attacker to know the date that is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-based authentication protocols.

Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect, but usually within 1000 seconds of the actual system time.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

Finding IDAffected System
1172.21.0.2
2172.21.0.4
3172.21.0.9
4172.21.0.10
5172.21.0.15
6172.21.0.16
7172.21.0.23
8172.21.0.24
9172.21.0.25
10172.21.0.101
11172.21.0.250
172.21.1.1
13172.21.1.11
14172.21.1.13
15172.21.1.101
16172.21.11.4
17172.21.11.5
19172.21.11.22
20172.21.11.121
21172.21.11.122
22172.21.11.145
23172.21.11.230
24172.21.11.250
25172.21.17.11
26172.21.17.12
27172.21.17.13
28172.21.17.14
30172.21.21.11
31172.21.70.11
32172.21.147.1
33172.21.172.21
35172.21.172.37
36172.21.172.42
37172.21.172.44
38172.21.172.45
39172.21.172.46
40172.21.172.47
41172.21.172.100
42172.21.172.101
43172.21.172.105
44172.21.172.106
45172.21.172.146
46172.21.172.147
47172.21.172.200
48172.21.172.240
49172.21.173.11
50172.21.173.111
51172.21.173.112
52172.21.173.121
53172.21.173.200
54172.21.174.11
55172.21.174.31
56172.21.174.32
57172.21.174.33
58172.21.174.220
59172.21.174.230
60172.21.198.11
61172.21.198.20
62172.21.198.21
172.21.198.22
64172.21.198.23
65172.21.198.24
66172.21.198.30
172.21.198.32
172.21.198.110
172.21.198.111
70172.21.198.112
172.21.198.113
72172.21.198.114
172.21.198.171
172.21.198.181
75172.21.198.182
172.21.198.230
77172.21.198.240
172.21.198.250
172.21.198.251
172.21.199.201
81172.21.199.211
172.21.220.11
83172.21.220.12
172.21.221.4
172.21.221.11
172.21.221.24
172.21.221.26
172.21.221.31
172.21.221.36
91172.21.221.40
92172.21.221.41
172.21.221.50
172.21.221.56
95172.21.221.76
96172.21.221.200
97172.21.221.201
98172.21.221.211
99172.21.221.233
100172.21.221.238
101172.21.221.240
102172.21.221.241
103172.21.221.243

CVE:

CVE-1999-0524

CWE:

200

VPR:

N/A

Full detection information for each system can be found in this section. Changes observed since the previous scan are highlighted.

All scanned systems
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
Down Critical High Medium Low Info Nonex No WAF
Please click on a system in the grid to view its details here

172.21.17.13 (VulnLIB) CRITICAL CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 10:57:04 2022-03-26 22:25:40
WAFs detected:
  • 172.21.17.13
  • No reverse DNS entries
  • 172.21.17.13
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
tcp9292www
Protocol Port Service
tcp80www
tcp999ssh
tcp9292www
Vulnerabilities detected:
CRITICALID: 356

The remote host contains an unsupported version of a web application scripting language.

Source              : X-Powered-By: PHP/5.4.45-0+deb7u7
  Installed version   : 5.4.45-0+deb7u7
  End of support date : 2015/09/03
  Announcement        : http://php.net/supported-versions.php
  Supported versions  : 7.3.x / 7.4.x / 8.0.x

Upgrade to a version of PHP that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Nessus was able to exploit the issue using the following URL :

  http://172.21.17.13:9292/?"><script>alert('struts_sa_surl_xss.nasl-1647596530')</script>
Nessus was able to exploit the issue using the following URL :

  http://172.21.17.13/?"><script>alert('struts_sa_surl_xss.nasl-1647596528')</script>

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

CVE:CVE-2008-6682
CWE:79
VPR:1.4


MEDIUMID:

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Nessus was able to exploit the issue using the following URL :

  http://172.21.17.13:9292/?"><script>alert('struts_sa_surl_xss.nasl-1647596530')</script>
Nessus was able to exploit the issue using the following URL :

  http://172.21.17.13/?"><script>alert('struts_sa_surl_xss.nasl-1647596528')</script>

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

CVE:CVE-2008-6682
CWE:79
VPR:1.4


MEDIUMID: 463

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote web server is affected by multiple cross site scripting vulnerability.

URL               : http://172.21.17.13:9292/lib/3rd_party/jquery.js
  Installed version : 1.9.1
  Fixed version     : 3.5.0
URL               : http://172.21.17.13/lib/3rd_party/jquery.js
  Installed version : 1.9.1
  Fixed version     : 3.5.0

Upgrade to JQuery version 3.5.0 or later.

CVE:CVE-2020-11022, CVE-2020-11023
CWE:N/A
VPR:5.7


MEDIUMID:

The remote web server is affected by multiple cross site scripting vulnerability.

URL               : http://172.21.17.13:9292/lib/3rd_party/jquery.js
  Installed version : 1.9.1
  Fixed version     : 3.5.0
URL               : http://172.21.17.13/lib/3rd_party/jquery.js
  Installed version : 1.9.1
  Fixed version     : 3.5.0

Upgrade to JQuery version 3.5.0 or later.

CVE:CVE-2020-11022, CVE-2020-11023
CWE:N/A
VPR:5.7


MEDIUMID:

The version of PHP running on the remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.17.13:9292/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.24
URL               : http://172.21.17.13/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.24

Upgrade to PHP version 7.3.24 or later.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The version of PHP running on the remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.17.13:9292/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.24
URL               : http://172.21.17.13/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.24

Upgrade to PHP version 7.3.24 or later.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The version of PHP running on the remote web server is affected by an email header injection vulnerability.

URL               : http://172.21.17.13:9292/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.28
URL               : http://172.21.17.13/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.28

Upgrade to PHP version 7.3.28 or later.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The version of PHP running on the remote web server is affected by an email header injection vulnerability.

URL               : http://172.21.17.13:9292/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.28
URL               : http://172.21.17.13/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.28

Upgrade to PHP version 7.3.28 or later.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 374

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 408

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 701

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 27

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID: 356

The remote host contains an unsupported version of a web application scripting language.

Source              : X-Powered-By: PHP/5.4.45-0+deb7u7
  Installed version   : 5.4.45-0+deb7u7
  End of support date : 2015/09/03
  Announcement        : http://php.net/supported-versions.php
  Supported versions  : 7.3.x / 7.4.x / 8.0.x

Upgrade to a version of PHP that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Nessus was able to exploit the issue using the following URL :

  http://172.21.17.13:9292/?"><script>alert('struts_sa_surl_xss.nasl-1648329041')</script>
Nessus was able to exploit the issue using the following URL :

  http://172.21.17.13/?"><script>alert('struts_sa_surl_xss.nasl-1648329041')</script>

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

CVE:CVE-2008-6682
CWE:79
VPR:1.4


MEDIUMID:

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Nessus was able to exploit the issue using the following URL :

  http://172.21.17.13:9292/?"><script>alert('struts_sa_surl_xss.nasl-1648329041')</script>
Nessus was able to exploit the issue using the following URL :

  http://172.21.17.13/?"><script>alert('struts_sa_surl_xss.nasl-1648329041')</script>

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

CVE:CVE-2008-6682
CWE:79
VPR:1.4


MEDIUMID: 463

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote web server is affected by multiple cross site scripting vulnerability.

URL               : http://172.21.17.13/lib/3rd_party/jquery.js
  Installed version : 1.9.1
  Fixed version     : 3.5.0

Upgrade to JQuery version 3.5.0 or later.

CVE:CVE-2020-11022, CVE-2020-11023
CWE:N/A
VPR:5.7


MEDIUMID:

The version of PHP running on the remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.17.13:9292/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.24
URL               : http://172.21.17.13/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.24

Upgrade to PHP version 7.3.24 or later.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The version of PHP running on the remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.17.13:9292/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.24
URL               : http://172.21.17.13/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.24

Upgrade to PHP version 7.3.24 or later.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The version of PHP running on the remote web server is affected by an email header injection vulnerability.

URL               : http://172.21.17.13:9292/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.28
URL               : http://172.21.17.13/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.28

Upgrade to PHP version 7.3.28 or later.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The version of PHP running on the remote web server is affected by an email header injection vulnerability.

URL               : http://172.21.17.13:9292/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.28
URL               : http://172.21.17.13/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7)
  Installed version : 5.4.45-0+deb7u7
  Fixed version     : 7.3.28

Upgrade to PHP version 7.3.28 or later.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 374

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 408

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 701

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 27

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.221.211 (Telephony) CRITICAL CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:46:32 2022-03-26 23:17:54
WAFs detected:
  • 172.21.221.211
  • No reverse DNS entries
  • 172.21.221.211
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 on Debian 5.0 (lenny) Linux Kernel 2.6 on Debian 5.0 (lenny)
Ports detected:
Protocol Port Service
tcp80www
tcp443www
tcp999ssh
tcp3306mysql
Protocol Port Service
tcp80www
tcp443www
tcp999ssh
tcp3306mysql
Vulnerabilities detected:
CRITICALID: 195

The operating system running on the remote host is no longer supported.

Debian 5.0 support ended on 2012-02-06.
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


HIGHID: 149

The remote service encrypts traffic using a protocol with known weaknesses.

- SSLv3 is enabled and the server supports at least one cipher.
	Explanation: TLS 1.0 and SSL 3.0 cipher suites may be used with SSLv3


  Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    EDH-RSA-DES-CBC3-SHA                           DH            RSA      3DES-CBC(168)          SHA1
    DES-CBC3-SHA                                   RSA           RSA      3DES-CBC(168)          SHA1

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    DHE-RSA-AES128-SHA                             DH            RSA      AES-CBC(128)           SHA1
    DHE-RSA-AES256-SHA                             DH            RSA      AES-CBC(256)           SHA1
    AES128-SHA                                     RSA           RSA      AES-CBC(128)           SHA1
    AES256-SHA                                     RSA           RSA      AES-CBC(256)           SHA1
    RC4-MD5                                        RSA           RSA      RC4(128)               MD5
    RC4-SHA                                        RSA           RSA      RC4(128)               SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Consult the application's documentation to disable SSL 2.0 and 3.0. Use TLS 1.2 (with approved cipher suites) or higher instead.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 349

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=hellphone.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 437

It is possible to obtain sensitive information from the remote host with SSL/TLS-enabled services.

Nessus determined that the remote server supports SSLv3 with at least one CBC 
cipher suite, indicating that this server is vulnerable.

It appears that TLSv1 or newer is supported on the server. However, the 
Fallback SCSV mechanism is not supported, allowing connections to be "rolled 
back" to SSLv3.

Disable SSLv3. Services that must support SSLv3 should enable the TLS Fallback SCSV mechanism until SSLv3 can be disabled.

CVE:CVE-2014-3566
CWE:N/A
VPR:5.6


MEDIUMID:

Debugging functions are enabled on the remote web server.

To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus1272578831.html HTTP/1.1
Connection: Close
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Fri, 18 Mar 2022 10:31:07 GMT
Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g
Connection: close
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus1272578831.html HTTP/1.1
Connection: Close
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------
To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus1749210743.html HTTP/1.1
Connection: Close
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Fri, 18 Mar 2022 10:31:07 GMT
Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus1749210743.html HTTP/1.1
Connection: Keep-Alive
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

Disable these HTTP methods. Refer to the plugin output for more information.

CVE:CVE-2003-1567, CVE-2004-2320, CVE-2010-0386
CWE:16, 200
VPR:4.0


MEDIUMID: 148

The remote server's SSL certificate has already expired.

The SSL certificate has already expired :

  Subject          : CN=hellphone.de
  Issuer           : CN=hellphone.de
  Not valid before : Jul 22 21:59:53 2009 GMT
  Not valid after  : Jul 20 21:59:53 2019 GMT

Purchase or generate a new SSL certificate to replace the existing one.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 206

An SSL certificate in the certificate chain has been signed using a weak hash algorithm.

The following certificates were part of the certificate chain sent by
the remote host, but contain hashes that are considered to be weak.

Subject             : CN=hellphone.de
Signature Algorithm : SHA-1 With RSA Encryption
Valid From          : Jul 22 21:59:53 2009 GMT
Valid To            : Jul 20 21:59:53 2019 GMT
Raw PEM certificate : 
-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----

Contact the Certificate Authority to have the SSL certificate reissued.

CVE:CVE-2004-2761
CWE:310
VPR:6.1


MEDIUMID: 212

The remote service supports the use of medium strength SSL ciphers.

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    EDH-RSA-DES-CBC3-SHA          0x00, 0x16       DH            RSA      3DES-CBC(168)          SHA1
    DES-CBC3-SHA                  0x00, 0x0A       RSA           RSA      3DES-CBC(168)          SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of medium strength ciphers.

CVE:CVE-2016-2183
CWE:N/A
VPR:4.4


MEDIUMID: 292

The SSL certificate for this service cannot be trusted.

The following certificate was part of the certificate chain
sent by the remote host, but it has expired :

|-Subject   : CN=hellphone.de
|-Not After : Jul 20 21:59:53 2019 GMT

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=hellphone.de
|-Issuer  : CN=hellphone.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

Debugging functions are enabled on the remote web server.

To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus1272578831.html HTTP/1.1
Connection: Close
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Fri, 18 Mar 2022 10:31:07 GMT
Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g
Connection: close
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus1272578831.html HTTP/1.1
Connection: Close
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------
To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus1749210743.html HTTP/1.1
Connection: Close
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Fri, 18 Mar 2022 10:31:07 GMT
Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus1749210743.html HTTP/1.1
Connection: Keep-Alive
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

Disable these HTTP methods. Refer to the plugin output for more information.

CVE:CVE-2003-1567, CVE-2004-2320, CVE-2010-0386
CWE:16, 200
VPR:4.0


MEDIUMID: 567

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 363

The remote service supports the use of the RC4 cipher.

List of RC4 cipher suites supported by the remote server :

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    RC4-MD5                       0x00, 0x04       RSA           RSA      RC4(128)               MD5
    RC4-SHA                       0x00, 0x05       RSA           RSA      RC4(128)               SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.

CVE:CVE-2013-2566, CVE-2015-2808
CWE:N/A
VPR:3.6


MEDIUMID: 487

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 451

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "191d-0-50e6b7e7d8c80"
  Inode number           : 6429
  File size              : 0 bytes
  File modification time : Feb.  6, 2015 at 13:35:30 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


LOWID: 727

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 431

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 396

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 360

The remote service has a configuration that may make it vulnerable to the CRIME attack.

The following configuration indicates that the remote service
may be vulnerable to the CRIME attack :

  - SSL / TLS compression is enabled.

Disable compression and / or the SPDY service.

CVE:CVE-2012-4929, CVE-2012-4930
CWE:N/A
VPR:5.9


INFOID: 98

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID: 195

The operating system running on the remote host is no longer supported.

Debian 5.0 support ended on 2012-02-06.
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


HIGHID: 149

The remote service encrypts traffic using a protocol with known weaknesses.

- SSLv3 is enabled and the server supports at least one cipher.
	Explanation: TLS 1.0 and SSL 3.0 cipher suites may be used with SSLv3


  Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    EDH-RSA-DES-CBC3-SHA                           DH            RSA      3DES-CBC(168)          SHA1
    DES-CBC3-SHA                                   RSA           RSA      3DES-CBC(168)          SHA1

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    DHE-RSA-AES128-SHA                             DH            RSA      AES-CBC(128)           SHA1
    DHE-RSA-AES256-SHA                             DH            RSA      AES-CBC(256)           SHA1
    AES128-SHA                                     RSA           RSA      AES-CBC(128)           SHA1
    AES256-SHA                                     RSA           RSA      AES-CBC(256)           SHA1
    RC4-MD5                                        RSA           RSA      RC4(128)               MD5
    RC4-SHA                                        RSA           RSA      RC4(128)               SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Consult the application's documentation to disable SSL 2.0 and 3.0. Use TLS 1.2 (with approved cipher suites) or higher instead.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 349

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=hellphone.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 437

It is possible to obtain sensitive information from the remote host with SSL/TLS-enabled services.

Nessus determined that the remote server supports SSLv3 with at least one CBC 
cipher suite, indicating that this server is vulnerable.

It appears that TLSv1 or newer is supported on the server. However, the 
Fallback SCSV mechanism is not supported, allowing connections to be "rolled 
back" to SSLv3.

Disable SSLv3. Services that must support SSLv3 should enable the TLS Fallback SCSV mechanism until SSLv3 can be disabled.

CVE:CVE-2014-3566
CWE:N/A
VPR:5.7


MEDIUMID:

Debugging functions are enabled on the remote web server.

To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus1266746963.html HTTP/1.1
Connection: Close
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Sat, 26 Mar 2022 22:02:29 GMT
Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g
Connection: close
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus1266746963.html HTTP/1.1
Connection: Close
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------
To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus753427652.html HTTP/1.1
Connection: Close
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Sat, 26 Mar 2022 22:02:29 GMT
Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus753427652.html HTTP/1.1
Connection: Keep-Alive
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

Disable these HTTP methods. Refer to the plugin output for more information.

CVE:CVE-2003-1567, CVE-2004-2320, CVE-2010-0386
CWE:16, 200
VPR:4.0


MEDIUMID: 148

The remote server's SSL certificate has already expired.

The SSL certificate has already expired :

  Subject          : CN=hellphone.de
  Issuer           : CN=hellphone.de
  Not valid before : Jul 22 21:59:53 2009 GMT
  Not valid after  : Jul 20 21:59:53 2019 GMT

Purchase or generate a new SSL certificate to replace the existing one.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 206

An SSL certificate in the certificate chain has been signed using a weak hash algorithm.

The following certificates were part of the certificate chain sent by
the remote host, but contain hashes that are considered to be weak.

Subject             : CN=hellphone.de
Signature Algorithm : SHA-1 With RSA Encryption
Valid From          : Jul 22 21:59:53 2009 GMT
Valid To            : Jul 20 21:59:53 2019 GMT
Raw PEM certificate : 
-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----

Contact the Certificate Authority to have the SSL certificate reissued.

CVE:CVE-2004-2761
CWE:310
VPR:6.1


MEDIUMID: 212

The remote service supports the use of medium strength SSL ciphers.

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    EDH-RSA-DES-CBC3-SHA          0x00, 0x16       DH            RSA      3DES-CBC(168)          SHA1
    DES-CBC3-SHA                  0x00, 0x0A       RSA           RSA      3DES-CBC(168)          SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of medium strength ciphers.

CVE:CVE-2016-2183
CWE:N/A
VPR:4.4


MEDIUMID: 292

The SSL certificate for this service cannot be trusted.

The following certificate was part of the certificate chain
sent by the remote host, but it has expired :

|-Subject   : CN=hellphone.de
|-Not After : Jul 20 21:59:53 2019 GMT

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=hellphone.de
|-Issuer  : CN=hellphone.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

Debugging functions are enabled on the remote web server.

To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus1266746963.html HTTP/1.1
Connection: Close
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Sat, 26 Mar 2022 22:02:29 GMT
Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g
Connection: close
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus1266746963.html HTTP/1.1
Connection: Close
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------
To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus753427652.html HTTP/1.1
Connection: Close
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Sat, 26 Mar 2022 22:02:29 GMT
Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus753427652.html HTTP/1.1
Connection: Keep-Alive
Host: 172.21.221.211
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

Disable these HTTP methods. Refer to the plugin output for more information.

CVE:CVE-2003-1567, CVE-2004-2320, CVE-2010-0386
CWE:16, 200
VPR:4.0


MEDIUMID: 567

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 363

The remote service supports the use of the RC4 cipher.

List of RC4 cipher suites supported by the remote server :

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    RC4-MD5                       0x00, 0x04       RSA           RSA      RC4(128)               MD5
    RC4-SHA                       0x00, 0x05       RSA           RSA      RC4(128)               SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.

CVE:CVE-2013-2566, CVE-2015-2808
CWE:N/A
VPR:3.6


MEDIUMID: 487

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 451

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "191d-0-50e6b7e7d8c80"
  Inode number           : 6429
  File size              : 0 bytes
  File modification time : Feb.  6, 2015 at 13:35:30 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


LOWID: 727

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 431

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 396

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 360

The remote service has a configuration that may make it vulnerable to the CRIME attack.

The following configuration indicates that the remote service
may be vulnerable to the CRIME attack :

  - SSL / TLS compression is enabled.

Disable compression and / or the SPDY service.

CVE:CVE-2012-4929, CVE-2012-4930
CWE:N/A
VPR:5.9


INFOID: 98

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.11.12 (ISP) HIGH CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 10:51:36 2022-03-26 22:20:22
WAFs detected:
  • 172.21.11.12
  • No reverse DNS entries
  • 172.21.11.12
  • No reverse DNS entries
OS detected: Ubuntu 14.04 Linux Kernel 3.13 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp25smtp
tcp80www
tcp110pop3
tcp443www
Protocol Port Service
tcp25smtp
tcp80www
tcp110pop3
tcp443www
Vulnerabilities detected:
HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.53
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.53

Upgrade to Apache version 2.4.53 or later.

CVE:CVE-2022-22719, CVE-2022-22720, CVE-2022-22721, CVE-2022-23943
CWE:N/A
VPR:6.3


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.39
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.39

Upgrade to Apache version 2.4.39 or later.

CVE:CVE-2019-0196, CVE-2019-0197, CVE-2019-0211, CVE-2019-0215, CVE-2019-0217, CVE-2019-0220
CWE:N/A
VPR:7.4


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.53
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.53

Upgrade to Apache version 2.4.53 or later.

CVE:CVE-2022-22719, CVE-2022-22720, CVE-2022-22721, CVE-2022-23943
CWE:N/A
VPR:6.3


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.52
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.52

Upgrade to Apache version 2.4.52 or later.

CVE:CVE-2021-44224, CVE-2021-44790
CWE:N/A
VPR:9.0


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.52
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.52

Upgrade to Apache version 2.4.52 or later.

CVE:CVE-2021-44224, CVE-2021-44790
CWE:N/A
VPR:9.0


HIGHID:

The remote web server is affected by a vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.49
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.49

Upgrade to Apache version 2.4.49 or later.

CVE:CVE-2021-34798, CVE-2021-39275
CWE:N/A
VPR:6.7


HIGHID:

The remote web server is affected by a vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.49
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.49

Upgrade to Apache version 2.4.49 or later.

CVE:CVE-2021-34798, CVE-2021-39275
CWE:N/A
VPR:6.7


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.47
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.47

Upgrade to Apache version 2.4.47 or later.

CVE:CVE-2019-17567, CVE-2020-13938, CVE-2020-13950, CVE-2020-35452, CVE-2021-26690, CVE-2021-26691, CVE-2021-30641
CWE:N/A
VPR:6.7


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.47
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.47

Upgrade to Apache version 2.4.47 or later.

CVE:CVE-2019-17567, CVE-2020-13938, CVE-2020-13950, CVE-2020-35452, CVE-2021-26690, CVE-2021-26691, CVE-2021-30641
CWE:N/A
VPR:6.7


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.46
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.46

Upgrade to Apache version 2.4.46 or later.

CVE:CVE-2020-9490, CVE-2020-11984, CVE-2020-11993
CWE:N/A
VPR:8.4


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.46
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.46

Upgrade to Apache version 2.4.46 or later.

CVE:CVE-2020-9490, CVE-2020-11984, CVE-2020-11993
CWE:N/A
VPR:8.4


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.39
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.39

Upgrade to Apache version 2.4.39 or later.

CVE:CVE-2019-0196, CVE-2019-0197, CVE-2019-0211, CVE-2019-0215, CVE-2019-0217, CVE-2019-0220
CWE:N/A
VPR:7.4


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.26
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.26

Upgrade to Apache version 2.2.33-dev / 2.4.26 or later.

CVE:CVE-2017-3167, CVE-2017-3169, CVE-2017-7659, CVE-2017-7668, CVE-2017-7679
CWE:N/A
VPR:6.7


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.26
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.26

Upgrade to Apache version 2.2.33-dev / 2.4.26 or later.

CVE:CVE-2017-3167, CVE-2017-3169, CVE-2017-7659, CVE-2017-7668, CVE-2017-7679
CWE:N/A
VPR:6.7


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.34
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.34

Upgrade to Apache version 2.4.34 or later.

CVE:CVE-2018-1333, CVE-2018-8011
CWE:N/A
VPR:3.6


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.28
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.28

Upgrade to Apache version 2.4.28 or later.

CVE:CVE-2017-9798
CWE:N/A
VPR:6.1


MEDIUMID: 229

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote web server is affected by a vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.49
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.49

Upgrade to Apache version 2.4.49 or later.

CVE:CVE-2021-33193
CWE:N/A
VPR:5.1


MEDIUMID:

The remote web server is affected by a vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.49
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.49

Upgrade to Apache version 2.4.49 or later.

CVE:CVE-2021-33193
CWE:N/A
VPR:5.1


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.27
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.27

Upgrade to Apache version 2.4.27 or later.

CVE:CVE-2017-9788, CVE-2017-9789
CWE:N/A
VPR:6.0


MEDIUMID:

The remote web server is affected by a vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.49
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.49

Upgrade to Apache version 2.4.49 or later.

CVE:CVE-2021-40438
CWE:N/A
VPR:10.0


MEDIUMID:

The remote web server is affected by a vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.49
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.49

Upgrade to Apache version 2.4.49 or later.

CVE:CVE-2021-40438
CWE:N/A
VPR:10.0


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.27
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.27

Upgrade to Apache version 2.4.27 or later.

CVE:CVE-2017-9788, CVE-2017-9789
CWE:N/A
VPR:6.0


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.28
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.28

Upgrade to Apache version 2.4.28 or later.

CVE:CVE-2017-9798
CWE:N/A
VPR:6.1


MEDIUMID: 510

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote web server is affected by a denial of service vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.35
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.35

Upgrade to Apache version 2.4.35 or later.

CVE:CVE-2018-11763
CWE:N/A
VPR:3.6


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.42
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.42

Upgrade to Apache version 2.4.42 or later.

CVE:CVE-2020-1927, CVE-2020-1934
CWE:N/A
VPR:3.8


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.42
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.42

Upgrade to Apache version 2.4.42 or later.

CVE:CVE-2020-1927, CVE-2020-1934
CWE:N/A
VPR:3.8


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.41
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.41

Upgrade to Apache version 2.4.41 or later.

CVE:CVE-2019-9517, CVE-2019-10081, CVE-2019-10082, CVE-2019-10092, CVE-2019-10097, CVE-2019-10098
CWE:N/A
VPR:5.9


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.41
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.41

Upgrade to Apache version 2.4.41 or later.

CVE:CVE-2019-9517, CVE-2019-10081, CVE-2019-10082, CVE-2019-10092, CVE-2019-10097, CVE-2019-10098
CWE:N/A
VPR:5.9


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.34
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.34

Upgrade to Apache version 2.4.34 or later.

CVE:CVE-2018-1333, CVE-2018-8011
CWE:N/A
VPR:3.6


MEDIUMID:

Debugging functions are enabled on the remote web server.

To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus2146448736.html HTTP/1.1
Connection: Close
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Fri, 18 Mar 2022 09:36:22 GMT
Server: Apache/2.4.25
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus2146448736.html HTTP/1.1
Connection: Keep-Alive
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8
GEOIP_ADDR: 172.21.172.24

------------------------------ snip ------------------------------
To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus109676596.html HTTP/1.1
Connection: Close
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Fri, 18 Mar 2022 09:36:22 GMT
Server: Apache/2.4.25
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus109676596.html HTTP/1.1
Connection: Keep-Alive
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8
GEOIP_ADDR: 172.21.172.24

------------------------------ snip ------------------------------

Disable these HTTP methods. Refer to the plugin output for more information.

CVE:CVE-2003-1567, CVE-2004-2320, CVE-2010-0386
CWE:16, 200
VPR:4.0


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.33
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.33

Upgrade to Apache version 2.4.33 or later.

CVE:CVE-2017-15710, CVE-2017-15715, CVE-2018-1283, CVE-2018-1301, CVE-2018-1302, CVE-2018-1303, CVE-2018-1312
CWE:N/A
VPR:7.4


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.33
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.33

Upgrade to Apache version 2.4.33 or later.

CVE:CVE-2017-15710, CVE-2017-15715, CVE-2018-1283, CVE-2018-1301, CVE-2018-1302, CVE-2018-1303, CVE-2018-1312
CWE:N/A
VPR:7.4


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.38
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.38

Upgrade to Apache version 2.4.38 or later.

CVE:CVE-2018-17189, CVE-2018-17199, CVE-2019-0190
CWE:N/A
VPR:3.6


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.38
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.38

Upgrade to Apache version 2.4.38 or later.

CVE:CVE-2018-17189, CVE-2018-17199, CVE-2019-0190
CWE:N/A
VPR:3.6


MEDIUMID:

The remote web server is affected by a denial of service vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.35
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.35

Upgrade to Apache version 2.4.35 or later.

CVE:CVE-2018-11763
CWE:N/A
VPR:3.6


MEDIUMID:

Debugging functions are enabled on the remote web server.

To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus2146448736.html HTTP/1.1
Connection: Close
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Fri, 18 Mar 2022 09:36:22 GMT
Server: Apache/2.4.25
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus2146448736.html HTTP/1.1
Connection: Keep-Alive
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8
GEOIP_ADDR: 172.21.172.24

------------------------------ snip ------------------------------
To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus109676596.html HTTP/1.1
Connection: Close
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Fri, 18 Mar 2022 09:36:22 GMT
Server: Apache/2.4.25
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus109676596.html HTTP/1.1
Connection: Keep-Alive
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8
GEOIP_ADDR: 172.21.172.24

------------------------------ snip ------------------------------

Disable these HTTP methods. Refer to the plugin output for more information.

CVE:CVE-2003-1567, CVE-2004-2320, CVE-2010-0386
CWE:16, 200
VPR:4.0


LOWID: 139

The remote POP3 daemon allows credentials to be transmitted in cleartext.

The following cleartext methods are supported :
USER
SASL PLAIN LOGIN

Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.

CVE:N/A
CWE:N/A
VPR:N/A
HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.53
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.53

Upgrade to Apache version 2.4.53 or later.

CVE:CVE-2022-22719, CVE-2022-22720, CVE-2022-22721, CVE-2022-23943
CWE:N/A
VPR:5.9


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.39
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.39

Upgrade to Apache version 2.4.39 or later.

CVE:CVE-2019-0196, CVE-2019-0197, CVE-2019-0211, CVE-2019-0215, CVE-2019-0217, CVE-2019-0220
CWE:N/A
VPR:7.4


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.53
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.53

Upgrade to Apache version 2.4.53 or later.

CVE:CVE-2022-22719, CVE-2022-22720, CVE-2022-22721, CVE-2022-23943
CWE:N/A
VPR:5.9


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.52
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.52

Upgrade to Apache version 2.4.52 or later.

CVE:CVE-2021-44224, CVE-2021-44790
CWE:N/A
VPR:9.0


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.52
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.52

Upgrade to Apache version 2.4.52 or later.

CVE:CVE-2021-44224, CVE-2021-44790
CWE:N/A
VPR:9.0


HIGHID:

The remote web server is affected by a vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.49
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.49

Upgrade to Apache version 2.4.49 or later.

CVE:CVE-2021-34798, CVE-2021-39275
CWE:N/A
VPR:6.7


HIGHID:

The remote web server is affected by a vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.49
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.49

Upgrade to Apache version 2.4.49 or later.

CVE:CVE-2021-34798, CVE-2021-39275
CWE:N/A
VPR:6.7


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.47
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.47

Upgrade to Apache version 2.4.47 or later.

CVE:CVE-2019-17567, CVE-2020-13938, CVE-2020-13950, CVE-2020-35452, CVE-2021-26690, CVE-2021-26691, CVE-2021-30641
CWE:N/A
VPR:6.7


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.47
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.47

Upgrade to Apache version 2.4.47 or later.

CVE:CVE-2019-17567, CVE-2020-13938, CVE-2020-13950, CVE-2020-35452, CVE-2021-26690, CVE-2021-26691, CVE-2021-30641
CWE:N/A
VPR:6.7


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.46
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.46

Upgrade to Apache version 2.4.46 or later.

CVE:CVE-2020-9490, CVE-2020-11984, CVE-2020-11993
CWE:N/A
VPR:8.4


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.46
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.46

Upgrade to Apache version 2.4.46 or later.

CVE:CVE-2020-9490, CVE-2020-11984, CVE-2020-11993
CWE:N/A
VPR:8.4


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.39
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.39

Upgrade to Apache version 2.4.39 or later.

CVE:CVE-2019-0196, CVE-2019-0197, CVE-2019-0211, CVE-2019-0215, CVE-2019-0217, CVE-2019-0220
CWE:N/A
VPR:7.4


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.26
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.26

Upgrade to Apache version 2.2.33-dev / 2.4.26 or later.

CVE:CVE-2017-3167, CVE-2017-3169, CVE-2017-7659, CVE-2017-7668, CVE-2017-7679
CWE:N/A
VPR:6.7


HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.26
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.26

Upgrade to Apache version 2.2.33-dev / 2.4.26 or later.

CVE:CVE-2017-3167, CVE-2017-3169, CVE-2017-7659, CVE-2017-7668, CVE-2017-7679
CWE:N/A
VPR:6.7


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.34
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.34

Upgrade to Apache version 2.4.34 or later.

CVE:CVE-2018-1333, CVE-2018-8011
CWE:N/A
VPR:3.6


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.28
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.28

Upgrade to Apache version 2.4.28 or later.

CVE:CVE-2017-9798
CWE:N/A
VPR:6.1


MEDIUMID: 229

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote web server is affected by a vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.49
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.49

Upgrade to Apache version 2.4.49 or later.

CVE:CVE-2021-33193
CWE:N/A
VPR:5.1


MEDIUMID:

The remote web server is affected by a vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.49
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.49

Upgrade to Apache version 2.4.49 or later.

CVE:CVE-2021-33193
CWE:N/A
VPR:5.1


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.27
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.27

Upgrade to Apache version 2.4.27 or later.

CVE:CVE-2017-9788, CVE-2017-9789
CWE:N/A
VPR:6.0


MEDIUMID:

The remote web server is affected by a vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.49
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.49

Upgrade to Apache version 2.4.49 or later.

CVE:CVE-2021-40438
CWE:N/A
VPR:10.0


MEDIUMID:

The remote web server is affected by a vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.49
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.49

Upgrade to Apache version 2.4.49 or later.

CVE:CVE-2021-40438
CWE:N/A
VPR:10.0


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.27
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.27

Upgrade to Apache version 2.4.27 or later.

CVE:CVE-2017-9788, CVE-2017-9789
CWE:N/A
VPR:6.0


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.28
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.28

Upgrade to Apache version 2.4.28 or later.

CVE:CVE-2017-9798
CWE:N/A
VPR:6.1


MEDIUMID: 510

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote web server is affected by a denial of service vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.35
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.35

Upgrade to Apache version 2.4.35 or later.

CVE:CVE-2018-11763
CWE:N/A
VPR:3.6


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.42
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.42

Upgrade to Apache version 2.4.42 or later.

CVE:CVE-2020-1927, CVE-2020-1934
CWE:N/A
VPR:3.8


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.42
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.42

Upgrade to Apache version 2.4.42 or later.

CVE:CVE-2020-1927, CVE-2020-1934
CWE:N/A
VPR:3.8


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.41
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.41

Upgrade to Apache version 2.4.41 or later.

CVE:CVE-2019-9517, CVE-2019-10081, CVE-2019-10082, CVE-2019-10092, CVE-2019-10097, CVE-2019-10098
CWE:N/A
VPR:5.9


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.41
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.41

Upgrade to Apache version 2.4.41 or later.

CVE:CVE-2019-9517, CVE-2019-10081, CVE-2019-10082, CVE-2019-10092, CVE-2019-10097, CVE-2019-10098
CWE:N/A
VPR:5.9


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.34
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.34

Upgrade to Apache version 2.4.34 or later.

CVE:CVE-2018-1333, CVE-2018-8011
CWE:N/A
VPR:3.6


MEDIUMID:

Debugging functions are enabled on the remote web server.

To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus1354742777.html HTTP/1.1
Connection: Close
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Sat, 26 Mar 2022 21:05:08 GMT
Server: Apache/2.4.25
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus1354742777.html HTTP/1.1
Connection: Keep-Alive
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8
GEOIP_ADDR: 172.21.172.24

------------------------------ snip ------------------------------
To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus2063119116.html HTTP/1.1
Connection: Close
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Sat, 26 Mar 2022 21:05:08 GMT
Server: Apache/2.4.25
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus2063119116.html HTTP/1.1
Connection: Keep-Alive
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8
GEOIP_ADDR: 172.21.172.24

------------------------------ snip ------------------------------

Disable these HTTP methods. Refer to the plugin output for more information.

CVE:CVE-2003-1567, CVE-2004-2320, CVE-2010-0386
CWE:16, 200
VPR:4.0


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.33
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.33

Upgrade to Apache version 2.4.33 or later.

CVE:CVE-2017-15710, CVE-2017-15715, CVE-2018-1283, CVE-2018-1301, CVE-2018-1302, CVE-2018-1303, CVE-2018-1312
CWE:N/A
VPR:7.4


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.33
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.33

Upgrade to Apache version 2.4.33 or later.

CVE:CVE-2017-15710, CVE-2017-15715, CVE-2018-1283, CVE-2018-1301, CVE-2018-1302, CVE-2018-1303, CVE-2018-1312
CWE:N/A
VPR:7.4


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.38
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.38

Upgrade to Apache version 2.4.38 or later.

CVE:CVE-2018-17189, CVE-2018-17199, CVE-2019-0190
CWE:N/A
VPR:3.6


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.38
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.38

Upgrade to Apache version 2.4.38 or later.

CVE:CVE-2018-17189, CVE-2018-17199, CVE-2019-0190
CWE:N/A
VPR:3.6


MEDIUMID:

The remote web server is affected by a denial of service vulnerability.

URL               : http://172.21.11.12/
  Installed version : 2.4.25
  Fixed version     : 2.4.35
URL               : http://172.21.11.12:443/
  Installed version : 2.4.25
  Fixed version     : 2.4.35

Upgrade to Apache version 2.4.35 or later.

CVE:CVE-2018-11763
CWE:N/A
VPR:3.6


MEDIUMID:

Debugging functions are enabled on the remote web server.

To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus1354742777.html HTTP/1.1
Connection: Close
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Sat, 26 Mar 2022 21:05:08 GMT
Server: Apache/2.4.25
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus1354742777.html HTTP/1.1
Connection: Keep-Alive
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8
GEOIP_ADDR: 172.21.172.24

------------------------------ snip ------------------------------
To disable these methods, add the following lines for each virtual
host in your configuration file :

    RewriteEngine on
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Nessus sent the following TRACE request : 

------------------------------ snip ------------------------------
TRACE /Nessus2063119116.html HTTP/1.1
Connection: Close
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Sat, 26 Mar 2022 21:05:08 GMT
Server: Apache/2.4.25
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus2063119116.html HTTP/1.1
Connection: Keep-Alive
Host: 172.21.11.12
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8
GEOIP_ADDR: 172.21.172.24

------------------------------ snip ------------------------------

Disable these HTTP methods. Refer to the plugin output for more information.

CVE:CVE-2003-1567, CVE-2004-2320, CVE-2010-0386
CWE:16, 200
VPR:4.0


LOWID: 139

The remote POP3 daemon allows credentials to be transmitted in cleartext.

The following cleartext methods are supported :
USER
SASL PLAIN LOGIN

Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.21.11 (ciproc intern) HIGH CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 10:45:18 2022-03-26 22:13:35
WAFs detected:
  • 172.21.46.77
  • www.ciproc.de
  • 172.21.46.77
  • www.ciproc.de
OS detected: Microsoft Windows 7 Microsoft Windows Server 2008 R2 Microsoft Windows 7 Microsoft Windows Server 2008 R2
Ports detected:
Protocol Port Service
tcp139smb
tcp445cifs
tcp999ssh
Protocol Port Service
tcp139smb
tcp445cifs
tcp999ssh
Vulnerabilities detected:
HIGHID: 810

The remote Samba server is potentially affected by multiple vulnerabilities.

Installed version : 4.9.5-Debian
  Fixed version     : 4.13.17

Upgrade to Samba version 4.13.17, 4.14.12, or 4.15.5 or later.

CVE:CVE-2021-44141, CVE-2021-44142, CVE-2022-0336
CWE:N/A
VPR:9.0


MEDIUMID: 352

Signing is not required on the remote SMB server.


  

Enforce message signing in the host's configuration. On Windows, this is found in the policy setting 'Microsoft network server: Digitally sign communications (always)'. On Samba, the setting is called 'server signing'. See the 'see also' links for further details.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 30

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
HIGHID: 810

The remote Samba server is potentially affected by multiple vulnerabilities.

Installed version : 4.9.5-Debian
  Fixed version     : 4.13.17

Upgrade to Samba version 4.13.17, 4.14.12, or 4.15.5 or later.

CVE:CVE-2021-44141, CVE-2021-44142, CVE-2022-0336
CWE:N/A
VPR:8.4


MEDIUMID: 352

Signing is not required on the remote SMB server.


  

Enforce message signing in the host's configuration. On Windows, this is found in the policy setting 'Microsoft network server: Digitally sign communications (always)'. On Samba, the setting is called 'server signing'. See the 'see also' links for further details.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 30

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.11.250 (ISP) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 10:53:54 2022-03-26 22:20:33
WAFs detected:
  • 172.21.11.250
  • No reverse DNS entries
  • 172.21.11.250
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp21ftp
tcp443www
tcp999ssh
tcp8080www
tcp8081www
Protocol Port Service
tcp21ftp
tcp443www
tcp999ssh
tcp8080http-alt?
tcp8081www
Vulnerabilities detected:
MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to exploit the issue using the following request :

http://172.21.11.250:8081/?M=A


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
[...]

------------------------------ snip ------------------------------
Nessus was able to exploit the issue using the following request :

http://172.21.11.250:443/?M=A


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
[...]

------------------------------ snip ------------------------------

Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.

CVE:CVE-2001-0731
CWE:N/A
VPR:2.2


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to exploit the issue using the following request :

http://172.21.11.250:8081/?M=A


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
[...]

------------------------------ snip ------------------------------
Nessus was able to exploit the issue using the following request :

http://172.21.11.250:443/?M=A


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
[...]

------------------------------ snip ------------------------------

Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.

CVE:CVE-2001-0731
CWE:N/A
VPR:2.2


MEDIUMID: 203

An SSL certificate in the certificate chain has been signed using a weak hash algorithm.

The following certificates were part of the certificate chain sent by
the remote host, but contain hashes that are considered to be weak.

Subject             : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
Signature Algorithm : SHA-1 With RSA Encryption
Valid From          : May 02 01:14:29 2012 GMT
Valid To            : Apr 27 01:14:29 2032 GMT
Raw PEM certificate : 
-----BEGIN CERTIFICATE-----
MIIEjzCCA3egAwIBAgIJAOojX+kzagfTMA0GCSqGSIb3DQEBBQUAMIGLMQswCQYDVQQGEwJERTEQMA4GA1UECBMHQmFkLVd1ZTETMBEGA1UEBxMKSGVpZGVsYmVyZzEQMA4GA1UEChMHYWRkMndlYjERMA8GA1UECxMIV2ViYWRtaW4xCzAJBgNVBAMTAkFFMSMwIQYJKoZIhvcNAQkBFhR3ZWJtYXN0ZXJAYWRkMndlYi5kZTAeFw0xMjA1MDIwMTE0MjlaFw0zMjA0MjcwMTE0MjlaMIGLMQswCQYDVQQGEwJERTEQMA4GA1UECBMHQmFkLVd1ZTETMBEGA1UEBxMKSGVpZGVsYmVyZzEQMA4GA1UEChMHYWRkMndlYjERMA8GA1UECxMIV2ViYWRtaW4xCzAJBgNVBAMTAkFFMSMwIQYJKoZIhvcNAQkBFhR3ZWJtYXN0ZXJAYWRkMndlYi5kZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMas0iNl3NE6L/y0Lr3yijaTfKcH0TBwi2ok2iZ+NAguYTZdCrBqwP/EIyiJr+AFLnJYarRyySGUD6VXOG4pc9Wp+3fjGB2WNhfet/yU3U41uctoBG1/8vJ73e4/jPUuheo5Olf9aF+aoAAFRCINtw8LfMpffoaBl10r7WmvGivb6quJfxU2S/fPndDHQBIwqowjYgg1I/y8IzwD8DAjU5EIdAAJjt2/S7EfIILkI6U3VnaVY5yXKhqWVfB50RG9jRX5tgtLscYT+XKLZWIJ/uiVLmBEmMLMFego6AOqSRc5nntEcwgHgJd/Uj9N0VT4/0Ze/sxIg7tkHuArrYNspKcCAwEAAaOB8zCB8DAdBgNVHQ4EFgQUYge5RGWbE/C3YdCqWcEtVIUltSIwgcAGA1UdIwSBuDCBtYAUYge5RGWbE/C3YdCqWcEtVIUltSKhgZGkgY4wgYsxCzAJBgNVBAYTAkRFMRAwDgYDVQQIEwdCYWQtV3VlMRMwEQYDVQQHEwpIZWlkZWxiZXJnMRAwDgYDVQQKEwdhZGQyd2ViMREwDwYDVQQLEwhXZWJhZG1pbjELMAkGA1UEAxMCQUUxIzAhBgkqhkiG9w0BCQEWFHdlYm1hc3RlckBhZGQyd2ViLmRlggkA6iNf6TNqB9MwDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQUFAAOCAQEAwZUtNNzhKzcow7k3TrYyDhttWuT5cFb6wGg/4phmoQ9imdHZdkyopi7hDO+SoJXQqm+kXLYfZk6TZbmG6b4l9iYYNJ+st02Zdem8xeaFpI7vzTIHqStYw2pqfQ9NuGRLSjL9ltMVvQ34+tUSdTV3WreUEb+YHY1Jpo9YAMijKqjE/mlF8sqi3kGHxAMrK+uf3pV8bz3oJuZjije9Oz/d+RUcEz8BDOjxiexWXqrXf5jj4TQKihTnXBOWQCbMgT52OYSCgO0wLaOXT0Jv6NKNDuTFaHdjtMJ5p231+vubt/o1tPSglxAWGNwXOch6PLsXhTAKmCMA+u0/ff9RWoqL2w==
-----END CERTIFICATE-----

Contact the Certificate Authority to have the SSL certificate reissued.

CVE:CVE-2004-2761
CWE:310
VPR:6.1


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
|-Issuer  : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de
|-Issuer  : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
|-Issuer  : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de
|-Issuer  : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 520

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 642

The remote web server is affected by multiple cross site scripting vulnerability.

URL               : https://172.21.11.250:8080/js/jquery.min.js
  Installed version : 2.1.3
  Fixed version     : 3.5.0

Upgrade to JQuery version 3.5.0 or later.

CVE:CVE-2020-11022, CVE-2020-11023
CWE:N/A
VPR:5.7


INFOID: 24

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to exploit the issue using the following request :

http://172.21.11.250:8081/?M=A


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
[...]

------------------------------ snip ------------------------------
Nessus was able to exploit the issue using the following request :

http://172.21.11.250:443/?M=A


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
[...]

------------------------------ snip ------------------------------

Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.

CVE:CVE-2001-0731
CWE:N/A
VPR:2.2


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to exploit the issue using the following request :

http://172.21.11.250:8081/?M=A


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
[...]

------------------------------ snip ------------------------------
Nessus was able to exploit the issue using the following request :

http://172.21.11.250:443/?M=A


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
[...]

------------------------------ snip ------------------------------

Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.

CVE:CVE-2001-0731
CWE:N/A
VPR:2.2


MEDIUMID: 203

An SSL certificate in the certificate chain has been signed using a weak hash algorithm.

The following certificates were part of the certificate chain sent by
the remote host, but contain hashes that are considered to be weak.

Subject             : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
Signature Algorithm : SHA-1 With RSA Encryption
Valid From          : May 02 01:14:29 2012 GMT
Valid To            : Apr 27 01:14:29 2032 GMT
Raw PEM certificate : 
-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----

Contact the Certificate Authority to have the SSL certificate reissued.

CVE:CVE-2004-2761
CWE:310
VPR:6.1


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
|-Issuer  : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de
|-Issuer  : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
|-Issuer  : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de
|-Issuer  : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 520

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 24

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.172.37 (ciproc intern) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 10:50:24 2022-03-26 22:22:34
WAFs detected:
  • 172.21.172.37
  • No reverse DNS entries
  • 172.21.172.37
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp21ftp
tcp443www
tcp999ssh
tcp3306mysql
Protocol Port Service
tcp21ftp
tcp443https?
tcp999ssh
tcp3306mysql
Vulnerabilities detected:
MEDIUMID: 205

An SSL certificate in the certificate chain has been signed using a weak hash algorithm.

The following certificates were part of the certificate chain sent by
the remote host, but contain hashes that are considered to be weak.

Subject             : CN=wiki.ciproc.de
Signature Algorithm : SHA-1 With RSA Encryption
Valid From          : Aug 01 10:28:30 2014 GMT
Valid To            : Jul 29 10:28:30 2024 GMT
Raw PEM certificate : 
-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----

Contact the Certificate Authority to have the SSL certificate reissued.

CVE:CVE-2004-2761
CWE:310
VPR:6.1


MEDIUMID: 246

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=wiki.ciproc.de
|-Issuer  : CN=wiki.ciproc.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 306

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=wiki.ciproc.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 468

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 524

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 151

The remote service supports the use of anonymous SSL ciphers.

The following is a list of SSL anonymous ciphers supported by the remote TCP server :

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    AECDH-AES128-SHA              0xC0, 0x18       ECDH          None     AES-CBC(128)           SHA1
    AECDH-AES256-SHA              0xC0, 0x19       ECDH          None     AES-CBC(256)           SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of weak ciphers.

CVE:CVE-2007-1858
CWE:N/A
VPR:4.4


LOWID: 378

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 413

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 706

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 35

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 516 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 468

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 524

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 151

The remote service supports the use of anonymous SSL ciphers.

The following is a list of SSL anonymous ciphers supported by the remote TCP server :

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    AECDH-AES128-SHA              0xC0, 0x18       ECDH          None     AES-CBC(128)           SHA1
    AECDH-AES256-SHA              0xC0, 0x19       ECDH          None     AES-CBC(256)           SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of weak ciphers.

CVE:CVE-2007-1858
CWE:N/A
VPR:4.4


LOWID: 378

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 413

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 706

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 35

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 539 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.31 (publior) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:04:30 2022-03-26 22:34:32
WAFs detected:
  • 172.21.198.31
  • No reverse DNS entries
  • 172.21.198.31
  • No reverse DNS entries
OS detected: Microsoft Windows Server 2012 R2 Linux Kernel 3.1
Ports detected:
Protocol Port Service
tcp80www
tcp443https?
tcp999ssh
Protocol Port Service
tcp80www
tcp443https?
tcp999ssh
Vulnerabilities detected:
HIGHID:

The remote web server is affected by multiple denial of service vulnerabilities.

URL               : http://172.21.198.31/
  Installed version : 1.14.2
  Fixed version     : 1.16.1 / 1.17.3

Upgrade to nginx version 1.16.1 / 1.17.3 or later.

CVE:CVE-2019-9511, CVE-2019-9513, CVE-2019-9516
CWE:N/A
VPR:4.4


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.31/
  Installed version : 1.14.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID:

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.31/
  Installed version : 1.14.2
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0
MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.31/
  Installed version : 1.14.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4

172.21.11.221 (ISP) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 10:52:40 2022-03-26 22:21:06
WAFs detected:
  • 172.21.11.221
  • No reverse DNS entries
  • 172.21.11.221
  • No reverse DNS entries
OS detected: Linux Kernel 3.1 Linux Kernel 3.1
Ports detected:
Protocol Port Service
tcp80www
tcp443www
tcp999ssh
Protocol Port Service
tcp80www
tcp443www
tcp999ssh
Vulnerabilities detected:
HIGHID:

The remote web server is affected by multiple denial of service vulnerabilities.

URL               : https://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.16.1 / 1.17.3
URL               : http://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.16.1 / 1.17.3

Upgrade to nginx version 1.16.1 / 1.17.3 or later.

CVE:CVE-2019-9511, CVE-2019-9513, CVE-2019-9516
CWE:N/A
VPR:4.4


HIGHID:

The remote web server is affected by multiple denial of service vulnerabilities.

URL               : https://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.16.1 / 1.17.3
URL               : http://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.16.1 / 1.17.3

Upgrade to nginx version 1.16.1 / 1.17.3 or later.

CVE:CVE-2019-9511, CVE-2019-9513, CVE-2019-9516
CWE:N/A
VPR:4.4


MEDIUMID: 238

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : https://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.17.7
URL               : http://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : https://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.17.7
URL               : http://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID:

The remote web server is affected by a remote code execution vulnerability.

URL               : https://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.20.1 / 1.21.0
URL               : http://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


MEDIUMID:

The remote web server is affected by a remote code execution vulnerability.

URL               : https://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.20.1 / 1.21.0
URL               : http://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0
MEDIUMID: 238

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : https://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.17.7
URL               : http://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : https://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.17.7
URL               : http://172.21.11.221/
  Installed version : 1.14.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4

172.21.11.230 (ISP) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 10:44:04 2022-03-26 22:07:27
WAFs detected:
  • 172.21.11.230
  • No reverse DNS entries
  • 172.21.11.230
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
tcp3306mysql
Protocol Port Service
tcp443www
tcp999ssh
tcp3306mysql
Vulnerabilities detected:
MEDIUMID: 121

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to exploit the issue using the following request :

https://172.21.11.230/?M=A


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
[...]

------------------------------ snip ------------------------------

Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.

CVE:CVE-2001-0731
CWE:N/A
VPR:2.2


MEDIUMID: 202

An SSL certificate in the certificate chain has been signed using a weak hash algorithm.

The following certificates were part of the certificate chain sent by
the remote host, but contain hashes that are considered to be weak.

Subject             : CN=spider01
Signature Algorithm : SHA-1 With RSA Encryption
Valid From          : Apr 23 13:53:20 2014 GMT
Valid To            : Apr 20 13:53:20 2024 GMT
Raw PEM certificate : 
-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----

Contact the Certificate Authority to have the SSL certificate reissued.

CVE:CVE-2004-2761
CWE:310
VPR:6.1


MEDIUMID: 239

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=spider01
|-Issuer  : CN=spider01

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 300

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=spider01

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 519

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 23

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 239

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=spider01
|-Issuer  : CN=spider01

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 202

An SSL certificate in the certificate chain has been signed using a weak hash algorithm.

The following certificates were part of the certificate chain sent by
the remote host, but contain hashes that are considered to be weak.

Subject             : CN=spider01
Signature Algorithm : SHA-1 With RSA Encryption
Valid From          : Apr 23 13:53:20 2014 GMT
Valid To            : Apr 20 13:53:20 2024 GMT
Raw PEM certificate : 
-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----

Contact the Certificate Authority to have the SSL certificate reissued.

CVE:CVE-2004-2761
CWE:310
VPR:6.1


MEDIUMID: 300

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=spider01

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 519

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 23

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.17.11 (VulnLIB) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 10:47:18 2022-03-26 22:23:28
WAFs detected:
  • 172.21.17.11
  • No reverse DNS entries
  • 172.21.17.11
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
tcp9292www
Protocol Port Service
tcp80www
tcp999ssh
tcp9292www
Vulnerabilities detected:
CRITICALID: 354

The remote host contains an unsupported version of a web application scripting language.

Source              : X-Powered-By: PHP/5.4.45-0+deb7u4
  Installed version   : 5.4.45-0+deb7u4
  End of support date : 2015/09/03
  Announcement        : http://php.net/supported-versions.php
  Supported versions  : 7.3.x / 7.4.x / 8.0.x

Upgrade to a version of PHP that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Nessus was able to exploit the issue using the following URL :

  http://172.21.17.11:9292/?"><script>alert('struts_sa_surl_xss.nasl-1647596479')</script>

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

CVE:CVE-2008-6682
CWE:79
VPR:1.4


MEDIUMID: 461

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: #EXP#

The version of PHP running on the remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.17.11:9292/ (5.4.45-0+deb7u4 under X-Powered-By: PHP/5.4.45-0+deb7u4)
  Installed version : 5.4.45-0+deb7u4
  Fixed version     : 7.3.24

Upgrade to PHP version 7.3.24 or later.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: #EXP#

The version of PHP running on the remote web server is affected by an email header injection vulnerability.

URL               : http://172.21.17.11:9292/ (5.4.45-0+deb7u4 under X-Powered-By: PHP/5.4.45-0+deb7u4)
  Installed version : 5.4.45-0+deb7u4
  Fixed version     : 7.3.28

Upgrade to PHP version 7.3.28 or later.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 372

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 406

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 699

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 25

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID:

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Nessus was able to exploit the issue using the following URL :

  http://172.21.17.11:9292/?"><script>alert('struts_sa_surl_xss.nasl-1648328907')</script>

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

CVE:CVE-2008-6682
CWE:79
VPR:1.4


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 9292 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "3e0d3-343-50ed2ef0bc400"
  Inode number           : 254163
  File size              : 835 bytes
  File modification time : Feb. 11, 2015 at 17:00:00 GMT
Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "3e0d3-343-50ed2ef0bc400"
  Inode number           : 254163
  File size              : 835 bytes
  File modification time : Feb. 11, 2015 at 17:00:00 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 9292 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "3e0d3-343-50ed2ef0bc400"
  Inode number           : 254163
  File size              : 835 bytes
  File modification time : Feb. 11, 2015 at 17:00:00 GMT
Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "3e0d3-343-50ed2ef0bc400"
  Inode number           : 254163
  File size              : 835 bytes
  File modification time : Feb. 11, 2015 at 17:00:00 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 461

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 372

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 406

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 699

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 25

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.17.12 (VulnLIB) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 10:47:20 2022-03-26 22:23:42
WAFs detected:
  • 172.21.17.12
  • No reverse DNS entries
  • 172.21.17.12
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
tcp9292www
Protocol Port Service
tcp80www
tcp999ssh
tcp9292www
Vulnerabilities detected:
CRITICALID: 355

The remote host contains an unsupported version of a web application scripting language.

Source              : X-Powered-By: PHP/5.4.45-0+deb7u4
  Installed version   : 5.4.45-0+deb7u4
  End of support date : 2015/09/03
  Announcement        : http://php.net/supported-versions.php
  Supported versions  : 7.3.x / 7.4.x / 8.0.x

Upgrade to a version of PHP that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Nessus was able to exploit the issue using the following URL :

  http://172.21.17.12/?"><script>alert('struts_sa_surl_xss.nasl-1647596487')</script>

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

CVE:CVE-2008-6682
CWE:79
VPR:1.4


MEDIUMID: 462

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote web server is affected by multiple cross site scripting vulnerability.

URL               : http://172.21.17.12/lib/3rd_party/jquery.js
  Installed version : 1.9.1
  Fixed version     : 3.5.0

Upgrade to JQuery version 3.5.0 or later.

CVE:CVE-2020-11022, CVE-2020-11023
CWE:N/A
VPR:5.7


MEDIUMID: #EXP#

The version of PHP running on the remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.17.12/ (5.4.45-0+deb7u4 under X-Powered-By: PHP/5.4.45-0+deb7u4)
  Installed version : 5.4.45-0+deb7u4
  Fixed version     : 7.3.24

Upgrade to PHP version 7.3.24 or later.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: #EXP#

The version of PHP running on the remote web server is affected by an email header injection vulnerability.

URL               : http://172.21.17.12/ (5.4.45-0+deb7u4 under X-Powered-By: PHP/5.4.45-0+deb7u4)
  Installed version : 5.4.45-0+deb7u4
  Fixed version     : 7.3.28

Upgrade to PHP version 7.3.28 or later.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 373

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 407

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 700

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 26

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID:

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Nessus was able to exploit the issue using the following URL :

  http://172.21.17.12:9292/?"><script>alert('struts_sa_surl_xss.nasl-1648328936')</script>
Nessus was able to exploit the issue using the following URL :

  http://172.21.17.12/?"><script>alert('struts_sa_surl_xss.nasl-1648328935')</script>

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

CVE:CVE-2008-6682
CWE:79
VPR:1.4


MEDIUMID:

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Nessus was able to exploit the issue using the following URL :

  http://172.21.17.12:9292/?"><script>alert('struts_sa_surl_xss.nasl-1648328936')</script>
Nessus was able to exploit the issue using the following URL :

  http://172.21.17.12/?"><script>alert('struts_sa_surl_xss.nasl-1648328935')</script>

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

CVE:CVE-2008-6682
CWE:79
VPR:1.4


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 9292 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "3e05e-343-50ed2ef0bc400"
  Inode number           : 254046
  File size              : 835 bytes
  File modification time : Feb. 11, 2015 at 17:00:00 GMT
Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "3e05e-343-50ed2ef0bc400"
  Inode number           : 254046
  File size              : 835 bytes
  File modification time : Feb. 11, 2015 at 17:00:00 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 9292 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "3e05e-343-50ed2ef0bc400"
  Inode number           : 254046
  File size              : 835 bytes
  File modification time : Feb. 11, 2015 at 17:00:00 GMT
Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "3e05e-343-50ed2ef0bc400"
  Inode number           : 254046
  File size              : 835 bytes
  File modification time : Feb. 11, 2015 at 17:00:00 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 462

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 373

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 407

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 700

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 26

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.172.105 (monkeySYS) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 10:54:09 2022-03-26 22:28:48
WAFs detected:
  • 172.21.172.105
  • No reverse DNS entries
  • 172.21.172.105
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
tcp1999ssh
Protocol Port Service
tcp443www
tcp999ssh
tcp1999ssh
Vulnerabilities detected:
MEDIUMID: 250

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=ponkeyAGENTS
|-Issuer  : CN=ponkeyAGENTS

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 221

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


MEDIUMID: 310

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=ponkeyAGENTS

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 528

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 43

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to exploit the issue using the following request :

https://172.21.172.105/?M=A


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
[...]

------------------------------ snip ------------------------------

Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.

CVE:CVE-2001-0731
CWE:N/A
VPR:2.2


MEDIUMID: 221

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


MEDIUMID: 250

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=ponkeyAGENTS
|-Issuer  : CN=ponkeyAGENTS

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 310

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=ponkeyAGENTS

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 528

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 43

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.5 (publior) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:14:08 2022-03-26 22:44:06
WAFs detected:
  • 172.21.198.5
  • No reverse DNS entries
  • 172.21.198.5
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 3.1
Ports detected:
Protocol Port Service
tcp21ftp
tcp25smtp
tcp53dns
tcp80www
tcp1063com-tsmux?
tcp110pop3
tcp143imap
tcp443www
tcp465smtp
tcp993imap
tcp995pop3
tcp999ssh
tcp8443www
tcp8880www
Protocol Port Service
tcp21ftp
tcp25smtp
tcp53dns
tcp80www
tcp1063com-tsmux?
tcp110pop3
tcp143imap
tcp443www
tcp465smtp
tcp993imap
tcp995pop3
tcp999ssh
tcp8443www
tcp8880www
Vulnerabilities detected:
MEDIUMID:

The remote DNS server is vulnerable to cache snooping attacks.

Nessus sent a non-recursive query for example.com
and received 1 answer :

93.184.216.34

Contact the vendor of the DNS software for a fix.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The remote POP3 daemon allows credentials to be transmitted in cleartext.

The following cleartext methods are supported :
USER
SASL PLAIN LOGIN DIGEST-MD5 CRAM-MD5

Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.

CVE:N/A
CWE:N/A
VPR:N/A
MEDIUMID:

The remote DNS server is vulnerable to cache snooping attacks.

Nessus sent a non-recursive query for example.com
and received 1 answer :

93.184.216.34

Contact the vendor of the DNS software for a fix.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The remote POP3 daemon allows credentials to be transmitted in cleartext.

The following cleartext methods are supported :
USER
SASL PLAIN LOGIN DIGEST-MD5 CRAM-MD5

Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.198.20 (publior) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:01:45 2022-03-26 22:32:45
WAFs detected:
  • 172.21.198.20
  • No reverse DNS entries
  • 172.21.198.20
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
HIGHID: 615

The remote web server is affected by multiple denial of service vulnerabilities.

URL               : http://172.21.198.20/
  Installed version : 1.12.0
  Fixed version     : 1.16.1 / 1.17.3

Upgrade to nginx version 1.16.1 / 1.17.3 or later.

CVE:CVE-2019-9511, CVE-2019-9513, CVE-2019-9516
CWE:N/A
VPR:4.4


MEDIUMID: 586

The remote web server is affected by a data disclosure vulnerability.

URL               : http://172.21.198.20/
  Installed version : 1.12.0
  Fixed version     : 1.12.1

Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.

CVE:CVE-2017-7529
CWE:N/A
VPR:5.1


MEDIUMID: 596

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.20/
  Installed version : 1.12.0
  Fixed version     : 1.14.1

Upgrade to nginx 1.14.1 / 1.15.6 or later.

CVE:CVE-2018-16843, CVE-2018-16844, CVE-2018-16845
CWE:N/A
VPR:5.0


MEDIUMID: 624

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.20/
  Installed version : 1.12.0
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID: 662

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.20/
  Installed version : 1.12.0
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID: 61

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 624

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.20/
  Installed version : 1.12.0
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


INFOID: 61

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.21 (publior) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:02:28 2022-03-26 22:32:43
WAFs detected:
  • 172.21.198.21
  • No reverse DNS entries
  • 172.21.198.21
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
HIGHID: 570

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.21/
  Installed version : 1.6.2
  Fixed version     : 1.8.1

Upgrade to nginx version 1.8.1 / 1.9.10 or later.

CVE:CVE-2016-0742, CVE-2016-0746, CVE-2016-0747
CWE:N/A
VPR:5.9


MEDIUMID: 587

The remote web server is affected by a data disclosure vulnerability.

URL               : http://172.21.198.21/
  Installed version : 1.6.2
  Fixed version     : 1.12.1 / 1.13.3

Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.

CVE:CVE-2017-7529
CWE:N/A
VPR:5.1


MEDIUMID: 597

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.21/
  Installed version : 1.6.2
  Fixed version     : 1.14.1

Upgrade to nginx 1.14.1 / 1.15.6 or later.

CVE:CVE-2018-16843, CVE-2018-16844, CVE-2018-16845
CWE:N/A
VPR:5.0


MEDIUMID: 625

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.21/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID: 663

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.21/
  Installed version : 1.6.2
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID: 62

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 625

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.21/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


INFOID: 62

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.22 (publior) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:03:05 2022-03-26 22:33:13
WAFs detected:
  • 172.21.198.22
  • No reverse DNS entries
  • 172.21.198.22
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.22/
  Installed version : 1.6.2
  Fixed version     : 1.8.1

Upgrade to nginx version 1.8.1 / 1.9.10 or later.

CVE:CVE-2016-0742, CVE-2016-0746, CVE-2016-0747
CWE:N/A
VPR:5.9


MEDIUMID:

The remote web server is affected by a data disclosure vulnerability.

URL               : http://172.21.198.22/
  Installed version : 1.6.2
  Fixed version     : 1.12.1 / 1.13.3

Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.

CVE:CVE-2017-7529
CWE:N/A
VPR:5.1


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.22/
  Installed version : 1.6.2
  Fixed version     : 1.14.1

Upgrade to nginx 1.14.1 / 1.15.6 or later.

CVE:CVE-2018-16843, CVE-2018-16844, CVE-2018-16845
CWE:N/A
VPR:5.0


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.22/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID:

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.22/
  Installed version : 1.6.2
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.22/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.23 (publior) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:03:08 2022-03-26 22:33:51
WAFs detected:
  • 172.21.198.23
  • No reverse DNS entries
  • 172.21.198.23
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
HIGHID: 616

The remote web server is affected by multiple denial of service vulnerabilities.

URL               : http://172.21.198.23/
  Installed version : 1.10.3
  Fixed version     : 1.16.1 / 1.17.3

Upgrade to nginx version 1.16.1 / 1.17.3 or later.

CVE:CVE-2019-9511, CVE-2019-9513, CVE-2019-9516
CWE:N/A
VPR:4.4


MEDIUMID: 589

The remote web server is affected by a data disclosure vulnerability.

URL               : http://172.21.198.23/
  Installed version : 1.10.3
  Fixed version     : 1.12.1 / 1.13.3

Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.

CVE:CVE-2017-7529
CWE:N/A
VPR:5.1


MEDIUMID: 599

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.23/
  Installed version : 1.10.3
  Fixed version     : 1.14.1

Upgrade to nginx 1.14.1 / 1.15.6 or later.

CVE:CVE-2018-16843, CVE-2018-16844, CVE-2018-16845
CWE:N/A
VPR:5.0


MEDIUMID: 627

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.23/
  Installed version : 1.10.3
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID: 665

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.23/
  Installed version : 1.10.3
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID: 64

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 627

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.23/
  Installed version : 1.10.3
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


INFOID: 64

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.110 (publior) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:04:03 2022-03-26 22:33:53
WAFs detected:
  • 172.21.198.110
  • No reverse DNS entries
  • 172.21.198.110
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.110/
  Installed version : 1.6.2
  Fixed version     : 1.8.1

Upgrade to nginx version 1.8.1 / 1.9.10 or later.

CVE:CVE-2016-0742, CVE-2016-0746, CVE-2016-0747
CWE:N/A
VPR:5.9


MEDIUMID:

The remote web server is affected by a data disclosure vulnerability.

URL               : http://172.21.198.110/
  Installed version : 1.6.2
  Fixed version     : 1.12.1 / 1.13.3

Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.

CVE:CVE-2017-7529
CWE:N/A
VPR:5.1


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.110/
  Installed version : 1.6.2
  Fixed version     : 1.14.1

Upgrade to nginx 1.14.1 / 1.15.6 or later.

CVE:CVE-2018-16843, CVE-2018-16844, CVE-2018-16845
CWE:N/A
VPR:5.0


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.110/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID:

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.110/
  Installed version : 1.6.2
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.110/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.111 (publior) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:04:57 2022-03-26 22:35:13
WAFs detected:
  • 172.21.198.111
  • No reverse DNS entries
  • 172.21.198.111
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.111/
  Installed version : 1.6.2
  Fixed version     : 1.8.1

Upgrade to nginx version 1.8.1 / 1.9.10 or later.

CVE:CVE-2016-0742, CVE-2016-0746, CVE-2016-0747
CWE:N/A
VPR:5.9


MEDIUMID:

The remote web server is affected by a data disclosure vulnerability.

URL               : http://172.21.198.111/
  Installed version : 1.6.2
  Fixed version     : 1.12.1 / 1.13.3

Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.

CVE:CVE-2017-7529
CWE:N/A
VPR:5.1


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.111/
  Installed version : 1.6.2
  Fixed version     : 1.14.1

Upgrade to nginx 1.14.1 / 1.15.6 or later.

CVE:CVE-2018-16843, CVE-2018-16844, CVE-2018-16845
CWE:N/A
VPR:5.0


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.111/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID:

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.111/
  Installed version : 1.6.2
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.111/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.112 (publior) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:05:52 2022-03-26 22:36:18
WAFs detected:
  • 172.21.198.112
  • No reverse DNS entries
  • 172.21.198.112
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
HIGHID: 574

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.112/
  Installed version : 1.6.2
  Fixed version     : 1.8.1

Upgrade to nginx version 1.8.1 / 1.9.10 or later.

CVE:CVE-2016-0742, CVE-2016-0746, CVE-2016-0747
CWE:N/A
VPR:5.9


MEDIUMID: 592

The remote web server is affected by a data disclosure vulnerability.

URL               : http://172.21.198.112/
  Installed version : 1.6.2
  Fixed version     : 1.12.1 / 1.13.3

Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.

CVE:CVE-2017-7529
CWE:N/A
VPR:5.1


MEDIUMID: 602

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.112/
  Installed version : 1.6.2
  Fixed version     : 1.14.1

Upgrade to nginx 1.14.1 / 1.15.6 or later.

CVE:CVE-2018-16843, CVE-2018-16844, CVE-2018-16845
CWE:N/A
VPR:5.0


MEDIUMID: 631

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.112/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID: 672

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.112/
  Installed version : 1.6.2
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID: 70

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 631

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.112/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


INFOID: 70

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.113 (publior) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:07:01 2022-03-26 22:38:46
WAFs detected:
  • 172.21.198.113
  • No reverse DNS entries
  • 172.21.198.113
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
HIGHID:

The remote web server is affected by multiple denial of service vulnerabilities.

URL               : http://172.21.198.113/
  Installed version : 1.10.3
  Fixed version     : 1.16.1 / 1.17.3

Upgrade to nginx version 1.16.1 / 1.17.3 or later.

CVE:CVE-2019-9511, CVE-2019-9513, CVE-2019-9516
CWE:N/A
VPR:4.4


MEDIUMID:

The remote web server is affected by a data disclosure vulnerability.

URL               : http://172.21.198.113/
  Installed version : 1.10.3
  Fixed version     : 1.12.1 / 1.13.3

Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.

CVE:CVE-2017-7529
CWE:N/A
VPR:5.1


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.113/
  Installed version : 1.10.3
  Fixed version     : 1.14.1

Upgrade to nginx 1.14.1 / 1.15.6 or later.

CVE:CVE-2018-16843, CVE-2018-16844, CVE-2018-16845
CWE:N/A
VPR:5.0


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.113/
  Installed version : 1.10.3
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID:

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.113/
  Installed version : 1.10.3
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.113/
  Installed version : 1.10.3
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.250 (publior) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:10:54 2022-03-26 22:42:34
WAFs detected:
  • 172.21.198.250
  • No reverse DNS entries
  • 172.21.198.250
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp111rpc-portmapper
tcp999ssh
Protocol Port Service
tcp80www
tcp111rpc-portmapper
tcp999ssh
Vulnerabilities detected:
HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.250/
  Installed version : 1.6.2
  Fixed version     : 1.8.1

Upgrade to nginx version 1.8.1 / 1.9.10 or later.

CVE:CVE-2016-0742, CVE-2016-0746, CVE-2016-0747
CWE:N/A
VPR:5.9


MEDIUMID:

The remote web server is affected by a data disclosure vulnerability.

URL               : http://172.21.198.250/
  Installed version : 1.6.2
  Fixed version     : 1.12.1 / 1.13.3

Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.

CVE:CVE-2017-7529
CWE:N/A
VPR:5.1


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.250/
  Installed version : 1.6.2
  Fixed version     : 1.14.1

Upgrade to nginx 1.14.1 / 1.15.6 or later.

CVE:CVE-2018-16843, CVE-2018-16844, CVE-2018-16845
CWE:N/A
VPR:5.0


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.250/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID:

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.250/
  Installed version : 1.6.2
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID:

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A
MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.250/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID:

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A

172.21.198.251 (publior) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:10:59 2022-03-26 22:42:48
WAFs detected:
  • 172.21.198.251
  • No reverse DNS entries
  • 172.21.198.251
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp111rpc-portmapper
tcp999ssh
Protocol Port Service
tcp80www
tcp111rpc-portmapper
tcp999ssh
Vulnerabilities detected:
HIGHID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.251/
  Installed version : 1.6.2
  Fixed version     : 1.8.1

Upgrade to nginx version 1.8.1 / 1.9.10 or later.

CVE:CVE-2016-0742, CVE-2016-0746, CVE-2016-0747
CWE:N/A
VPR:5.9


MEDIUMID:

The remote web server is affected by a data disclosure vulnerability.

URL               : http://172.21.198.251/
  Installed version : 1.6.2
  Fixed version     : 1.12.1 / 1.13.3

Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.

CVE:CVE-2017-7529
CWE:N/A
VPR:5.1


MEDIUMID:

The remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.198.251/
  Installed version : 1.6.2
  Fixed version     : 1.14.1

Upgrade to nginx 1.14.1 / 1.15.6 or later.

CVE:CVE-2018-16843, CVE-2018-16844, CVE-2018-16845
CWE:N/A
VPR:5.0


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.251/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


MEDIUMID:

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.251/
  Installed version : 1.6.2
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID:

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A
MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

URL               : http://172.21.198.251/
  Installed version : 1.6.2
  Fixed version     : 1.17.7

Upgrade to nginx version 1.17.7 or later.

CVE:CVE-2019-20372
CWE:N/A
VPR:1.4


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID:

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A

172.21.199.19 (Hosting) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:21:40 2022-03-26 22:43:53
WAFs detected:
  • 172.21.199.19
  • No reverse DNS entries
  • 172.21.199.19
  • No reverse DNS entries
OS detected: Windows Server 2019 Standard 17763 Windows Server 2019 Standard 17763
Ports detected:
Protocol Port Service
tcp53dns
tcp88kerberos?
tcp135epmap
tcp139smb
tcp389ldap
tcp445cifs
tcp464kpasswd?
tcp593http-rpc-epmap
tcp636ldaps?
tcp1801msmq?
tcp2103dce-rpc
tcp2105dce-rpc
tcp2107dce-rpc
tcp3268ldap
tcp3269msft-gc-ssl?
tcp3387www
tcp3389msrdp
tcp5800www
tcp5900vnc
Protocol Port Service
tcp53dns
tcp88kerberos?
tcp135epmap
tcp139smb
tcp389ldap
tcp445cifs
tcp464kpasswd?
tcp593http-rpc-epmap
tcp636ldaps?
tcp1801msmq?
tcp2103dce-rpc
tcp2105dce-rpc
tcp2107dce-rpc
tcp3268ldap
tcp3269msft-gc-ssl?
tcp3387www
tcp3389msrdp
Vulnerabilities detected:
MEDIUMID: 209

The remote service supports the use of medium strength SSL ciphers.

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    DES-CBC3-SHA                  0x00, 0x0A       RSA           RSA      3DES-CBC(168)          SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of medium strength ciphers.

CVE:CVE-2016-2183
CWE:N/A
VPR:4.4


MEDIUMID: 213

The SSL certificate for this service is for a different host.

The identities known by Nessus are :

  172.21.199.19
  172.21.199.19

The Common Name in the certificate is :

  TAU.hbmedia.lan

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 264

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=TAU.hbmedia.lan
|-Issuer  : CN=TAU.hbmedia.lan

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 322

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=TAU.hbmedia.lan

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 541

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
MEDIUMID: 209

The remote service supports the use of medium strength SSL ciphers.

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    DES-CBC3-SHA                  0x00, 0x0A       RSA           RSA      3DES-CBC(168)          SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of medium strength ciphers.

CVE:CVE-2016-2183
CWE:N/A
VPR:4.4


MEDIUMID: 213

The SSL certificate for this service is for a different host.

The identities known by Nessus are :

  172.21.199.19
  172.21.199.19

The Common Name in the certificate is :

  TAU.hbmedia.lan

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 264

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=TAU.hbmedia.lan
|-Issuer  : CN=TAU.hbmedia.lan

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 322

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=TAU.hbmedia.lan

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 541

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.199.201 (Hosting) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:20:13 2022-03-26 22:50:08
WAFs detected:
  • 172.21.199.201
  • No reverse DNS entries
  • 172.21.199.201
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp111rpc-portmapper
tcp443www
tcp4040www
tcp8443www
tcp44337kerio_mailserver_admin
Protocol Port Service
tcp111rpc-portmapper
tcp443www
tcp4040www
tcp8443www
tcp44337kerio_mailserver_admin
Vulnerabilities detected:
MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID:

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A
MEDIUMID:

The remote server's SSL certificate has already expired.

The SSL certificate has already expired :

  Subject          : CN=mail.hbmedia.net
  Issuer           : C=US, O=Let's Encrypt, CN=R3
  Not valid before : Dec 25 04:58:08 2021 GMT
  Not valid after  : Mar 25 04:58:07 2022 GMT

Purchase or generate a new SSL certificate to replace the existing one.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was part of the certificate chain
sent by the remote host, but it has expired :

|-Subject   : CN=mail.hbmedia.net
|-Not After : Mar 25 04:58:07 2022 GMT

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID:

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A

172.21.221.24 (Telephony) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:15:17 2022-03-26 22:46:02
WAFs detected:
  • 172.21.221.24
  • No reverse DNS entries
  • 172.21.221.24
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) FreePBX SIP Device
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "1a3fc-221-4f4552e1ea380"
  Inode number           : 107516
  File size              : 545 bytes
  File modification time : Mar. 11, 2014 at 14:03:10 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID:

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID:

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "1a3fc-221-4f4552e1ea380"
  Inode number           : 107516
  File size              : 545 bytes
  File modification time : Mar. 11, 2014 at 14:03:10 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID:

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID:

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.221.238 (Telephony) MEDIUM CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:48:22 2022-03-26 23:19:31
WAFs detected:
  • 172.21.221.238
  • No reverse DNS entries
  • 172.21.221.238
  • No reverse DNS entries
OS detected: Asterisk SIP Device Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
tcp8001www
tcp8003www
tcp8088www
tcp8089www
Protocol Port Service
tcp80www
tcp999ssh
tcp8001www
tcp8003www
tcp8088www
tcp8089www
Vulnerabilities detected:
MEDIUMID: 350

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-buster-b/O=tel-buster-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 293

The SSL certificate for this service cannot be trusted.

The following certificate was part of the certificate chain
sent by the remote host, but it has an invalid signature :

|-Subject : CN=tel-buster-b/O=tel-buster-b
|-Hash    : 

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-buster-b/O=tel-buster-b
|-Issuer  : CN=tel-buster-b/O=tel-buster-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 568

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 100

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 350

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-buster-b/O=tel-buster-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 293

The SSL certificate for this service cannot be trusted.

The following certificate was part of the certificate chain
sent by the remote host, but it has an invalid signature :

|-Subject : CN=tel-buster-b/O=tel-buster-b
|-Hash    : 

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-buster-b/O=tel-buster-b
|-Issuer  : CN=tel-buster-b/O=tel-buster-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 568

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 100

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.11.17 (ISP) LOW CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 10:40:32 2022-03-26 22:07:15
WAFs detected:
  • 172.21.46.59
  • wp-info.ciproc.de
  • 172.21.46.59
  • wp-info.ciproc.de
OS detected: Ubuntu 14.04 Linux Kernel 3.13 Ubuntu 14.04 Linux Kernel 3.13
Ports detected:
Protocol Port Service
tcp25smtp
tcp110pop3
Protocol Port Service
tcp25smtp
tcp110pop3
Vulnerabilities detected:
MEDIUMID: 513

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 232

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 142

The remote POP3 daemon allows credentials to be transmitted in cleartext.

The following cleartext methods are supported :
USER
SASL PLAIN LOGIN

Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.

CVE:N/A
CWE:N/A
VPR:N/A
LOWID: 142

The remote POP3 daemon allows credentials to be transmitted in cleartext.

The following cleartext methods are supported :
USER
SASL PLAIN LOGIN

Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.1.1 (Gateways) INFO CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 10:34:30 2022-03-26 22:03:30
WAFs detected:
  • 172.21.1.1
  • dns.devmonkey.ciproc
  • dns.ali.ciproc
  • 172.21.1.1
  • dns.devmonkey.ciproc
  • dns.ali.ciproc
OS detected: Unknown Unknown
Ports detected:
Protocol Port Service
tcp53domain?
Protocol Port Service
tcp53dns
Vulnerabilities detected: None
INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.174.32 (darkhill) INFO CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:04:10 2022-03-26 22:27:26
WAFs detected:
  • 172.21.174.32
  • No reverse DNS entries
  • 172.21.174.32
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp80www
tcp111rpc-portmapper
tcp443www
tcp999ssh
Protocol Port Service
tcp80http?
tcp111sunrpc?
tcp443https?
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 259

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=web02.alevi.de
|-Issuer  : CN=web02.alevi.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 319

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=web02.alevi.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 537

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 56

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 114

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A
INFOID: 56

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.24 (publior) INFO CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:02:47 2022-03-26 22:33:53
WAFs detected:
  • 172.21.198.24
  • No reverse DNS entries
  • 172.21.198.24
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 666

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.24/
  Installed version : 1.18.0
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID: 65

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
INFOID: 65

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.30 (publior) INFO CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:12:15 2022-03-26 22:41:32
WAFs detected:
  • 172.21.198.30
  • No reverse DNS entries
  • 172.21.198.30
  • No reverse DNS entries
OS detected: Ubuntu 14.04 Linux Kernel 3.13 Ubuntu 14.04 Linux Kernel 3.13
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
tcp5222ejabberd
tcp5269jabber_s2s
tcp8888www
Protocol Port Service
tcp80www
tcp999ssh
tcp5222ejabberd
tcp5269jabber_s2s
tcp8888www
Vulnerabilities detected:
MEDIUMID: 667

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.30/
  Installed version : 1.18.0
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID: 66

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
INFOID: 66

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.32 (publior) INFO CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:03:52 2022-03-26 22:34:10
WAFs detected:
  • 172.21.198.32
  • No reverse DNS entries
  • 172.21.198.32
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
MEDIUMID:

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.32/
  Installed version : 1.18.0
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.114 (publior) INFO CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:08:38 2022-03-26 22:38:23
WAFs detected:
  • 172.21.198.114
  • No reverse DNS entries
  • 172.21.198.114
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 674

The remote web server is affected by a remote code execution vulnerability.

URL               : http://172.21.198.114/
  Installed version : 1.18.0
  Fixed version     : 1.20.1 / 1.21.0

Upgrade to nginx 1.20.1 or later.

CVE:CVE-2021-23017
CWE:193
VPR:7.0


INFOID: 72

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
INFOID: 72

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.221.43 (Telephony) CHANGES ARE HIGHLIGHTED

Previous scan Current scan
Scan completed: 2022-03-18 11:15:22 2022-03-26 22:46:02
WAFs detected:
  • 172.21.221.43
  • No reverse DNS entries
  • 172.21.221.43
  • No reverse DNS entries
OS detected: FreePBX SIP Device Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp999ssh
Protocol Port Service
tcp999ssh
Vulnerabilities detected: None None

172.21.0.2 (Hosts) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:39:35 2022-03-26 22:09:02
WAFs detected:
  • 172.21.0.2
  • No reverse DNS entries
  • 172.21.0.2
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp53dns
tcp80www
tcp111rpc-portmapper
tcp999ssh
Protocol Port Service
tcp53dns
tcp80www
tcp111rpc-portmapper
tcp999ssh
Vulnerabilities detected:
CRITICALID: 157

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 133

The remote DNS server is vulnerable to cache snooping attacks.

Nessus sent a non-recursive query for example.com
and received 1 answer :

93.184.216.34

Contact the vendor of the DNS software for a fix.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 1

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 104

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A
CRITICALID: 157

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 133

The remote DNS server is vulnerable to cache snooping attacks.

Nessus sent a non-recursive query for example.com
and received 1 answer :

93.184.216.34

Contact the vendor of the DNS software for a fix.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 1

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 104

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A

172.21.0.16 (Hosts) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:39:35 2022-03-26 22:09:00
WAFs detected:
  • 172.21.0.16
  • No reverse DNS entries
  • 172.21.0.16
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 on Debian 6.0 (squeeze) Linux Kernel 2.6 on Debian 6.0 (squeeze)
Ports detected:
Protocol Port Service
tcp53dns
tcp80www
tcp111rpc-portmapper
tcp999ssh
Protocol Port Service
tcp53dns
tcp80www
tcp111rpc-portmapper
tcp999ssh
Vulnerabilities detected:
CRITICALID: 158

The operating system running on the remote host is no longer supported.

Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


HIGHID: 639

The remote name server is affected by an assertion failure vulnerability.

Installed version : 9.7.3
  Fixed version     : 9.11.19

Upgrade to the patched release most closely related to your current version of BIND.

CVE:CVE-2020-8617
CWE:N/A
VPR:5.1


MEDIUMID: 134

The remote DNS server is vulnerable to cache snooping attacks.

Nessus sent a non-recursive query for example.com
and received 1 answer :

93.184.216.34

Contact the vendor of the DNS software for a fix.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 439

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "3c8835-b1-4c12d8ed73440"
  Inode number           : 3967029
  File size              : 177 bytes
  File modification time : May. 29, 2012 at 14:22:01 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 460

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 637

The remote name server is affected by Service Downgrade / Reflected DoS vulnerabilities.

Installed version : 9.7.3
  Fixed version     : 9.11.19

Upgrade to the ISC BIND version referenced in the vendor advisory.

CVE:CVE-2020-8616
CWE:N/A
VPR:5.2


MEDIUMID: 648

The remote name server is affected by a denial of service vulnerability.

Installed version : 9.7.3
  Fixed version     : 9.11.22, 9.16.6, 9.17.4 or later

Upgrade to BIND 9.11.22, 9.16.6, 9.17.4 or later.

CVE:CVE-2020-8622
CWE:N/A
VPR:4.4


LOWID: 371

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 405

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 698

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 6

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 108

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A
CRITICALID: 158

The operating system running on the remote host is no longer supported.

Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


HIGHID: 639

The remote name server is affected by an assertion failure vulnerability.

Installed version : 9.7.3
  Fixed version     : 9.11.19

Upgrade to the patched release most closely related to your current version of BIND.

CVE:CVE-2020-8617
CWE:N/A
VPR:5.1


MEDIUMID: 134

The remote DNS server is vulnerable to cache snooping attacks.

Nessus sent a non-recursive query for example.com
and received 1 answer :

93.184.216.34

Contact the vendor of the DNS software for a fix.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 439

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "3c8835-b1-4c12d8ed73440"
  Inode number           : 3967029
  File size              : 177 bytes
  File modification time : May. 29, 2012 at 14:22:01 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 460

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 637

The remote name server is affected by Service Downgrade / Reflected DoS vulnerabilities.

Installed version : 9.7.3
  Fixed version     : 9.11.19

Upgrade to the ISC BIND version referenced in the vendor advisory.

CVE:CVE-2020-8616
CWE:N/A
VPR:5.2


MEDIUMID: 648

The remote name server is affected by a denial of service vulnerability.

Installed version : 9.7.3
  Fixed version     : 9.11.22, 9.16.6, 9.17.4 or later

Upgrade to BIND 9.11.22, 9.16.6, 9.17.4 or later.

CVE:CVE-2020-8622
CWE:N/A
VPR:4.4


LOWID: 371

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 405

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 698

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 6

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 108

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A

172.21.11.121 (ISP) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:42:03 2022-03-26 22:10:48
WAFs detected:
  • 172.21.11.121
  • No reverse DNS entries
  • 172.21.11.121
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
tcp3306mysql
Protocol Port Service
tcp443www
tcp999ssh
tcp3306mysql
Vulnerabilities detected:
CRITICALID: 160

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 235

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=sysmonkeyWEB
|-Issuer  : CN=sysmonkeyWEB

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 298

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=sysmonkeyWEB

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 516

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 641

The remote web server is affected by multiple cross site scripting vulnerability.

URL               : https://172.21.11.121/lib/3rd_party/jquery/jquery.js
  Installed version : 1.7.1
  Fixed version     : 3.5.0

Upgrade to JQuery version 3.5.0 or later.

CVE:CVE-2020-11022, CVE-2020-11023
CWE:N/A
VPR:5.7


INFOID: 20

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID: 160

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 235

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=sysmonkeyWEB
|-Issuer  : CN=sysmonkeyWEB

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 298

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=sysmonkeyWEB

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 516

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 641

The remote web server is affected by multiple cross site scripting vulnerability.

URL               : https://172.21.11.121/lib/3rd_party/jquery/jquery.js
  Installed version : 1.7.1
  Fixed version     : 3.5.0

Upgrade to JQuery version 3.5.0 or later.

CVE:CVE-2020-11022, CVE-2020-11023
CWE:N/A
VPR:5.7


INFOID: 20

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.17.14 (VulnLIB) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:56:58 2022-03-26 22:25:20
WAFs detected:
  • 172.21.17.14
  • No reverse DNS entries
  • 172.21.17.14
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
tcp9292www
Protocol Port Service
tcp80www
tcp999ssh
tcp9292www
Vulnerabilities detected:
CRITICALID: 357

The remote host contains an unsupported version of a web application scripting language.

Source              : X-Powered-By: PHP/5.4.45-0+deb7u4
  Installed version   : 5.4.45-0+deb7u4
  End of support date : 2015/09/03
  Announcement        : http://php.net/supported-versions.php
  Supported versions  : 7.3.x / 7.4.x / 8.0.x

Upgrade to a version of PHP that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Nessus was able to exploit the issue using the following URL :

  http://172.21.17.14:9292/?"><script>alert('struts_sa_surl_xss.nasl-1647596523')</script>
Nessus was able to exploit the issue using the following URL :

  http://172.21.17.14/?"><script>alert('struts_sa_surl_xss.nasl-1647596522')</script>

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

CVE:CVE-2008-6682
CWE:79
VPR:1.4


MEDIUMID:

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Nessus was able to exploit the issue using the following URL :

  http://172.21.17.14:9292/?"><script>alert('struts_sa_surl_xss.nasl-1647596523')</script>
Nessus was able to exploit the issue using the following URL :

  http://172.21.17.14/?"><script>alert('struts_sa_surl_xss.nasl-1647596522')</script>

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

CVE:CVE-2008-6682
CWE:79
VPR:1.4


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 9292 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "3e05e-343-50ed2ef0bc400"
  Inode number           : 254046
  File size              : 835 bytes
  File modification time : Feb. 11, 2015 at 17:00:00 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 464

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: #EXP#

The version of PHP running on the remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.17.14/ (5.4.45-0+deb7u4 under X-Powered-By: PHP/5.4.45-0+deb7u4)
  Installed version : 5.4.45-0+deb7u4
  Fixed version     : 7.3.24

Upgrade to PHP version 7.3.24 or later.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: #EXP#

The version of PHP running on the remote web server is affected by an email header injection vulnerability.

URL               : http://172.21.17.14/ (5.4.45-0+deb7u4 under X-Powered-By: PHP/5.4.45-0+deb7u4)
  Installed version : 5.4.45-0+deb7u4
  Fixed version     : 7.3.28

Upgrade to PHP version 7.3.28 or later.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 375

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 409

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 702

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 28

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID: 357

The remote host contains an unsupported version of a web application scripting language.

Source              : X-Powered-By: PHP/5.4.45-0+deb7u4
  Installed version   : 5.4.45-0+deb7u4
  End of support date : 2015/09/03
  Announcement        : http://php.net/supported-versions.php
  Supported versions  : 7.3.x / 7.4.x / 8.0.x

Upgrade to a version of PHP that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Nessus was able to exploit the issue using the following URL :

  http://172.21.17.14:9292/?"><script>alert('struts_sa_surl_xss.nasl-1648329034')</script>
Nessus was able to exploit the issue using the following URL :

  http://172.21.17.14/?"><script>alert('struts_sa_surl_xss.nasl-1648329033')</script>

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

CVE:CVE-2008-6682
CWE:79
VPR:1.4


MEDIUMID:

The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities.

Nessus was able to exploit the issue using the following URL :

  http://172.21.17.14:9292/?"><script>alert('struts_sa_surl_xss.nasl-1648329034')</script>
Nessus was able to exploit the issue using the following URL :

  http://172.21.17.14/?"><script>alert('struts_sa_surl_xss.nasl-1648329033')</script>

Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.

CVE:CVE-2008-6682
CWE:79
VPR:1.4


MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 9292 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "3e05e-343-50ed2ef0bc400"
  Inode number           : 254046
  File size              : 835 bytes
  File modification time : Feb. 11, 2015 at 17:00:00 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 464

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The version of PHP running on the remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.17.14/ (5.4.45-0+deb7u4 under X-Powered-By: PHP/5.4.45-0+deb7u4)
  Installed version : 5.4.45-0+deb7u4
  Fixed version     : 7.3.24

Upgrade to PHP version 7.3.24 or later.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The version of PHP running on the remote web server is affected by an email header injection vulnerability.

URL               : http://172.21.17.14/ (5.4.45-0+deb7u4 under X-Powered-By: PHP/5.4.45-0+deb7u4)
  Installed version : 5.4.45-0+deb7u4
  Fixed version     : 7.3.28

Upgrade to PHP version 7.3.28 or later.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 375

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 409

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 702

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 28

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.172.146 (monkeySYS) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:57:52 2022-03-26 22:29:57
WAFs detected:
  • 172.21.172.146
  • donkeyA01.devmonkey.ciproc
  • 172.21.172.146
  • donkeyA01.devmonkey.ciproc
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
tcp1999ssh
tcp3306mysql
Protocol Port Service
tcp443www
tcp999ssh
tcp1999ssh
tcp3306mysql
Vulnerabilities detected:
CRITICALID: 163

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 127

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to exploit the issue using the following request :

https://donkeyA01.devmonkey.ciproc/?M=A


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
[...]

------------------------------ snip ------------------------------

Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.

CVE:CVE-2001-0731
CWE:N/A
VPR:2.2


MEDIUMID: 223

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


MEDIUMID: 252

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=sysmonkey
|-Issuer  : CN=sysmonkey

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 312

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=sysmonkey

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 530

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 45

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID: 163

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 127

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to exploit the issue using the following request :

https://172.21.172.146/?M=A


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
[...]

------------------------------ snip ------------------------------

Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.

CVE:CVE-2001-0731
CWE:N/A
VPR:2.2


MEDIUMID: 223

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


MEDIUMID: 252

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=sysmonkey
|-Issuer  : CN=sysmonkey

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 312

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=sysmonkey

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 530

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 45

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.173.11 (darkhill) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:07:57 2022-03-26 22:37:08
WAFs detected:
  • 172.21.173.11
  • No reverse DNS entries
  • 172.21.173.11
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp443www
tcp999ssh
Protocol Port Service
tcp80www
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID: 164

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 254

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=horde.eitun.de
|-Issuer  : CN=horde.eitun.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 314

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=horde.eitun.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 469

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 532

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 49

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1034 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID: 164

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 254

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=horde.eitun.de
|-Issuer  : CN=horde.eitun.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 314

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=horde.eitun.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 469

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 532

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 49

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1045 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.230 (publior) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:10:12 2022-03-26 22:42:15
WAFs detected:
  • 172.21.198.230
  • No reverse DNS entries
  • 172.21.198.230
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp389ldap
tcp443www
tcp999ssh
Protocol Port Service
tcp389ldap
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 3 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.220.11 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:21:37 2022-03-26 22:51:33
WAFs detected:
  • 172.21.220.11
  • No reverse DNS entries
  • 172.21.220.11
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp389ldap
tcp443www
tcp999ssh
tcp5060sip
tcp5061sip
Protocol Port Service
tcp80www
tcp389ldap
tcp443www
tcp999ssh
tcp5060sip
tcp5061sip
Vulnerabilities detected:
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote server's SSL certificate has already expired.

The SSL certificate has already expired :

  Subject          : CN=ciproc.nextgentel.de, O=Ciproc GmbH
  Issuer           : CN=Asterisk Private CA, O=Ciproc GmbH
  Not valid before : Mar 22 19:12:24 2020 GMT
  Not valid after  : Mar 22 19:12:24 2021 GMT

Purchase or generate a new SSL certificate to replace the existing one.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service supports the use of medium strength SSL ciphers.

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    ECDHE-RSA-DES-CBC3-SHA        0xC0, 0x12       ECDH          RSA      3DES-CBC(168)          SHA1
    AECDH-DES-CBC3-SHA            0xC0, 0x17       ECDH          None     3DES-CBC(168)          SHA1
    DES-CBC3-SHA                  0x00, 0x0A       RSA           RSA      3DES-CBC(168)          SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of medium strength ciphers.

CVE:CVE-2016-2183
CWE:N/A
VPR:4.4


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b
The following certificates were part of the certificate chain
sent by the remote host, but they have expired :

|-Subject   : CN=Asterisk Private CA/O=Ciproc GmbH
|-Not After : Mar 22 19:12:20 2021 GMT

|-Subject   : CN=ciproc.nextgentel.de/O=Ciproc GmbH
|-Not After : Mar 22 19:12:24 2021 GMT

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=Asterisk Private CA/O=Ciproc GmbH
|-Issuer  : CN=Asterisk Private CA/O=Ciproc GmbH

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b
The following certificates were part of the certificate chain
sent by the remote host, but they have expired :

|-Subject   : CN=Asterisk Private CA/O=Ciproc GmbH
|-Not After : Mar 22 19:12:20 2021 GMT

|-Subject   : CN=ciproc.nextgentel.de/O=Ciproc GmbH
|-Not After : Mar 22 19:12:24 2021 GMT

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=Asterisk Private CA/O=Ciproc GmbH
|-Issuer  : CN=Asterisk Private CA/O=Ciproc GmbH

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=Asterisk Private CA/O=Ciproc GmbH

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=Asterisk Private CA/O=Ciproc GmbH

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service supports the use of the RC4 cipher.

List of RC4 cipher suites supported by the remote server :

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    ECDHE-RSA-RC4-SHA             0xC0, 0x11       ECDH          RSA      RC4(128)               SHA1
    AECDH-RC4-SHA                 0xC0, 0x16       ECDH          None     RC4(128)               SHA1
    RC4-MD5                       0x00, 0x04       RSA           RSA      RC4(128)               MD5
    RC4-SHA                       0x00, 0x05       RSA           RSA      RC4(128)               SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.

CVE:CVE-2013-2566, CVE-2015-2808
CWE:N/A
VPR:3.6


MEDIUMID:

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The remote service supports the use of anonymous SSL ciphers.

The following is a list of SSL anonymous ciphers supported by the remote TCP server :

  Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    AECDH-DES-CBC3-SHA            0xC0, 0x17       ECDH          None     3DES-CBC(168)          SHA1

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    AECDH-AES128-SHA              0xC0, 0x18       ECDH          None     AES-CBC(128)           SHA1
    AECDH-AES256-SHA              0xC0, 0x19       ECDH          None     AES-CBC(256)           SHA1
    AECDH-RC4-SHA                 0xC0, 0x16       ECDH          None     RC4(128)               SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of weak ciphers.

CVE:CVE-2007-1858
CWE:N/A
VPR:4.4


LOWID:

The X.509 certificate chain used by this service contains certificates with RSA keys shorter than 2048 bits.

The following certificates were part of the certificate chain
sent by the remote host, but contain RSA keys that are considered
to be weak :

|-Subject        : CN=ciproc.nextgentel.de/O=Ciproc GmbH
|-RSA Key Length : 1024 bits

Replace the certificate in the chain with the RSA key less than 2048 bits in length with a longer key, and reissue any certificates signed by the old certificate.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote server's SSL certificate has already expired.

The SSL certificate has already expired :

  Subject          : CN=ciproc.nextgentel.de, O=Ciproc GmbH
  Issuer           : CN=Asterisk Private CA, O=Ciproc GmbH
  Not valid before : Mar 22 19:12:24 2020 GMT
  Not valid after  : Mar 22 19:12:24 2021 GMT

Purchase or generate a new SSL certificate to replace the existing one.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service supports the use of medium strength SSL ciphers.

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    ECDHE-RSA-DES-CBC3-SHA        0xC0, 0x12       ECDH          RSA      3DES-CBC(168)          SHA1
    AECDH-DES-CBC3-SHA            0xC0, 0x17       ECDH          None     3DES-CBC(168)          SHA1
    DES-CBC3-SHA                  0x00, 0x0A       RSA           RSA      3DES-CBC(168)          SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of medium strength ciphers.

CVE:CVE-2016-2183
CWE:N/A
VPR:4.4


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificates were part of the certificate chain
sent by the remote host, but they have expired :

|-Subject   : CN=Asterisk Private CA/O=Ciproc GmbH
|-Not After : Mar 22 19:12:20 2021 GMT

|-Subject   : CN=ciproc.nextgentel.de/O=Ciproc GmbH
|-Not After : Mar 22 19:12:24 2021 GMT

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=Asterisk Private CA/O=Ciproc GmbH
|-Issuer  : CN=Asterisk Private CA/O=Ciproc GmbH
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificates were part of the certificate chain
sent by the remote host, but they have expired :

|-Subject   : CN=Asterisk Private CA/O=Ciproc GmbH
|-Not After : Mar 22 19:12:20 2021 GMT

|-Subject   : CN=ciproc.nextgentel.de/O=Ciproc GmbH
|-Not After : Mar 22 19:12:24 2021 GMT

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=Asterisk Private CA/O=Ciproc GmbH
|-Issuer  : CN=Asterisk Private CA/O=Ciproc GmbH
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=Asterisk Private CA/O=Ciproc GmbH
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=Asterisk Private CA/O=Ciproc GmbH
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service supports the use of the RC4 cipher.

List of RC4 cipher suites supported by the remote server :

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    ECDHE-RSA-RC4-SHA             0xC0, 0x11       ECDH          RSA      RC4(128)               SHA1
    AECDH-RC4-SHA                 0xC0, 0x16       ECDH          None     RC4(128)               SHA1
    RC4-MD5                       0x00, 0x04       RSA           RSA      RC4(128)               MD5
    RC4-SHA                       0x00, 0x05       RSA           RSA      RC4(128)               SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.

CVE:CVE-2013-2566, CVE-2015-2808
CWE:N/A
VPR:3.6


MEDIUMID:

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The remote service supports the use of anonymous SSL ciphers.

The following is a list of SSL anonymous ciphers supported by the remote TCP server :

  Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    AECDH-DES-CBC3-SHA            0xC0, 0x17       ECDH          None     3DES-CBC(168)          SHA1

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    AECDH-AES128-SHA              0xC0, 0x18       ECDH          None     AES-CBC(128)           SHA1
    AECDH-AES256-SHA              0xC0, 0x19       ECDH          None     AES-CBC(256)           SHA1
    AECDH-RC4-SHA                 0xC0, 0x16       ECDH          None     RC4(128)               SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of weak ciphers.

CVE:CVE-2007-1858
CWE:N/A
VPR:4.4


LOWID:

The X.509 certificate chain used by this service contains certificates with RSA keys shorter than 2048 bits.

The following certificates were part of the certificate chain
sent by the remote host, but contain RSA keys that are considered
to be weak :

|-Subject        : CN=ciproc.nextgentel.de/O=Ciproc GmbH
|-RSA Key Length : 1024 bits

Replace the certificate in the chain with the RSA key less than 2048 bits in length with a longer key, and reissue any certificates signed by the old certificate.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 2 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.220.12 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:20:57 2022-03-26 22:50:43
WAFs detected:
  • 172.21.220.12
  • No reverse DNS entries
  • 172.21.220.12
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp389ldap
tcp443www
tcp999ssh
Protocol Port Service
tcp80www
tcp389ldap
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID: 167

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 268

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 325

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 544

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 83

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID: 167

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 268

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 325

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 544

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 83

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 2 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.221.9 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:14:09 2022-03-26 22:44:46
WAFs detected:
  • 172.21.221.9
  • No reverse DNS entries
  • 172.21.221.9
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 on Debian 6.0 (squeeze) Linux Kernel 2.6 on Debian 6.0 (squeeze)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
CRITICALID: 169

The operating system running on the remote host is no longer supported.

Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 442

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "1a3fc-25a-4b2015ecc4780"
  Inode number           : 107516
  File size              : 602 bytes
  File modification time : Nov. 18, 2011 at 12:21:02 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 471

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 380

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 415

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 711

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID: 169

The operating system running on the remote host is no longer supported.

Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 442

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "1a3fc-25a-4b2015ecc4780"
  Inode number           : 107516
  File size              : 602 bytes
  File modification time : Nov. 18, 2011 at 12:21:02 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 471

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 380

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 415

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 711

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.26 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:16:10 2022-03-26 22:46:29
WAFs detected:
  • 172.21.221.26
  • No reverse DNS entries
  • 172.21.221.26
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.221.31 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:16:57 2022-03-26 22:48:32
WAFs detected:
  • 172.21.221.31
  • No reverse DNS entries
  • 172.21.221.31
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
CRITICALID:

The remote host contains an unsupported version of a web application scripting language.

Source              : X-Powered-By: PHP/5.4.45-0+deb7u13
  Installed version   : 5.4.45-0+deb7u13
  End of support date : 2015/09/03
  Announcement        : http://php.net/supported-versions.php
  Supported versions  : 7.3.x / 7.4.x / 8.0.x

Upgrade to a version of PHP that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The version of PHP running on the remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.221.31/ (5.4.45-0+deb7u13 under X-Powered-By: PHP/5.4.45-0+deb7u13)
  Installed version : 5.4.45-0+deb7u13
  Fixed version     : 7.3.24

Upgrade to PHP version 7.3.24 or later.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The version of PHP running on the remote web server is affected by an email header injection vulnerability.

URL               : http://172.21.221.31/ (5.4.45-0+deb7u13 under X-Powered-By: PHP/5.4.45-0+deb7u13)
  Installed version : 5.4.45-0+deb7u13
  Fixed version     : 7.3.28

Upgrade to PHP version 7.3.28 or later.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID:

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID:

The remote host contains an unsupported version of a web application scripting language.

Source              : X-Powered-By: PHP/5.4.45-0+deb7u13
  Installed version   : 5.4.45-0+deb7u13
  End of support date : 2015/09/03
  Announcement        : http://php.net/supported-versions.php
  Supported versions  : 7.3.x / 7.4.x / 8.0.x

Upgrade to a version of PHP that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The version of PHP running on the remote web server is affected by multiple vulnerabilities.

URL               : http://172.21.221.31/ (5.4.45-0+deb7u13 under X-Powered-By: PHP/5.4.45-0+deb7u13)
  Installed version : 5.4.45-0+deb7u13
  Fixed version     : 7.3.24

Upgrade to PHP version 7.3.24 or later.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The version of PHP running on the remote web server is affected by an email header injection vulnerability.

URL               : http://172.21.221.31/ (5.4.45-0+deb7u13 under X-Powered-By: PHP/5.4.45-0+deb7u13)
  Installed version : 5.4.45-0+deb7u13
  Fixed version     : 7.3.28

Upgrade to PHP version 7.3.28 or later.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID:

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.221.45 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:31:33 2022-03-26 23:01:25
WAFs detected:
  • 172.21.221.45
  • No reverse DNS entries
  • 172.21.221.45
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp443www
tcp999ssh
Protocol Port Service
tcp80www
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.52 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:25:13 2022-03-26 22:55:51
WAFs detected:
  • 172.21.221.52
  • No reverse DNS entries
  • 172.21.221.52
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.53 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:34:40 2022-03-26 23:04:53
WAFs detected:
  • 172.21.221.53
  • No reverse DNS entries
  • 172.21.221.53
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp443www
tcp999ssh
Protocol Port Service
tcp80www
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID: 173

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 270

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 327

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 546

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID: 173

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 270

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 327

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 546

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.54 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:26:14 2022-03-26 22:57:55
WAFs detected:
  • 172.21.221.54
  • No reverse DNS entries
  • 172.21.221.54
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
Protocol Port Service
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID: 174

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 271

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 328

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 547

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID: 174

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 271

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 328

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 547

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.55 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:26:48 2022-03-26 22:58:06
WAFs detected:
  • 172.21.221.55
  • No reverse DNS entries
  • 172.21.221.55
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.56 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:26:48 2022-03-26 22:57:56
WAFs detected:
  • 172.21.221.56
  • No reverse DNS entries
  • 172.21.221.56
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
Protocol Port Service
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID:

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 2 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.221.59 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:27:38 2022-03-26 22:58:33
WAFs detected:
  • 172.21.221.59
  • No reverse DNS entries
  • 172.21.221.59
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
Protocol Port Service
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID: 178

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 274

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 331

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 550

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID: 178

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 274

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 331

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 550

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.61 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:27:44 2022-03-26 22:59:24
WAFs detected:
  • 172.21.221.61
  • No reverse DNS entries
  • 172.21.221.61
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp443www
Protocol Port Service
tcp443www
Vulnerabilities detected:
CRITICALID: 179

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 275

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 332

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 551

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID: 179

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 275

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 332

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 551

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.62 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:37:00 2022-03-26 23:08:07
WAFs detected:
  • 172.21.221.62
  • No reverse DNS entries
  • 172.21.221.62
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp443www
tcp999ssh
tcp3306mysql
Protocol Port Service
tcp80www
tcp443www
tcp999ssh
tcp3306mysql
Vulnerabilities detected:
CRITICALID: 180

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 276

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 333

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 552

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID: 180

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 276

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 333

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 552

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.65 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:28:34 2022-03-26 23:00:44
WAFs detected:
  • 172.21.221.65
  • No reverse DNS entries
  • 172.21.221.65
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
Protocol Port Service
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID: 182

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 278

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 335

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 554

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID: 182

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 278

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 335

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 554

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.66 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:29:18 2022-03-26 23:01:01
WAFs detected:
  • 172.21.221.66
  • No reverse DNS entries
  • 172.21.221.66
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
Protocol Port Service
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID: 183

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 279

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 336

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 555

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID: 183

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 279

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 336

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 555

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.67 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:30:05 2022-03-26 23:01:10
WAFs detected:
  • 172.21.221.67
  • No reverse DNS entries
  • 172.21.221.67
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
Protocol Port Service
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID: 184

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 280

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 337

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 556

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID: 184

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 280

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 337

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 556

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.68 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:30:08 2022-03-26 23:01:31
WAFs detected:
  • 172.21.221.68
  • No reverse DNS entries
  • 172.21.221.68
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
Protocol Port Service
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID: 185

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 281

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 338

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 557

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID: 185

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 281

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 338

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 557

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.69 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:31:58 2022-03-26 23:03:07
WAFs detected:
  • 172.21.221.69
  • No reverse DNS entries
  • 172.21.221.69
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
Protocol Port Service
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID: 186

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 282

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 339

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 558

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID: 186

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 282

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 339

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 558

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.70 (Uncategorized) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:33:34 2022-03-26 23:05:08
WAFs detected:
  • 172.21.221.70
  • No reverse DNS entries
  • 172.21.221.70
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
Protocol Port Service
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID: 187

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 283

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 340

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 559

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID: 187

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 283

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 340

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 559

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.71 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:34:36 2022-03-26 23:07:05
WAFs detected:
  • 172.21.221.71
  • No reverse DNS entries
  • 172.21.221.71
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
Protocol Port Service
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID: 188

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 284

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 341

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 560

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID: 188

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 284

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 341

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 560

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.72 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:35:14 2022-03-26 23:07:24
WAFs detected:
  • 172.21.221.72
  • No reverse DNS entries
  • 172.21.221.72
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
Protocol Port Service
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID: 189

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 285

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 342

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 561

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID: 189

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 285

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 342

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 561

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.73 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:35:21 2022-03-26 23:07:12
WAFs detected:
  • 172.21.221.73
  • No reverse DNS entries
  • 172.21.221.73
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
Protocol Port Service
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID: 190

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 286

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 343

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 562

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID: 190

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 286

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 343

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 562

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.74 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:36:07 2022-03-26 23:07:47
WAFs detected:
  • 172.21.221.74
  • No reverse DNS entries
  • 172.21.221.74
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
Protocol Port Service
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID: 191

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 287

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 344

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 563

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID: 191

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 287

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 344

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 563

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.76 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:44:49 2022-03-26 23:16:29
WAFs detected:
  • 172.21.221.76
  • No reverse DNS entries
  • 172.21.221.76
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp389ldap
tcp443www
tcp999ssh
tcp5060sip
tcp5061sip
Protocol Port Service
tcp80www
tcp389ldap
tcp443www
tcp999ssh
tcp5060sip
tcp5061sip
Vulnerabilities detected:
CRITICALID: 192

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 147

The remote server's SSL certificate has already expired.

The SSL certificate has already expired :

  Subject          : CN=ciproc.nextgentel.de, O=Ciproc GmbH
  Issuer           : CN=Asterisk Private CA, O=Ciproc GmbH
  Not valid before : Mar 22 19:12:24 2020 GMT
  Not valid after  : Mar 22 19:12:24 2021 GMT

Purchase or generate a new SSL certificate to replace the existing one.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 211

The remote service supports the use of medium strength SSL ciphers.

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    ECDHE-RSA-DES-CBC3-SHA        0xC0, 0x12       ECDH          RSA      3DES-CBC(168)          SHA1
    AECDH-DES-CBC3-SHA            0xC0, 0x17       ECDH          None     3DES-CBC(168)          SHA1
    DES-CBC3-SHA                  0x00, 0x0A       RSA           RSA      3DES-CBC(168)          SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of medium strength ciphers.

CVE:CVE-2016-2183
CWE:N/A
VPR:4.4


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b
The following certificates were part of the certificate chain
sent by the remote host, but they have expired :

|-Subject   : CN=Asterisk Private CA/O=Ciproc GmbH
|-Not After : Mar 22 19:12:20 2021 GMT

|-Subject   : CN=ciproc.nextgentel.de/O=Ciproc GmbH
|-Not After : Mar 22 19:12:24 2021 GMT

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=Asterisk Private CA/O=Ciproc GmbH
|-Issuer  : CN=Asterisk Private CA/O=Ciproc GmbH

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b
The following certificates were part of the certificate chain
sent by the remote host, but they have expired :

|-Subject   : CN=Asterisk Private CA/O=Ciproc GmbH
|-Not After : Mar 22 19:12:20 2021 GMT

|-Subject   : CN=ciproc.nextgentel.de/O=Ciproc GmbH
|-Not After : Mar 22 19:12:24 2021 GMT

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=Asterisk Private CA/O=Ciproc GmbH
|-Issuer  : CN=Asterisk Private CA/O=Ciproc GmbH

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=Asterisk Private CA/O=Ciproc GmbH

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=Asterisk Private CA/O=Ciproc GmbH

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 362

The remote service supports the use of the RC4 cipher.

List of RC4 cipher suites supported by the remote server :

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    ECDHE-RSA-RC4-SHA             0xC0, 0x11       ECDH          RSA      RC4(128)               SHA1
    AECDH-RC4-SHA                 0xC0, 0x16       ECDH          None     RC4(128)               SHA1
    RC4-MD5                       0x00, 0x04       RSA           RSA      RC4(128)               MD5
    RC4-SHA                       0x00, 0x05       RSA           RSA      RC4(128)               SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.

CVE:CVE-2013-2566, CVE-2015-2808
CWE:N/A
VPR:3.6


MEDIUMID: 564

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 156

The remote service supports the use of anonymous SSL ciphers.

The following is a list of SSL anonymous ciphers supported by the remote TCP server :

  Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    AECDH-DES-CBC3-SHA            0xC0, 0x17       ECDH          None     3DES-CBC(168)          SHA1

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    AECDH-AES128-SHA              0xC0, 0x18       ECDH          None     AES-CBC(128)           SHA1
    AECDH-AES256-SHA              0xC0, 0x19       ECDH          None     AES-CBC(256)           SHA1
    AECDH-RC4-SHA                 0xC0, 0x16       ECDH          None     RC4(128)               SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of weak ciphers.

CVE:CVE-2007-1858
CWE:N/A
VPR:4.4


LOWID: 366

The X.509 certificate chain used by this service contains certificates with RSA keys shorter than 2048 bits.

The following certificates were part of the certificate chain
sent by the remote host, but contain RSA keys that are considered
to be weak :

|-Subject        : CN=ciproc.nextgentel.de/O=Ciproc GmbH
|-RSA Key Length : 1024 bits

Replace the certificate in the chain with the RSA key less than 2048 bits in length with a longer key, and reissue any certificates signed by the old certificate.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 95

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID: 192

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 147

The remote server's SSL certificate has already expired.

The SSL certificate has already expired :

  Subject          : CN=ciproc.nextgentel.de, O=Ciproc GmbH
  Issuer           : CN=Asterisk Private CA, O=Ciproc GmbH
  Not valid before : Mar 22 19:12:24 2020 GMT
  Not valid after  : Mar 22 19:12:24 2021 GMT

Purchase or generate a new SSL certificate to replace the existing one.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 211

The remote service supports the use of medium strength SSL ciphers.

Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    ECDHE-RSA-DES-CBC3-SHA        0xC0, 0x12       ECDH          RSA      3DES-CBC(168)          SHA1
    AECDH-DES-CBC3-SHA            0xC0, 0x17       ECDH          None     3DES-CBC(168)          SHA1
    DES-CBC3-SHA                  0x00, 0x0A       RSA           RSA      3DES-CBC(168)          SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of medium strength ciphers.

CVE:CVE-2016-2183
CWE:N/A
VPR:4.4


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificates were part of the certificate chain
sent by the remote host, but they have expired :

|-Subject   : CN=Asterisk Private CA/O=Ciproc GmbH
|-Not After : Mar 22 19:12:20 2021 GMT

|-Subject   : CN=ciproc.nextgentel.de/O=Ciproc GmbH
|-Not After : Mar 22 19:12:24 2021 GMT

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=Asterisk Private CA/O=Ciproc GmbH
|-Issuer  : CN=Asterisk Private CA/O=Ciproc GmbH
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificates were part of the certificate chain
sent by the remote host, but they have expired :

|-Subject   : CN=Asterisk Private CA/O=Ciproc GmbH
|-Not After : Mar 22 19:12:20 2021 GMT

|-Subject   : CN=ciproc.nextgentel.de/O=Ciproc GmbH
|-Not After : Mar 22 19:12:24 2021 GMT

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=Asterisk Private CA/O=Ciproc GmbH
|-Issuer  : CN=Asterisk Private CA/O=Ciproc GmbH
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=Asterisk Private CA/O=Ciproc GmbH
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=Asterisk Private CA/O=Ciproc GmbH
The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 362

The remote service supports the use of the RC4 cipher.

List of RC4 cipher suites supported by the remote server :

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    ECDHE-RSA-RC4-SHA             0xC0, 0x11       ECDH          RSA      RC4(128)               SHA1
    AECDH-RC4-SHA                 0xC0, 0x16       ECDH          None     RC4(128)               SHA1
    RC4-MD5                       0x00, 0x04       RSA           RSA      RC4(128)               MD5
    RC4-SHA                       0x00, 0x05       RSA           RSA      RC4(128)               SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.

CVE:CVE-2013-2566, CVE-2015-2808
CWE:N/A
VPR:3.6


MEDIUMID: 564

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 156

The remote service supports the use of anonymous SSL ciphers.

The following is a list of SSL anonymous ciphers supported by the remote TCP server :

  Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    AECDH-DES-CBC3-SHA            0xC0, 0x17       ECDH          None     3DES-CBC(168)          SHA1

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    AECDH-AES128-SHA              0xC0, 0x18       ECDH          None     AES-CBC(128)           SHA1
    AECDH-AES256-SHA              0xC0, 0x19       ECDH          None     AES-CBC(256)           SHA1
    AECDH-RC4-SHA                 0xC0, 0x16       ECDH          None     RC4(128)               SHA1

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of weak ciphers.

CVE:CVE-2007-1858
CWE:N/A
VPR:4.4


LOWID: 366

The X.509 certificate chain used by this service contains certificates with RSA keys shorter than 2048 bits.

The following certificates were part of the certificate chain
sent by the remote host, but contain RSA keys that are considered
to be weak :

|-Subject        : CN=ciproc.nextgentel.de/O=Ciproc GmbH
|-RSA Key Length : 1024 bits

Replace the certificate in the chain with the RSA key less than 2048 bits in length with a longer key, and reissue any certificates signed by the old certificate.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 95

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.221.78 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:36:36 2022-03-26 23:09:36
WAFs detected:
  • 172.21.221.78
  • No reverse DNS entries
  • 172.21.221.78
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
Protocol Port Service
tcp443www
tcp999ssh
Vulnerabilities detected:
CRITICALID: 193

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 290

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 347

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 565

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID: 193

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 290

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 347

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 565

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.162 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:45:59 2022-03-26 23:18:10
WAFs detected:
  • 172.21.221.162
  • No reverse DNS entries
  • 172.21.221.162
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp80www
tcp443www
tcp999ssh
tcp3306mysql
Protocol Port Service
tcp80www
tcp443www
tcp999ssh
tcp3306mysql
Vulnerabilities detected:
CRITICALID: 194

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 291

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 348

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 566

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
CRITICALID: 194

The operating system running on the remote host is no longer supported.

Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 291

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 348

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 566

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.233 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:38:35 2022-03-26 23:10:23
WAFs detected:
  • 172.21.221.233
  • No reverse DNS entries
  • 172.21.221.233
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 on Debian 6.0 (squeeze) Linux Kernel 2.6 on Debian 6.0 (squeeze)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
tcp3306mysql
Protocol Port Service
tcp80www
tcp999ssh
tcp3306mysql
Vulnerabilities detected:
CRITICALID: 196

The operating system running on the remote host is no longer supported.

Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 452

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "d9-b1-4e71f19852040"
  Inode number           : 217
  File size              : 177 bytes
  File modification time : Sep. 24, 2013 at 11:04:25 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 488

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 397

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 432

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 728

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 99

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID: 196

The operating system running on the remote host is no longer supported.

Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 452

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "d9-b1-4e71f19852040"
  Inode number           : 217
  File size              : 177 bytes
  File modification time : Sep. 24, 2013 at 11:04:25 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 488

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 397

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 432

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 728

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 99

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.221.240 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:40:33 2022-03-26 23:12:44
WAFs detected:
  • 172.21.221.240
  • No reverse DNS entries
  • 172.21.221.240
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 on Debian 6.0 (squeeze) Linux Kernel 2.6 on Debian 6.0 (squeeze)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
tcp3306mysql
Protocol Port Service
tcp80www
tcp999ssh
tcp3306mysql
Vulnerabilities detected:
CRITICALID: 197

The operating system running on the remote host is no longer supported.

Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 453

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "400c0-b1-56e0ecc601640"
  Inode number           : 262336
  File size              : 177 bytes
  File modification time : Jun.  7, 2018 at 15:18:41 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 489

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 398

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 433

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 729

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 101

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID: 197

The operating system running on the remote host is no longer supported.

Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 453

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "400c0-b1-56e0ecc601640"
  Inode number           : 262336
  File size              : 177 bytes
  File modification time : Jun.  7, 2018 at 15:18:41 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 489

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 398

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 433

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 729

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 101

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.221.241 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:40:52 2022-03-26 23:12:43
WAFs detected:
  • 172.21.221.241
  • No reverse DNS entries
  • 172.21.221.241
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 on Debian 6.0 (squeeze) Linux Kernel 2.6 on Debian 6.0 (squeeze)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
tcp3306mysql
Protocol Port Service
tcp80www
tcp999ssh
tcp3306mysql
Vulnerabilities detected:
CRITICALID: 198

The operating system running on the remote host is no longer supported.

Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 454

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "d9-b1-4e71f18dd4780"
  Inode number           : 217
  File size              : 177 bytes
  File modification time : Sep. 24, 2013 at 11:04:14 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 490

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 399

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 434

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 730

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 102

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID: 198

The operating system running on the remote host is no longer supported.

Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 454

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "d9-b1-4e71f18dd4780"
  Inode number           : 217
  File size              : 177 bytes
  File modification time : Sep. 24, 2013 at 11:04:14 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 490

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 399

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 434

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 730

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 102

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.221.243 (Telephony) CRITICAL NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:41:29 2022-03-26 23:12:42
WAFs detected:
  • 172.21.221.243
  • No reverse DNS entries
  • 172.21.221.243
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 on Debian 6.0 (squeeze) Linux Kernel 2.6 on Debian 6.0 (squeeze)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
tcp3306mysql
Protocol Port Service
tcp80www
tcp999ssh
tcp3306mysql
Vulnerabilities detected:
CRITICALID: 199

The operating system running on the remote host is no longer supported.

Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 455

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "d9-b1-4e71f18dd4780"
  Inode number           : 217
  File size              : 177 bytes
  File modification time : Sep. 24, 2013 at 11:04:14 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 491

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 400

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 435

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 731

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 103

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
CRITICALID: 199

The operating system running on the remote host is no longer supported.

Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS).
Upgrade to Debian Linux 10.x ("Buster").

For more information, see : http://www.debian.org/releases/

Upgrade to a version of the Unix operating system that is currently supported.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 455

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "d9-b1-4e71f18dd4780"
  Inode number           : 217
  File size              : 177 bytes
  File modification time : Sep. 24, 2013 at 11:04:14 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 491

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 400

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 435

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 731

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 103

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.0.4 (Hosts) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:37:09 2022-03-26 22:02:46
WAFs detected:
  • 172.21.0.4
  • debx04.hosts.ciproc
  • 172.21.0.4
  • debx04.hosts.ciproc
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp111rpc-portmapper
tcp999ssh
Protocol Port Service
tcp111rpc-portmapper
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 456

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 367

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 401

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 694

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 2

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 2 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 105

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A
MEDIUMID: 456

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 367

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 401

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 694

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 2

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 105

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A

172.21.0.9 (Hosts) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:33:44 2022-03-26 22:02:46
WAFs detected:
  • 172.21.0.9
  • No reverse DNS entries
  • 172.21.0.9
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp999ssh
Protocol Port Service
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 457

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 402

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 368

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 695

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 3

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 2 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 457

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 402

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 368

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 695

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 3

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.0.10 (Hosts) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:34:02 2022-03-26 22:02:45
WAFs detected:
  • 172.21.0.10
  • No reverse DNS entries
  • 172.21.0.10
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp111rpc-portmapper
tcp999ssh
Protocol Port Service
tcp111rpc-portmapper
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 458

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 369

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 403

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 696

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 4

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 2 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 106

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A
MEDIUMID: 458

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 369

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 403

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 696

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 4

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 4 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 106

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A

172.21.0.15 (Hosts) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:34:00 2022-03-26 22:02:47
WAFs detected:
  • 172.21.0.15
  • No reverse DNS entries
  • 172.21.0.15
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp111rpc-portmapper
tcp999ssh
Protocol Port Service
tcp111rpc-portmapper
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 459

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 370

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 404

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 697

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 5

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 2932 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 107

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A
MEDIUMID: 459

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 370

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 404

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 697

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 5

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 2951 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 107

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A

172.21.11.5 (ISP) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:35:15 2022-03-26 22:04:03
WAFs detected:
  • 172.21.11.5
  • No reverse DNS entries
  • 172.21.11.5
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp53dns
tcp999ssh
tcp3306mysql
Protocol Port Service
tcp53dns
tcp999ssh
tcp3306mysql
Vulnerabilities detected:
MEDIUMID: 136

The remote DNS server is vulnerable to cache snooping attacks.

Nessus sent a non-recursive query for example.com
and received 1 answer :

93.184.216.34

Contact the vendor of the DNS software for a fix.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 17

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 136

The remote DNS server is vulnerable to cache snooping attacks.

Nessus sent a non-recursive query for example.com
and received 1 answer :

93.184.216.34

Contact the vendor of the DNS software for a fix.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 17

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.11.11 (ISP) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:42:21 2022-03-26 22:11:11
WAFs detected:
  • 172.21.11.11
  • No reverse DNS entries
  • 172.21.11.11
  • No reverse DNS entries
OS detected: Ubuntu 14.04 Linux Kernel 3.13 Ubuntu 14.04 Linux Kernel 3.13
Ports detected:
Protocol Port Service
tcp21ftp
tcp25smtp
tcp110pop3
Protocol Port Service
tcp21ftp
tcp25smtp
tcp110pop3
Vulnerabilities detected:
MEDIUMID: 201

An SSL certificate in the certificate chain has been signed using a weak hash algorithm.

The following certificates were part of the certificate chain sent by
the remote host, but contain hashes that are considered to be weak.

Subject             : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
Signature Algorithm : SHA-1 With RSA Encryption
Valid From          : May 02 01:14:19 2012 GMT
Valid To            : Apr 27 01:14:19 2032 GMT
Raw PEM certificate : 
-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----

Contact the Certificate Authority to have the SSL certificate reissued.

CVE:CVE-2004-2761
CWE:310
VPR:6.1


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
|-Issuer  : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
|-Issuer  : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 295

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 509

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 138

The remote POP3 daemon allows credentials to be transmitted in cleartext.

The following cleartext methods are supported :
USER
SASL PLAIN LOGIN

Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.

CVE:N/A
CWE:N/A
VPR:N/A
MEDIUMID: 201

An SSL certificate in the certificate chain has been signed using a weak hash algorithm.

The following certificates were part of the certificate chain sent by
the remote host, but contain hashes that are considered to be weak.

Subject             : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
Signature Algorithm : SHA-1 With RSA Encryption
Valid From          : May 02 01:14:19 2012 GMT
Valid To            : Apr 27 01:14:19 2032 GMT
Raw PEM certificate : 
-----BEGIN CERTIFICATE-----
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
-----END CERTIFICATE-----

Contact the Certificate Authority to have the SSL certificate reissued.

CVE:CVE-2004-2761
CWE:310
VPR:6.1


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
|-Issuer  : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
|-Issuer  : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de
The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 295

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 509

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 138

The remote POP3 daemon allows credentials to be transmitted in cleartext.

The following cleartext methods are supported :
USER
SASL PLAIN LOGIN

Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.11.14 (ISP) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:49:59 2022-03-26 22:20:25
WAFs detected:
  • 172.21.11.14
  • No reverse DNS entries
  • 172.21.11.14
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp25smtp
tcp110pop3
tcp143imap
tcp465smtp
tcp587smtp
tcp993imap
tcp995pop3
Protocol Port Service
tcp25smtp
tcp110pop3
tcp143imap
tcp465smtp
tcp587smtp
tcp993imap
tcp995pop3
Vulnerabilities detected:
MEDIUMID: 511

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 230

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 140

The remote POP3 daemon allows credentials to be transmitted in cleartext.

The following cleartext methods are supported :
USER
SASL PLAIN LOGIN

Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.

CVE:N/A
CWE:N/A
VPR:N/A
MEDIUMID: 511

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 230

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 140

The remote POP3 daemon allows credentials to be transmitted in cleartext.

The following cleartext methods are supported :
USER
SASL PLAIN LOGIN

Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.11.15 (ISP) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:40:11 2022-03-26 22:09:12
WAFs detected:
  • 172.21.11.15
  • No reverse DNS entries
  • 172.21.11.15
  • No reverse DNS entries
OS detected: Ubuntu 14.04 Linux Kernel 3.13 Ubuntu 14.04 Linux Kernel 3.13
Ports detected:
Protocol Port Service
tcp25smtp
tcp110pop3
Protocol Port Service
tcp25smtp
tcp110pop3
Vulnerabilities detected:
MEDIUMID: 512

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 231

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 141

The remote POP3 daemon allows credentials to be transmitted in cleartext.

The following cleartext methods are supported :
USER
SASL PLAIN LOGIN

Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.

CVE:N/A
CWE:N/A
VPR:N/A
MEDIUMID: 512

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 231

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 141

The remote POP3 daemon allows credentials to be transmitted in cleartext.

The following cleartext methods are supported :
USER
SASL PLAIN LOGIN

Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.11.20 (ISP) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:52:13 2022-03-26 22:20:59
WAFs detected:
  • 172.21.11.20
  • No reverse DNS entries
  • 172.21.11.20
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp25smtp
tcp80www
tcp110pop3
tcp143imap
tcp443www
tcp465smtp
tcp587smtp
tcp993imap
tcp995pop3
tcp999ssh
Protocol Port Service
tcp25smtp
tcp80www
tcp110pop3
tcp143imap
tcp443www
tcp465smtp
tcp587smtp
tcp993imap
tcp995pop3
tcp999ssh
Vulnerabilities detected:
MEDIUMID:

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 143

The remote POP3 daemon allows credentials to be transmitted in cleartext.

The following cleartext methods are supported :
USER
SASL PLAIN LOGIN

Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.

CVE:N/A
CWE:N/A
VPR:N/A
MEDIUMID:

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID:

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 143

The remote POP3 daemon allows credentials to be transmitted in cleartext.

The following cleartext methods are supported :
USER
SASL PLAIN LOGIN

Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.11.22 (ISP) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:43:56 2022-03-26 22:12:45
WAFs detected:
  • 172.21.11.22
  • No reverse DNS entries
  • 172.21.11.22
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp25smtp
tcp110pop3
tcp143imap
tcp993imap
tcp995pop3
tcp999ssh
Protocol Port Service
tcp25smtp
tcp110pop3
tcp143imap
tcp993imap
tcp995pop3
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 234

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=dib.eitun.de
|-Issuer  : CN=dib.eitun.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 297

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=dib.eitun.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 515

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 150

The remote service supports the use of anonymous SSL ciphers.

The following is a list of SSL anonymous ciphers supported by the remote TCP server :

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    DH-AES128-SHA256              0x00, 0xA6       DH            None     AES-GCM(128)           SHA256
    DH-AES256-SHA384              0x00, 0xA7       DH            None     AES-GCM(256)           SHA384
    ADH-AES128-SHA                0x00, 0x34       DH            None     AES-CBC(128)           SHA1
    ADH-AES256-SHA                0x00, 0x3A       DH            None     AES-CBC(256)           SHA1
    ADH-CAMELLIA128-SHA           0x00, 0x46       DH            None     Camellia-CBC(128)      SHA1
    ADH-CAMELLIA256-SHA           0x00, 0x89       DH            None     Camellia-CBC(256)      SHA1
    ADH-SEED-SHA                  0x00, 0x9B       DH            None     SEED-CBC(128)          SHA1
    AECDH-AES128-SHA              0xC0, 0x18       ECDH          None     AES-CBC(128)           SHA1
    AECDH-AES256-SHA              0xC0, 0x19       ECDH          None     AES-CBC(256)           SHA1
    DH-AES128-SHA256              0x00, 0x6C       DH            None     AES-CBC(128)           SHA256
    DH-AES256-SHA256              0x00, 0x6D       DH            None     AES-CBC(256)           SHA256
    DH-CAMELLIA128-SHA256         0x00, 0xBF       DH            None     Camellia-CBC(128)      SHA256
    DH-CAMELLIA256-SHA256         0x00, 0xC5       DH            None     Camellia-CBC(256)      SHA256

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of weak ciphers.

CVE:CVE-2007-1858
CWE:N/A
VPR:4.4


INFOID: 19

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 234

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=dib.eitun.de
|-Issuer  : CN=dib.eitun.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 297

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=dib.eitun.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 515

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 150

The remote service supports the use of anonymous SSL ciphers.

The following is a list of SSL anonymous ciphers supported by the remote TCP server :

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    DH-AES128-SHA256              0x00, 0xA6       DH            None     AES-GCM(128)           SHA256
    DH-AES256-SHA384              0x00, 0xA7       DH            None     AES-GCM(256)           SHA384
    ADH-AES128-SHA                0x00, 0x34       DH            None     AES-CBC(128)           SHA1
    ADH-AES256-SHA                0x00, 0x3A       DH            None     AES-CBC(256)           SHA1
    ADH-CAMELLIA128-SHA           0x00, 0x46       DH            None     Camellia-CBC(128)      SHA1
    ADH-CAMELLIA256-SHA           0x00, 0x89       DH            None     Camellia-CBC(256)      SHA1
    ADH-SEED-SHA                  0x00, 0x9B       DH            None     SEED-CBC(128)          SHA1
    AECDH-AES128-SHA              0xC0, 0x18       ECDH          None     AES-CBC(128)           SHA1
    AECDH-AES256-SHA              0xC0, 0x19       ECDH          None     AES-CBC(256)           SHA1
    DH-AES128-SHA256              0x00, 0x6C       DH            None     AES-CBC(128)           SHA256
    DH-AES256-SHA256              0x00, 0x6D       DH            None     AES-CBC(256)           SHA256
    DH-CAMELLIA128-SHA256         0x00, 0xBF       DH            None     Camellia-CBC(128)      SHA256
    DH-CAMELLIA256-SHA256         0x00, 0xC5       DH            None     Camellia-CBC(256)      SHA256

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of weak ciphers.

CVE:CVE-2007-1858
CWE:N/A
VPR:4.4


INFOID: 19

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.11.122 (ISP) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:38:15 2022-03-26 22:07:04
WAFs detected:
  • 172.21.11.122
  • No reverse DNS entries
  • 172.21.11.122
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
Protocol Port Service
tcp443www
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 299

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=ponkeyMON

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 236

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=ponkeyMON
|-Issuer  : CN=ponkeyMON

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 517

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 21

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 299

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=ponkeyMON

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 236

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=ponkeyMON
|-Issuer  : CN=ponkeyMON

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 517

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 21

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.11.145 (ISP) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:52:11 2022-03-26 22:20:58
WAFs detected:
  • 172.21.11.145
  • No reverse DNS entries
  • 172.21.11.145
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp25smtp?
tcp80www
tcp443www
tcp999ssh
Protocol Port Service
tcp25smtp?
tcp80www
tcp443www
tcp999ssh
Vulnerabilities detected:
MEDIUMID:

The remote server's SSL certificate has already expired.

The SSL certificate has already expired :

  Subject          : CN=hbmedia.info
  Issuer           : C=US, O=Let's Encrypt, CN=R3
  Not valid before : Nov 15 15:59:49 2021 GMT
  Not valid after  : Feb 13 15:59:48 2022 GMT

Purchase or generate a new SSL certificate to replace the existing one.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 804

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to exploit the issue using the following request :

https://172.21.11.145/?M=A


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
[...]

------------------------------ snip ------------------------------

Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.

CVE:CVE-2001-0731
CWE:N/A
VPR:2.2


MEDIUMID: 237

The SSL certificate for this service cannot be trusted.

The following certificate was part of the certificate chain
sent by the remote host, but it has expired :

|-Subject   : CN=hbmedia.info
|-Not After : Feb 13 15:59:48 2022 GMT

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 518

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 22

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID:

The remote server's SSL certificate has already expired.

The SSL certificate has already expired :

  Subject          : CN=hbmedia.info
  Issuer           : C=US, O=Let's Encrypt, CN=R3
  Not valid before : Nov 15 15:59:49 2021 GMT
  Not valid after  : Feb 13 15:59:48 2022 GMT

Purchase or generate a new SSL certificate to replace the existing one.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 804

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to exploit the issue using the following request :

https://172.21.11.145/?M=A


This produced the following truncated output (limited to 10 lines) :
------------------------------ snip ------------------------------
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>
<head>
<title>Index of /</title>
</head>
<body>
<h1>Index of /</h1>
<table>
<tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr>
<tr><th colspan="5"><hr></th></tr>
[...]

------------------------------ snip ------------------------------

Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.

CVE:CVE-2001-0731
CWE:N/A
VPR:2.2


MEDIUMID: 237

The SSL certificate for this service cannot be trusted.

The following certificate was part of the certificate chain
sent by the remote host, but it has expired :

|-Subject   : CN=hbmedia.info
|-Not After : Feb 13 15:59:48 2022 GMT

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1
|-Issuer  : O=Digital Signature Trust Co./CN=DST Root CA X3

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 518

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 22

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.147.1 (Hosting) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:46:24 2022-03-26 22:14:35
WAFs detected:
  • 172.21.147.1
  • No reverse DNS entries
  • 172.21.147.1
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp999ssh
Protocol Port Service
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 466

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 411

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 377

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 704

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 32

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 3526 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 466

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 411

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 377

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 704

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 32

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 3538 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.172.21 (monkeySYS) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:46:51 2022-03-26 22:14:51
WAFs detected:
  • 172.21.172.21
  • No reverse DNS entries
  • 172.21.172.21
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp1999ssh
Protocol Port Service
tcp1999ssh
Vulnerabilities detected:
MEDIUMID: 214

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


INFOID: 33

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 214

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


INFOID: 33

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.172.22 (VulnLIB) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:48:47 2022-03-26 22:17:07
WAFs detected:
  • 172.21.172.22
  • No reverse DNS entries
  • 172.21.172.22
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp999ssh
Protocol Port Service
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 467

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 412

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 705

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A
MEDIUMID: 467

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 412

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 705

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.172.24 (ciproc intern) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:52:48 2022-03-26 22:21:27
WAFs detected:
  • 172.21.172.24
  • No reverse DNS entries
  • 172.21.172.24
  • No reverse DNS entries
OS detected: Linux Kernel 3.16.0-4-amd64 Linux Kernel 3.16.0-4-amd64
Ports detected: None None
Vulnerabilities detected:
MEDIUMID: 145

The remote server's SSL certificate has already expired.

The SSL certificate has already expired :

  Subject          : O=Nessus Users United, OU=Nessus Server, L=New York, C=US, ST=NY, CN=pent01.ciproc.de
  Issuer           : O=Nessus Users United, OU=Nessus Certification Authority (6d2a629d), L=New York, C=US, ST=NY, CN=Nessus Certification Authority (6d2a629d)
  Not valid before : Jan  5 22:37:57 2013 GMT
  Not valid after  : Jan  5 22:37:57 2014 GMT

Purchase or generate a new SSL certificate to replace the existing one.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 245

The SSL certificate for this service cannot be trusted.

The following certificate was part of the certificate chain
sent by the remote host, but it has expired :

|-Subject   : O=Nessus Users United/OU=Nessus Server/L=New York/C=US/ST=NY/CN=pent01.ciproc.de
|-Not After : Jan 05 22:37:57 2014 GMT

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : O=Nessus Users United/OU=Nessus Server/L=New York/C=US/ST=NY/CN=pent01.ciproc.de
|-Issuer  : O=Nessus Users United/OU=Nessus Certification Authority (6d2a629d)/L=New York/C=US/ST=NY/CN=Nessus Certification Authority (6d2a629d)

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 364

The X.509 certificate chain used by this service contains certificates with RSA keys shorter than 2048 bits.

The following certificates were part of the certificate chain
sent by the remote host, but contain RSA keys that are considered
to be weak :

|-Subject        : O=Nessus Users United/OU=Nessus Server/L=New York/C=US/ST=NY/CN=pent01.ciproc.de
|-RSA Key Length : 1024 bits

Replace the certificate in the chain with the RSA key less than 2048 bits in length with a longer key, and reissue any certificates signed by the old certificate.

CVE:N/A
CWE:N/A
VPR:N/A
MEDIUMID: 145

The remote server's SSL certificate has already expired.

The SSL certificate has already expired :

  Subject          : O=Nessus Users United, OU=Nessus Server, L=New York, C=US, ST=NY, CN=pent01.ciproc.de
  Issuer           : O=Nessus Users United, OU=Nessus Certification Authority (6d2a629d), L=New York, C=US, ST=NY, CN=Nessus Certification Authority (6d2a629d)
  Not valid before : Jan  5 22:37:57 2013 GMT
  Not valid after  : Jan  5 22:37:57 2014 GMT

Purchase or generate a new SSL certificate to replace the existing one.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 245

The SSL certificate for this service cannot be trusted.

The following certificate was part of the certificate chain
sent by the remote host, but it has expired :

|-Subject   : O=Nessus Users United/OU=Nessus Server/L=New York/C=US/ST=NY/CN=pent01.ciproc.de
|-Not After : Jan 05 22:37:57 2014 GMT

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : O=Nessus Users United/OU=Nessus Server/L=New York/C=US/ST=NY/CN=pent01.ciproc.de
|-Issuer  : O=Nessus Users United/OU=Nessus Certification Authority (6d2a629d)/L=New York/C=US/ST=NY/CN=Nessus Certification Authority (6d2a629d)

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 364

The X.509 certificate chain used by this service contains certificates with RSA keys shorter than 2048 bits.

The following certificates were part of the certificate chain
sent by the remote host, but contain RSA keys that are considered
to be weak :

|-Subject        : O=Nessus Users United/OU=Nessus Server/L=New York/C=US/ST=NY/CN=pent01.ciproc.de
|-RSA Key Length : 1024 bits

Replace the certificate in the chain with the RSA key less than 2048 bits in length with a longer key, and reissue any certificates signed by the old certificate.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.172.45 (monkeySYS) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:51:48 2022-03-26 22:20:53
WAFs detected:
  • 172.21.172.45
  • No reverse DNS entries
  • 172.21.172.45
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
tcp1999ssh
Protocol Port Service
tcp443www
tcp999ssh
tcp1999ssh
Vulnerabilities detected:
MEDIUMID: 247

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=sysmonkey
|-Issuer  : CN=sysmonkey

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 216

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


MEDIUMID: 307

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=sysmonkey

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 525

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 38

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 247

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=sysmonkey
|-Issuer  : CN=sysmonkey

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 216

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


MEDIUMID: 307

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=sysmonkey

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 525

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 38

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.172.46 (monkeySYS) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:50:22 2022-03-26 22:19:31
WAFs detected:
  • 172.21.172.46
  • No reverse DNS entries
  • 172.21.172.46
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp1999ssh
Protocol Port Service
tcp1999ssh
Vulnerabilities detected:
MEDIUMID: 217

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


INFOID: 39

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 217

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


INFOID: 39

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.172.47 (monkeySYS) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:50:47 2022-03-26 22:20:32
WAFs detected:
  • 172.21.172.47
  • No reverse DNS entries
  • 172.21.172.47
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp1999ssh
Protocol Port Service
tcp1999ssh
Vulnerabilities detected:
MEDIUMID: 218

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


INFOID: 40

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 218

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


INFOID: 40

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.172.100 (monkeySYS) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:53:11 2022-03-26 22:22:03
WAFs detected:
  • 172.21.172.100
  • No reverse DNS entries
  • 172.21.172.100
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
tcp1999ssh
Protocol Port Service
tcp443www
tcp999ssh
tcp1999ssh
Vulnerabilities detected:
MEDIUMID: 249

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=ponkeySYS
|-Issuer  : CN=ponkeySYS

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 219

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


MEDIUMID: 309

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=ponkeySYS

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 527

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 41

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 249

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=ponkeySYS
|-Issuer  : CN=ponkeySYS

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 219

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


MEDIUMID: 309

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=ponkeySYS

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 527

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 41

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.172.101 (monkeySYS) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:51:34 2022-03-26 22:20:52
WAFs detected:
  • 172.21.172.101
  • No reverse DNS entries
  • 172.21.172.101
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp1999ssh
Protocol Port Service
tcp1999ssh
Vulnerabilities detected:
MEDIUMID: 220

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


INFOID: 42

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 220

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


INFOID: 42

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.172.106 (monkeySYS) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:54:07 2022-03-26 22:24:27
WAFs detected:
  • 172.21.172.106
  • No reverse DNS entries
  • 172.21.172.106
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
tcp1999ssh
Protocol Port Service
tcp443www
tcp999ssh
tcp1999ssh
Vulnerabilities detected:
MEDIUMID: 251

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=ponkeyA01
|-Issuer  : CN=ponkeyA01

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 222

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


MEDIUMID: 311

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=ponkeyA01

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 529

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 44

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 251

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=ponkeyA01
|-Issuer  : CN=ponkeyA01

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 222

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


MEDIUMID: 311

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=ponkeyA01

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 529

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 44

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.172.147 (monkeySYS) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:52:36 2022-03-26 22:22:36
WAFs detected:
  • 172.21.172.147
  • donkeyA02.devmonkey.ciproc
  • 172.21.172.147
  • donkeyA02.devmonkey.ciproc
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp999ssh
tcp1999ssh
tcp3306mysql
Protocol Port Service
tcp999ssh
tcp1999ssh
tcp3306mysql
Vulnerabilities detected:
MEDIUMID: 224

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


INFOID: 46

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 224

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


INFOID: 46

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.172.200 (monkeySYS) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:53:51 2022-03-26 22:23:25
WAFs detected:
  • 172.21.172.200
  • No reverse DNS entries
  • 172.21.172.200
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp1999ssh
Protocol Port Service
tcp1999ssh
Vulnerabilities detected:
MEDIUMID: 225

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


INFOID: 47

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 225

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


INFOID: 47

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.172.240 (monkeySYS) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:58:49 2022-03-26 22:24:24
WAFs detected:
  • 172.21.172.240
  • No reverse DNS entries
  • 172.21.172.240
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
tcp1999ssh
tcp3306mysql
Protocol Port Service
tcp443www
tcp999ssh
tcp1999ssh
tcp3306mysql
Vulnerabilities detected:
MEDIUMID: 253

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=donkeyAGENTS
|-Issuer  : CN=donkeyAGENTS

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 226

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


MEDIUMID: 313

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=donkeyAGENTS

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 531

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 48

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 253

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=donkeyAGENTS
|-Issuer  : CN=donkeyAGENTS

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 226

The remote host has IP forwarding enabled.

IP forwarding appears to be enabled on the remote host.

 Detected local MAC Address        : 00113c1500b4
 Response from local MAC Address   : 00113c1500b4

 Detected Gateway MAC Address      : 00163e15ae12
 Response from Gateway MAC Address : 00163e15ae12

On Linux, you can disable IP forwarding by doing : echo 0 > /proc/sys/net/ipv4/ip_forward On Windows, set the key 'IPEnableRouter' to 0 under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters On Mac OS X, you can disable IP forwarding by executing the command : sysctl -w net.inet.ip.forwarding=0 For other systems, check with your vendor.

CVE:CVE-1999-0511
CWE:N/A
VPR:4.0


MEDIUMID: 313

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=donkeyAGENTS

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 531

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 48

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.173.111 (darkhill) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:55:42 2022-03-26 22:24:48
WAFs detected:
  • 172.21.173.111
  • No reverse DNS entries
  • 172.21.173.111
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
Protocol Port Service
tcp443www
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 315

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=bulut.darkhill.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 255

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=bulut.darkhill.de
|-Issuer  : CN=bulut.darkhill.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 533

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 50

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 315

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=bulut.darkhill.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 255

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=bulut.darkhill.de
|-Issuer  : CN=bulut.darkhill.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 533

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 50

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.173.112 (darkhill) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:55:42 2022-03-26 22:24:55
WAFs detected:
  • 172.21.173.112
  • No reverse DNS entries
  • 172.21.173.112
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
Protocol Port Service
tcp443www
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 316

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=bulut.alielci.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 256

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=bulut.alielci.de
|-Issuer  : CN=bulut.alielci.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 534

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 51

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 316

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=bulut.alielci.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 256

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=bulut.alielci.de
|-Issuer  : CN=bulut.alielci.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 534

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 51

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.173.121 (ciproc intern) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:55:55 2022-03-26 22:24:59
WAFs detected:
  • 172.21.173.121
  • No reverse DNS entries
  • 172.21.173.121
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
Protocol Port Service
tcp443www
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 317

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=cirrus.ciproc.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 257

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=cirrus.ciproc.de
|-Issuer  : CN=cirrus.ciproc.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 535

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 52

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 317

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=cirrus.ciproc.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 257

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=cirrus.ciproc.de
|-Issuer  : CN=cirrus.ciproc.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 535

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 52

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.174.31 (darkhill) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:11:26 2022-03-26 22:29:34
WAFs detected:
  • 172.21.174.31
  • No reverse DNS entries
  • 172.21.174.31
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp25smtp
tcp111rpc-portmapper
tcp443www
tcp999ssh
Protocol Port Service
tcp25smtp
tcp111rpc-portmapper
tcp443www
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 258

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=web01.alevi.de
|-Issuer  : CN=web01.alevi.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 318

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=web01.alevi.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 536

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 152

The remote service supports the use of anonymous SSL ciphers.

The following is a list of SSL anonymous ciphers supported by the remote TCP server :

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    DH-AES128-SHA256              0x00, 0xA6       DH            None     AES-GCM(128)           SHA256
    DH-AES256-SHA384              0x00, 0xA7       DH            None     AES-GCM(256)           SHA384
    ADH-AES128-SHA                0x00, 0x34       DH            None     AES-CBC(128)           SHA1
    ADH-AES256-SHA                0x00, 0x3A       DH            None     AES-CBC(256)           SHA1
    ADH-CAMELLIA128-SHA           0x00, 0x46       DH            None     Camellia-CBC(128)      SHA1
    ADH-CAMELLIA256-SHA           0x00, 0x89       DH            None     Camellia-CBC(256)      SHA1
    ADH-SEED-SHA                  0x00, 0x9B       DH            None     SEED-CBC(128)          SHA1
    AECDH-AES128-SHA              0xC0, 0x18       ECDH          None     AES-CBC(128)           SHA1
    AECDH-AES256-SHA              0xC0, 0x19       ECDH          None     AES-CBC(256)           SHA1
    DH-AES128-SHA256              0x00, 0x6C       DH            None     AES-CBC(128)           SHA256
    DH-AES256-SHA256              0x00, 0x6D       DH            None     AES-CBC(256)           SHA256
    DH-CAMELLIA128-SHA256         0x00, 0xBF       DH            None     Camellia-CBC(128)      SHA256
    DH-CAMELLIA256-SHA256         0x00, 0xC5       DH            None     Camellia-CBC(256)      SHA256

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of weak ciphers.

CVE:CVE-2007-1858
CWE:N/A
VPR:4.4


INFOID: 55

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 113

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A
MEDIUMID: 258

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=web01.alevi.de
|-Issuer  : CN=web01.alevi.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 318

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=web01.alevi.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 536

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 152

The remote service supports the use of anonymous SSL ciphers.

The following is a list of SSL anonymous ciphers supported by the remote TCP server :

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    DH-AES128-SHA256              0x00, 0xA6       DH            None     AES-GCM(128)           SHA256
    DH-AES256-SHA384              0x00, 0xA7       DH            None     AES-GCM(256)           SHA384
    ADH-AES128-SHA                0x00, 0x34       DH            None     AES-CBC(128)           SHA1
    ADH-AES256-SHA                0x00, 0x3A       DH            None     AES-CBC(256)           SHA1
    ADH-CAMELLIA128-SHA           0x00, 0x46       DH            None     Camellia-CBC(128)      SHA1
    ADH-CAMELLIA256-SHA           0x00, 0x89       DH            None     Camellia-CBC(256)      SHA1
    ADH-SEED-SHA                  0x00, 0x9B       DH            None     SEED-CBC(128)          SHA1
    AECDH-AES128-SHA              0xC0, 0x18       ECDH          None     AES-CBC(128)           SHA1
    AECDH-AES256-SHA              0xC0, 0x19       ECDH          None     AES-CBC(256)           SHA1
    DH-AES128-SHA256              0x00, 0x6C       DH            None     AES-CBC(128)           SHA256
    DH-AES256-SHA256              0x00, 0x6D       DH            None     AES-CBC(256)           SHA256
    DH-CAMELLIA128-SHA256         0x00, 0xBF       DH            None     Camellia-CBC(128)      SHA256
    DH-CAMELLIA256-SHA256         0x00, 0xC5       DH            None     Camellia-CBC(256)      SHA256

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of weak ciphers.

CVE:CVE-2007-1858
CWE:N/A
VPR:4.4


INFOID: 55

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 113

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A

172.21.174.33 (darkhill) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:59:58 2022-03-26 22:33:53
WAFs detected:
  • 172.21.174.33
  • No reverse DNS entries
  • 172.21.174.33
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp25smtp
tcp80www
tcp111rpc-portmapper
tcp443www
tcp999ssh
Protocol Port Service
tcp25smtp
tcp80www
tcp111rpc-portmapper
tcp443www
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 260

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=webdev.alevi.de
|-Issuer  : CN=webdev.alevi.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 320

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=webdev.alevi.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 538

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 154

The remote service supports the use of anonymous SSL ciphers.

The following is a list of SSL anonymous ciphers supported by the remote TCP server :

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    DH-AES128-SHA256              0x00, 0xA6       DH            None     AES-GCM(128)           SHA256
    DH-AES256-SHA384              0x00, 0xA7       DH            None     AES-GCM(256)           SHA384
    ADH-AES128-SHA                0x00, 0x34       DH            None     AES-CBC(128)           SHA1
    ADH-AES256-SHA                0x00, 0x3A       DH            None     AES-CBC(256)           SHA1
    ADH-CAMELLIA128-SHA           0x00, 0x46       DH            None     Camellia-CBC(128)      SHA1
    ADH-CAMELLIA256-SHA           0x00, 0x89       DH            None     Camellia-CBC(256)      SHA1
    ADH-SEED-SHA                  0x00, 0x9B       DH            None     SEED-CBC(128)          SHA1
    AECDH-AES128-SHA              0xC0, 0x18       ECDH          None     AES-CBC(128)           SHA1
    AECDH-AES256-SHA              0xC0, 0x19       ECDH          None     AES-CBC(256)           SHA1
    DH-AES128-SHA256              0x00, 0x6C       DH            None     AES-CBC(128)           SHA256
    DH-AES256-SHA256              0x00, 0x6D       DH            None     AES-CBC(256)           SHA256
    DH-CAMELLIA128-SHA256         0x00, 0xBF       DH            None     Camellia-CBC(128)      SHA256
    DH-CAMELLIA256-SHA256         0x00, 0xC5       DH            None     Camellia-CBC(256)      SHA256

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of weak ciphers.

CVE:CVE-2007-1858
CWE:N/A
VPR:4.4


INFOID: 57

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 115

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A
MEDIUMID: 260

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=webdev.alevi.de
|-Issuer  : CN=webdev.alevi.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 320

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=webdev.alevi.de

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 538

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 154

The remote service supports the use of anonymous SSL ciphers.

The following is a list of SSL anonymous ciphers supported by the remote TCP server :

  High Strength Ciphers (>= 112-bit key)

    Name                          Code             KEX           Auth     Encryption             MAC
    ----------------------        ----------       ---           ----     ---------------------  ---
    DH-AES128-SHA256              0x00, 0xA6       DH            None     AES-GCM(128)           SHA256
    DH-AES256-SHA384              0x00, 0xA7       DH            None     AES-GCM(256)           SHA384
    ADH-AES128-SHA                0x00, 0x34       DH            None     AES-CBC(128)           SHA1
    ADH-AES256-SHA                0x00, 0x3A       DH            None     AES-CBC(256)           SHA1
    ADH-CAMELLIA128-SHA           0x00, 0x46       DH            None     Camellia-CBC(128)      SHA1
    ADH-CAMELLIA256-SHA           0x00, 0x89       DH            None     Camellia-CBC(256)      SHA1
    ADH-SEED-SHA                  0x00, 0x9B       DH            None     SEED-CBC(128)          SHA1
    AECDH-AES128-SHA              0xC0, 0x18       ECDH          None     AES-CBC(128)           SHA1
    AECDH-AES256-SHA              0xC0, 0x19       ECDH          None     AES-CBC(256)           SHA1
    DH-AES128-SHA256              0x00, 0x6C       DH            None     AES-CBC(128)           SHA256
    DH-AES256-SHA256              0x00, 0x6D       DH            None     AES-CBC(256)           SHA256
    DH-CAMELLIA128-SHA256         0x00, 0xBF       DH            None     Camellia-CBC(128)      SHA256
    DH-CAMELLIA256-SHA256         0x00, 0xC5       DH            None     Camellia-CBC(256)      SHA256

The fields above are :

  {Tenable ciphername}
  {Cipher ID code}
  Kex={key exchange}
  Auth={authentication}
  Encrypt={symmetric encryption method}
  MAC={message authentication code}
  {export flag}

Reconfigure the affected application if possible to avoid use of weak ciphers.

CVE:CVE-2007-1858
CWE:N/A
VPR:4.4


INFOID: 57

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 115

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A

172.21.199.211 (Hosting) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:06:30 2022-03-26 22:36:17
WAFs detected:
  • 172.21.199.211
  • No reverse DNS entries
  • 172.21.199.211
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp139smb
tcp445cifs
tcp1972intersys-cache?
Protocol Port Service
tcp139smb
tcp445cifs
tcp1972intersys-cache?
Vulnerabilities detected:
MEDIUMID: 353

Signing is not required on the remote SMB server.


  

Enforce message signing in the host's configuration. On Windows, this is found in the policy setting 'Microsoft network server: Digitally sign communications (always)'. On Samba, the setting is called 'server signing'. See the 'see also' links for further details.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 81

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 353

Signing is not required on the remote SMB server.


  

Enforce message signing in the host's configuration. On Windows, this is found in the policy setting 'Microsoft network server: Digitally sign communications (always)'. On Samba, the setting is called 'server signing'. See the 'see also' links for further details.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 81

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.221.4 (Telephony) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:08:07 2022-03-26 22:38:19
WAFs detected:
  • 172.21.221.4
  • No reverse DNS entries
  • 172.21.221.4
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp999ssh
Protocol Port Service
tcp999ssh
Vulnerabilities detected:
MEDIUMID:

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID:

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID:

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID:

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.221.27 (Telephony) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:11:14 2022-03-26 22:41:32
WAFs detected:
  • 172.21.221.27
  • No reverse DNS entries
  • 172.21.221.27
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp999ssh
Protocol Port Service
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 473

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 382

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 417

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 713

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A
MEDIUMID: 473

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 382

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 417

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 713

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.32 (Telephony) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:17:59 2022-03-26 22:48:34
WAFs detected:
  • 172.21.221.32
  • No reverse DNS entries
  • 172.21.221.32
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 444

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "1a068-221-4f911ed8c5580"
  Inode number           : 106600
  File size              : 545 bytes
  File modification time : May. 10, 2014 at 20:55:02 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 475

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 384

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 419

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 715

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A
MEDIUMID: 444

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "1a068-221-4f911ed8c5580"
  Inode number           : 106600
  File size              : 545 bytes
  File modification time : May. 10, 2014 at 20:55:02 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 475

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 384

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 419

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 715

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.36 (Telephony) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:18:29 2022-03-26 22:48:52
WAFs detected:
  • 172.21.221.36
  • No reverse DNS entries
  • 172.21.221.36
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "1a0ad-221-4fbf23504b140"
  Inode number           : 106669
  File size              : 545 bytes
  File modification time : Jun. 16, 2014 at 11:19:57 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID:

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID:

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 2 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "1a0ad-221-4fbf23504b140"
  Inode number           : 106669
  File size              : 545 bytes
  File modification time : Jun. 16, 2014 at 11:19:57 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID:

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID:

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 4 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.221.37 (Telephony) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:19:16 2022-03-26 22:51:03
WAFs detected:
  • 172.21.221.37
  • No reverse DNS entries
  • 172.21.221.37
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 446

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "1a3fc-25a-4fc86e5f99940"
  Inode number           : 107516
  File size              : 602 bytes
  File modification time : Jun. 23, 2014 at 20:43:41 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 477

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 386

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 421

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 717

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A
MEDIUMID: 446

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "1a3fc-25a-4fc86e5f99940"
  Inode number           : 107516
  File size              : 602 bytes
  File modification time : Jun. 23, 2014 at 20:43:41 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 477

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 386

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 421

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 717

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.40 (Telephony) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:19:21 2022-03-26 22:51:22
WAFs detected:
  • 172.21.221.40
  • No reverse DNS entries
  • 172.21.221.40
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 447

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "1a3fc-221-4f4552e1ea380"
  Inode number           : 107516
  File size              : 545 bytes
  File modification time : Mar. 11, 2014 at 14:03:10 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 478

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 387

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 422

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 718

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 91

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 447

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "1a3fc-221-4f4552e1ea380"
  Inode number           : 107516
  File size              : 545 bytes
  File modification time : Mar. 11, 2014 at 14:03:10 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 478

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 387

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 422

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 718

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 91

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.221.41 (Telephony) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:19:35 2022-03-26 22:51:29
WAFs detected:
  • 172.21.221.41
  • No reverse DNS entries
  • 172.21.221.41
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 448

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "1a0cf-25a-50f8bffbcfe40"
  Inode number           : 106703
  File size              : 602 bytes
  File modification time : Feb. 20, 2015 at 21:47:29 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 479

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 388

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 423

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 719

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 92

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 2 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 448

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "1a0cf-25a-50f8bffbcfe40"
  Inode number           : 106703
  File size              : 602 bytes
  File modification time : Feb. 20, 2015 at 21:47:29 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 479

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 388

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 423

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 719

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 92

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 9 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.221.42 (Telephony) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:19:47 2022-03-26 22:52:00
WAFs detected:
  • 172.21.221.42
  • No reverse DNS entries
  • 172.21.221.42
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 449

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "1a3fc-221-4f4552e1ea380"
  Inode number           : 107516
  File size              : 545 bytes
  File modification time : Mar. 11, 2014 at 14:03:10 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 480

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 389

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 424

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 720

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A
MEDIUMID: 449

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "1a3fc-221-4f4552e1ea380"
  Inode number           : 107516
  File size              : 545 bytes
  File modification time : Mar. 11, 2014 at 14:03:10 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID: 480

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 389

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 424

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 720

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.46 (Telephony) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:17:16 2022-03-26 22:47:21
WAFs detected:
  • 172.21.221.46
  • No reverse DNS entries
  • 172.21.221.46
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp999ssh
Protocol Port Service
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 481

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 390

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 425

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 721

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A
MEDIUMID: 481

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 390

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 425

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 721

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.47 (Telephony) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:23:39 2022-03-26 22:53:51
WAFs detected:
  • 172.21.221.47
  • No reverse DNS entries
  • 172.21.221.47
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "1a3fc-221-4f4552e1ea380"
  Inode number           : 107516
  File size              : 545 bytes
  File modification time : Mar. 11, 2014 at 14:03:10 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID:

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID:

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A
MEDIUMID:

The remote web server is affected by an information disclosure vulnerability.

Nessus was able to determine that the Apache Server listening on
port 80 leaks the servers inode numbers in the ETag HTTP
Header field : 

  Source                 : ETag: "1a3fc-221-4f4552e1ea380"
  Inode number           : 107516
  File size              : 545 bytes
  File modification time : Mar. 11, 2014 at 14:03:10 GMT

Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.

CVE:CVE-2003-1418
CWE:200
VPR:1.4


MEDIUMID:

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID:

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.48 (Telephony) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:18:32 2022-03-26 22:49:12
WAFs detected:
  • 172.21.221.48
  • No reverse DNS entries
  • 172.21.221.48
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp999ssh
Protocol Port Service
tcp999ssh
Vulnerabilities detected:
MEDIUMID:

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID:

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A
MEDIUMID:

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID:

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.50 (Telephony) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:19:19 2022-03-26 22:49:11
WAFs detected:
  • 172.21.221.50
  • No reverse DNS entries
  • 172.21.221.50
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp999ssh
Protocol Port Service
tcp999ssh
Vulnerabilities detected:
MEDIUMID:

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID:

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 3 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID:

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID:

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID:

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 3 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.221.58 (Telephony) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:27:39 2022-03-26 22:58:23
WAFs detected:
  • 172.21.221.58
  • No reverse DNS entries
  • 172.21.221.58
  • No reverse DNS entries
OS detected: FreePBX SIP Device FreePBX SIP Device
Ports detected:
Protocol Port Service
tcp389ldap
tcp443www
tcp999ssh
Protocol Port Service
tcp389ldap
tcp443www
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 273

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 330

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 549

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
MEDIUMID: 273

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 330

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 549

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.64 (Telephony) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:28:05 2022-03-26 23:00:21
WAFs detected:
  • 172.21.221.64
  • No reverse DNS entries
  • 172.21.221.64
  • No reverse DNS entries
OS detected: FreePBX SIP Device FreePBX SIP Device
Ports detected:
Protocol Port Service
tcp389ldap
tcp443www
tcp999ssh
Protocol Port Service
tcp389ldap
tcp443www
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 277

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 334

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 553

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
MEDIUMID: 277

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 334

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 553

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.221.200 (Telephony) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:30:40 2022-03-26 23:02:14
WAFs detected:
  • 172.21.221.200
  • No reverse DNS entries
  • 172.21.221.200
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp999ssh
tcp3306mysql
Protocol Port Service
tcp999ssh
tcp3306mysql
Vulnerabilities detected:
MEDIUMID: 485

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 429

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 394

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 725

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 96

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 485

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 429

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 394

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 725

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 96

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.221.201 (Telephony) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:31:16 2022-03-26 23:02:33
WAFs detected:
  • 172.21.221.201
  • No reverse DNS entries
  • 172.21.221.201
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp999ssh
Protocol Port Service
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 486

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 430

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 395

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 726

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 97

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
MEDIUMID: 486

The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all.

The following weak server-to-client encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

The following weak client-to-server encryption algorithms are supported : 

  arcfour
  arcfour128
  arcfour256

Contact the vendor or consult product documentation to remove the weak ciphers.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 430

The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms.

The following client-to-server Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

The following server-to-client Message Authentication Code (MAC) algorithms
are supported : 

  hmac-md5
  hmac-md5-96
  hmac-sha1-96
  hmac-sha2-256-96
  hmac-sha2-512-96

Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


LOWID: 395

The SSH server is configured to use Cipher Block Chaining.

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc
  rijndael-cbc@lysator.liu.se

Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

CVE:CVE-2008-5161
CWE:200
VPR:2.5


LOWID: 726

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 97

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.221.250 (Telephony) MEDIUM NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:42:54 2022-03-26 23:14:27
WAFs detected:
  • 172.21.221.250
  • No reverse DNS entries
  • 172.21.221.250
  • No reverse DNS entries
OS detected: Linux Kernel 3.16.0-4-amd64 (x86_64) Linux Kernel 3.16.0-4-amd64 (x86_64)
Ports detected:
Protocol Port Service
tcp389ldap
tcp443www
tcp999ssh
Protocol Port Service
tcp389ldap
tcp443www
tcp999ssh
Vulnerabilities detected:
MEDIUMID: 294

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 351

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 436

The remote NTP server is affected by a denial of service vulnerability.

Nessus was able to retrieve the following list of recent hosts to
connect to this NTP server :

172.21.172.24
80.151.186.5
193.141.27.6
173.249.58.145
194.0.5.123
192.168.175.129

If using NTP from the Network Time Protocol Project, upgrade to NTP version 4.2.7-p26 or later. Alternatively, add 'disable monitor' to the ntp.conf configuration file and restart the service. Otherwise, limit access to the affected service to trusted hosts, or contact the vendor for a fix.

CVE:CVE-2013-5211
CWE:N/A
VPR:4.4


MEDIUMID: 502

The remote NTP server responds to mode 6 queries.

Nessus elicited the following response from the remote
  host by sending an NTP mode 6 query :

'version="ntpd 4.2.6p5@1.2349-o Tue May  5 09:53:03 UTC 2020 (1)",
processor="x86_64", system="Linux/3.16.0-4-amd64", leap=0, stratum=3,
precision=-19, rootdelay=17.436, rootdisp=39.352, refid=194.0.5.123,
reftime=0xe5dedc5e.b802a6a7, clock=0xe5dedf10.35713a37, peer=56038,
tc=10, mintc=3, offset=0.009, frequency=32.230, sys_jitter=1.125,
clk_jitter=0.219, clk_wander=0.026'

Restrict NTP mode 6 queries.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 569

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A
MEDIUMID: 294

The SSL certificate for this service cannot be trusted.

The following certificate was at the top of the certificate
chain sent by the remote host, but it is signed by an unknown
certificate authority :

|-Subject : CN=tel-jessie-b
|-Issuer  : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 351

The SSL certificate chain for this service ends in an unrecognized self-signed certificate.

The following certificate was found at the top of the certificate
chain sent by the remote host, but is self-signed and was not
found in the list of known certificate authorities :

|-Subject : CN=tel-jessie-b

Purchase or generate a proper SSL certificate for this service.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 436

The remote NTP server is affected by a denial of service vulnerability.

Nessus was able to retrieve the following list of recent hosts to
connect to this NTP server :

172.21.172.24
173.249.58.145
172.21.172.48
193.141.27.6
194.0.5.123
80.151.186.5

If using NTP from the Network Time Protocol Project, upgrade to NTP version 4.2.7-p26 or later. Alternatively, add 'disable monitor' to the ntp.conf configuration file and restart the service. Otherwise, limit access to the affected service to trusted hosts, or contact the vendor for a fix.

CVE:CVE-2013-5211
CWE:N/A
VPR:4.4


MEDIUMID: 502

The remote NTP server responds to mode 6 queries.

Nessus elicited the following response from the remote
  host by sending an NTP mode 6 query :

'version="ntpd 4.2.6p5@1.2349-o Tue May  5 09:53:03 UTC 2020 (1)",
processor="x86_64", system="Linux/3.16.0-4-amd64", leap=0, stratum=3,
precision=-19, rootdelay=17.575, rootdisp=40.114, refid=194.0.5.123,
reftime=0xe5ea0a48.b89c42f7, clock=0xe5ea0d00.204113dc, peer=56038,
tc=10, mintc=3, offset=0.131, frequency=32.185, sys_jitter=0.819,
clk_jitter=0.225, clk_wander=0.014'

Restrict NTP mode 6 queries.

CVE:N/A
CWE:N/A
VPR:N/A


MEDIUMID: 569

The remote service encrypts traffic using an older version of TLS.

TLSv1 is enabled and the server supports at least one cipher.

Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.

CVE:N/A
CWE:N/A
VPR:N/A

172.21.198.171 (publior) LOW NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:03:40 2022-03-26 22:33:58
WAFs detected:
  • 172.21.198.171
  • No reverse DNS entries
  • 172.21.198.171
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp999ssh
tcp3306mysql
Protocol Port Service
tcp999ssh
tcp3306mysql
Vulnerabilities detected:
LOWID:

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
LOWID:

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.181 (publior) LOW NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:03:55 2022-03-26 22:34:02
WAFs detected:
  • 172.21.198.181
  • No reverse DNS entries
  • 172.21.198.181
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp999ssh
tcp3306mysql
Protocol Port Service
tcp999ssh
tcp3306mysql
Vulnerabilities detected:
LOWID:

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
LOWID:

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID:

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.182 (publior) LOW NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:04:17 2022-03-26 22:34:25
WAFs detected:
  • 172.21.198.182
  • No reverse DNS entries
  • 172.21.198.182
  • No reverse DNS entries
OS detected: Linux Kernel 3.2 on Debian 7.0 (wheezy) Linux Kernel 3.2 on Debian 7.0 (wheezy)
Ports detected:
Protocol Port Service
tcp999ssh
tcp3306mysql
Protocol Port Service
tcp999ssh
tcp3306mysql
Vulnerabilities detected:
LOWID: 709

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 75

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
LOWID: 709

The remote SSH server is configured to allow weak key exchange algorithms.

The following weak key exchange algorithms are enabled : 

  diffie-hellman-group-exchange-sha1
  diffie-hellman-group1-sha1

Contact the vendor or consult product documentation to disable the weak algorithms.

CVE:N/A
CWE:N/A
VPR:N/A


INFOID: 75

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.0.23 (Hosts) INFO NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:37:08 2022-03-26 22:02:49
WAFs detected:
  • 172.21.0.23
  • No reverse DNS entries
  • 172.21.0.23
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp111rpc-portmapper
tcp999ssh
Protocol Port Service
tcp111rpc-portmapper
tcp999ssh
Vulnerabilities detected:
INFOID: 7

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 109

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A
INFOID: 7

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 109

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A

172.21.0.24 (Hosts) INFO NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:34:01 2022-03-26 22:02:46
WAFs detected:
  • 172.21.0.24
  • No reverse DNS entries
  • 172.21.0.24
  • No reverse DNS entries
OS detected: Linux Kernel 3.12 Linux Kernel 3.12
Ports detected:
Protocol Port Service
tcp111rpc-portmapper
tcp999ssh
Protocol Port Service
tcp111rpc-portmapper
tcp999ssh
Vulnerabilities detected:
INFOID: 8

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 110

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A
INFOID: 8

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 110

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A

172.21.0.25 (Hosts) INFO NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:34:02 2022-03-26 22:02:42
WAFs detected:
  • 172.21.0.25
  • No reverse DNS entries
  • 172.21.0.25
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp111rpc-portmapper
tcp999ssh
tcp5900vnc
tcp5901vnc
Protocol Port Service
tcp111rpc-portmapper
tcp999ssh
tcp5900vnc
tcp5901vnc
Vulnerabilities detected:
INFOID: 9

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 111

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A
INFOID: 9

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 111

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A

172.21.0.101 (Hosts) INFO NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:32:32 2022-03-26 22:01:12
WAFs detected:
  • 172.21.0.101
  • No reverse DNS entries
  • 172.21.0.101
  • No reverse DNS entries
OS detected: Unknown Unknown
Ports detected: None None
Vulnerabilities detected:
INFOID: 10

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
INFOID: 10

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.0.250 (Hosts) INFO NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:34:02 2022-03-26 22:02:46
WAFs detected:
  • 172.21.0.250
  • No reverse DNS entries
  • 172.21.0.250
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp111rpc-portmapper
tcp999ssh
tcp2049rpc-nfs_acl
Protocol Port Service
tcp111rpc-portmapper
tcp999ssh
tcp2049rpc-nfs_acl
Vulnerabilities detected:
INFOID: 11

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 112

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A
INFOID: 11

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 112

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A

172.21.1.11 (Gateways) INFO NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:34:49 2022-03-26 22:03:24
WAFs detected:
  • 172.21.1.11
  • No reverse DNS entries
  • 172.21.1.11
  • No reverse DNS entries
OS detected: Unknown Unknown
Ports detected: None None
Vulnerabilities detected:
INFOID: 13

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
INFOID: 13

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.1.13 (Gateways) INFO NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:34:31 2022-03-26 22:03:35
WAFs detected:
  • 172.21.1.13
  • No reverse DNS entries
  • 172.21.1.13
  • No reverse DNS entries
OS detected: Unknown Unknown
Ports detected: None None
Vulnerabilities detected:
INFOID: 14

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
INFOID: 14

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.1.101 (Gateways) INFO NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:34:50 2022-03-26 22:03:34
WAFs detected:
  • 172.21.1.101
  • No reverse DNS entries
  • 172.21.1.101
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp999ssh
Protocol Port Service
tcp999ssh
Vulnerabilities detected:
INFOID: 15

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
INFOID: 15

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.11.4 (ISP) INFO NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:36:54 2022-03-26 22:05:54
WAFs detected:
  • 172.21.11.4
  • No reverse DNS entries
  • 172.21.11.4
  • No reverse DNS entries
OS detected: Unknown Unknown
Ports detected: None None
Vulnerabilities detected:
INFOID: 16

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 2 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
INFOID: 16

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 4 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.70.11 (Hosting) INFO NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:45:51 2022-03-26 22:13:58
WAFs detected:
  • 172.21.70.11
  • No reverse DNS entries
  • 172.21.70.11
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp999ssh
Protocol Port Service
tcp999ssh
Vulnerabilities detected:
INFOID: 31

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
INFOID: 31

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.172.42 (ciproc intern) INFO NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:48:42 2022-03-26 22:18:13
WAFs detected:
  • 172.21.172.42
  • No reverse DNS entries
  • 172.21.172.42
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp999ssh
Protocol Port Service
tcp999ssh
Vulnerabilities detected:
INFOID: 36

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
INFOID: 36

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.172.44 (ciproc intern) INFO NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:54:31 2022-03-26 22:18:41
WAFs detected:
  • 172.21.172.44
  • No reverse DNS entries
  • 172.21.172.44
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp999ssh
tcp3142www
Protocol Port Service
tcp999ssh
tcp3142www
Vulnerabilities detected:
INFOID: 37

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 516 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
INFOID: 37

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 539 seconds.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.173.200 (ciproc intern) INFO NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:54:11 2022-03-26 22:23:29
WAFs detected:
  • 172.21.173.200
  • No reverse DNS entries
  • 172.21.173.200
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp80www
tcp999ssh
Protocol Port Service
tcp80www
tcp999ssh
Vulnerabilities detected:
INFOID: 53

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
INFOID: 53

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.174.11 (darkhill) INFO NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:54:27 2022-03-26 22:23:54
WAFs detected:
  • 172.21.174.11
  • No reverse DNS entries
  • 172.21.174.11
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp999ssh
tcp11223www
Protocol Port Service
tcp999ssh
tcp11223www
Vulnerabilities detected:
INFOID: 54

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
INFOID: 54

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.174.220 (darkhill) INFO NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:55:42 2022-03-26 22:24:41
WAFs detected:
  • 172.21.174.220
  • No reverse DNS entries
  • 172.21.174.220
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp111rpc-portmapper
tcp999ssh
tcp2049rpc-nfs_acl
Protocol Port Service
tcp111rpc-portmapper
tcp999ssh
tcp2049rpc-nfs_acl
Vulnerabilities detected:
INFOID: 58

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 116

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A
INFOID: 58

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 116

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A

172.21.174.230 (darkhill) INFO NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:55:30 2022-03-26 22:24:58
WAFs detected:
  • 172.21.174.230
  • No reverse DNS entries
  • 172.21.174.230
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp999ssh
tcp3306mysql
Protocol Port Service
tcp999ssh
tcp3306mysql
Vulnerabilities detected:
INFOID: 59

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
INFOID: 59

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.11 (publior) INFO NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:55:57 2022-03-26 22:25:42
WAFs detected:
  • 172.21.198.11
  • No reverse DNS entries
  • 172.21.198.11
  • No reverse DNS entries
OS detected: Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8
Ports detected:
Protocol Port Service
tcp999ssh
Protocol Port Service
tcp999ssh
Vulnerabilities detected:
INFOID: 60

It is possible to determine the exact time set on the remote host.

The difference between the local and remote clocks is 1 second.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
INFOID: 60

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.198.240 (publior) INFO NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:04:46 2022-03-26 22:35:10
WAFs detected:
  • 172.21.198.240
  • No reverse DNS entries
  • 172.21.198.240
  • No reverse DNS entries
OS detected: Linux Kernel 2.6 Linux Kernel 2.6
Ports detected:
Protocol Port Service
tcp111rpc-portmapper
tcp999ssh
tcp2049rpc-nfs_acl
Protocol Port Service
tcp111rpc-portmapper
tcp999ssh
tcp2049rpc-nfs_acl
Vulnerabilities detected:
INFOID: 77

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 117

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A
INFOID: 77

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A


INFOID: 117

An ONC RPC portmapper is running on the remote host.


  

n/a

CVE:CVE-1999-0632
CWE:N/A
VPR:N/A

172.21.221.11 (Telephony) INFO NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:09:40 2022-03-26 22:39:26
WAFs detected:
  • 172.21.221.11
  • No reverse DNS entries
  • 172.21.221.11
  • No reverse DNS entries
OS detected: Unknown Unknown
Ports detected: None None
Vulnerabilities detected:
INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A
INFOID:

It is possible to determine the exact time set on the remote host.

The remote clock is synchronized with the local clock.

Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).

CVE:CVE-1999-0524
CWE:200
VPR:N/A

172.21.11.2 (ISP) NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:34:50 2022-03-26 22:03:36
WAFs detected:
  • 172.21.11.2
  • No reverse DNS entries
  • 172.21.11.2
  • No reverse DNS entries
OS detected: Unknown Unknown
Ports detected: None None
Vulnerabilities detected: None None

172.21.11.3 (ISP) NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:34:52 2022-03-26 22:03:33
WAFs detected:
  • 172.21.11.3
  • No reverse DNS entries
  • 172.21.11.3
  • No reverse DNS entries
OS detected: Unknown Unknown
Ports detected: None None
Vulnerabilities detected: None None

172.21.12.1 (VulnLIB) NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:40:20 2022-03-26 22:09:08
WAFs detected:
  • 172.21.12.1
  • No reverse DNS entries
  • 172.21.12.1
  • No reverse DNS entries
OS detected: Unknown Unknown
Ports detected: None None
Vulnerabilities detected: None None

172.21.12.21 (VulnLIB) NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:41:28 2022-03-26 22:10:15
WAFs detected:
  • 172.21.12.21
  • No reverse DNS entries
  • 172.21.12.21
  • No reverse DNS entries
OS detected: Unknown Unknown
Ports detected: None None
Vulnerabilities detected: None None

172.21.17.251 (VulnLIB) NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:43:43 2022-03-26 22:12:19
WAFs detected:
  • 172.21.17.251
  • No reverse DNS entries
  • 172.21.17.251
  • No reverse DNS entries
OS detected: Unknown Unknown
Ports detected: None None
Vulnerabilities detected: None None

172.21.17.254 (VulnLIB) NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:44:39 2022-03-26 22:12:22
WAFs detected:
  • 172.21.17.254
  • No reverse DNS entries
  • 172.21.17.254
  • No reverse DNS entries
OS detected: Unknown Unknown
Ports detected: None None
Vulnerabilities detected: None None

172.21.18.1 (VulnLIB) NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:45:14 2022-03-26 22:13:27
WAFs detected:
  • 172.21.18.1
  • No reverse DNS entries
  • 172.21.18.1
  • No reverse DNS entries
OS detected: Unknown Unknown
Ports detected: None None
Vulnerabilities detected: None None

172.21.18.11 (Uncategorized) NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:45:34 2022-03-26 22:13:59
WAFs detected:
  • 172.21.18.11
  • No reverse DNS entries
  • 172.21.18.11
  • No reverse DNS entries
OS detected: Unknown Unknown
Ports detected: None None
Vulnerabilities detected: None None

172.21.18.12 (Uncategorized) NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:46:57 2022-03-26 22:14:22
WAFs detected:
  • 172.21.18.12
  • No reverse DNS entries
  • 172.21.18.12
  • No reverse DNS entries
OS detected: Unknown Unknown
Ports detected: None None
Vulnerabilities detected: None None

172.21.18.211 (Uncategorized) NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:47:08 2022-03-26 22:15:31
WAFs detected:
  • 172.21.18.211
  • No reverse DNS entries
  • 172.21.18.211
  • No reverse DNS entries
OS detected: Unknown Unknown
Ports detected: None None
Vulnerabilities detected: None None

172.21.172.23 (VulnLIB) NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:49:07 2022-03-26 22:17:15
WAFs detected:
  • 172.21.172.23
  • No reverse DNS entries
  • 172.21.172.23
  • No reverse DNS entries
OS detected: Unknown Unknown
Ports detected: None None
Vulnerabilities detected: None None

172.21.172.31 (VulnLIB) NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:50:03 2022-03-26 22:17:46
WAFs detected:
  • 172.21.172.31
  • No reverse DNS entries
  • 172.21.172.31
  • No reverse DNS entries
OS detected: Unknown Unknown
Ports detected: None None
Vulnerabilities detected: None None

172.21.172.38 (VulnLIB) NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 10:50:20 2022-03-26 22:18:43
WAFs detected:
  • 172.21.172.38
  • No reverse DNS entries
  • 172.21.172.38
  • No reverse DNS entries
OS detected: Unknown Unknown
Ports detected: None None
Vulnerabilities detected: None None

172.21.221.75 (Telephony) NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:30:50 2022-03-26 23:01:38
WAFs detected:
  • 172.21.221.75
  • No reverse DNS entries
  • 172.21.221.75
  • No reverse DNS entries
OS detected: Linux Kernel 3.16 on Debian 8.0 (jessie) Linux Kernel 3.16 on Debian 8.0 (jessie)
Ports detected:
Protocol Port Service
tcp389ldap
tcp999ssh
Protocol Port Service
tcp389ldap
tcp999ssh
Vulnerabilities detected: None None

172.21.221.230 (Telephony) NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:33:51 2022-03-26 23:04:48
WAFs detected:
  • 172.21.221.230
  • No reverse DNS entries
  • 172.21.221.230
  • No reverse DNS entries
OS detected: Unknown Unknown
Ports detected: None None
Vulnerabilities detected: None None

172.21.221.231 (Telephony) NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:34:02 2022-03-26 23:04:55
WAFs detected:
  • 172.21.221.231
  • No reverse DNS entries
  • 172.21.221.231
  • No reverse DNS entries
OS detected: Unknown Unknown
Ports detected: None None
Vulnerabilities detected: None None

172.21.221.232 (Telephony) NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:34:28 2022-03-26 23:05:32
WAFs detected:
  • 172.21.221.232
  • No reverse DNS entries
  • 172.21.221.232
  • No reverse DNS entries
OS detected: Unknown Unknown
Ports detected: None None
Vulnerabilities detected: None None

172.21.221.242 (Telephony) NO CHANGES

Previous scan Current scan
Scan completed: 2022-03-18 11:37:14 2022-03-26 23:08:07
WAFs detected:
  • 172.21.221.242
  • No reverse DNS entries
  • 172.21.221.242
  • No reverse DNS entries
OS detected: Unknown Unknown
Ports detected: None None
Vulnerabilities detected: None None

Warning: One or more systems were detected that have not been assigned to a system group. Please let us know which group any uncategorized systems belong to so we can display them correctly.

The number of systems in each risk class by system group:

GroupCriticalHighMediumLowInfoNone
ciproc intern (7)
013030
darkhill (9)
104040
Gateways (4)
000040
Hosting (5)
004010
Hosts (11)
204050
ISP (17)
1111112
monkeySYS (12)
1011000
publior (22)
1012360
Telephony (57)
31019016
VulnLIB (13)
203008
Uncategorized (4)
100003
TOTALS:4027142519

The raw output of some supplementary scans is available below.


Scan subtype:
Origin IP:
Details:
Command:
Version: (official web site)
Output:
2021-06-24 10:58:06,681 Could not find custom hooks file at /home/zap/.zap_hooks.py 
Jun 24, 2021 10:58:19 AM java.util.prefs.FileSystemPreferences\ run
INFO: Created user preferences directory.
Total of 4 URLs
PASS: Vulnerable JS Library [10003]
PASS: Cookie No HttpOnly Flag [10010]
PASS: Cookie Without Secure Flag [10011]
PASS: Cross-Domain JavaScript Source File Inclusion [10017]
PASS: Content-Type Header Missing [10019]
PASS: X-Frame-Options Header [10020]
PASS: X-Content-Type-Options Header Missing [10021]
PASS: Information Disclosure - Debug Error Messages [10023]
PASS: Information Disclosure - Sensitive Information in URL [10024]
PASS: Information Disclosure - Sensitive Information in HTTP Referrer Header [10025]
PASS: HTTP Parameter Override [10026]
PASS: Information Disclosure - Suspicious Comments [10027]
PASS: Open Redirect [10028]
PASS: Cookie Poisoning [10029]
PASS: User Controllable Charset [10030]
PASS: User Controllable HTML Element Attribute (Potential XSS) [10031]
PASS: Viewstate [10032]
PASS: Directory Browsing [10033]
PASS: Heartbleed OpenSSL Vulnerability (Indicative) [10034]
PASS: HTTP Server Response Header [10036]
PASS: Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s) [10037]
PASS: X-Backend-Server Header Information Leak [10039]
PASS: Secure Pages Include Mixed Content [10040]
PASS: HTTP to HTTPS Insecure Transition in Form Post [10041]
PASS: HTTPS to HTTP Insecure Transition in Form Post [10042]
PASS: User Controllable JavaScript Event (XSS) [10043]
PASS: Big Redirect Detected (Potential Sensitive Information Leak) [10044]
PASS: Retrieved from Cache [10050]
PASS: X-ChromeLogger-Data (XCOLD) Header Information Leak [10052]
PASS: Cookie without SameSite Attribute [10054]
PASS: CSP [10055]
PASS: X-Debug-Token Information Leak [10056]
PASS: Username Hash Found [10057]
PASS: X-AspNet-Version Response Header [10061]
PASS: PII Disclosure [10062]
PASS: Timestamp Disclosure [10096]
PASS: Hash Disclosure [10097]
PASS: Cross-Domain Misconfiguration [10098]
PASS: Weak Authentication Method [10105]
PASS: Reverse Tabnabbing [10108]
PASS: Modern Web Application [10109]
PASS: Absence of Anti-CSRF Tokens [10202]
PASS: Private IP Disclosure [2]
PASS: Session ID in URL Rewrite [3]
PASS: Script Passive Scan Rules [50001]
PASS: Insecure JSF ViewState [90001]
PASS: Charset Mismatch [90011]
PASS: Application Error Disclosure [90022]
PASS: WSDL File Detection [90030]
PASS: Loosely Scoped Cookie [90033]
WARN-NEW: Incomplete or No Cache-control Header Set [10015] x 1 
	https://172.21.46.247/robots.txt (200 OK)
WARN-NEW: Strict-Transport-Security Header Not Set [10035] x 3 
	https://172.21.46.247/ (403 Forbidden)
	https://172.21.46.247 (403 Forbidden)
	https://172.21.46.247/sitemap.xml (403 Forbidden)
WARN-NEW: Content Security Policy (CSP) Header Not Set [10038] x 3 
	https://172.21.46.247/ (403 Forbidden)
	https://172.21.46.247 (403 Forbidden)
	https://172.21.46.247/sitemap.xml (403 Forbidden)
FAIL-NEW: 0	FAIL-INPROG: 0	WARN-NEW: 3	WARN-INPROG: 0	INFO: 0	IGNORE: 0	PASS: 50
------- START: 172.21.46.108 - 2022-04-20 23:48:36
Total of 2 URLs
PASS: Directory Browsing [0]
PASS: Vulnerable JS Library [10003]
PASS: Cookie No HttpOnly Flag [10010]
PASS: Cookie Without Secure Flag [10011]
PASS: Incomplete or No Cache-control Header Set [10015]
PASS: Cross-Domain JavaScript Source File Inclusion [10017]
PASS: Content-Type Header Missing [10019]
PASS: X-Frame-Options Header [10020]
PASS: X-Content-Type-Options Header Missing [10021]
PASS: Information Disclosure - Debug Error Messages [10023]
PASS: Information Disclosure - Sensitive Information in URL [10024]
PASS: Information Disclosure - Sensitive Information in HTTP Referrer Header [10025]
PASS: HTTP Parameter Override [10026]
PASS: Information Disclosure - Suspicious Comments [10027]
PASS: Open Redirect [10028]
PASS: Cookie Poisoning [10029]
PASS: User Controllable Charset [10030]
PASS: User Controllable HTML Element Attribute (Potential XSS) [10031]
PASS: Viewstate [10032]
PASS: Directory Browsing [10033]
PASS: Heartbleed OpenSSL Vulnerability (Indicative) [10034]
PASS: Strict-Transport-Security Header [10035]
PASS: HTTP Server Response Header [10036]
PASS: Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s) [10037]
PASS: Content Security Policy (CSP) Header Not Set [10038]
PASS: X-Backend-Server Header Information Leak [10039]
PASS: Secure Pages Include Mixed Content [10040]
PASS: HTTP to HTTPS Insecure Transition in Form Post [10041]
PASS: HTTPS to HTTP Insecure Transition in Form Post [10042]
PASS: User Controllable JavaScript Event (XSS) [10043]
PASS: Big Redirect Detected (Potential Sensitive Information Leak) [10044]
PASS: Source Code Disclosure - /WEB-INF folder [10045]
PASS: HTTPS Content Available via HTTP [10047]
PASS: Remote Code Execution - Shell Shock [10048]
PASS: Retrieved from Cache [10050]
PASS: Relative Path Confusion [10051]
PASS: X-ChromeLogger-Data (XCOLD) Header Information Leak [10052]
PASS: Cookie without SameSite Attribute [10054]
PASS: CSP [10055]
PASS: X-Debug-Token Information Leak [10056]
PASS: Username Hash Found [10057]
PASS: GET for POST [10058]
PASS: X-AspNet-Version Response Header [10061]
PASS: PII Disclosure [10062]
PASS: Backup File Disclosure [10095]
PASS: Timestamp Disclosure [10096]
PASS: Hash Disclosure [10097]
PASS: Cross-Domain Misconfiguration [10098]
PASS: User Agent Fuzzer [10104]
PASS: Weak Authentication Method [10105]
PASS: HTTP Only Site [10106]
PASS: Httpoxy - Proxy Header Misuse [10107]
PASS: Reverse Tabnabbing [10108]
PASS: Modern Web Application [10109]
PASS: Absence of Anti-CSRF Tokens [10202]
PASS: Private IP Disclosure [2]
PASS: Anti-CSRF Tokens Check [20012]
PASS: HTTP Parameter Pollution [20014]
PASS: Heartbleed OpenSSL Vulnerability [20015]
PASS: Cross-Domain Misconfiguration [20016]
PASS: Source Code Disclosure - CVE-2012-1823 [20017]
PASS: Remote Code Execution - CVE-2012-1823 [20018]
PASS: External Redirect [20019]
PASS: Session ID in URL Rewrite [3]
PASS: Buffer Overflow [30001]
PASS: Format String Error [30002]
PASS: Integer Overflow Error [30003]
PASS: CRLF Injection [40003]
PASS: Parameter Tampering [40008]
PASS: Server Side Include [40009]
PASS: Cross Site Scripting (Reflected) [40012]
PASS: Session Fixation [40013]
PASS: Cross Site Scripting (Persistent) [40014]
PASS: Cross Site Scripting (Persistent) - Prime [40016]
PASS: Cross Site Scripting (Persistent) - Spider [40017]
PASS: SQL Injection [40018]
PASS: SQL Injection - MySQL [40019]
PASS: SQL Injection - Hypersonic SQL [40020]
PASS: SQL Injection - Oracle [40021]
PASS: SQL Injection - PostgreSQL [40022]
PASS: Possible Username Enumeration [40023]
PASS: SQL Injection - SQLite [40024]
PASS: Proxy Disclosure [40025]
PASS: Cross Site Scripting (DOM Based) [40026]
PASS: SQL Injection - MsSQL [40027]
PASS: ELMAH Information Leak [40028]
PASS: Trace.axd Information Leak [40029]
PASS: .htaccess Information Leak [40032]
PASS: .env Information Leak [40034]
PASS: Hidden File Finder [40035]
PASS: Source Code Disclosure - Git  [41]
PASS: Source Code Disclosure - SVN [42]
PASS: Source Code Disclosure - File Inclusion [43]
PASS: Script Active Scan Rules [50000]
PASS: Script Passive Scan Rules [50001]
PASS: Path Traversal [6]
PASS: Remote File Inclusion [7]
PASS: Insecure JSF ViewState [90001]
PASS: Charset Mismatch [90011]
PASS: XSLT Injection [90017]
PASS: Server Side Code Injection [90019]
PASS: Remote OS Command Injection [90020]
PASS: XPath Injection [90021]
PASS: Application Error Disclosure [90022]
PASS: XML External Entity Attack [90023]
PASS: Generic Padding Oracle [90024]
PASS: Expression Language Injection [90025]
PASS: SOAP Action Spoofing [90026]
PASS: Cookie Slack Detector [90027]
PASS: Insecure HTTP Method [90028]
PASS: SOAP XML Injection [90029]
PASS: WSDL File Detection [90030]
PASS: Loosely Scoped Cookie [90033]
PASS: Cloud Metadata Potentially Exposed [90034]
FAIL-NEW: 0	FAIL-INPROG: 0	WARN-NEW: 0	WARN-INPROG: 0	INFO: 0	IGNORE: 0	PASS: 114
------- START: 172.21.46.120 - 2022-04-21 01:10:15
Total of 245 URLs
PASS: Directory Browsing [0]
PASS: Vulnerable JS Library [10003]
PASS: Cookie Without Secure Flag [10011]
PASS: Cross-Domain JavaScript Source File Inclusion [10017]
PASS: Content-Type Header Missing [10019]
PASS: X-Frame-Options Header [10020]
PASS: Information Disclosure - Debug Error Messages [10023]
PASS: Information Disclosure - Sensitive Information in URL [10024]
PASS: Information Disclosure - Sensitive Information in HTTP Referrer Header [10025]
PASS: HTTP Parameter Override [10026]
PASS: Information Disclosure - Suspicious Comments [10027]
PASS: Open Redirect [10028]
PASS: Cookie Poisoning [10029]
PASS: User Controllable Charset [10030]
PASS: User Controllable HTML Element Attribute (Potential XSS) [10031]
PASS: Viewstate [10032]
PASS: Directory Browsing [10033]
PASS: Heartbleed OpenSSL Vulnerability (Indicative) [10034]
PASS: Strict-Transport-Security Header [10035]
PASS: HTTP Server Response Header [10036]
PASS: Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s) [10037]
PASS: Content Security Policy (CSP) Header Not Set [10038]
PASS: X-Backend-Server Header Information Leak [10039]
PASS: Secure Pages Include Mixed Content [10040]
PASS: HTTP to HTTPS Insecure Transition in Form Post [10041]
PASS: HTTPS to HTTP Insecure Transition in Form Post [10042]
PASS: User Controllable JavaScript Event (XSS) [10043]
PASS: Big Redirect Detected (Potential Sensitive Information Leak) [10044]
PASS: Source Code Disclosure - /WEB-INF folder [10045]
PASS: HTTPS Content Available via HTTP [10047]
PASS: Remote Code Execution - Shell Shock [10048]
PASS: Retrieved from Cache [10050]
PASS: X-ChromeLogger-Data (XCOLD) Header Information Leak [10052]
PASS: X-Debug-Token Information Leak [10056]
PASS: Username Hash Found [10057]
PASS: GET for POST [10058]
PASS: X-AspNet-Version Response Header [10061]
PASS: PII Disclosure [10062]
PASS: Backup File Disclosure [10095]
PASS: Timestamp Disclosure [10096]
PASS: Hash Disclosure [10097]
PASS: Cross-Domain Misconfiguration [10098]
PASS: User Agent Fuzzer [10104]
PASS: Weak Authentication Method [10105]
PASS: HTTP Only Site [10106]
PASS: Httpoxy - Proxy Header Misuse [10107]
PASS: Reverse Tabnabbing [10108]
PASS: Modern Web Application [10109]
PASS: Private IP Disclosure [2]
PASS: HTTP Parameter Pollution [20014]
PASS: Heartbleed OpenSSL Vulnerability [20015]
PASS: Cross-Domain Misconfiguration [20016]
PASS: Source Code Disclosure - CVE-2012-1823 [20017]
PASS: Remote Code Execution - CVE-2012-1823 [20018]
PASS: External Redirect [20019]
PASS: Buffer Overflow [30001]
PASS: Format String Error [30002]
PASS: CRLF Injection [40003]
PASS: Parameter Tampering [40008]
PASS: Server Side Include [40009]
PASS: Cross Site Scripting (Reflected) [40012]
PASS: Session Fixation [40013]
PASS: Cross Site Scripting (Persistent) [40014]
PASS: Cross Site Scripting (Persistent) - Prime [40016]
PASS: Cross Site Scripting (Persistent) - Spider [40017]
PASS: SQL Injection [40018]
PASS: SQL Injection - MySQL [40019]
PASS: SQL Injection - Hypersonic SQL [40020]
PASS: SQL Injection - Oracle [40021]
PASS: SQL Injection - PostgreSQL [40022]
PASS: Possible Username Enumeration [40023]
PASS: SQL Injection - SQLite [40024]
PASS: Proxy Disclosure [40025]
PASS: Cross Site Scripting (DOM Based) [40026]
PASS: SQL Injection - MsSQL [40027]
PASS: ELMAH Information Leak [40028]
PASS: Trace.axd Information Leak [40029]
PASS: .htaccess Information Leak [40032]
PASS: .env Information Leak [40034]
PASS: Source Code Disclosure - Git  [41]
PASS: Source Code Disclosure - SVN [42]
PASS: Source Code Disclosure - File Inclusion [43]
PASS: Script Active Scan Rules [50000]
PASS: Script Passive Scan Rules [50001]
PASS: Remote File Inclusion [7]
PASS: Insecure JSF ViewState [90001]
PASS: Charset Mismatch [90011]
PASS: XSLT Injection [90017]
PASS: Server Side Code Injection [90019]
PASS: Remote OS Command Injection [90020]
PASS: XPath Injection [90021]
PASS: Application Error Disclosure [90022]
PASS: XML External Entity Attack [90023]
PASS: Generic Padding Oracle [90024]
PASS: Expression Language Injection [90025]
PASS: SOAP Action Spoofing [90026]
PASS: Insecure HTTP Method [90028]
PASS: SOAP XML Injection [90029]
PASS: WSDL File Detection [90030]
PASS: Loosely Scoped Cookie [90033]
PASS: Cloud Metadata Potentially Exposed [90034]
WARN-NEW: Cookie No HttpOnly Flag [10010] x 1 
	https://172.21.46.120/application/ (200 200)
WARN-NEW: Incomplete or No Cache-control Header Set [10015] x 11 
	https://172.21.46.120/application/ (200 200)
	https://172.21.46.120/application/requestresetpassword (200 200)
	https://172.21.46.120/application/disclaimer;jsessionid=D3403DE2E3AEC97B9D24208432C14E11.eRepInka2 (200 200)
	https://172.21.46.120/application/imprint;jsessionid=D3403DE2E3AEC97B9D24208432C14E11.eRepInka2 (200 200)
	https://172.21.46.120/application/de/login (200 200)
WARN-NEW: X-Content-Type-Options Header Missing [10021] x 11 
	https://172.21.46.120/application/ (200 200)
	https://172.21.46.120/application/requestresetpassword (200 200)
	https://172.21.46.120/application/disclaimer;jsessionid=D3403DE2E3AEC97B9D24208432C14E11.eRepInka2 (200 200)
	https://172.21.46.120/application/imprint;jsessionid=D3403DE2E3AEC97B9D24208432C14E11.eRepInka2 (200 200)
	https://172.21.46.120/application/assets/lKFMrOfjVN83D/application/services/impl/favicon.ico (200 200)
WARN-NEW: Relative Path Confusion [10051] x 64 
	https://172.21.46.120/application/de/disclaimer.dialoglayout.sessiontimeoutform (200 200)
	https://172.21.46.120/application/de/imprint.dialoglayout.sessiontimeoutform (200 200)
	https://172.21.46.120/application/de/login.layout.sessiontimeoutform (200 200)
	https://172.21.46.120/application/de/requestresetpassword.passwordform (200 200)
	https://172.21.46.120/application/de/requestresetpassword.layoutnoheader.sessiontimeoutform (200 200)
WARN-NEW: Cookie without SameSite Attribute [10054] x 2 
	https://172.21.46.120/application/ (200 200)
	https://172.21.46.120/application/ (200 200)
WARN-NEW: CSP: Wildcard Directive [10055] x 9 
	https://172.21.46.120/application/ (200 200)
	https://172.21.46.120/application/ (200 200)
	https://172.21.46.120/application/ (200 200)
	https://172.21.46.120/application/requestresetpassword (200 200)
	https://172.21.46.120/application/requestresetpassword (200 200)
WARN-NEW: Absence of Anti-CSRF Tokens [10202] x 11 
	https://172.21.46.120/application/ (200 200)
	https://172.21.46.120/application/ (200 200)
	https://172.21.46.120/application/ (200 200)
	https://172.21.46.120/application/requestresetpassword (200 200)
	https://172.21.46.120/application/requestresetpassword (200 200)
WARN-NEW: Anti-CSRF Tokens Check [20012] x 34 
	https://172.21.46.120/application/ (200 200)
	https://172.21.46.120/application/assets (200 200)
	https://172.21.46.120/application/ (200 200)
	https://172.21.46.120/application/assets (200 200)
	https://172.21.46.120/application/assets/lKFMrOfjVN83D (200 200)
WARN-NEW: Session ID in URL Rewrite [3] x 5 
	https://172.21.46.120/application/disclaimer;jsessionid=D3403DE2E3AEC97B9D24208432C14E11.eRepInka2 (200 200)
	https://172.21.46.120/application/disclaimer;jsessionid=D3403DE2E3AEC97B9D24208432C14E11.eRepInka2 (200 200)
	https://172.21.46.120/application/imprint;jsessionid=D3403DE2E3AEC97B9D24208432C14E11.eRepInka2 (200 200)
	https://172.21.46.120/application/imprint;jsessionid=D3403DE2E3AEC97B9D24208432C14E11.eRepInka2 (200 200)
	https://172.21.46.120/application/login.layout.sessiontimeoutform;jsessionid=D3403DE2E3AEC97B9D24208432C14E11.eRepInka2 (302 302)
WARN-NEW: Integer Overflow Error [30003] x 3 
	https://172.21.46.120/application/de/login.usernameform (500 500)
	https://172.21.46.120/application/en/login.usernameform (500 500)
	https://172.21.46.120/application/login.usernameform (500 500)
WARN-NEW: Hidden File Found [40035] x 1 
	https://172.21.46.120/.svn/entries (301 Moved Permanently)
WARN-NEW: Path Traversal [6] x 5 
	https://172.21.46.120/application/de/login.layout.sessiontimeoutform (200 200)
	https://172.21.46.120/application/de/requestresetpassword.layoutnoheader.sessiontimeoutform (200 200)
	https://172.21.46.120/application/de/requestresetpassword.passwordform (200 200)
	https://172.21.46.120/application/de/login.usernameform (200 200)
	https://172.21.46.120/application/en/requestresetpassword.passwordform (200 200)
WARN-NEW: Cookie Slack Detector [90027] x 59 
	https://172.21.46.120/application/de/disclaimer.dialoglayout.sessiontimeoutform (302 302)
	https://172.21.46.120/application/de/imprint.dialoglayout.sessiontimeoutform (302 302)
	https://172.21.46.120/application/de/login.layout.sessiontimeoutform (302 302)
	https://172.21.46.120/application/de/requestresetpassword.layoutnoheader.sessiontimeoutform (302 302)
	https://172.21.46.120/application/de/login.usernameform (302 302)
FAIL-NEW: 0	FAIL-INPROG: 0	WARN-NEW: 13	WARN-INPROG: 0	INFO: 0	IGNORE: 0	PASS: 101
------- START: 172.21.46.144 - 2022-04-21 00:05:22
Total of 16 URLs
PASS: Directory Browsing [0]
PASS: Vulnerable JS Library [10003]
PASS: Cookie No HttpOnly Flag [10010]
PASS: Cookie Without Secure Flag [10011]
PASS: Incomplete or No Cache-control Header Set [10015]
PASS: Cross-Domain JavaScript Source File Inclusion [10017]
PASS: Content-Type Header Missing [10019]
PASS: X-Frame-Options Header [10020]
PASS: X-Content-Type-Options Header Missing [10021]
PASS: Information Disclosure - Debug Error Messages [10023]
PASS: Information Disclosure - Sensitive Information in URL [10024]
PASS: Information Disclosure - Sensitive Information in HTTP Referrer Header [10025]
PASS: HTTP Parameter Override [10026]
PASS: Information Disclosure - Suspicious Comments [10027]
PASS: Open Redirect [10028]
PASS: Cookie Poisoning [10029]
PASS: User Controllable Charset [10030]
PASS: User Controllable HTML Element Attribute (Potential XSS) [10031]
PASS: Viewstate [10032]
PASS: Directory Browsing [10033]
PASS: Heartbleed OpenSSL Vulnerability (Indicative) [10034]
PASS: Strict-Transport-Security Header [10035]
PASS: HTTP Server Response Header [10036]
PASS: Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s) [10037]
PASS: Content Security Policy (CSP) Header Not Set [10038]
PASS: X-Backend-Server Header Information Leak [10039]
PASS: Secure Pages Include Mixed Content [10040]
PASS: HTTP to HTTPS Insecure Transition in Form Post [10041]
PASS: HTTPS to HTTP Insecure Transition in Form Post [10042]
PASS: User Controllable JavaScript Event (XSS) [10043]
PASS: Big Redirect Detected (Potential Sensitive Information Leak) [10044]
PASS: Source Code Disclosure - /WEB-INF folder [10045]
PASS: HTTPS Content Available via HTTP [10047]
PASS: Remote Code Execution - Shell Shock [10048]
PASS: Retrieved from Cache [10050]
PASS: Relative Path Confusion [10051]
PASS: X-ChromeLogger-Data (XCOLD) Header Information Leak [10052]
PASS: X-Debug-Token Information Leak [10056]
PASS: Username Hash Found [10057]
PASS: GET for POST [10058]
PASS: X-AspNet-Version Response Header [10061]
PASS: PII Disclosure [10062]
PASS: Backup File Disclosure [10095]
PASS: Timestamp Disclosure [10096]
PASS: Hash Disclosure [10097]
PASS: Cross-Domain Misconfiguration [10098]
PASS: User Agent Fuzzer [10104]
PASS: Weak Authentication Method [10105]
PASS: HTTP Only Site [10106]
PASS: Httpoxy - Proxy Header Misuse [10107]
PASS: Reverse Tabnabbing [10108]
PASS: Modern Web Application [10109]
PASS: Private IP Disclosure [2]
PASS: HTTP Parameter Pollution [20014]
PASS: Heartbleed OpenSSL Vulnerability [20015]
PASS: Cross-Domain Misconfiguration [20016]
PASS: Source Code Disclosure - CVE-2012-1823 [20017]
PASS: Remote Code Execution - CVE-2012-1823 [20018]
PASS: External Redirect [20019]
PASS: Session ID in URL Rewrite [3]
PASS: Buffer Overflow [30001]
PASS: Format String Error [30002]
PASS: Integer Overflow Error [30003]
PASS: CRLF Injection [40003]
PASS: Parameter Tampering [40008]
PASS: Server Side Include [40009]
PASS: Cross Site Scripting (Reflected) [40012]
PASS: Session Fixation [40013]
PASS: Cross Site Scripting (Persistent) [40014]
PASS: Cross Site Scripting (Persistent) - Prime [40016]
PASS: Cross Site Scripting (Persistent) - Spider [40017]
PASS: SQL Injection - MySQL [40019]
PASS: SQL Injection - Hypersonic SQL [40020]
PASS: SQL Injection - Oracle [40021]
PASS: SQL Injection - PostgreSQL [40022]
PASS: Possible Username Enumeration [40023]
PASS: SQL Injection - SQLite [40024]
PASS: Proxy Disclosure [40025]
PASS: Cross Site Scripting (DOM Based) [40026]
PASS: SQL Injection - MsSQL [40027]
PASS: ELMAH Information Leak [40028]
PASS: Trace.axd Information Leak [40029]
PASS: .htaccess Information Leak [40032]
PASS: .env Information Leak [40034]
PASS: Source Code Disclosure - Git  [41]
PASS: Source Code Disclosure - SVN [42]
PASS: Source Code Disclosure - File Inclusion [43]
PASS: Script Active Scan Rules [50000]
PASS: Script Passive Scan Rules [50001]
PASS: Path Traversal [6]
PASS: Remote File Inclusion [7]
PASS: Insecure JSF ViewState [90001]
PASS: Charset Mismatch [90011]
PASS: XSLT Injection [90017]
PASS: Server Side Code Injection [90019]
PASS: Remote OS Command Injection [90020]
PASS: XPath Injection [90021]
PASS: Application Error Disclosure [90022]
PASS: XML External Entity Attack [90023]
PASS: Generic Padding Oracle [90024]
PASS: Expression Language Injection [90025]
PASS: SOAP Action Spoofing [90026]
PASS: Cookie Slack Detector [90027]
PASS: Insecure HTTP Method [90028]
PASS: SOAP XML Injection [90029]
PASS: WSDL File Detection [90030]
PASS: Loosely Scoped Cookie [90033]
WARN-NEW: Cookie without SameSite Attribute [10054] x 3 
	https://172.21.46.144/ (200 OK)
	https://172.21.46.144/robots.txt (200 OK)
	https://172.21.46.144 (200 OK)
WARN-NEW: CSP: Notices [10055] x 12 
	https://172.21.46.144/ (200 OK)
	https://172.21.46.144/ (200 OK)
	https://172.21.46.144/robots.txt (200 OK)
	https://172.21.46.144/robots.txt (200 OK)
	https://172.21.46.144/sitemap.xml (200 OK)
WARN-NEW: Absence of Anti-CSRF Tokens [10202] x 10 
	https://172.21.46.144/ (200 OK)
	https://172.21.46.144/ (200 OK)
	https://172.21.46.144/robots.txt (200 OK)
	https://172.21.46.144/robots.txt (200 OK)
	https://172.21.46.144/sitemap.xml (200 OK)
WARN-NEW: Anti-CSRF Tokens Check [20012] x 8 
	https://172.21.46.144/webauth (200 OK)
	https://172.21.46.144 (200 OK)
	https://172.21.46.144/ (200 OK)
	https://172.21.46.144/?sd_time=1650492025 (200 OK)
	https://172.21.46.144/robots.txt (200 OK)
WARN-NEW: SQL Injection [40018] x 6 
	https://172.21.46.144/webauth?Cancel (200 OK)
	https://172.21.46.144/webauth?Cancel (200 OK)
	https://172.21.46.144/webauth (200 OK)
	https://172.21.46.144/webauth (200 OK)
	https://172.21.46.144/webauth (200 OK)
WARN-NEW: Hidden File Found [40035] x 1 
	https://172.21.46.144/.svn/entries (200 OK)
WARN-NEW: Cloud Metadata Potentially Exposed [90034] x 1 
	https://172.21.46.144/latest/meta-data/ (200 OK)
FAIL-NEW: 0	FAIL-INPROG: 0	WARN-NEW: 7	WARN-INPROG: 0	INFO: 0	IGNORE: 0	PASS: 107
Total of 103 URLs
PASS: Directory Browsing [0]
PASS: Vulnerable JS Library [10003]
PASS: Cookie No HttpOnly Flag [10010]
PASS: Cookie Without Secure Flag [10011]
PASS: Incomplete or No Cache-control Header Set [10015]
PASS: Content-Type Header Missing [10019]
PASS: X-Frame-Options Header [10020]
PASS: Information Disclosure - Debug Error Messages [10023]
PASS: Information Disclosure - Sensitive Information in URL [10024]
PASS: Information Disclosure - Sensitive Information in HTTP Referrer Header [10025]
PASS: HTTP Parameter Override [10026]
PASS: Information Disclosure - Suspicious Comments [10027]
PASS: Open Redirect [10028]
PASS: Cookie Poisoning [10029]
PASS: User Controllable Charset [10030]
PASS: User Controllable HTML Element Attribute (Potential XSS) [10031]
PASS: Viewstate [10032]
PASS: Directory Browsing [10033]
PASS: Heartbleed OpenSSL Vulnerability (Indicative) [10034]
PASS: Strict-Transport-Security Header [10035]
PASS: HTTP Server Response Header [10036]
PASS: Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s) [10037]
PASS: X-Backend-Server Header Information Leak [10039]
PASS: Secure Pages Include Mixed Content [10040]
PASS: HTTP to HTTPS Insecure Transition in Form Post [10041]
PASS: HTTPS to HTTP Insecure Transition in Form Post [10042]
PASS: User Controllable JavaScript Event (XSS) [10043]
PASS: Big Redirect Detected (Potential Sensitive Information Leak) [10044]
PASS: Source Code Disclosure - /WEB-INF folder [10045]
PASS: HTTPS Content Available via HTTP [10047]
PASS: Remote Code Execution - Shell Shock [10048]
PASS: Retrieved from Cache [10050]
PASS: X-ChromeLogger-Data (XCOLD) Header Information Leak [10052]
PASS: CSP [10055]
PASS: X-Debug-Token Information Leak [10056]
PASS: Username Hash Found [10057]
PASS: GET for POST [10058]
PASS: X-AspNet-Version Response Header [10061]
PASS: PII Disclosure [10062]
PASS: Backup File Disclosure [10095]
PASS: Timestamp Disclosure [10096]
PASS: Hash Disclosure [10097]
PASS: Cross-Domain Misconfiguration [10098]
PASS: User Agent Fuzzer [10104]
PASS: Weak Authentication Method [10105]
PASS: HTTP Only Site [10106]
PASS: Httpoxy - Proxy Header Misuse [10107]
PASS: Reverse Tabnabbing [10108]
PASS: Modern Web Application [10109]
PASS: Private IP Disclosure [2]
PASS: HTTP Parameter Pollution [20014]
PASS: Heartbleed OpenSSL Vulnerability [20015]
PASS: Cross-Domain Misconfiguration [20016]
PASS: Source Code Disclosure - CVE-2012-1823 [20017]
PASS: Remote Code Execution - CVE-2012-1823 [20018]
PASS: External Redirect [20019]
PASS: Session ID in URL Rewrite [3]
PASS: Buffer Overflow [30001]
PASS: Format String Error [30002]
PASS: Integer Overflow Error [30003]
PASS: CRLF Injection [40003]
PASS: Parameter Tampering [40008]
PASS: Server Side Include [40009]
PASS: Cross Site Scripting (Reflected) [40012]
PASS: Session Fixation [40013]
PASS: Cross Site Scripting (Persistent) [40014]
PASS: Cross Site Scripting (Persistent) - Prime [40016]
PASS: Cross Site Scripting (Persistent) - Spider [40017]
PASS: SQL Injection [40018]
PASS: SQL Injection - MySQL [40019]
PASS: SQL Injection - Hypersonic SQL [40020]
PASS: SQL Injection - Oracle [40021]
PASS: SQL Injection - PostgreSQL [40022]
PASS: Possible Username Enumeration [40023]
PASS: SQL Injection - SQLite [40024]
PASS: Cross Site Scripting (DOM Based) [40026]
PASS: SQL Injection - MsSQL [40027]
PASS: ELMAH Information Leak [40028]
PASS: Trace.axd Information Leak [40029]
PASS: .htaccess Information Leak [40032]
PASS: .env Information Leak [40034]
PASS: Source Code Disclosure - Git  [41]
PASS: Source Code Disclosure - SVN [42]
PASS: Source Code Disclosure - File Inclusion [43]
PASS: Script Active Scan Rules [50000]
PASS: Script Passive Scan Rules [50001]
PASS: Path Traversal [6]
PASS: Remote File Inclusion [7]
PASS: Insecure JSF ViewState [90001]
PASS: Charset Mismatch [90011]
PASS: XSLT Injection [90017]
PASS: Server Side Code Injection [90019]
PASS: Remote OS Command Injection [90020]
PASS: XPath Injection [90021]
PASS: Application Error Disclosure [90022]
PASS: XML External Entity Attack [90023]
PASS: Generic Padding Oracle [90024]
PASS: Expression Language Injection [90025]
PASS: SOAP Action Spoofing [90026]
PASS: Insecure HTTP Method [90028]
PASS: SOAP XML Injection [90029]
PASS: WSDL File Detection [90030]
PASS: Loosely Scoped Cookie [90033]
PASS: Cloud Metadata Potentially Exposed [90034]
WARN-NEW: Cross-Domain JavaScript Source File Inclusion [10017] x 12 
	https://172.21.46.193/ (404 Not Found)
	https://172.21.46.193/ (404 Not Found)
	https://172.21.46.193/ (404 Not Found)
	https://172.21.46.193/robots.txt (404 Not Found)
	https://172.21.46.193/robots.txt (404 Not Found)
WARN-NEW: X-Content-Type-Options Header Missing [10021] x 12 
	https://172.21.46.193/.resources/-theme/webresources/images/icons/favicon.ico (200 OK)
	https://172.21.46.193/fallback/.resources/-theme/webresources/css/bootstrap.min~2021-12-16-08-18-44-000~cache.css (200 OK)
	https://172.21.46.193/fallback/.resources/-theme/webresources/css/content~2021-12-16-08-18-44-000~cache.css (200 OK)
	https://172.21.46.193/fallback/.resources/-theme/webresources/css/~2021-12-16-08-18-44-000~cache.css (200 OK)
	https://172.21.46.193/fallback/.resources/-theme/webresources/css/custom~2021-01-12-10-47-01-507~cache.css (200 OK)
WARN-NEW: Content Security Policy (CSP) Header Not Set [10038] x 10 
	https://172.21.46.193/ (404 Not Found)
	https://172.21.46.193/robots.txt (404 Not Found)
	https://172.21.46.193 (404 Not Found)
	https://172.21.46.193/sitemap.xml (404 Not Found)
	https://172.21.46.193/wp/ (404 Not Found)
WARN-NEW: Relative Path Confusion [10051] x 27 
	https://172.21.46.193/.resources/-theme/webresources/images/icons/favicon.ico (404 Not Found)
	https://172.21.46.193/.resources/-theme/webresources/js/collapsabe-text.js (404 Not Found)
	https://172.21.46.193/.resources/-theme/webresources/js/Helper.js (404 Not Found)
	https://172.21.46.193/.resources/-theme/webresources/js/main.js (404 Not Found)
	https://172.21.46.193/.resources/-theme/webresources/js/snapshot.js (404 Not Found)
WARN-NEW: Cookie without SameSite Attribute [10054] x 3 
	https://172.21.46.193/ (404 Not Found)
	https://172.21.46.193/robots.txt (404 Not Found)
	https://172.21.46.193 (404 Not Found)
WARN-NEW: Absence of Anti-CSRF Tokens [10202] x 7 
	https://172.21.46.193/ (404 Not Found)
	https://172.21.46.193/robots.txt (404 Not Found)
	https://172.21.46.193 (404 Not Found)
	https://172.21.46.193/sitemap.xml (404 Not Found)
	https://172.21.46.193/.resources/-theme/webresources/js/vendor/footable.js (200 OK)
WARN-NEW: Anti-CSRF Tokens Check [20012] x 7 
	https://172.21.46.193 (404 Not Found)
	https://172.21.46.193/?queryString=ZAP (404 Not Found)
	https://172.21.46.193/ (404 Not Found)
	https://172.21.46.193/fallback (404 Not Found)
	https://172.21.46.193/robots.txt (404 Not Found)
WARN-NEW: Proxy Disclosure [40025] x 48 
	https://172.21.46.193/.resources (200 OK)
	https://172.21.46.193 (404 Not Found)
	https://172.21.46.193/.resources/-theme (200 OK)
	https://172.21.46.193/.resources/-theme/webresources (200 OK)
	https://172.21.46.193/.resources/-theme/webresources/images (400 Bad Request)
WARN-NEW: Hidden File Found [40035] x 1 
	https://172.21.46.193/.svn/entries (200 OK)
WARN-NEW: Cookie Slack Detector [90027] x 48 
	https://172.21.46.193/.resources (200 OK)
	https://172.21.46.193 (404 Not Found)
	https://172.21.46.193/.resources/-theme (200 OK)
	https://172.21.46.193/.resources/-theme/webresources (200 OK)
	https://172.21.46.193/.resources/-theme/webresources/images (400 Bad Request)
FAIL-NEW: 0	FAIL-INPROG: 0	WARN-NEW: 10	WARN-INPROG: 0	INFO: 0	IGNORE: 0	PASS: 104
------- START: 172.21.46.196 - 2022-04-21 01:44:30
Total of 5 URLs
PASS: Directory Browsing [0]
PASS: Vulnerable JS Library [10003]
PASS: Cookie No HttpOnly Flag [10010]
PASS: Cross-Domain JavaScript Source File Inclusion [10017]
PASS: Content-Type Header Missing [10019]
PASS: Information Disclosure - Debug Error Messages [10023]
PASS: Information Disclosure - Sensitive Information in URL [10024]
PASS: Information Disclosure - Sensitive Information in HTTP Referrer Header [10025]
PASS: HTTP Parameter Override [10026]
PASS: Information Disclosure - Suspicious Comments [10027]
PASS: Open Redirect [10028]
PASS: Cookie Poisoning [10029]
PASS: User Controllable Charset [10030]
PASS: User Controllable HTML Element Attribute (Potential XSS) [10031]
PASS: Viewstate [10032]
PASS: Directory Browsing [10033]
PASS: Heartbleed OpenSSL Vulnerability (Indicative) [10034]
PASS: HTTP Server Response Header [10036]
PASS: X-Backend-Server Header Information Leak [10039]
PASS: Secure Pages Include Mixed Content [10040]
PASS: HTTP to HTTPS Insecure Transition in Form Post [10041]
PASS: HTTPS to HTTP Insecure Transition in Form Post [10042]
PASS: User Controllable JavaScript Event (XSS) [10043]
PASS: Big Redirect Detected (Potential Sensitive Information Leak) [10044]
PASS: Source Code Disclosure - /WEB-INF folder [10045]
PASS: HTTPS Content Available via HTTP [10047]
PASS: Remote Code Execution - Shell Shock [10048]
PASS: Retrieved from Cache [10050]
PASS: Relative Path Confusion [10051]
PASS: X-ChromeLogger-Data (XCOLD) Header Information Leak [10052]
PASS: CSP [10055]
PASS: X-Debug-Token Information Leak [10056]
PASS: Username Hash Found [10057]
PASS: GET for POST [10058]
PASS: X-AspNet-Version Response Header [10061]
PASS: PII Disclosure [10062]
PASS: Backup File Disclosure [10095]
PASS: Timestamp Disclosure [10096]
PASS: Hash Disclosure [10097]
PASS: Cross-Domain Misconfiguration [10098]
PASS: User Agent Fuzzer [10104]
PASS: Weak Authentication Method [10105]
PASS: HTTP Only Site [10106]
PASS: Httpoxy - Proxy Header Misuse [10107]
PASS: Reverse Tabnabbing [10108]
PASS: Modern Web Application [10109]
PASS: Absence of Anti-CSRF Tokens [10202]
PASS: Private IP Disclosure [2]
PASS: Anti-CSRF Tokens Check [20012]
PASS: HTTP Parameter Pollution [20014]
PASS: Heartbleed OpenSSL Vulnerability [20015]
PASS: Cross-Domain Misconfiguration [20016]
PASS: Source Code Disclosure - CVE-2012-1823 [20017]
PASS: Remote Code Execution - CVE-2012-1823 [20018]
PASS: External Redirect [20019]
PASS: Session ID in URL Rewrite [3]
PASS: Buffer Overflow [30001]
PASS: Format String Error [30002]
PASS: Integer Overflow Error [30003]
PASS: CRLF Injection [40003]
PASS: Parameter Tampering [40008]
PASS: Server Side Include [40009]
PASS: Cross Site Scripting (Reflected) [40012]
PASS: Session Fixation [40013]
PASS: Cross Site Scripting (Persistent) [40014]
PASS: Cross Site Scripting (Persistent) - Prime [40016]
PASS: Cross Site Scripting (Persistent) - Spider [40017]
PASS: SQL Injection [40018]
PASS: SQL Injection - MySQL [40019]
PASS: SQL Injection - Hypersonic SQL [40020]
PASS: SQL Injection - Oracle [40021]
PASS: SQL Injection - PostgreSQL [40022]
PASS: Possible Username Enumeration [40023]
PASS: SQL Injection - SQLite [40024]
PASS: Proxy Disclosure [40025]
PASS: Cross Site Scripting (DOM Based) [40026]
PASS: SQL Injection - MsSQL [40027]
PASS: ELMAH Information Leak [40028]
PASS: Trace.axd Information Leak [40029]
PASS: .htaccess Information Leak [40032]
PASS: .env Information Leak [40034]
PASS: Hidden File Finder [40035]
PASS: Source Code Disclosure - Git  [41]
PASS: Source Code Disclosure - SVN [42]
PASS: Source Code Disclosure - File Inclusion [43]
PASS: Script Active Scan Rules [50000]
PASS: Script Passive Scan Rules [50001]
PASS: Path Traversal [6]
PASS: Remote File Inclusion [7]
PASS: Insecure JSF ViewState [90001]
PASS: Charset Mismatch [90011]
PASS: XSLT Injection [90017]
PASS: Server Side Code Injection [90019]
PASS: Remote OS Command Injection [90020]
PASS: XPath Injection [90021]
PASS: Application Error Disclosure [90022]
PASS: XML External Entity Attack [90023]
PASS: Generic Padding Oracle [90024]
PASS: Expression Language Injection [90025]
PASS: SOAP Action Spoofing [90026]
PASS: Insecure HTTP Method [90028]
PASS: SOAP XML Injection [90029]
PASS: WSDL File Detection [90030]
PASS: Loosely Scoped Cookie [90033]
PASS: Cloud Metadata Potentially Exposed [90034]
WARN-NEW: Cookie Without Secure Flag [10011] x 6 
	https://172.21.46.196/shop (200 OK)
	https://172.21.46.196/shop (200 OK)
	https://172.21.46.196/robots.txt (404 Not Found)
	https://172.21.46.196/robots.txt (404 Not Found)
	https://172.21.46.196/sitemap.xml (404 Not Found)
WARN-NEW: Incomplete or No Cache-control Header Set [10015] x 2 
	https://172.21.46.196/shop (200 OK)
	https://172.21.46.196/shop (200 OK)
WARN-NEW: X-Frame-Options Header Not Set [10020] x 1 
	https://172.21.46.196/shop (200 OK)
WARN-NEW: X-Content-Type-Options Header Missing [10021] x 1 
	https://172.21.46.196/shop (200 OK)
WARN-NEW: Strict-Transport-Security Header Not Set [10035] x 3 
	https://172.21.46.196/shop (200 OK)
	https://172.21.46.196/robots.txt (404 Not Found)
	https://172.21.46.196/sitemap.xml (404 Not Found)
WARN-NEW: Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s) [10037] x 3 
	https://172.21.46.196/shop (200 OK)
	https://172.21.46.196/robots.txt (404 Not Found)
	https://172.21.46.196/sitemap.xml (404 Not Found)
WARN-NEW: Content Security Policy (CSP) Header Not Set [10038] x 3 
	https://172.21.46.196/shop (200 OK)
	https://172.21.46.196/robots.txt (404 Not Found)
	https://172.21.46.196/sitemap.xml (404 Not Found)
WARN-NEW: Cookie without SameSite Attribute [10054] x 6 
	https://172.21.46.196/shop (200 OK)
	https://172.21.46.196/shop (200 OK)
	https://172.21.46.196/robots.txt (404 Not Found)
	https://172.21.46.196/robots.txt (404 Not Found)
	https://172.21.46.196/sitemap.xml (404 Not Found)
WARN-NEW: Cookie Slack Detector [90027] x 3 
	https://172.21.46.196/robots.txt (404 Not Found)
	https://172.21.46.196/shop (200 OK)
	https://172.21.46.196/sitemap.xml (404 Not Found)
FAIL-NEW: 0	FAIL-INPROG: 0	WARN-NEW: 9	WARN-INPROG: 0	INFO: 0	IGNORE: 0	PASS: 105
------- START: 172.21.46.30 - 2022-04-20 01:40:18
Total of 60 URLs
PASS: Directory Browsing [0]
PASS: Cookie No HttpOnly Flag [10010]
PASS: Cookie Without Secure Flag [10011]
PASS: Cross-Domain JavaScript Source File Inclusion [10017]
PASS: Content-Type Header Missing [10019]
PASS: X-Frame-Options Header [10020]
PASS: Information Disclosure - Debug Error Messages [10023]
PASS: Information Disclosure - Sensitive Information in URL [10024]
PASS: Information Disclosure - Sensitive Information in HTTP Referrer Header [10025]
PASS: HTTP Parameter Override [10026]
PASS: Information Disclosure - Suspicious Comments [10027]
PASS: Open Redirect [10028]
PASS: Cookie Poisoning [10029]
PASS: User Controllable Charset [10030]
PASS: User Controllable HTML Element Attribute (Potential XSS) [10031]
PASS: Viewstate [10032]
PASS: Directory Browsing [10033]
PASS: Heartbleed OpenSSL Vulnerability (Indicative) [10034]
PASS: HTTP Server Response Header [10036]
PASS: Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s) [10037]
PASS: Content Security Policy (CSP) Header Not Set [10038]
PASS: X-Backend-Server Header Information Leak [10039]
PASS: Secure Pages Include Mixed Content [10040]
PASS: HTTP to HTTPS Insecure Transition in Form Post [10041]
PASS: HTTPS to HTTP Insecure Transition in Form Post [10042]
PASS: User Controllable JavaScript Event (XSS) [10043]
PASS: Big Redirect Detected (Potential Sensitive Information Leak) [10044]
PASS: Source Code Disclosure - /WEB-INF folder [10045]
PASS: HTTPS Content Available via HTTP [10047]
PASS: Remote Code Execution - Shell Shock [10048]
PASS: Retrieved from Cache [10050]
PASS: Relative Path Confusion [10051]
PASS: X-ChromeLogger-Data (XCOLD) Header Information Leak [10052]
PASS: Cookie without SameSite Attribute [10054]
PASS: X-Debug-Token Information Leak [10056]
PASS: Username Hash Found [10057]
PASS: GET for POST [10058]
PASS: X-AspNet-Version Response Header [10061]
PASS: PII Disclosure [10062]
PASS: Backup File Disclosure [10095]
PASS: Timestamp Disclosure [10096]
PASS: Hash Disclosure [10097]
PASS: Cross-Domain Misconfiguration [10098]
PASS: User Agent Fuzzer [10104]
PASS: Weak Authentication Method [10105]
PASS: HTTP Only Site [10106]
PASS: Httpoxy - Proxy Header Misuse [10107]
PASS: Reverse Tabnabbing [10108]
PASS: Modern Web Application [10109]
PASS: Private IP Disclosure [2]
PASS: Anti-CSRF Tokens Check [20012]
PASS: HTTP Parameter Pollution [20014]
PASS: Heartbleed OpenSSL Vulnerability [20015]
PASS: Cross-Domain Misconfiguration [20016]
PASS: Source Code Disclosure - CVE-2012-1823 [20017]
PASS: Remote Code Execution - CVE-2012-1823 [20018]
PASS: External Redirect [20019]
PASS: Session ID in URL Rewrite [3]
PASS: Buffer Overflow [30001]
PASS: Format String Error [30002]
PASS: Integer Overflow Error [30003]
PASS: CRLF Injection [40003]
PASS: Parameter Tampering [40008]
PASS: Server Side Include [40009]
PASS: Cross Site Scripting (Reflected) [40012]
PASS: Session Fixation [40013]
PASS: Cross Site Scripting (Persistent) [40014]
PASS: Cross Site Scripting (Persistent) - Prime [40016]
PASS: Cross Site Scripting (Persistent) - Spider [40017]
PASS: SQL Injection [40018]
PASS: SQL Injection - MySQL [40019]
PASS: SQL Injection - Hypersonic SQL [40020]
PASS: SQL Injection - Oracle [40021]
PASS: SQL Injection - PostgreSQL [40022]
PASS: Possible Username Enumeration [40023]
PASS: SQL Injection - SQLite [40024]
PASS: Cross Site Scripting (DOM Based) [40026]
PASS: SQL Injection - MsSQL [40027]
PASS: ELMAH Information Leak [40028]
PASS: Trace.axd Information Leak [40029]
PASS: .htaccess Information Leak [40032]
PASS: .env Information Leak [40034]
PASS: Hidden File Finder [40035]
PASS: Source Code Disclosure - Git  [41]
PASS: Source Code Disclosure - SVN [42]
PASS: Source Code Disclosure - File Inclusion [43]
PASS: Script Active Scan Rules [50000]
PASS: Script Passive Scan Rules [50001]
PASS: Path Traversal [6]
PASS: Remote File Inclusion [7]
PASS: Insecure JSF ViewState [90001]
PASS: Charset Mismatch [90011]
PASS: XSLT Injection [90017]
PASS: Server Side Code Injection [90019]
PASS: Remote OS Command Injection [90020]
PASS: XPath Injection [90021]
PASS: Application Error Disclosure [90022]
PASS: XML External Entity Attack [90023]
PASS: Generic Padding Oracle [90024]
PASS: Expression Language Injection [90025]
PASS: SOAP Action Spoofing [90026]
PASS: Cookie Slack Detector [90027]
PASS: Insecure HTTP Method [90028]
PASS: SOAP XML Injection [90029]
PASS: WSDL File Detection [90030]
PASS: Loosely Scoped Cookie [90033]
WARN-NEW: Vulnerable JS Library [10003] x 1 
	https://172.21.46.30/js/dependencies/angular.min.js (200 OK)
WARN-NEW: Incomplete or No Cache-control Header Set [10015] x 3 
	https://172.21.46.30/ (200 OK)
	https://172.21.46.30/robots.txt (200 OK)
	https://172.21.46.30 (200 OK)
WARN-NEW: X-Content-Type-Options Header Missing [10021] x 11 
	https://172.21.46.30/ (200 OK)
	https://172.21.46.30/robots.txt (200 OK)
	https://172.21.46.30 (200 OK)
	https://172.21.46.30/styles/common.css (200 OK)
	https://172.21.46.30/styles/icons.css (200 OK)
WARN-NEW: Strict-Transport-Security Header Not Set [10035] x 12 
	https://172.21.46.30/robots.txt (200 OK)
	https://172.21.46.30/styles/common.css (200 OK)
	https://172.21.46.30/styles/icons.css (200 OK)
	https://172.21.46.30/styles/sweet-alert.css (200 OK)
	https://172.21.46.30/styles/loading-bar.min.css (200 OK)
WARN-NEW: CSP: Wildcard Directive [10055] x 6 
	https://172.21.46.30/ (200 OK)
	https://172.21.46.30/ (200 OK)
	https://172.21.46.30/ (200 OK)
	https://172.21.46.30 (200 OK)
	https://172.21.46.30 (200 OK)
WARN-NEW: Absence of Anti-CSRF Tokens [10202] x 2 
	https://172.21.46.30/styles/angular-material.min.css (200 OK)
	https://172.21.46.30/styles/angular-material.min.css (200 OK)
WARN-NEW: Proxy Disclosure [40025] x 55 
	https://172.21.46.30 (200 OK)
	https://172.21.46.30/js (303 See Other)
	https://172.21.46.30/favicon.ico (200 OK)
	https://172.21.46.30/js/app.directives.js (200 OK)
	https://172.21.46.30/js/app.js (200 OK)
WARN-NEW: Cloud Metadata Potentially Exposed [90034] x 1 
	https://172.21.46.30/latest/meta-data/ (200 OK)
FAIL-NEW: 0	FAIL-INPROG: 0	WARN-NEW: 8	WARN-INPROG: 0	INFO: 0	IGNORE: 0	PASS: 106
------- START: 172.21.46.31 - 2022-04-20 01:50:30
Total of 6 URLs
PASS: Directory Browsing [0]
PASS: Vulnerable JS Library [10003]
PASS: Cookie No HttpOnly Flag [10010]
PASS: Cookie Without Secure Flag [10011]
PASS: Incomplete or No Cache-control Header Set [10015]
PASS: Cross-Domain JavaScript Source File Inclusion [10017]
PASS: Content-Type Header Missing [10019]
PASS: X-Frame-Options Header [10020]
PASS: X-Content-Type-Options Header Missing [10021]
PASS: Information Disclosure - Debug Error Messages [10023]
PASS: Information Disclosure - Sensitive Information in URL [10024]
PASS: Information Disclosure - Sensitive Information in HTTP Referrer Header [10025]
PASS: HTTP Parameter Override [10026]
PASS: Information Disclosure - Suspicious Comments [10027]
PASS: Open Redirect [10028]
PASS: Cookie Poisoning [10029]
PASS: User Controllable Charset [10030]
PASS: User Controllable HTML Element Attribute (Potential XSS) [10031]
PASS: Viewstate [10032]
PASS: Directory Browsing [10033]
PASS: Heartbleed OpenSSL Vulnerability (Indicative) [10034]
PASS: HTTP Server Response Header [10036]
PASS: Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s) [10037]
PASS: Content Security Policy (CSP) Header Not Set [10038]
PASS: X-Backend-Server Header Information Leak [10039]
PASS: Secure Pages Include Mixed Content [10040]
PASS: HTTP to HTTPS Insecure Transition in Form Post [10041]
PASS: HTTPS to HTTP Insecure Transition in Form Post [10042]
PASS: User Controllable JavaScript Event (XSS) [10043]
PASS: Big Redirect Detected (Potential Sensitive Information Leak) [10044]
PASS: Source Code Disclosure - /WEB-INF folder [10045]
PASS: HTTPS Content Available via HTTP [10047]
PASS: Remote Code Execution - Shell Shock [10048]
PASS: Retrieved from Cache [10050]
PASS: Relative Path Confusion [10051]
PASS: X-ChromeLogger-Data (XCOLD) Header Information Leak [10052]
PASS: Cookie without SameSite Attribute [10054]
PASS: CSP [10055]
PASS: X-Debug-Token Information Leak [10056]
PASS: Username Hash Found [10057]
PASS: GET for POST [10058]
PASS: X-AspNet-Version Response Header [10061]
PASS: PII Disclosure [10062]
PASS: Backup File Disclosure [10095]
PASS: Timestamp Disclosure [10096]
PASS: Hash Disclosure [10097]
PASS: Cross-Domain Misconfiguration [10098]
PASS: User Agent Fuzzer [10104]
PASS: Weak Authentication Method [10105]
PASS: HTTP Only Site [10106]
PASS: Httpoxy - Proxy Header Misuse [10107]
PASS: Reverse Tabnabbing [10108]
PASS: Modern Web Application [10109]
PASS: Absence of Anti-CSRF Tokens [10202]
PASS: Private IP Disclosure [2]
PASS: Anti-CSRF Tokens Check [20012]
PASS: HTTP Parameter Pollution [20014]
PASS: Heartbleed OpenSSL Vulnerability [20015]
PASS: Cross-Domain Misconfiguration [20016]
PASS: Source Code Disclosure - CVE-2012-1823 [20017]
PASS: Remote Code Execution - CVE-2012-1823 [20018]
PASS: External Redirect [20019]
PASS: Session ID in URL Rewrite [3]
PASS: Buffer Overflow [30001]
PASS: Format String Error [30002]
PASS: Integer Overflow Error [30003]
PASS: CRLF Injection [40003]
PASS: Parameter Tampering [40008]
PASS: Server Side Include [40009]
PASS: Cross Site Scripting (Reflected) [40012]
PASS: Session Fixation [40013]
PASS: Cross Site Scripting (Persistent) [40014]
PASS: Cross Site Scripting (Persistent) - Prime [40016]
PASS: Cross Site Scripting (Persistent) - Spider [40017]
PASS: SQL Injection [40018]
PASS: SQL Injection - MySQL [40019]
PASS: SQL Injection - Hypersonic SQL [40020]
PASS: SQL Injection - Oracle [40021]
PASS: SQL Injection - PostgreSQL [40022]
PASS: Possible Username Enumeration [40023]
PASS: SQL Injection - SQLite [40024]
PASS: Proxy Disclosure [40025]
PASS: Cross Site Scripting (DOM Based) [40026]
PASS: SQL Injection - MsSQL [40027]
PASS: ELMAH Information Leak [40028]
PASS: Trace.axd Information Leak [40029]
PASS: .htaccess Information Leak [40032]
PASS: .env Information Leak [40034]
PASS: Hidden File Finder [40035]
PASS: Source Code Disclosure - Git  [41]
PASS: Source Code Disclosure - SVN [42]
PASS: Source Code Disclosure - File Inclusion [43]
PASS: Script Active Scan Rules [50000]
PASS: Script Passive Scan Rules [50001]
PASS: Path Traversal [6]
PASS: Remote File Inclusion [7]
PASS: Insecure JSF ViewState [90001]
PASS: Charset Mismatch [90011]
PASS: XSLT Injection [90017]
PASS: Server Side Code Injection [90019]
PASS: Remote OS Command Injection [90020]
PASS: XPath Injection [90021]
PASS: Application Error Disclosure [90022]
PASS: XML External Entity Attack [90023]
PASS: Generic Padding Oracle [90024]
PASS: Expression Language Injection [90025]
PASS: SOAP Action Spoofing [90026]
PASS: Cookie Slack Detector [90027]
PASS: Insecure HTTP Method [90028]
PASS: SOAP XML Injection [90029]
PASS: WSDL File Detection [90030]
PASS: Loosely Scoped Cookie [90033]
PASS: Cloud Metadata Potentially Exposed [90034]
WARN-NEW: Strict-Transport-Security Header Not Set [10035] x 4 
	https://172.21.46.31/ (302 Found)
	https://172.21.46.31 (302 Found)
	https://172.21.46.31/robots.txt (302 Found)
	https://172.21.46.31/sitemap.xml (302 Found)
FAIL-NEW: 0	FAIL-INPROG: 0	WARN-NEW: 1	WARN-INPROG: 0	INFO: 0	IGNORE: 0	PASS: 113
Scan subtype:
Origin IP:
Details:
Command:
Version: (official web site)
Output:
ERROR:wafw00f:Something went wrong HTTPSConnectionPool(host='wp-info.ciproc.de', port=443): Read timed out. (read timeout=7)
ERROR:wafw00f:Something went wrong HTTPSConnectionPool(host='wp-info.ciproc.de', port=443): Read timed out. (read timeout=7)
ERROR:wafw00f:Something went wrong Exceeded 30 redirects.
------- START: 172.21.46.120:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.120:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.144:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.144:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.167:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.167:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.183:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.183:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.193:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.193:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.196:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.196:443
[+] The site https://172.21.46.196:443 is behind Barracuda (Barracuda Networks) WAF.
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.248:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.248:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.249:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.249:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.250:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.250:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.251:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.251:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.252:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.252:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.30:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.30:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.31:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.31:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.32:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.32:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.36:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.36:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.37:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.37:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.38:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.38:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.39:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.39:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.40:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.40:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.42:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.42:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.45:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.45:443
[+] The site https://172.21.46.45:443 is behind Barracuda (Barracuda Networks) WAF.
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.48:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.48:443
[+] The site https://172.21.46.48:443 is behind Barracuda (Barracuda Networks) WAF.
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.51:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.51:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.54:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.54:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.57:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.57:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.58:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.58:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.59:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.59:443
[+] The site https://172.21.46.59:443 is behind Barracuda (Barracuda Networks) WAF.
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.60:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.60:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.68:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.68:443
[+] Generic Detection results:
[*] The site https://172.21.46.68:443 seems to be behind a WAF or some sort of security solution
[~] Reason: The server returns a different response code when an attack string is used.
Normal response code is "200", while the response code to cross-site scripting attack is "500"
[~] Number of requests: 5
------- START: 172.21.46.69:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.69:443
[+] Generic Detection results:
[*] The site https://172.21.46.69:443 seems to be behind a WAF or some sort of security solution
[~] Reason: Blocking is being done at connection/packet level.
[~] Number of requests: 4
------- START: 172.21.46.77:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.77:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.47.108:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.47.108:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.47.132:8443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.47.132:8443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.47.133:8443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.47.133:8443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: alt.ciproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://alt.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: docs.ciproc.de:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://docs.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: shop.ciproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://shop.ciproc.de:443
[+] The site https://shop.ciproc.de:443 is behind Barracuda (Barracuda Networks) WAF.
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: shop.voiproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://shop.voiproc.de:443
[+] The site https://shop.voiproc.de:443 is behind Barracuda (Barracuda Networks) WAF.
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: intern.ciproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://intern.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: prod.ciproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://prod.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: services.ciproc.de:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://services.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: jobs.ciproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://jobs.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: keys.ciproc.de:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://keys.ciproc.de:443
[+] Generic Detection results:
[*] The site https://keys.ciproc.de:443 seems to be behind a WAF or some sort of security solution
[~] Reason: The server returns a different response code when an attack string is used.
Normal response code is "200", while the response code to cross-site scripting attack is "500"
[~] Number of requests: 5
------- START: keys.voiproc.com:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://keys.voiproc.com:443
[+] Generic Detection results:
[*] The site https://keys.voiproc.com:443 seems to be behind a WAF or some sort of security solution
[~] Reason: The server returns a different response code when an attack string is used.
Normal response code is "200", while the response code to cross-site scripting attack is "500"
[~] Number of requests: 5
------- START: login.voiproc.com:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://login.voiproc.com:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: lu.ciproc.de:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://lu.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: lu.voiproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://lu.voiproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: mailgw01.ciproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://mailgw01.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: mailgw02.ciproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://mailgw02.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: mailgw03.ciproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://mailgw03.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: mailgw04.ciproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://mailgw04.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: post.voiproc.com:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://post.voiproc.com:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: post.eiproc.de:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://post.eiproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: multiweb.ciproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://multiweb.ciproc.de:443
[+] The site https://multiweb.ciproc.de:443 is behind Barracuda (Barracuda Networks) WAF.
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: webportal.ciproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://webportal.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: multiweb.siproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://multiweb.siproc.de:443
[+] The site https://multiweb.siproc.de:443 is behind Barracuda (Barracuda Networks) WAF.
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: logs.ciproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://logs.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: logs.voiproc.de:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://logs.voiproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: research.ciproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://research.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: mail.ciproc.de:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://mail.ciproc.de:443
[+] Generic Detection results:
[*] The site https://mail.ciproc.de:443 seems to be behind a WAF or some sort of security solution
[~] Reason: The server returns a different response code when an attack string is used.
Normal response code is "200", while the response code to cross-site scripting attack is "500"
[~] Number of requests: 5
------- START: post.ciproc.de:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://post.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: rznet.ciproc.de:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://rznet.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: rznet-inte.ciproc.de:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://rznet-inte.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: wp-info.ciproc.de:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://wp-info.ciproc.de:443
[+] Generic Detection results:
[*] The site https://wp-info.ciproc.de:443 seems to be behind a WAF or some sort of security solution
[~] Reason: Blocking is being done at connection/packet level.
[~] Number of requests: 5
------- START: www.ciproc.com:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://www.ciproc.com:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: www.ciproc.net:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://www.ciproc.net:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: www.voiproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://www.voiproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: www.voiproc.com:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://www.voiproc.com:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: www.ciproc.com:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://www.ciproc.com:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: www..net:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://www..net:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: www..net:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://www..net:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
ERROR:wafw00f:Something went wrong HTTPSConnectionPool(host='172.21.46.57', port=443): Read timed out. (read timeout=7)
ERROR:wafw00f:Site 172.21.46.57 appears to be down
ERROR:wafw00f:Something went wrong HTTPSConnectionPool(host='services.ciproc.de', port=443): Read timed out. (read timeout=7)
ERROR:wafw00f:Site services.ciproc.de appears to be down
ERROR:wafw00f:Something went wrong HTTPSConnectionPool(host='post.ciproc.de', port=443): Read timed out. (read timeout=7)
ERROR:wafw00f:Site post.ciproc.de appears to be down
ERROR:wafw00f:Something went wrong HTTPSConnectionPool(host='wp-info.ciproc.de', port=443): Read timed out. (read timeout=7)
ERROR:wafw00f:Something went wrong HTTPSConnectionPool(host='wp-info.ciproc.de', port=443): Read timed out. (read timeout=7)
ERROR:wafw00f:Something went wrong Exceeded 30 redirects.
------- START: 172.21.46.120:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.120:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.144:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.144:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.167:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.167:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.183:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.183:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.193:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.193:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.196:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.196:443
[+] The site https://172.21.46.196:443 is behind Barracuda (Barracuda Networks) WAF.
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.248:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.248:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.249:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.249:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.250:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.250:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.251:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.251:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.252:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.252:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.30:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.30:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.31:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.31:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.32:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.32:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.36:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.36:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.37:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.37:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.38:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.38:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.39:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.39:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.40:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.40:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.42:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.42:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.45:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.45:443
[+] The site https://172.21.46.45:443 is behind Barracuda (Barracuda Networks) WAF.
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.48:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.48:443
[+] The site https://172.21.46.48:443 is behind Barracuda (Barracuda Networks) WAF.
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.51:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.51:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.54:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.54:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.57:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.57:443
------- START: 172.21.46.58:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.58:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.59:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.59:443
[+] The site https://172.21.46.59:443 is behind Barracuda (Barracuda Networks) WAF.
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.60:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.60:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.46.68:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.68:443
[+] Generic Detection results:
[*] The site https://172.21.46.68:443 seems to be behind a WAF or some sort of security solution
[~] Reason: The server returns a different response code when an attack string is used.
Normal response code is "200", while the response code to cross-site scripting attack is "500"
[~] Number of requests: 5
------- START: 172.21.46.69:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.69:443
[+] Generic Detection results:
[*] The site https://172.21.46.69:443 seems to be behind a WAF or some sort of security solution
[~] Reason: Blocking is being done at connection/packet level.
[~] Number of requests: 4
------- START: 172.21.46.77:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.46.77:443
[+] Generic Detection results:
[*] The site https://172.21.46.77:443 seems to be behind a WAF or some sort of security solution
[~] Reason: The server returns a different response code when an attack string is used.
Normal response code is "200", while the response code to cross-site scripting attack is "404"
[~] Number of requests: 5
------- START: 172.21.47.108:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.47.108:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.47.132:8443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.47.132:8443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: 172.21.47.133:8443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://172.21.47.133:8443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: alt.ciproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://alt.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: docs.ciproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://docs.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: shop.ciproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://shop.ciproc.de:443
[+] The site https://shop.ciproc.de:443 is behind Barracuda (Barracuda Networks) WAF.
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: shop.voiproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://shop.voiproc.de:443
[+] The site https://shop.voiproc.de:443 is behind Barracuda (Barracuda Networks) WAF.
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: intern.ciproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://intern.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: prod.ciproc.de:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://prod.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: services.ciproc.de:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://services.ciproc.de:443
------- START: jobs.ciproc.de:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://jobs.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: keys.ciproc.de:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://keys.ciproc.de:443
[+] Generic Detection results:
[*] The site https://keys.ciproc.de:443 seems to be behind a WAF or some sort of security solution
[~] Reason: The server returns a different response code when an attack string is used.
Normal response code is "200", while the response code to cross-site scripting attack is "500"
[~] Number of requests: 5
------- START: keys.voiproc.com:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://keys.voiproc.com:443
[+] Generic Detection results:
[*] The site https://keys.voiproc.com:443 seems to be behind a WAF or some sort of security solution
[~] Reason: The server returns a different response code when an attack string is used.
Normal response code is "200", while the response code to cross-site scripting attack is "500"
[~] Number of requests: 5
------- START: login.voiproc.com:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://login.voiproc.com:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: lu.ciproc.de:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://lu.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: lu.voiproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://lu.voiproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: mailgw01.ciproc.de:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://mailgw01.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: mailgw02.ciproc.de:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://mailgw02.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: mailgw03.ciproc.de:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://mailgw03.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: mailgw04.ciproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://mailgw04.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: post.voiproc.com:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://post.voiproc.com:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: post.eiproc.de:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://post.eiproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: multiweb.ciproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://multiweb.ciproc.de:443
[+] The site https://multiweb.ciproc.de:443 is behind Barracuda (Barracuda Networks) WAF.
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: webportal.ciproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://webportal.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: multiweb.siproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://multiweb.siproc.de:443
[+] The site https://multiweb.siproc.de:443 is behind Barracuda (Barracuda Networks) WAF.
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: logs.ciproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://logs.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: logs.voiproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://logs.voiproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: research.ciproc.de:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://research.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: mail.ciproc.de:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://mail.ciproc.de:443
[+] Generic Detection results:
[*] The site https://mail.ciproc.de:443 seems to be behind a WAF or some sort of security solution
[~] Reason: The server returns a different response code when an attack string is used.
Normal response code is "200", while the response code to cross-site scripting attack is "500"
[~] Number of requests: 5
------- START: post.ciproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://post.ciproc.de:443
------- START: rznet.ciproc.de:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://rznet.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: rznet-inte.ciproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://rznet-inte.ciproc.de:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: wp-info.ciproc.de:443

______
/      \
(  Woof! )
\  ____/                      )
,,                           ) (_
.-. -    _______                 ( |__|
()``; |==|_______)                .)|__|
/ ('        /|\                  (  |__|
(  /  )        / | \                  . |__|
\(_)_))      /  |  \                   |__|

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://wp-info.ciproc.de:443
[+] Generic Detection results:
[*] The site https://wp-info.ciproc.de:443 seems to be behind a WAF or some sort of security solution
[~] Reason: Blocking is being done at connection/packet level.
[~] Number of requests: 5
------- START: www.ciproc.com:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://www.ciproc.com:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: www.ciproc.net:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://www.ciproc.net:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: www.voiproc.de:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://www.voiproc.de:443
[+] Generic Detection results:
[*] The site https://www.voiproc.de:443 seems to be behind a WAF or some sort of security solution
[~] Reason: The server returns a different response code when an attack string is used.
Normal response code is "200", while the response code to cross-site scripting attack is "404"
[~] Number of requests: 5
------- START: www.voiproc.com:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://www.voiproc.com:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: www.ciproc.com:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://www.ciproc.com:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: www..net:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://www..net:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7
------- START: www..net:443

______
/      \
(  W00f! )
\  ____/
,,    __            404 Hack Not Found
|`-.__   / /                      __     __
/"  _/  /_/                       \ \   / /
*===*    /                          \ \_/ /  405 Not Allowed
/     )__//                           \   /
/|  /     /---`                        403 Forbidden
\/`   \ |                                 / _ \
`\    /_\_              502 Bad Gateway  / / \ \  500 Internal Error
`_____``-`                             /_/   \_\

~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit

[*] Checking https://www..net:443
[+] Generic Detection results:
[-] No WAF detected by the generic detection
[~] Number of requests: 7

Scans were carried out using Nessus Professional to identify security risks, exposures, and vulnerabilities. Details of the previous and current Nessus scans are summarized in the following table:

Previous scan Current scan
Scan started: 2022-03-18 10:31:18 2022-03-26 22:00:06
Scan completed: 2022-03-18 11:48:22 2022-03-26 23:19:31
IP ranges:
  • 212.65.10.0/26
  • 212.65.0.192/27
  • 109.233.144.64/27
  • 172.21.0.0/16
  • 212.65.10.0/26
  • 212.65.0.192/27
  • 109.233.144.64/27
  • 172.21.0.0/16
Scanned from:
  • 212.65.0.204
  • 212.65.0.204

Notes:

  1. The findings described in this report are valid for the time of testing only.
  2. All scans were performed from systems within the ciproc gmbh network.
  3. No denial of service attacks and no tests for vulnerabilities that could crash the targetted systems were undertaken, nor were any attempts made to break into the targetted systems. If you would like us to perform denial of service tests and/or tests that may crash your systems, please contact us.

One-line summary:

Changes were found since the previous port scan.

Details:


New Changes No changes Ports detected
Please click on a system in the grid to view its details here

172.21.0.2 (Hosts) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 01:53:34
Ports detected: N/A
ProtocolPortServiceStatus
tcp53domainopen
tcp80httpopen
tcp111rpcbindopen
tcp999garconopen
tcp44296domainopen
udp111rpcbindopen
udp123ntpopen

172.21.0.4 (Hosts) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 01:53:56
Ports detected: N/A
ProtocolPortServiceStatus
tcp111rpcbindopen
tcp999garconopen
tcp42046rpcbindopen

172.21.0.9 (Hosts) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 01:44:06
Ports detected: N/A
ProtocolPortServiceStatus
tcp999garconopen

172.21.0.10 (Hosts) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 01:47:12
Ports detected: N/A
ProtocolPortServiceStatus
tcp111rpcbindopen
tcp999garconopen
tcp43209rpcbindopen

172.21.0.15 (Hosts) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 01:58:36
Ports detected: N/A
ProtocolPortServiceStatus
tcp111rpcbindopen
tcp999garconopen
tcp46491unknownopen
udp111rpcbindopen

172.21.0.16 (Hosts) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 01:58:08
Ports detected: N/A
ProtocolPortServiceStatus
tcp53domainopen
tcp80httpopen
tcp111rpcbindopen
tcp999garconopen
tcp4949muninopen
tcp52259domainopen
udp111rpcbindopen

172.21.0.23 (Hosts) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 02:08:58
Ports detected: N/A
ProtocolPortServiceStatus
tcp111rpcbindopen
tcp999garconopen
udp111rpcbindopen

172.21.0.24 (Hosts) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 01:58:08
Ports detected: N/A
ProtocolPortServiceStatus
tcp111rpcbindopen
tcp999garconopen
udp111rpcbindopen

172.21.0.25 (Hosts) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 02:01:25
Ports detected: N/A
ProtocolPortServiceStatus
tcp111rpcbindopen
tcp999garconopen
tcp5900vncopen
tcp37137rpcbindopen

172.21.0.101 (Hosts) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 01:44:49
Ports detected: N/A
ProtocolPortServiceStatus
tcp42559unknownopen
udp123ntpopen

172.21.0.250 (Hosts) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 01:42:47
Ports detected: N/A
ProtocolPortServiceStatus
tcp111rpcbindopen
tcp999garconopen
tcp2049nfsopen
tcp38471dhcpcopen
udp111rpcbindopen
udp2049nfsopen

172.21.1.1 (Gateways) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-25 00:31:02
Ports detected: N/A
ProtocolPortServiceStatus
tcp53domainopen
udp53domainopen
udp123ntpopen

172.21.1.11 (Gateways) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-25 04:00:32
Ports detected: N/A None

172.21.1.13 (Gateways) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-25 05:04:16
Ports detected: N/A None

172.21.1.101 (Gateways) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-23 12:48:54
Ports detected: N/A
ProtocolPortServiceStatus
tcp999garconopen

172.21.12.1 (VulnLIB) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-23 12:59:22
Ports detected: N/A None

172.21.12.21 (VulnLIB) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-23 12:59:00
Ports detected: N/A None

172.21.17.11 (VulnLIB) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-23 12:26:54
Ports detected: N/A None

172.21.17.12 (VulnLIB) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-23 12:45:22
Ports detected: N/A None

172.21.17.13 (VulnLIB) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-23 13:08:07
Ports detected: N/A None

172.21.17.14 (VulnLIB) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-23 13:09:28
Ports detected: N/A None

172.21.17.251 (VulnLIB) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-23 12:28:18
Ports detected: N/A None

172.21.17.254 (VulnLIB) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-23 12:59:23
Ports detected: N/A None

172.21.18.1 (VulnLIB) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-23 13:06:01
Ports detected: N/A None

172.21.18.11 (Uncategorized) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-23 13:03:20
Ports detected: N/A None

172.21.18.12 (Uncategorized) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-23 13:08:19
Ports detected: N/A None

172.21.18.211 (Uncategorized) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-23 12:42:11
Ports detected: N/A None

172.21.21.11 (ciproc intern) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 01:59:49
Ports detected: N/A
ProtocolPortServiceStatus
tcp139netbios-ssnopen
tcp445microsoft-dsopen
tcp999garconopen
udp137netbios-nsopen

172.21.70.11 (Hosting) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 01:58:16
Ports detected: N/A
ProtocolPortServiceStatus
tcp999garconopen

172.21.147.1 (Hosting) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 01:50:26
Ports detected: N/A
ProtocolPortServiceStatus
tcp999garconopen

172.21.172.21 (monkeySYS) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-27 01:43:33
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsfiltered
tcp999garconfiltered
tcp1999tcp-id-portopen
tcp3306mysqlfiltered

172.21.172.22 (VulnLIB) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-23 12:55:21
Ports detected: N/A None

172.21.172.23 (VulnLIB) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-23 13:10:23
Ports detected: N/A None

172.21.172.24 (ciproc intern) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 01:56:33
Ports detected: N/A
ProtocolPortServiceStatus
tcp999garconopen
tcp8834nessus-xmlrpcopen

172.21.172.31 (VulnLIB) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-23 13:05:29
Ports detected: N/A None

172.21.172.35 (Uncategorized) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-28 01:09:10
Ports detected: N/A
ProtocolPortServiceStatus
tcp999garconopen

172.21.172.37 (ciproc intern) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 01:51:06
Ports detected: N/A
ProtocolPortServiceStatus
tcp21ftpopen
tcp443httpsopen
tcp999garconopen
tcp3306mysqlopen

172.21.172.38 (VulnLIB) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-23 13:04:23
Ports detected: N/A None

172.21.172.42 (ciproc intern) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 01:53:28
Ports detected: N/A
ProtocolPortServiceStatus
tcp999garconopen

172.21.172.44 (ciproc intern) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 02:15:41
Ports detected: N/A
ProtocolPortServiceStatus
tcp999garconopen
tcp3142apt-cacheropen

172.21.172.45 (monkeySYS) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-27 05:16:41
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen
tcp1999tcp-id-portopen

172.21.172.46 (monkeySYS) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-27 04:37:39
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsfiltered
tcp999garconfiltered
tcp1999tcp-id-portopen
tcp3306mysqlfiltered

172.21.172.47 (monkeySYS) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-27 09:21:02
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsfiltered
tcp999garconfiltered
tcp1999tcp-id-portopen
tcp3306mysqlfiltered

172.21.172.100 (monkeySYS) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-27 06:36:30
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen
tcp1999tcp-id-portopen

172.21.172.101 (monkeySYS) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-27 11:13:05
Ports detected: N/A
ProtocolPortServiceStatus
tcp1999tcp-id-portopen

172.21.172.105 (monkeySYS) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-27 13:47:52
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen
tcp1999tcp-id-portopen

172.21.172.106 (monkeySYS) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-27 14:15:06
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen
tcp1999tcp-id-portopen

172.21.172.146 (monkeySYS) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-27 15:17:36
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen
tcp1999tcp-id-portopen
tcp3306mysqlopen

172.21.172.147 (monkeySYS) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-27 14:28:52
Ports detected: N/A
ProtocolPortServiceStatus
tcp999garconopen
tcp1999tcp-id-portopen
tcp3306mysqlopen

172.21.172.200 (monkeySYS) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-27 14:26:17
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsfiltered
tcp999garconfiltered
tcp1999tcp-id-portopen
tcp3306mysqlfiltered

172.21.172.240 (monkeySYS) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-27 10:24:26
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen
tcp1999tcp-id-portopen
tcp3306mysqlopen

172.21.173.11 (darkhill) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 01:47:37
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp443httpsopen
tcp999garconopen

172.21.173.111 (darkhill) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 01:45:23
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen

172.21.173.112 (darkhill) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 01:48:04
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen

172.21.173.121 (ciproc intern) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 01:56:10
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen

172.21.173.200 (ciproc intern) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 01:44:08
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp999garconopen

172.21.174.11 (darkhill) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 01:51:24
Ports detected: N/A
ProtocolPortServiceStatus
tcp999garconopen

172.21.174.31 (darkhill) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 01:55:42
Ports detected: N/A
ProtocolPortServiceStatus
tcp25smtpopen
tcp111rpcbindopen
tcp443httpsopen
tcp999garconopen
udp111rpcbindopen

172.21.174.32 (darkhill) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 01:57:48
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp111rpcbindopen
tcp443httpsopen
tcp999garconopen
udp111rpcbindopen

172.21.174.33 (darkhill) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 01:49:04
Ports detected: N/A
ProtocolPortServiceStatus
tcp25smtpopen
tcp80httpopen
tcp111rpcbindopen
tcp443httpsopen
tcp999garconopen
udp111rpcbindopen

172.21.174.220 (darkhill) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 02:06:01
Ports detected: N/A
ProtocolPortServiceStatus
tcp111rpcbindopen
tcp999garconopen
tcp2049nfsopen
tcp38731rpcbindopen
udp2049nfsopen

172.21.174.230 (darkhill) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-24 01:47:47
Ports detected: N/A
ProtocolPortServiceStatus
tcp999garconopen
tcp3306mysqlopen

172.21.198.5 (publior) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-31 05:25:02
Ports detected: N/A
ProtocolPortServiceStatus
tcp21ftpopen
tcp25smtpopen
tcp53domainopen
tcp80httpopen
tcp106pop3pwopen
tcp110pop3open
tcp143imapopen
tcp443httpsopen
tcp465smtpsopen
tcp993imapsopen
tcp995pop3sopen
tcp999garconopen
tcp8443https-altopen
tcp8880cddbp-altopen
tcp32799unknownopen
udp53domainopen

172.21.198.11 (publior) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:23:07
Ports detected: N/A
ProtocolPortServiceStatus
tcp999garconopen
tcp16293unknownopen

172.21.198.20 (publior) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:22:38
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp999garconopen

172.21.198.21 (publior) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:22:25
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp999garconopen

172.21.198.22 (publior) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:22:06
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp999garconopen

172.21.198.23 (publior) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:22:47
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp999garconopen

172.21.198.24 (publior) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:21:32
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp999garconopen

172.21.198.30 (publior) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:29:20
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp999garconopen
tcp5222xmpp-clientopen
tcp5269xmpp-serveropen
tcp5280xmpp-boshopen
tcp8888sun-answerbookopen

172.21.198.31 (publior) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 10:56:33
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp443httpsopen
tcp999garconopen

172.21.198.32 (publior) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:24:23
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp999garconopen

172.21.198.110 (publior) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:26:11
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp999garconopen

172.21.198.111 (publior) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:18:34
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp999garconopen

172.21.198.112 (publior) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:18:32
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp999garconopen

172.21.198.113 (publior) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:20:13
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp999garconopen

172.21.198.114 (publior) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:23:42
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp999garconopen

172.21.198.171 (publior) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:11:06
Ports detected: N/A
ProtocolPortServiceStatus
tcp999garconopen
tcp3306mysqlopen

172.21.198.181 (publior) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:20:26
Ports detected: N/A
ProtocolPortServiceStatus
tcp999garconopen
tcp3306mysqlopen

172.21.198.182 (publior) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:20:54
Ports detected: N/A
ProtocolPortServiceStatus
tcp999garconopen
tcp3306mysqlopen

172.21.198.230 (publior) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:24:13
Ports detected: N/A
ProtocolPortServiceStatus
tcp389ldapopen
tcp443httpsopen
tcp999garconopen

172.21.198.240 (publior) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:19:53
Ports detected: N/A
ProtocolPortServiceStatus
tcp111rpcbindopen
tcp999garconopen
tcp2049nfsopen
tcp38563rpcbindopen
udp2049nfsopen

172.21.198.250 (publior) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:25:57
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp111rpcbindopen
tcp999garconopen
tcp32798unknownopen
tcp59320rpcbindopen

172.21.198.251 (publior) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:25:23
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp111rpcbindopen
tcp999garconopen
tcp51576rpcbindopen

172.21.199.19 (Hosting) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-31 03:57:10
Ports detected: N/A
ProtocolPortServiceStatus
tcp53domainopen
tcp88kerberos-secopen
tcp135msrpcopen
tcp139netbios-ssnopen
tcp389ldapopen
tcp445microsoft-dsopen
tcp464kpasswd5open
tcp593http-rpc-epmapopen
tcp636ldapsslopen
tcp1801msmqopen
tcp2103zephyr-cltopen
tcp2105ekloginopen
tcp2107msmq-mgmtopen
tcp3268globalcatldapopen
tcp3269globalcatldapsslopen
tcp3387backroomnetopen
tcp3389ms-wbt-serveropen
tcp5357wsdapiopen
tcp5985wsmanopen
tcp9389adwsopen
tcp49666domainopen
udp123ntpopen
udp137netbios-nsopen
udp389ldapopen

172.21.199.201 (Hosting) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:19:37
Ports detected: N/A
ProtocolPortServiceStatus
tcp111rpcbindopen
tcp443httpsopen
tcp4040yo-mainopen
tcp4044ltpopen
tcp8443https-altopen
tcp42559unknownopen
tcp44337rpcbindopen
udp123ntpopen

172.21.199.211 (Hosting) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:19:04
Ports detected: N/A
ProtocolPortServiceStatus
tcp139netbios-ssnopen
tcp445microsoft-dsopen
tcp1972intersys-cacheopen
tcp42559unknownopen
tcp57772netbios-nsopen

172.21.220.11 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:22:28
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp389ldapopen
tcp443httpsopen
tcp999garconopen
tcp5038sipopen
tcp5061sip-tlsopen

172.21.220.12 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:24:43
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp389ldapopen
tcp443httpsopen
tcp999garconopen

172.21.221.4 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-31 05:21:59
Ports detected: N/A
ProtocolPortServiceStatus
tcp999garconopen

172.21.221.7 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:51:56
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp999garconopen

172.21.221.9 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-31 05:24:18
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp443httpsclosed
tcp999garconopen

172.21.221.11 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 08:58:49
Ports detected: N/A None

172.21.221.24 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:11:34
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp999garconopen

172.21.221.26 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:11:40
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp999garconopen

172.21.221.27 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-31 05:26:19
Ports detected: N/A
ProtocolPortServiceStatus
tcp999garconopen

172.21.221.31 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-31 05:14:35
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp443httpsclosed
tcp999garconopen

172.21.221.32 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-31 05:03:31
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp443httpsclosed
tcp999garconopen

172.21.221.36 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-31 05:19:35
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp443httpsclosed
tcp999garconopen

172.21.221.37 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-31 05:23:07
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp443httpsclosed
tcp999garconopen

172.21.221.40 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 21:29:30
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp443httpsclosed
tcp999garconopen

172.21.221.41 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-31 05:20:52
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp443httpsclosed
tcp999garconopen

172.21.221.42 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-31 05:19:23
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp999garconopen

172.21.221.43 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:16:38
Ports detected: N/A
ProtocolPortServiceStatus
tcp999garconopen

172.21.221.45 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-31 05:17:33
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp443httpsopen
tcp999garconopen
tcp55050unknownclosed

172.21.221.46 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:23:46
Ports detected: N/A
ProtocolPortServiceStatus
tcp999garconopen

172.21.221.47 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-31 05:23:43
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp999garconopen

172.21.221.48 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-31 03:28:27
Ports detected: N/A
ProtocolPortServiceStatus
tcp999garconopen

172.21.221.50 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-31 05:18:44
Ports detected: N/A
ProtocolPortServiceStatus
tcp999garconopen

172.21.221.52 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:14:41
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp999garconopen

172.21.221.53 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:15:15
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp443httpsopen
tcp999garconopen

172.21.221.54 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:15:50
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen

172.21.221.55 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:24:28
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp999garconopen

172.21.221.56 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:15:22
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen

172.21.221.58 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:30:00
Ports detected: N/A
ProtocolPortServiceStatus
tcp389ldapopen
tcp443httpsopen
tcp999garconopen

172.21.221.59 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:15:23
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen

172.21.221.61 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:15:27
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsopen

172.21.221.62 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:15:25
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp443httpsopen
tcp999garconopen
tcp3306mysqlopen

172.21.221.64 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:25:07
Ports detected: N/A
ProtocolPortServiceStatus
tcp389ldapopen
tcp443httpsopen
tcp999garconopen

172.21.221.65 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:15:25
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen

172.21.221.66 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:16:05
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen

172.21.221.67 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:35:37
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen

172.21.221.68 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:12:52
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen

172.21.221.69 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:34:50
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen

172.21.221.70 (Uncategorized) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:14:17
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen

172.21.221.71 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:16:37
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen

172.21.221.72 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:29:55
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen

172.21.221.73 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:14:32
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen

172.21.221.74 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:14:22
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen
udp123ntpopen

172.21.221.75 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-31 03:37:28
Ports detected: N/A
ProtocolPortServiceStatus
tcp389ldapopen
tcp999garconopen

172.21.221.76 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:24:06
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp389ldapopen
tcp443httpsopen
tcp999garconopen
tcp5038sipopen
tcp5061sip-tlsopen

172.21.221.78 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:25:07
Ports detected: N/A
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen

172.21.221.162 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:12:38
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp443httpsopen
tcp999garconopen
tcp3306mysqlopen

172.21.221.200 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:19:19
Ports detected: N/A
ProtocolPortServiceStatus
tcp999garconopen
tcp3306mysqlopen

172.21.221.201 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:19:15
Ports detected: N/A
ProtocolPortServiceStatus
tcp999garconopen

172.21.221.211 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:18:55
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp443httpsopen
tcp999garconopen
tcp3306mysqlopen
udp123ntpopen

172.21.221.230 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-29 15:36:55
Ports detected: N/A None

172.21.221.231 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-29 15:48:12
Ports detected: N/A None

172.21.221.232 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-29 15:52:54
Ports detected: N/A None

172.21.221.233 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:19:33
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp999garconopen
tcp3306mysqlopen

172.21.221.238 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:19:35
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp999garconopen
tcp5038vcom-tunnelopen
tcp8003mcreportopen
tcp8088radan-httpopen
tcp8089unknownopen

172.21.221.240 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:27:59
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp999garconopen
tcp3306mysqlopen

172.21.221.241 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:27:10
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp999garconopen
tcp3306mysqlopen
tcp5038sipopen

172.21.221.242 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-29 15:43:52
Ports detected: N/A None

172.21.221.243 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 07:26:20
Ports detected: N/A
ProtocolPortServiceStatus
tcp80httpopen
tcp999garconopen
tcp3306mysqlopen

172.21.221.250 (Telephony) NEW

NMAP Findings
Previous scanCurrent scan
Scan completed:N/A2022-03-30 12:20:41
Ports detected: N/A
ProtocolPortServiceStatus
tcp389ldapopen
tcp443httpsopen
tcp999garconopen
udp123ntpopen

172.21.11.2 (ISP)

Previous scanCurrent scan
NMAP Findings
Scan completed:2022-03-21 06:29:042022-03-23 12:56:45
Ports detected: None None
Nessus Findings
Scan completed: 2022-03-18 10:34:50 2022-03-26 22:03:36
Ports detected: None None

172.21.11.3 (ISP)

Previous scanCurrent scan
NMAP Findings
Scan completed:2022-03-21 06:46:092022-03-24 04:09:56
Ports detected: None None
Nessus Findings
Scan completed: 2022-03-18 10:34:52 2022-03-26 22:03:33
Ports detected: None None

172.21.11.4 (ISP)

Previous scanCurrent scan
NMAP Findings
Scan completed:2022-03-21 06:46:092022-03-24 04:07:19
Ports detected: None None
Nessus Findings
Scan completed: 2022-03-18 10:36:54 2022-03-26 22:05:54
Ports detected: None None

172.21.11.5 (ISP)

Previous scanCurrent scan
NMAP Findings
Scan completed:2022-03-21 06:44:342022-03-24 01:43:40
Ports detected:
ProtocolPortServiceStatus
tcp53domainopen
tcp999garconopen
tcp3306mysqlopen
udp53domainopen
ProtocolPortServiceStatus
tcp53domainopen
tcp999garconopen
tcp3306mysqlopen
udp53domainopen
Nessus Findings
Scan completed: 2022-03-18 10:35:15 2022-03-26 22:04:03
Ports detected:
Protocol Port Service
tcp53dns
tcp999ssh
tcp3306mysql
Protocol Port Service
tcp53dns
tcp999ssh
tcp3306mysql

172.21.11.11 (ISP)

Previous scanCurrent scan
NMAP Findings
Scan completed:2022-03-21 06:30:282022-03-24 20:57:29
Ports detected:
ProtocolPortServiceStatus
tcp21ftpopen
tcp25smtpopen
tcp80httpopen
tcp110pop3open
tcp143imapopen
tcp443httpsopen
tcp465smtpsopen
tcp993imapsopen
tcp995pop3sopen
tcp999garconopen
tcp3306mysqlopen
tcp8081blackice-icecapopen
ProtocolPortServiceStatus
tcp21ftpopen
tcp25smtpopen
tcp80httpopen
tcp110pop3open
tcp143imapopen
tcp443httpsopen
tcp465smtpsopen
tcp993imapsopen
tcp995pop3sopen
tcp999garconopen
tcp3306mysqlopen
tcp8081blackice-icecapopen
Nessus Findings
Scan completed: 2022-03-18 10:42:21 2022-03-26 22:11:11
Ports detected:
Protocol Port Service
tcp21ftp
tcp25smtp
tcp110pop3
Protocol Port Service
tcp21ftp
tcp25smtp
tcp110pop3

172.21.11.12 (ISP)

Previous scanCurrent scan
NMAP Findings
Scan completed:2022-03-21 06:31:552022-03-24 19:47:58
Ports detected:
ProtocolPortServiceStatus
tcp25smtpopen
tcp80httpopen
tcp110pop3open
tcp443httpsopen
ProtocolPortServiceStatus
tcp25smtpopen
tcp80httpopen
tcp110pop3open
tcp443httpsopen
Nessus Findings
Scan completed: 2022-03-18 10:51:36 2022-03-26 22:20:22
Ports detected:
Protocol Port Service
tcp25smtp
tcp80www
tcp110pop3
tcp443www
Protocol Port Service
tcp25smtp
tcp80www
tcp110pop3
tcp443www

172.21.11.14 (ISP)

Previous scanCurrent scan
NMAP Findings
Scan completed:2022-03-21 06:30:172022-03-24 22:28:56
Ports detected:
ProtocolPortServiceStatus
tcp25smtpopen
tcp80httpopen
tcp110pop3open
tcp143imapopen
tcp443httpsopen
tcp465smtpsopen
tcp587submissionopen
tcp993imapsopen
tcp995pop3sopen
tcp999garconopen
tcp3306mysqlopen
ProtocolPortServiceStatus
tcp25smtpopen
tcp80httpopen
tcp110pop3open
tcp143imapopen
tcp443httpsopen
tcp465smtpsopen
tcp587submissionopen
tcp993imapsopen
tcp995pop3sopen
tcp999garconopen
tcp3306mysqlopen
Nessus Findings
Scan completed: 2022-03-18 10:49:59 2022-03-26 22:20:25
Ports detected:
Protocol Port Service
tcp25smtp
tcp110pop3
tcp143imap
tcp465smtp
tcp587smtp
tcp993imap
tcp995pop3
Protocol Port Service
tcp25smtp
tcp110pop3
tcp143imap
tcp465smtp
tcp587smtp
tcp993imap
tcp995pop3

172.21.11.15 (ISP)

Previous scanCurrent scan
NMAP Findings
Scan completed:2022-03-21 06:30:232022-03-23 13:11:54
Ports detected:
ProtocolPortServiceStatus
tcp25smtpopen
tcp110pop3open
ProtocolPortServiceStatus
tcp25smtpopen
tcp110pop3open
Nessus Findings
Scan completed: 2022-03-18 10:40:11 2022-03-26 22:09:12
Ports detected:
Protocol Port Service
tcp25smtp
tcp110pop3
Protocol Port Service
tcp25smtp
tcp110pop3

172.21.11.17 (ISP)

Previous scanCurrent scan
NMAP Findings
Scan completed:2022-03-21 06:30:202022-03-24 23:50:38
Ports detected:
ProtocolPortServiceStatus
tcp21ftpopen
tcp25smtpopen
tcp80httpopen
tcp110pop3open
tcp143imapopen
tcp443httpsopen
tcp465smtpsopen
tcp587submissionopen
tcp993imapsopen
tcp995pop3sopen
tcp999garconopen
tcp3306mysqlopen
tcp8081blackice-icecapopen
ProtocolPortServiceStatus
tcp21ftpopen
tcp25smtpopen
tcp80httpopen
tcp110pop3open
tcp143imapopen
tcp443httpsopen
tcp465smtpsopen
tcp587submissionopen
tcp993imapsopen
tcp995pop3sopen
tcp999garconopen
tcp3306mysqlopen
tcp8081blackice-icecapopen
tcp4190sieveopen
Nessus Findings
Scan completed: 2022-03-18 10:40:32 2022-03-26 22:07:15
Ports detected:
Protocol Port Service
tcp25smtp
tcp110pop3
Protocol Port Service
tcp25smtp
tcp110pop3

172.21.11.20 (ISP)

Previous scanCurrent scan
NMAP Findings
Scan completed:2022-03-21 06:30:332022-03-24 17:37:32
Ports detected:
ProtocolPortServiceStatus
tcp25smtpopen
tcp80httpopen
tcp110pop3open
tcp143imapopen
tcp443httpsopen
tcp465smtpsopen
tcp587submissionopen
tcp993imapsopen
tcp995pop3sopen
tcp999garconopen
ProtocolPortServiceStatus
tcp25smtpopen
tcp80httpopen
tcp110pop3open
tcp143imapopen
tcp443httpsopen
tcp465smtpsopen
tcp587submissionopen
tcp993imapsopen
tcp995pop3sopen
tcp999garconopen
tcp2552call-loggingclosed
Nessus Findings
Scan completed: 2022-03-18 10:52:13 2022-03-26 22:20:59
Ports detected:
Protocol Port Service
tcp25smtp
tcp80www
tcp110pop3
tcp143imap
tcp443www
tcp465smtp
tcp587smtp
tcp993imap
tcp995pop3
tcp999ssh
Protocol Port Service
tcp25smtp
tcp80www
tcp110pop3
tcp143imap
tcp443www
tcp465smtp
tcp587smtp
tcp993imap
tcp995pop3
tcp999ssh

172.21.11.22 (ISP)

Previous scanCurrent scan
NMAP Findings
Scan completed:2022-03-21 06:44:172022-03-24 01:58:32
Ports detected:
ProtocolPortServiceStatus
tcp25smtpopen
tcp110pop3open
tcp143imapopen
tcp993imapsopen
tcp995pop3sopen
tcp999garconopen
udp123ntpopen
ProtocolPortServiceStatus
tcp25smtpopen
tcp110pop3open
tcp143imapopen
tcp993imapsopen
tcp995pop3sopen
tcp999garconopen
udp123ntpopen
Nessus Findings
Scan completed: 2022-03-18 10:43:56 2022-03-26 22:12:45
Ports detected:
Protocol Port Service
tcp25smtp
tcp110pop3
tcp143imap
tcp993imap
tcp995pop3
tcp999ssh
Protocol Port Service
tcp25smtp
tcp110pop3
tcp143imap
tcp993imap
tcp995pop3
tcp999ssh

172.21.11.121 (ISP)

Previous scanCurrent scan
NMAP Findings
Scan completed:2022-03-21 06:44:482022-03-24 01:54:49
Ports detected:
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen
tcp3306mysqlopen
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen
tcp3306mysqlopen
Nessus Findings
Scan completed: 2022-03-18 10:42:03 2022-03-26 22:10:48
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
tcp3306mysql
Protocol Port Service
tcp443www
tcp999ssh
tcp3306mysql

172.21.11.122 (ISP)

Previous scanCurrent scan
NMAP Findings
Scan completed:2022-03-21 06:44:422022-03-24 01:56:20
Ports detected:
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen
Nessus Findings
Scan completed: 2022-03-18 10:38:15 2022-03-26 22:07:04
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
Protocol Port Service
tcp443www
tcp999ssh

172.21.11.145 (ISP)

Previous scanCurrent scan
NMAP Findings
Scan completed:2022-03-21 06:44:582022-03-24 01:57:00
Ports detected:
ProtocolPortServiceStatus
tcp25smtpopen
tcp80httpopen
tcp443httpsopen
tcp999garconopen
ProtocolPortServiceStatus
tcp25smtpopen
tcp80httpopen
tcp443httpsopen
tcp999garconopen
Nessus Findings
Scan completed: 2022-03-18 10:52:11 2022-03-26 22:20:58
Ports detected:
Protocol Port Service
tcp25smtp?
tcp80www
tcp443www
tcp999ssh
Protocol Port Service
tcp25smtp?
tcp80www
tcp443www
tcp999ssh

172.21.11.221 (ISP)

Previous scanCurrent scan
NMAP Findings
Scan completed:2022-03-21 06:56:342022-03-28 01:05:01
Ports detected:
ProtocolPortServiceStatus
tcp80httpopen
tcp443httpsopen
tcp999garconopen
ProtocolPortServiceStatus
tcp80httpopen
tcp443httpsopen
tcp999garconopen
Nessus Findings
Scan completed: 2022-03-18 10:52:40 2022-03-26 22:21:06
Ports detected:
Protocol Port Service
tcp80www
tcp443www
tcp999ssh
Protocol Port Service
tcp80www
tcp443www
tcp999ssh

172.21.11.230 (ISP)

Previous scanCurrent scan
NMAP Findings
Scan completed:2022-03-21 06:44:482022-03-24 01:55:30
Ports detected:
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen
tcp3306mysqlopen
ProtocolPortServiceStatus
tcp443httpsopen
tcp999garconopen
tcp3306mysqlopen
Nessus Findings
Scan completed: 2022-03-18 10:44:04 2022-03-26 22:07:27
Ports detected:
Protocol Port Service
tcp443www
tcp999ssh
tcp3306mysql
Protocol Port Service
tcp443www
tcp999ssh
tcp3306mysql

172.21.11.250 (ISP)

Previous scanCurrent scan
NMAP Findings
Scan completed:2022-03-21 06:44:502022-03-24 01:42:09
Ports detected:
ProtocolPortServiceStatus
tcp21ftpopen
tcp443httpsopen
tcp999garconopen
tcp8080http-proxyopen
tcp8081blackice-icecapopen
ProtocolPortServiceStatus
tcp21ftpopen
tcp443httpsopen
tcp999garconopen
tcp8080http-proxyopen
tcp8081blackice-icecapopen
Nessus Findings
Scan completed: 2022-03-18 10:53:54 2022-03-26 22:20:33
Ports detected:
Protocol Port Service
tcp21ftp
tcp443www
tcp999ssh
tcp8080www
tcp8081www
Protocol Port Service
tcp21ftp
tcp443www
tcp999ssh
tcp8080http-alt?
tcp8081www

The raw output of some supplementary scans is available below.


Scan subtype:
Origin IP:
Details:
Command:
Version: (official web site)
Output:




Scan subtype:
Origin IP:
Details:
Command:
Version: (official web site)
Output:
No ports detected on 109.233.144.64
No ports detected on 109.233.144.65
Discovered open port 5225/tcp on 109.233.144.66                                
Discovered open port 465/tcp on 109.233.144.66                                 
Discovered open port 995/tcp on 109.233.144.66                                 
Discovered open port 143/tcp on 109.233.144.66                                 
Discovered open port 993/tcp on 109.233.144.66                                 
Discovered open port 443/tcp on 109.233.144.66                                 
Discovered open port 25/tcp on 109.233.144.66                                  
Discovered open port 110/tcp on 109.233.144.66                                 
Discovered open port 21/tcp on 109.233.144.66                                  
Discovered open port 2552/tcp on 109.233.144.66                                
Discovered open port 587/tcp on 109.233.144.66                                 
Discovered open port 80/tcp on 109.233.144.66                                  
Discovered open port 143/tcp on 109.233.144.67                                 
Discovered open port 587/tcp on 109.233.144.67                                 
Discovered open port 25/tcp on 109.233.144.67                                  
Discovered open port 5225/tcp on 109.233.144.67                                
Discovered open port 21/tcp on 109.233.144.67                                  
Discovered open port 465/tcp on 109.233.144.67                                 
Discovered open port 80/tcp on 109.233.144.67                                  
Discovered open port 993/tcp on 109.233.144.67                                 
Discovered open port 995/tcp on 109.233.144.67                                 
Discovered open port 110/tcp on 109.233.144.67                                 
Discovered open port 443/tcp on 109.233.144.67                                 
Discovered open port 2552/tcp on 109.233.144.67                                
No ports detected on 109.233.144.68
No ports detected on 109.233.144.69
No ports detected on 109.233.144.70
No ports detected on 109.233.144.71
No ports detected on 109.233.144.72
No ports detected on 109.233.144.73
No ports detected on 109.233.144.74
No ports detected on 109.233.144.75
No ports detected on 109.233.144.76
No ports detected on 109.233.144.77
No ports detected on 109.233.144.78
No ports detected on 109.233.144.79
Discovered open port 80/tcp on 109.233.144.80                                  
Discovered open port 443/tcp on 109.233.144.80                                 
No ports detected on 109.233.144.81
No ports detected on 109.233.144.82
Discovered open port 80/tcp on 109.233.144.83                                  
Discovered open port 443/tcp on 109.233.144.83                                 
No ports detected on 109.233.144.84
No ports detected on 109.233.144.85
Discovered open port 80/tcp on 109.233.144.86                                  
Discovered open port 443/tcp on 109.233.144.86                                 
Discovered open port 3306/tcp on 109.233.144.87                                
Discovered open port 53/tcp on 109.233.144.87                                  
No ports detected on 109.233.144.88
No ports detected on 109.233.144.89
No ports detected on 109.233.144.90
No ports detected on 109.233.144.91
No ports detected on 109.233.144.92
No ports detected on 109.233.144.93
No ports detected on 109.233.144.94
No ports detected on 109.233.144.95
No ports detected on 109.233.144.64.
No ports detected on 109.233.144.65.
No ports detected on 109.233.144.66.
No ports detected on 109.233.144.67.
No ports detected on 109.233.144.68.
No ports detected on 109.233.144.69.
No ports detected on 109.233.144.70.
No ports detected on 109.233.144.71.
No ports detected on 109.233.144.72.
No ports detected on 109.233.144.73.
Discovered open port 5060/udp on 109.233.144.74                                
No ports detected on 109.233.144.75.
No ports detected on 109.233.144.76.
No ports detected on 109.233.144.77.
No ports detected on 109.233.144.78.
No ports detected on 109.233.144.79.
No ports detected on 109.233.144.80.
Discovered open port 5060/udp on 109.233.144.81                                
No ports detected on 109.233.144.82.
No ports detected on 109.233.144.83.
Discovered open port 5060/udp on 109.233.144.84                                
No ports detected on 109.233.144.85.
No ports detected on 109.233.144.86.
Discovered open port 53/udp on 109.233.144.87                                  
No ports detected on 109.233.144.88.
No ports detected on 109.233.144.89.
No ports detected on 109.233.144.90.
Discovered open port 5060/udp on 109.233.144.91                                
No ports detected on 109.233.144.92.
No ports detected on 109.233.144.93.
No ports detected on 109.233.144.94.
No ports detected on 109.233.144.95.


Port scans were carried out using Nmap. Details of the previous and current scans are summarized in the following table:

Previous scan Current scan
Scan started: 2022-03-21 06:23:35 2022-03-22 06:23:51
Scan completed: 2022-03-21 06:56:34 2022-03-31 05:26:26
Scanned IPs: 256 65536
IPs alive 17 163
IPs unresponsive 239 65373
Reason for stopping success success
Scanned from:
  • 212.65.0.204 (pent01)
  • 172.21.172.24 (pent01 intern)
  • 212.65.0.209 (pent02)
  • 172.21.172.35 (pent02 intern)
  • 212.65.0.204 (pent01)
  • 172.21.172.24 (pent01 intern)
  • 212.65.0.209 (pent02)
  • 172.21.172.35 (pent02 intern)

The current scan was performed using the following command:

/usr/bin/nmap -n -p0-65353 -T4 -sS -sU -P0 -oX /opt/nmap_portscans/nmap_portscan_03220623.xml 172.21.0.0/16

Command line output of current scan:

Nmap done at Thu Mar 31 05:26:26 2022; 65536 IP addresses (163 hosts up) scanned in 770555.69 seconds

IP/Domain WAF Certificate Expiration date Days left
172.21.46.30

intern-inte.ciproc.de

(ciproc GmbH)

Jul 9 23:59:59 2022 GMT 74
server.tel.voiproc.de (172.21.46.144)

server.ciproc.de

(ciproc GmbH)

Jun 11 23:59:59 2022 GMT 46
shop.ciproc.de (172.21.46.196)

shop.ciproc.de

(ciproc GmbH)

May 20 23:59:59 2022 GMT 24
multiweb.voiproc.de (172.21.46.196)

shop.ciproc.de

(ciproc GmbH)

May 20 23:59:59 2022 GMT 24
172.21.46.196

shop.ciproc.de

(ciproc GmbH)

May 20 23:59:59 2022 GMT 24
jobs.ciproc.de (172.21.46.193)

jobs.ciproc.de

(ciproc GmbH)

Nov 28 23:59:59 2022 GMT 216
172.21.46.193

jobs.ciproc.de

(ciproc GmbH)

Nov 28 23:59:59 2022 GMT 216
172.21.46.183

pandora.tel.voiproc.de

(ciproc GmbH)

Apr 8 23:59:59 2023 GMT 347
172.21.46.167

pandora.tel.voiproc.de

(ciproc GmbH)

Apr 8 23:59:59 2023 GMT 347
server.ciproc.de (172.21.46.144)

server.ciproc.de

(ciproc GmbH)

Jun 11 23:59:59 2022 GMT 46
multiweb.ciproc.de (172.21.46.196)

shop.ciproc.de

(ciproc GmbH)

May 20 23:59:59 2022 GMT 24
172.21.46.144

server.ciproc.de

(ciproc GmbH)

Jun 11 23:59:59 2022 GMT 46
login.ciproc.de (172.21.46.120)

login.ciproc.de

(ciproc GmbH)

May 27 23:59:59 2022 GMT 31
172.21.46.120

login.ciproc.de

(ciproc GmbH)

May 27 23:59:59 2022 GMT 31
www.siproc.de (172.21.46.77)

www.siproc.de

(ciproc GmbH)

Sep 14 23:59:59 2022 GMT 141
172.21.46.77

www.siproc.de

(ciproc GmbH)

Sep 14 23:59:59 2022 GMT 141
172.21.46.69

imap-mail.ciproc.net

(ciproc GmbH)

Nov 18 23:59:59 2022 GMT 206
172.21.46.69

imap-mail.ciproc.net

(ciproc GmbH)

Nov 18 23:59:59 2022 GMT 206
keys.ciproc.de (172.21.46.68)

imap-mail.ciproc.net

(ciproc GmbH)

Nov 18 23:59:59 2022 GMT 206
shop.tel.voiproc.de (172.21.46.196)

shop.ciproc.de

(ciproc GmbH)

May 20 23:59:59 2022 GMT 24
172.21.46.248

smtp-mail.ciproc.de

(ciproc GmbH)

Oct 14 23:59:59 2022 GMT 171
imap-mail.ciproc.de (172.21.46.68)

imap-mail.ciproc.net

(ciproc GmbH)

Nov 18 23:59:59 2022 GMT 206
172.21.46.251

smtp-mail.ciproc.de

(ciproc GmbH)

Oct 14 23:59:59 2022 GMT 171
172.21.47.132

customer.ciproc.de

(ciproc GmbH)

Oct 27 23:59:59 2022 GMT 184
172.21.47.108

exconnect.ciproc.de

(ciproc GmbH)

Apr 23 23:59:59 2023 GMT 362
mailgw04.ciproc.de (172.21.46.252)

smtp-mail.ciproc.de

(ciproc GmbH)

Oct 14 23:59:59 2022 GMT 171
172.21.46.252

smtp-mail.ciproc.de

(ciproc GmbH)

Oct 14 23:59:59 2022 GMT 171
mailgw04.ciproc.de (172.21.46.252)

smtp-mail.ciproc.de

(ciproc GmbH)

Oct 18 23:59:59 2022 GMT 175
172.21.46.252

smtp-mail.ciproc.de

(ciproc GmbH)

Oct 18 23:59:59 2022 GMT 175
mailgw03.ciproc.de (172.21.46.251)

smtp-mail.ciproc.de

(ciproc GmbH)

Oct 14 23:59:59 2022 GMT 171
mailgw03.ciproc.de (172.21.46.251)

smtp-mail.ciproc.de

(ciproc GmbH)

Oct 18 23:59:59 2022 GMT 175
172.21.46.249

smtp-mail.ciproc.de

(ciproc GmbH)

Oct 18 23:59:59 2022 GMT 175
172.21.46.251

smtp-mail.ciproc.de

(ciproc GmbH)

Oct 18 23:59:59 2022 GMT 175
mailgw02.ciproc.de (172.21.46.250)

smtp-mail.ciproc.de

(ciproc GmbH)

Oct 14 23:59:59 2022 GMT 171
172.21.46.250

smtp-mail.ciproc.de

(ciproc GmbH)

Oct 14 23:59:59 2022 GMT 171
mailgw02.ciproc.de (172.21.46.250)

smtp-mail.ciproc.de

(ciproc GmbH)

Oct 18 23:59:59 2022 GMT 175
172.21.46.250

smtp-mail.ciproc.de

(ciproc GmbH)

Oct 18 23:59:59 2022 GMT 175
mailgw01.ciproc.de (172.21.46.249)

smtp-mail.ciproc.de

(ciproc GmbH)

Oct 14 23:59:59 2022 GMT 171
172.21.46.249

smtp-mail.ciproc.de

(ciproc GmbH)

Oct 14 23:59:59 2022 GMT 171
mailgw01.ciproc.de (172.21.46.249)

smtp-mail.ciproc.de

(ciproc GmbH)

Oct 18 23:59:59 2022 GMT 175
keys.ciproc.de (172.21.46.68)

imap-mail.ciproc.net

(ciproc GmbH)

Nov 18 23:59:59 2022 GMT 206
172.21.46.68

imap-mail.ciproc.net

(ciproc GmbH)

Nov 18 23:59:59 2022 GMT 206
support-inte.ciproc.de (172.21.46.30)

intern-inte.ciproc.de

(ciproc GmbH)

Jul 9 23:59:59 2022 GMT 74
www.proxy.ciproc.de (172.21.46.37)

www.logs.ciproc.de

(ciproc GmbH)

Feb 27 23:59:59 2023 GMT 307
wiki.ciproc.de (172.21.46.39)

wiki.ciproc.de

(ciproc GmbH)

Aug 13 23:59:59 2022 GMT 109
172.21.46.39

wiki.ciproc.de

(ciproc GmbH)

Aug 13 23:59:59 2022 GMT 109
docs.ciproc.de (172.21.46.38)

docs.ciproc.de

(ciproc GmbH)

Feb 24 23:59:59 2023 GMT 304
172.21.46.38

docs.ciproc.de

(ciproc GmbH)

Feb 24 23:59:59 2023 GMT 304
www.ids.ciproc.com (172.21.46.37)

www.logs.ciproc.de

(ciproc GmbH)

Feb 27 23:59:59 2023 GMT 307
www.ids.ciproc.de (172.21.46.37)

www.logs.ciproc.de

(ciproc GmbH)

Feb 27 23:59:59 2023 GMT 307
www.logs.ciproc.de (172.21.46.37)

www.logs.ciproc.de

(ciproc GmbH)

Feb 27 23:59:59 2023 GMT 307
172.21.46.37

www.logs.ciproc.de

(ciproc GmbH)

Feb 27 23:59:59 2023 GMT 307
wiki.ciproc.com (172.21.46.40)

wiki.ciproc.com

(ciproc GmbH)

Sep 13 23:59:59 2022 GMT 140
www.ciproc.net.de (172.21.46.36)

www.ciproc.net.de

(ciproc GmbH)

Jan 17 23:59:59 2023 GMT 266
172.21.46.36

www.ciproc.net.de

(ciproc GmbH)

Jan 17 23:59:59 2023 GMT 266
www.ciproc.de (172.21.46.32)

www.ciproc.de

(ciproc GmbH)

Jan 30 23:59:59 2023 GMT 279
172.21.46.32

www.ciproc.de

(ciproc GmbH)

Jan 30 23:59:59 2023 GMT 279
support-prod.ciproc.de (172.21.46.31)

intern.ciproc.de

(ciproc GmbH)

Jul 11 23:59:59 2022 GMT 76
intern.ciproc.de (172.21.46.31)

intern.ciproc.de

(ciproc GmbH)

Jul 11 23:59:59 2022 GMT 76
172.21.46.31

intern.ciproc.de

(ciproc GmbH)

Jul 11 23:59:59 2022 GMT 76
intern-inte.ciproc.de (172.21.46.30)

intern-inte.ciproc.de

(ciproc GmbH)

Jul 9 23:59:59 2022 GMT 74
172.21.46.40

wiki.ciproc.com

(ciproc GmbH)

Sep 13 23:59:59 2022 GMT 140
172.21.46.42

www.voiproc.com.de

(ciproc GmbH)

Feb 27 23:59:59 2023 GMT 307
imap-mail.ciproc.de (172.21.46.68)

imap-mail.ciproc.net

(ciproc GmbH)

Nov 18 23:59:59 2022 GMT 206
172.21.46.58

services.ciproc.de

(ciproc GmbH)

Feb 23 23:59:59 2022 GMT -62
keys.ciproc.de (172.21.46.68)

imap-mail.ciproc.net

(ciproc GmbH)

Nov 18 23:59:59 2022 GMT 206
keys.ciproc.de (172.21.46.68)

imap-mail.ciproc.net

(ciproc GmbH)

Nov 18 23:59:59 2022 GMT 206
172.21.46.68

imap-mail.ciproc.net

(ciproc GmbH)

Nov 18 23:59:59 2022 GMT 206
lu.ciproc.de (172.21.46.60)

lu.tel.voiproc.de

(ciproc GmbH)

May 21 23:59:59 2022 GMT 25
lu.tel.voiproc.de (172.21.46.60)

lu.tel.voiproc.de

(ciproc GmbH)

May 21 23:59:59 2022 GMT 25
172.21.46.60

lu.tel.voiproc.de

(ciproc GmbH)

May 21 23:59:59 2022 GMT 25
wp-info.ciproc.de (172.21.46.59)

www.ciproc.com

(ciproc GmbH)

Apr 25 23:59:59 2023 GMT 364
172.21.46.59

www.ciproc.com

(ciproc GmbH)

Apr 25 23:59:59 2023 GMT 364
post.ciproc.de (172.21.46.57)

post.ciproc.de

(ciproc GmbH)

Sep 22 23:59:59 2022 GMT 149
demo.ciproc.de (172.21.46.42)

www.voiproc.com.de

(ciproc GmbH)

Feb 27 23:59:59 2023 GMT 307
services.ciproc.de (172.21.46.57)

post.ciproc.de

(ciproc GmbH)

Sep 22 23:59:59 2022 GMT 149
172.21.46.57

post.ciproc.de

(ciproc GmbH)

Sep 22 23:59:59 2022 GMT 149
webportal.ciproc.de (172.21.46.54)

webportal.ciproc.de

(ciproc GmbH)

Apr 18 23:59:59 2023 GMT 357
172.21.46.54

webportal.ciproc.de

(ciproc GmbH)

Apr 18 23:59:59 2023 GMT 357
research.ciproc.de (172.21.46.51)

research.ciproc.de

(ciproc GmbH)

May 21 23:59:59 2022 GMT 25
172.21.46.51

research.ciproc.de

(ciproc GmbH)

May 21 23:59:59 2022 GMT 25
172.21.46.48

www.ciproc.com

(ciproc GmbH)

Apr 25 23:59:59 2023 GMT 364
172.21.46.45

shop.ciproc.de

(ciproc GmbH)

May 20 23:59:59 2022 GMT 24
172.21.47.133

customer.ciproc.de

(ciproc GmbH)

Oct 27 23:59:59 2022 GMT 184
IP/Domain Port Service Protocol Check Nonconforming Protocols Cipher Check Nonconforming Ciphers
172.21.46.30443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256
172.21.46.31443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256
172.21.46.32443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256
172.21.46.36443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256, AES256-GCM-SHA384, AES128-GCM-SHA256
172.21.46.37443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256
172.21.46.38443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256
172.21.46.39443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256
172.21.46.40443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256
172.21.46.42443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256
172.21.46.45443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES256-SHA256, AES256-GCM-SHA384, AES256-SHA256, AES256-SHA, AES128-GCM-SHA256, AES128-SHA256, AES128-SHA
172.21.46.48443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256
172.21.46.51443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256
172.21.46.54443 HTTP ECDHE-RSA-AES256-SHA, AES256-GCM-SHA384, AES256-SHA256, AES256-SHA, ECDHE-RSA-AES128-SHA, AES128-GCM-SHA256, AES128-SHA256
172.21.46.57443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256
172.21.46.58443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256
172.21.46.59443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256
172.21.46.60443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256
172.21.46.68443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256
172.21.46.68443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256
172.21.46.69443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256
172.21.46.69443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256
172.21.46.77443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256
172.21.46.120443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256
172.21.46.144443 HTTP AES256-GCM-SHA384, AES256-SHA256, AES128-SHA256
172.21.46.167443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES256-SHA256, DHE-RSA-AES256-SHA, AES256-GCM-SHA384, AES256-SHA256, AES256-SHA, DHE-RSA-AES128-GCM-SHA256, DHE-RSA-AES128-SHA256, DHE, RSA-AES128-SHA, AES128-GCM-SHA256, AES128-SHA256, AES128-SHA
172.21.46.170443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES256-SHA256, DHE-RSA-AES256-SHA, AES256-GCM-SHA384, AES256-SHA256, AES256-SHA, DHE-RSA-AES128-GCM-SHA256, DHE-RSA-AES128-SHA256, DHE-RSA-AES128-SHA, AES128-GCM-SHA256, AES128-SHA256, AES128-SHA
172.21.46.183443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES256-SHA256, DHE-RSA-AES256-SHA, AES256-GCM-SHA384, AES256-SHA256, AES256-SHA, DHE-RSA-AES128-GCM-SHA256, DHE-RSA-AES128-SHA256, DHE-RSA-AES128-SHA, AES128-GCM-SHA256, AES128-SHA256, AES128-SHA
172.21.46.193443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256
172.21.46.196443 HTTP DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES256-SHA256, AES256-GCM-SHA384, AES256-SHA256, AES256-SHA, AES128-GCM-SHA256, AES128-SHA256, AES128-SHA
172.21.46.24725 SMTP ECDHE-RSA-AES256-SHA, AES256-GCM-SHA384, AES256-SHA256, AES256-SHA, ECDHE-RSA-AES128-SHA, AES128-GCM-SHA256, AES128-SHA256, AES128-SHA, RC4-SHA, DES-CBC3-SHA
172.21.46.24925 SMTP TLS 1, TLS 1.1ECDHE-RSA-AES256-SHA, AES256-GCM-SHA384, AES256-SHA256, AES256-SHA, ECDHE-RSA-AES128-SHA, AES128-GCM-SHA256, AES128-SHA256, AES128-SHA, RC4-SHA, DES-CBC3-SHA
172.21.46.25025 SMTP TLS 1, TLS 1.1ECDHE-RSA-AES256-SHA, AES256-GCM-SHA384, AES256-SHA256, AES256-SHA, ECDHE-RSA-AES128-SHA, AES128-GCM-SHA256, AES128-SHA256, AES128-SHA, RC4-SHA, DES-CBC3-SHA
172.21.46.25125 SMTP TLS 1, TLS 1.1ECDHE-RSA-AES256-SHA, AES256-GCM-SHA384, AES256-SHA256, AES256-SHA, ECDHE-RSA-AES128-SHA, AES128-GCM-SHA256, AES128-SHA256, AES128-SHA, RC4-SHA, DES-CBC3-SHA
172.21.46.25225 SMTP TLS 1, TLS 1.1ECDHE-RSA-AES256-SHA, AES256-GCM-SHA384, AES256-SHA256, AES256-SHA, ECDHE-RSA-AES128-SHA, AES128-GCM-SHA256, AES128-SHA256, AES128-SHA, RC4-SHA, DES-CBC3-SHA
172.21.47.108443 HTTP AES256-GCM-SHA384, AES128-GCM-SHA256, AES256-SHA256, AES128-SHA256
172.21.47.1328443 HTTP NPN/SPDY, ALPN/HTTP2DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES256-SHA256, AES256-GCM-SHA384, AES256-SHA256, DHE-RSA-AES128-GCM-SHA256, DHE-RSA-AES128-SHA256, AES128-GCM-SHA256, AES128-SHA256
172.21.47.1338443 HTTP NPN/SPDY, ALPN/HTTP2DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES256-SHA256, AES256-GCM-SHA384, AES256-SHA256, DHE-RSA-AES128-GCM-SHA256, DHE-RSA-AES128-SHA256, AES128-GCM-SHA256, AES128-SHA256

The raw output of some supplementary scans is available below.


Scan subtype:
Origin IP:
Details:
Command:
Version: (official web site)
Output:
------- START: 109.233.144.64
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.64
Host is up.
All 1034 scanned ports on 109.233.144.64 are filtered

Nmap done: 1 IP address (1 host up) scanned in 211.83 seconds
------- START: 109.233.144.65
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.65
Host is up (0.0010s latency).
All 1034 scanned ports on 109.233.144.65 are closed

Nmap done: 1 IP address (1 host up) scanned in 79.18 seconds
------- START: 109.233.144.66
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for mail01.ciproc.de (109.233.144.66)
Host is up (0.0013s latency).
Not shown: 1023 filtered ports
PORT    STATE  SERVICE
20/tcp  closed ftp-data
21/tcp  open   ftp
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|     warnings: 
|       Weak certificate signature: SHA1
|   TLSv1.1: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|     warnings: 
|       Weak certificate signature: SHA1
|   TLSv1.2: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|     warnings: 
|       Weak certificate signature: SHA1
|_  least strength: A
25/tcp  open   smtp
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|_  least strength: A
80/tcp  open   http
110/tcp open   pop3
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|_  least strength: A
143/tcp open   imap
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|_  least strength: A
443/tcp open   https
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|   TLSv1.1: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|   TLSv1.2: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|_  least strength: A
465/tcp open   smtps
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|_  least strength: A
587/tcp open   submission
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|_  least strength: A
993/tcp open   imaps
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|_  least strength: A
995/tcp open   pop3s
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|_  least strength: A

Nmap done: 1 IP address (1 host up) scanned in 31.83 seconds
------- START: 109.233.144.67
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for mail01.add2web.de (109.233.144.67)
Host is up (0.0012s latency).
Not shown: 1023 filtered ports
PORT    STATE  SERVICE
20/tcp  closed ftp-data
21/tcp  open   ftp
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|     warnings: 
|       Weak certificate signature: SHA1
|   TLSv1.1: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|     warnings: 
|       Weak certificate signature: SHA1
|   TLSv1.2: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|     warnings: 
|       Weak certificate signature: SHA1
|_  least strength: A
25/tcp  open   smtp
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|_  least strength: A
80/tcp  open   http
110/tcp open   pop3
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|_  least strength: A
143/tcp open   imap
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|_  least strength: A
443/tcp open   https
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|   TLSv1.1: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|   TLSv1.2: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|_  least strength: A
465/tcp open   smtps
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|_  least strength: A
587/tcp open   submission
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|_  least strength: A
993/tcp open   imaps
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|_  least strength: A
995/tcp open   pop3s
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|_  least strength: A

Nmap done: 1 IP address (1 host up) scanned in 41.17 seconds
------- START: 109.233.144.68
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for mail01.alevi.de (109.233.144.68)
Host is up.
All 1034 scanned ports on mail01.alevi.de (109.233.144.68) are filtered

Nmap done: 1 IP address (1 host up) scanned in 212.71 seconds
------- START: 109.233.144.69
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.69
Host is up.
All 1034 scanned ports on 109.233.144.69 are filtered

Nmap done: 1 IP address (1 host up) scanned in 212.63 seconds
------- START: 109.233.144.70
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.70
Host is up.
All 1034 scanned ports on 109.233.144.70 are filtered

Nmap done: 1 IP address (1 host up) scanned in 212.58 seconds
------- START: 109.233.144.71
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.71
Host is up.
All 1034 scanned ports on 109.233.144.71 are filtered

Nmap done: 1 IP address (1 host up) scanned in 212.47 seconds
------- START: 109.233.144.72
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for mail02.alevi.de (109.233.144.72)
Host is up.
All 1034 scanned ports on mail02.alevi.de (109.233.144.72) are filtered

Nmap done: 1 IP address (1 host up) scanned in 212.42 seconds
------- START: 109.233.144.73
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.73
Host is up.
All 1034 scanned ports on 109.233.144.73 are filtered

Nmap done: 1 IP address (1 host up) scanned in 212.33 seconds
------- START: 109.233.144.74
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.74
Host is up.
All 1034 scanned ports on 109.233.144.74 are filtered

Nmap done: 1 IP address (1 host up) scanned in 212.29 seconds
------- START: 109.233.144.75
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.75
Host is up.
All 1034 scanned ports on 109.233.144.75 are filtered

Nmap done: 1 IP address (1 host up) scanned in 212.20 seconds
------- START: 109.233.144.76
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.76
Host is up.
All 1034 scanned ports on 109.233.144.76 are filtered

Nmap done: 1 IP address (1 host up) scanned in 213.10 seconds
------- START: 109.233.144.77
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.77
Host is up.
All 1034 scanned ports on 109.233.144.77 are filtered

Nmap done: 1 IP address (1 host up) scanned in 213.03 seconds
------- START: 109.233.144.78
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.78
Host is up.
All 1034 scanned ports on 109.233.144.78 are filtered

Nmap done: 1 IP address (1 host up) scanned in 212.97 seconds
------- START: 109.233.144.79
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.79
Host is up.
All 1034 scanned ports on 109.233.144.79 are filtered

Nmap done: 1 IP address (1 host up) scanned in 212.86 seconds
------- START: 109.233.144.80
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.80
Host is up (0.0014s latency).
Not shown: 1032 filtered ports
PORT    STATE SERVICE
80/tcp  open  http
443/tcp open  https
| ssl-enum-ciphers: 
|   TLSv1.2: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|_  least strength: A

Nmap done: 1 IP address (1 host up) scanned in 13.20 seconds
------- START: 109.233.144.81
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.81
Host is up.
All 1034 scanned ports on 109.233.144.81 are filtered

Nmap done: 1 IP address (1 host up) scanned in 212.67 seconds
------- START: 109.233.144.82
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.82
Host is up.
All 1034 scanned ports on 109.233.144.82 are filtered

Nmap done: 1 IP address (1 host up) scanned in 212.60 seconds
------- START: 109.233.144.83
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.83
Host is up (0.0011s latency).
Not shown: 1032 filtered ports
PORT    STATE SERVICE
80/tcp  open  http
443/tcp open  https
| ssl-enum-ciphers: 
|   TLSv1.2: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|_  least strength: A

Nmap done: 1 IP address (1 host up) scanned in 14.87 seconds
------- START: 109.233.144.84
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for mx.e-zee.eu (109.233.144.84)
Host is up.
All 1034 scanned ports on mx.e-zee.eu (109.233.144.84) are filtered

Nmap done: 1 IP address (1 host up) scanned in 212.38 seconds
------- START: 109.233.144.85
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.85
Host is up (0.00099s latency).
Not shown: 1032 filtered ports
PORT    STATE  SERVICE
80/tcp  closed http
443/tcp closed https

Nmap done: 1 IP address (1 host up) scanned in 9.66 seconds
------- START: 109.233.144.86
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.86
Host is up (0.0011s latency).
Not shown: 1032 filtered ports
PORT    STATE SERVICE
80/tcp  open  http
443/tcp open  https
| ssl-enum-ciphers: 
|   TLSv1.2: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|_  least strength: A

Nmap done: 1 IP address (1 host up) scanned in 11.97 seconds
------- START: 109.233.144.87
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.87
Host is up (0.00097s latency).
Not shown: 1033 closed ports
PORT   STATE SERVICE
53/tcp open  domain

Nmap done: 1 IP address (1 host up) scanned in 18.10 seconds
------- START: 109.233.144.88
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.88
Host is up.
All 1034 scanned ports on 109.233.144.88 are filtered

Nmap done: 1 IP address (1 host up) scanned in 212.01 seconds
------- START: 109.233.144.89
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.89
Host is up.
All 1034 scanned ports on 109.233.144.89 are filtered

Nmap done: 1 IP address (1 host up) scanned in 211.87 seconds
------- START: 109.233.144.90
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.90
Host is up.
All 1034 scanned ports on 109.233.144.90 are filtered

Nmap done: 1 IP address (1 host up) scanned in 211.79 seconds
------- START: 109.233.144.91
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.91
Host is up.
All 1034 scanned ports on 109.233.144.91 are filtered

Nmap done: 1 IP address (1 host up) scanned in 211.72 seconds
------- START: 109.233.144.92
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.92
Host is up.
All 1034 scanned ports on 109.233.144.92 are filtered

Nmap done: 1 IP address (1 host up) scanned in 211.56 seconds
------- START: 109.233.144.93
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.93
Host is up.
All 1034 scanned ports on 109.233.144.93 are filtered

Nmap done: 1 IP address (1 host up) scanned in 212.54 seconds
------- START: 109.233.144.94
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.94
Host is up.
All 1034 scanned ports on 109.233.144.94 are filtered

Nmap done: 1 IP address (1 host up) scanned in 212.41 seconds
------- START: 109.233.144.95
Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET
Nmap scan report for 109.233.144.95
Host is up.
All 1034 scanned ports on 109.233.144.95 are filtered

Nmap done: 1 IP address (1 host up) scanned in 212.29 seconds
------- START: 109.233.144.66
Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 09:30 CEST
Nmap scan report for mail01.ciproc.de (109.233.144.66)
Host is up (0.0012s latency).
Not shown: 816 filtered ports, 173 closed ports
PORT     STATE SERVICE    VERSION
21/tcp   open  ftp        Pure-FTPd
25/tcp   open  smtp       Postfix smtpd
80/tcp   open  http       Apache httpd 2.4.25
| http-headers: 
|   Date: Mon, 04 Apr 2022 07:33:44 GMT
|   Server: Apache/2.4.25 (Debian)
|   Last-Modified: Fri, 05 Mar 2021 00:02:02 GMT
|   ETag: "745-5bcbecb2cd341"
|   Accept-Ranges: bytes
|   Content-Length: 1861
|   Vary: Accept-Encoding
|   Connection: close
|   Content-Type: text/html
|   
|_  (Request type: HEAD)
|_http-server-header: Apache/2.4.25 (Debian)
110/tcp  open  pop3       Dovecot pop3d
143/tcp  open  imap       Dovecot imapd
443/tcp  open  ssl/http   Apache httpd 2.4.25 ((Debian))
| http-headers: 
|   Date: Mon, 04 Apr 2022 07:33:44 GMT
|   Server: Apache/2.4.25 (Debian)
|   Last-Modified: Fri, 05 Mar 2021 00:02:02 GMT
|   ETag: "745-5bcbecb2cd341"
|   Accept-Ranges: bytes
|   Content-Length: 1861
|   Vary: Accept-Encoding
|   Connection: close
|   Content-Type: text/html
|   
|_  (Request type: HEAD)
|_http-server-header: Apache/2.4.25 (Debian)
465/tcp  open  ssl/smtp   Postfix smtpd
587/tcp  open  smtp       Postfix smtpd
993/tcp  open  ssl/imaps?
995/tcp  open  ssl/pop3s?
5225/tcp open  smtp       Postfix smtpd
Service Info: Host: 00.ciproc.de

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 188.04 seconds
------- START: 109.233.144.67
Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 09:39 CEST
Nmap scan report for mail01.add2web.de (109.233.144.67)
Host is up (0.0012s latency).
Not shown: 988 filtered ports
PORT     STATE  SERVICE    VERSION
20/tcp   closed ftp-data
21/tcp   open   ftp        Pure-FTPd
25/tcp   open   smtp       Postfix smtpd
80/tcp   open   http       Apache httpd 2.4.25
| http-headers: 
|   Date: Mon, 04 Apr 2022 07:40:24 GMT
|   Server: Apache/2.4.25
|   Last-Modified: Wed, 23 Mar 2016 13:53:12 GMT
|   ETag: "0-52eb7a6918200"
|   Accept-Ranges: bytes
|   Connection: close
|   Content-Type: text/html
|   
|_  (Request type: HEAD)
|_http-server-header: Apache/2.4.25
110/tcp  open   pop3       Dovecot pop3d
143/tcp  open   imap       Dovecot imapd
443/tcp  open   ssl/http   Apache httpd 2.4.25 (PHP/5.6.33-0+deb8u1)
| http-headers: 
|   Date: Mon, 04 Apr 2022 07:40:26 GMT
|   Server: Apache/2.4.25
|   X-Powered-By: PHP/5.6.33-0+deb8u1
|   Vary: Accept-Encoding,Cookie
|   X-Redirect-By: WordPress
|   Location: https://ahornapotheke-ma.de/
|   Content-Length: 0
|   Connection: close
|   Content-Type: text/html; charset=UTF-8
|   
|_  (Request type: GET)
|_http-server-header: Apache/2.4.25
465/tcp  open   ssl/smtp   Postfix smtpd
587/tcp  open   smtp       Postfix smtpd
993/tcp  open   ssl/imaps?
995/tcp  open   ssl/pop3s?
5225/tcp open   smtp       Postfix smtpd
Service Info: Host:  mail01.add2web.de

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 45.59 seconds
------- START: 109.233.144.80
Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 09:41 CEST
Nmap scan report for 109.233.144.80
Host is up (0.0012s latency).
Not shown: 998 filtered ports
PORT    STATE SERVICE   VERSION
80/tcp  open  http
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, RPCCheck, X11Probe: 
|     HTTP/1.1 400 Bad request
|     content-length: 90
|     cache-control: no-cache
|     content-type: text/html
|     connection: close
|     <html><body><h1>400 Bad request</h1>
|     Your browser sent an invalid request.
|     </body></html>
|   FourOhFourRequest: 
|     HTTP/1.1 302 Found
|     content-length: 0
|     location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
|     cache-control: no-cache
|     connection: close
|   GetRequest, HTTPOptions, RTSPRequest: 
|     HTTP/1.1 302 Found
|     content-length: 0
|     location: https:///
|     cache-control: no-cache
|_    connection: close
| http-headers: 
|   content-length: 0
|   location: https://109.233.144.80/
|   cache-control: no-cache
|   connection: close
|   
|_  (Request type: GET)
443/tcp open  ssl/https
| fingerprint-strings: 
|   DNSVersionBindReqTCP, RPCCheck, tor-versions: 
|     HTTP/1.1 400 Bad request
|     content-length: 90
|     cache-control: no-cache
|     content-type: text/html
|     connection: close
|     <html><body><h1>400 Bad request</h1>
|     Your browser sent an invalid request.
|     </body></html>
|   FourOhFourRequest, GetRequest, HTTPOptions, RTSPRequest: 
|     HTTP/1.1 503 Service Unavailable
|     content-length: 107
|     cache-control: no-cache
|     content-type: text/html
|     connection: close
|     <html><body><h1>503 Service Unavailable</h1>
|     server is available to handle this request.
|_    </body></html>
| http-headers: 
|   content-length: 107
|   cache-control: no-cache
|   content-type: text/html
|   connection: close
|   
|_  (Request type: GET)
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=4/4%Time=624AA15B%P=x86_64-pc-linux-gnu%r(GetRe
SF:quest,6A,"HTTP/1\.1\x20302\x20Found
content-length:\x200
location
SF::\x20https:///
cache-control:\x20no-cache
connection:\x20close
\
SF:n
")%r(HTTPOptions,6A,"HTTP/1\.1\x20302\x20Found
content-length:\
SF:x200
location:\x20https:///
cache-control:\x20no-cache
connect
SF:ion:\x20close

")%r(RTSPRequest,6A,"HTTP/1\.1\x20302\x20Found

SF:content-length:\x200
location:\x20https:///
cache-control:\x20no-
SF:cache
connection:\x20close

")%r(X11Probe,CF,"HTTP/1\.1\x20400
SF:\x20Bad\x20request
content-length:\x2090
cache-control:\x20no-cac
SF:he
content-type:\x20text/html
connection:\x20close

<html><
SF:body><h1>400\x20Bad\x20request</h1>
Your\x20browser\x20sent\x20an\x20i
SF:nvalid\x20request\.
</body></html>
")%r(FourOhFourRequest,8D,"HTTP/1\
SF:.1\x20302\x20Found
content-length:\x200
location:\x20https:///nic
SF:e%20ports%2C/Tri%6Eity\.txt%2ebak
cache-control:\x20no-cache
conn
SF:ection:\x20close

")%r(RPCCheck,CF,"HTTP/1\.1\x20400\x20Bad\x20re
SF:quest
content-length:\x2090
cache-control:\x20no-cache
content
SF:-type:\x20text/html
connection:\x20close

<html><body><h1>400\
SF:x20Bad\x20request</h1>
Your\x20browser\x20sent\x20an\x20invalid\x20req
SF:uest\.
</body></html>
")%r(DNSVersionBindReqTCP,CF,"HTTP/1\.1\x20400\
SF:x20Bad\x20request
content-length:\x2090
cache-control:\x20no-cach
SF:e
content-type:\x20text/html
connection:\x20close

<html><b
SF:ody><h1>400\x20Bad\x20request</h1>
Your\x20browser\x20sent\x20an\x20in
SF:valid\x20request\.
</body></html>
")%r(DNSStatusRequestTCP,CF,"HTTP/1
SF:\.1\x20400\x20Bad\x20request
content-length:\x2090
cache-control:
SF:\x20no-cache
content-type:\x20text/html
connection:\x20close
\
SF:r
<html><body><h1>400\x20Bad\x20request</h1>
Your\x20browser\x20sent\
SF:x20an\x20invalid\x20request\.
</body></html>
")%r(Help,CF,"HTTP/1\.1\
SF:x20400\x20Bad\x20request
content-length:\x2090
cache-control:\x20
SF:no-cache
content-type:\x20text/html
connection:\x20close

<
SF:html><body><h1>400\x20Bad\x20request</h1>
Your\x20browser\x20sent\x20a
SF:n\x20invalid\x20request\.
</body></html>
");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=4/4%Time=624AA161%P=x86_64-pc-linux-gnu%
SF:r(GetRequest,E9,"HTTP/1\.1\x20503\x20Service\x20Unavailable
content-
SF:length:\x20107
cache-control:\x20no-cache
content-type:\x20text/h
SF:tml
connection:\x20close

<html><body><h1>503\x20Service\x20Un
SF:available</h1>
No\x20server\x20is\x20available\x20to\x20handle\x20this
SF:\x20request\.
</body></html>
")%r(HTTPOptions,E9,"HTTP/1\.1\x20503\x2
SF:0Service\x20Unavailable
content-length:\x20107
cache-control:\x20
SF:no-cache
content-type:\x20text/html
connection:\x20close

<
SF:html><body><h1>503\x20Service\x20Unavailable</h1>
No\x20server\x20is\x
SF:20available\x20to\x20handle\x20this\x20request\.
</body></html>
")%r(
SF:FourOhFourRequest,E9,"HTTP/1\.1\x20503\x20Service\x20Unavailable
con
SF:tent-length:\x20107
cache-control:\x20no-cache
content-type:\x20t
SF:ext/html
connection:\x20close

<html><body><h1>503\x20Service\
SF:x20Unavailable</h1>
No\x20server\x20is\x20available\x20to\x20handle\x2
SF:0this\x20request\.
</body></html>
")%r(tor-versions,CF,"HTTP/1\.1\x20
SF:400\x20Bad\x20request
content-length:\x2090
cache-control:\x20no-
SF:cache
content-type:\x20text/html
connection:\x20close

<htm
SF:l><body><h1>400\x20Bad\x20request</h1>
Your\x20browser\x20sent\x20an\x
SF:20invalid\x20request\.
</body></html>
")%r(RTSPRequest,E9,"HTTP/1\.1\
SF:x20503\x20Service\x20Unavailable
content-length:\x20107
cache-con
SF:trol:\x20no-cache
content-type:\x20text/html
connection:\x20close
SF:

<html><body><h1>503\x20Service\x20Unavailable</h1>
No\x20serve
SF:r\x20is\x20available\x20to\x20handle\x20this\x20request\.
</body></htm
SF:l>
")%r(RPCCheck,CF,"HTTP/1\.1\x20400\x20Bad\x20request
content-len
SF:gth:\x2090
cache-control:\x20no-cache
content-type:\x20text/html\
SF:r
connection:\x20close

<html><body><h1>400\x20Bad\x20request</h
SF:1>
Your\x20browser\x20sent\x20an\x20invalid\x20request\.
</body></htm
SF:l>
")%r(DNSVersionBindReqTCP,CF,"HTTP/1\.1\x20400\x20Bad\x20request
\
SF:ncontent-length:\x2090
cache-control:\x20no-cache
content-type:\x
SF:20text/html
connection:\x20close

<html><body><h1>400\x20Bad\x
SF:20request</h1>
Your\x20browser\x20sent\x20an\x20invalid\x20request\.

SF:</body></html>
");

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 39.16 seconds
------- START: 109.233.144.83
Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 09:42 CEST
Nmap scan report for 109.233.144.83
Host is up (0.0011s latency).
Not shown: 998 filtered ports
PORT    STATE SERVICE   VERSION
80/tcp  open  http
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, RPCCheck, X11Probe: 
|     HTTP/1.1 400 Bad request
|     content-length: 90
|     cache-control: no-cache
|     content-type: text/html
|     connection: close
|     <html><body><h1>400 Bad request</h1>
|     Your browser sent an invalid request.
|     </body></html>
|   FourOhFourRequest: 
|     HTTP/1.1 302 Found
|     content-length: 0
|     location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak
|     cache-control: no-cache
|     connection: close
|   GetRequest, HTTPOptions, RTSPRequest: 
|     HTTP/1.1 302 Found
|     content-length: 0
|     location: https:///
|     cache-control: no-cache
|_    connection: close
| http-headers: 
|   content-length: 0
|   location: https://109.233.144.83/
|   cache-control: no-cache
|   connection: close
|   
|_  (Request type: GET)
443/tcp open  ssl/https
| fingerprint-strings: 
|   DNSVersionBindReqTCP, RPCCheck, tor-versions: 
|     HTTP/1.1 400 Bad request
|     content-length: 90
|     cache-control: no-cache
|     content-type: text/html
|     connection: close
|     <html><body><h1>400 Bad request</h1>
|     Your browser sent an invalid request.
|     </body></html>
|   FourOhFourRequest, GetRequest, HTTPOptions, RTSPRequest: 
|     HTTP/1.1 503 Service Unavailable
|     content-length: 107
|     cache-control: no-cache
|     content-type: text/html
|     connection: close
|     <html><body><h1>503 Service Unavailable</h1>
|     server is available to handle this request.
|_    </body></html>
| http-headers: 
|   content-length: 107
|   cache-control: no-cache
|   content-type: text/html
|   connection: close
|   
|_  (Request type: GET)
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=4/4%Time=624AA184%P=x86_64-pc-linux-gnu%r(GetRe
SF:quest,6A,"HTTP/1\.1\x20302\x20Found
content-length:\x200
location
SF::\x20https:///
cache-control:\x20no-cache
connection:\x20close
\
SF:n
")%r(HTTPOptions,6A,"HTTP/1\.1\x20302\x20Found
content-length:\
SF:x200
location:\x20https:///
cache-control:\x20no-cache
connect
SF:ion:\x20close

")%r(RTSPRequest,6A,"HTTP/1\.1\x20302\x20Found

SF:content-length:\x200
location:\x20https:///
cache-control:\x20no-
SF:cache
connection:\x20close

")%r(X11Probe,CF,"HTTP/1\.1\x20400
SF:\x20Bad\x20request
content-length:\x2090
cache-control:\x20no-cac
SF:he
content-type:\x20text/html
connection:\x20close

<html><
SF:body><h1>400\x20Bad\x20request</h1>
Your\x20browser\x20sent\x20an\x20i
SF:nvalid\x20request\.
</body></html>
")%r(FourOhFourRequest,8D,"HTTP/1\
SF:.1\x20302\x20Found
content-length:\x200
location:\x20https:///nic
SF:e%20ports%2C/Tri%6Eity\.txt%2ebak
cache-control:\x20no-cache
conn
SF:ection:\x20close

")%r(RPCCheck,CF,"HTTP/1\.1\x20400\x20Bad\x20re
SF:quest
content-length:\x2090
cache-control:\x20no-cache
content
SF:-type:\x20text/html
connection:\x20close

<html><body><h1>400\
SF:x20Bad\x20request</h1>
Your\x20browser\x20sent\x20an\x20invalid\x20req
SF:uest\.
</body></html>
")%r(DNSVersionBindReqTCP,CF,"HTTP/1\.1\x20400\
SF:x20Bad\x20request
content-length:\x2090
cache-control:\x20no-cach
SF:e
content-type:\x20text/html
connection:\x20close

<html><b
SF:ody><h1>400\x20Bad\x20request</h1>
Your\x20browser\x20sent\x20an\x20in
SF:valid\x20request\.
</body></html>
")%r(DNSStatusRequestTCP,CF,"HTTP/1
SF:\.1\x20400\x20Bad\x20request
content-length:\x2090
cache-control:
SF:\x20no-cache
content-type:\x20text/html
connection:\x20close
\
SF:r
<html><body><h1>400\x20Bad\x20request</h1>
Your\x20browser\x20sent\
SF:x20an\x20invalid\x20request\.
</body></html>
")%r(Help,CF,"HTTP/1\.1\
SF:x20400\x20Bad\x20request
content-length:\x2090
cache-control:\x20
SF:no-cache
content-type:\x20text/html
connection:\x20close

<
SF:html><body><h1>400\x20Bad\x20request</h1>
Your\x20browser\x20sent\x20a
SF:n\x20invalid\x20request\.
</body></html>
");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=4/4%Time=624AA18A%P=x86_64-pc-linux-gnu%
SF:r(GetRequest,E9,"HTTP/1\.1\x20503\x20Service\x20Unavailable
content-
SF:length:\x20107
cache-control:\x20no-cache
content-type:\x20text/h
SF:tml
connection:\x20close

<html><body><h1>503\x20Service\x20Un
SF:available</h1>
No\x20server\x20is\x20available\x20to\x20handle\x20this
SF:\x20request\.
</body></html>
")%r(HTTPOptions,E9,"HTTP/1\.1\x20503\x2
SF:0Service\x20Unavailable
content-length:\x20107
cache-control:\x20
SF:no-cache
content-type:\x20text/html
connection:\x20close

<
SF:html><body><h1>503\x20Service\x20Unavailable</h1>
No\x20server\x20is\x
SF:20available\x20to\x20handle\x20this\x20request\.
</body></html>
")%r(
SF:FourOhFourRequest,E9,"HTTP/1\.1\x20503\x20Service\x20Unavailable
con
SF:tent-length:\x20107
cache-control:\x20no-cache
content-type:\x20t
SF:ext/html
connection:\x20close

<html><body><h1>503\x20Service\
SF:x20Unavailable</h1>
No\x20server\x20is\x20available\x20to\x20handle\x2
SF:0this\x20request\.
</body></html>
")%r(tor-versions,CF,"HTTP/1\.1\x20
SF:400\x20Bad\x20request
content-length:\x2090
cache-control:\x20no-
SF:cache
content-type:\x20text/html
connection:\x20close

<htm
SF:l><body><h1>400\x20Bad\x20request</h1>
Your\x20browser\x20sent\x20an\x
SF:20invalid\x20request\.
</body></html>
")%r(RTSPRequest,E9,"HTTP/1\.1\
SF:x20503\x20Service\x20Unavailable
content-length:\x20107
cache-con
SF:trol:\x20no-cache
content-type:\x20text/html
connection:\x20close
SF:

<html><body><h1>503\x20Service\x20Unavailable</h1>
No\x20serve
SF:r\x20is\x20available\x20to\x20handle\x20this\x20request\.
</body></htm
SF:l>
")%r(RPCCheck,CF,"HTTP/1\.1\x20400\x20Bad\x20request
content-len
SF:gth:\x2090
cache-control:\x20no-cache
content-type:\x20text/html\
SF:r
connection:\x20close

<html><body><h1>400\x20Bad\x20request</h
SF:1>
Your\x20browser\x20sent\x20an\x20invalid\x20request\.
</body></htm
SF:l>
")%r(DNSVersionBindReqTCP,CF,"HTTP/1\.1\x20400\x20Bad\x20request
\
SF:ncontent-length:\x2090
cache-control:\x20no-cache
content-type:\x
SF:20text/html
connection:\x20close

<html><body><h1>400\x20Bad\x
SF:20request</h1>
Your\x20browser\x20sent\x20an\x20invalid\x20request\.

SF:</body></html>
");

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 36.69 seconds
------- START: 109.233.144.86
Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 09:43 CEST
Nmap scan report for 109.233.144.86
Host is up (0.0012s latency).
Not shown: 998 filtered ports
PORT    STATE SERVICE   VERSION
80/tcp  open  http      Apache/2.2.22 (Debian)
| fingerprint-strings: 
|   GetRequest: 
|     HTTP/1.1 200 OK
|     date: Mon, 04 Apr 2022 07:43:41 GMT
|     server: Apache/2.2.22 (Debian)
|     x-powered-by: PHP/5.4.45-0+deb7u7
|     set-cookie: vulnlib=e129f4m5g1bl67kg31a3ct7ij7; path=/
|     expires: Thu, 19 Nov 1981 08:52:00 GMT
|     cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
|     pragma: no-cache
|     vary: Accept-Encoding
|     content-type: text/html
|     connection: close
|     <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
|     "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|     <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
|     <head>
|     <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
|     <title>
|     VulnLIB - Eine umfassende Bibliothek f
|     IT-Schwachstellen und L
|     sungen</title>
|     <link rel="stylesheet" type="text/css" href="app/skins/base_skin/master.css" />
|     <link rel="stylesheet" type="text/css" href="app/skins/base_skin/s
|   HTTPOptions: 
|     HTTP/1.1 200 OK
|     date: Mon, 04 Apr 2022 07:43:41 GMT
|     server: Apache/2.2.22 (Debian)
|     x-powered-by: PHP/5.4.45-0+deb7u4
|     set-cookie: vulnlib=nsbdbuqkdp9fjpdrbjsvrp53p0; path=/
|     expires: Thu, 19 Nov 1981 08:52:00 GMT
|     cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
|     pragma: no-cache
|     vary: Accept-Encoding
|     content-type: text/html
|     connection: close
|     <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
|     "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|     <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
|     <head>
|     <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
|     <title>
|     VulnLIB - Eine umfassende Bibliothek f
|     IT-Schwachstellen und L
|     sungen</title>
|     <link rel="stylesheet" type="text/css" href="app/skins/base_skin/master.css" />
|_    <link rel="stylesheet" type="text/css" href="app/skins/base_skin/s
| http-headers: 
|   date: Mon, 04 Apr 2022 07:43:53 GMT
|   server: Apache/2.2.22 (Debian)
|   x-powered-by: PHP/5.4.45-0+deb7u7
|   set-cookie: vulnlib=a4945acgjmkvb6eodk8c3d2j20; path=/
|   expires: Thu, 19 Nov 1981 08:52:00 GMT
|   cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
|   pragma: no-cache
|   vary: Accept-Encoding
|   content-type: text/html
|   connection: close
|   
|_  (Request type: HEAD)
|_http-server-header: Apache/2.2.22 (Debian)
443/tcp open  ssl/https Apache/2.2.22 (Debian)
| fingerprint-strings: 
|   GetRequest: 
|     HTTP/1.1 200 OK
|     date: Mon, 04 Apr 2022 07:43:47 GMT
|     server: Apache/2.2.22 (Debian)
|     x-powered-by: PHP/5.4.45-0+deb7u7
|     set-cookie: vulnlib=j8tknt7mna04h3s85qfbmvq4j7; path=/
|     expires: Thu, 19 Nov 1981 08:52:00 GMT
|     cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
|     pragma: no-cache
|     vary: Accept-Encoding
|     content-type: text/html
|     connection: close
|     <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
|     "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|     <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
|     <head>
|     <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
|     <title>
|     VulnLIB - Eine umfassende Bibliothek f
|     IT-Schwachstellen und L
|     sungen</title>
|     <link rel="stylesheet" type="text/css" href="app/skins/base_skin/master.css" />
|     <link rel="stylesheet" type="text/css" href="app/skins/base_skin/s
|   HTTPOptions: 
|     HTTP/1.1 200 OK
|     date: Mon, 04 Apr 2022 07:43:48 GMT
|     server: Apache/2.2.22 (Debian)
|     x-powered-by: PHP/5.4.45-0+deb7u4
|     set-cookie: vulnlib=uju15v3ajq9dnjqbc08h7g9lh3; path=/
|     expires: Thu, 19 Nov 1981 08:52:00 GMT
|     cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
|     pragma: no-cache
|     vary: Accept-Encoding
|     content-type: text/html
|     connection: close
|     <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
|     "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|     <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
|     <head>
|     <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
|     <title>
|     VulnLIB - Eine umfassende Bibliothek f
|     IT-Schwachstellen und L
|     sungen</title>
|     <link rel="stylesheet" type="text/css" href="app/skins/base_skin/master.css" />
|_    <link rel="stylesheet" type="text/css" href="app/skins/base_skin/s
| http-headers: 
|   date: Mon, 04 Apr 2022 07:43:53 GMT
|   server: Apache/2.2.22 (Debian)
|   x-powered-by: PHP/5.4.45-0+deb7u4
|   set-cookie: vulnlib=kkmi3hmcvgb1m6thhnh09gibk2; path=/
|   expires: Thu, 19 Nov 1981 08:52:00 GMT
|   cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
|   pragma: no-cache
|   vary: Accept-Encoding
|   content-type: text/html
|   connection: close
|   
|_  (Request type: HEAD)
|_http-server-header: Apache/2.2.22 (Debian)
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port80-TCP:V=7.70%I=7%D=4/4%Time=624AA1AE%P=x86_64-pc-linux-gnu%r(GetRe
SF:quest,24C2,"HTTP/1\.1\x20200\x20OK
date:\x20Mon,\x2004\x20Apr\x20202
SF:2\x2007:43:41\x20GMT
server:\x20Apache/2\.2\.22\x20\(Debian\)
x-p
SF:owered-by:\x20PHP/5\.4\.45-0\+deb7u7
set-cookie:\x20vulnlib=e129f4m5
SF:g1bl67kg31a3ct7ij7;\x20path=/
expires:\x20Thu,\x2019\x20Nov\x201981\
SF:x2008:52:00\x20GMT
cache-control:\x20no-store,\x20no-cache,\x20must-
SF:revalidate,\x20post-check=0,\x20pre-check=0
pragma:\x20no-cache
v
SF:ary:\x20Accept-Encoding
content-type:\x20text/html
connection:\x2
SF:0close

<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20XHTML\x20
SF:1\.0\x20Transitional//EN\"
	\"http://www\.w3\.org/TR/xhtml1/DTD/xhtml
SF:1-transitional\.dtd\">
<html\x20xmlns=\"http://www\.w3\.org/1999/xhtml
SF:\"\x20xml:lang=\"en\"\x20lang=\"en\">
<head>
\x20\x20<meta\x20http-eq
SF:uiv=\"Content-Type\"\x20content=\"text/html;\x20charset=UTF-8\"\x20/>

SF:\x20\x20<title>
\x20\x20VulnLIB\x20-\x20Eine\x20umfassende\x20Biblioth
SF:ek\x20f\xc3\xbcr\x20IT-Schwachstellen\x20und\x20L\xc3\xb6sungen</title>
SF:
\x20\x20
\x20\x20<link\x20rel=\"stylesheet\"\x20type=\"text/css\"\x2
SF:0href=\"app/skins/base_skin/master\.css\"\x20/>
\x20\x20<link\x20rel=\
SF:"stylesheet\"\x20type=\"text/css\"\x20href=\"app/skins/base_skin/s")%r(
SF:HTTPOptions,24C2,"HTTP/1\.1\x20200\x20OK
date:\x20Mon,\x2004\x20Apr\
SF:x202022\x2007:43:41\x20GMT
server:\x20Apache/2\.2\.22\x20\(Debian\)\
SF:r
x-powered-by:\x20PHP/5\.4\.45-0\+deb7u4
set-cookie:\x20vulnlib=ns
SF:bdbuqkdp9fjpdrbjsvrp53p0;\x20path=/
expires:\x20Thu,\x2019\x20Nov\x2
SF:01981\x2008:52:00\x20GMT
cache-control:\x20no-store,\x20no-cache,\x2
SF:0must-revalidate,\x20post-check=0,\x20pre-check=0
pragma:\x20no-cach
SF:e
vary:\x20Accept-Encoding
content-type:\x20text/html
connecti
SF:on:\x20close

<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20XHT
SF:ML\x201\.0\x20Transitional//EN\"
	\"http://www\.w3\.org/TR/xhtml1/DTD
SF:/xhtml1-transitional\.dtd\">
<html\x20xmlns=\"http://www\.w3\.org/1999
SF:/xhtml\"\x20xml:lang=\"en\"\x20lang=\"en\">
<head>
\x20\x20<meta\x20h
SF:ttp-equiv=\"Content-Type\"\x20content=\"text/html;\x20charset=UTF-8\"\x
SF:20/>
\x20\x20<title>
\x20\x20VulnLIB\x20-\x20Eine\x20umfassende\x20Bi
SF:bliothek\x20f\xc3\xbcr\x20IT-Schwachstellen\x20und\x20L\xc3\xb6sungen</
SF:title>
\x20\x20
\x20\x20<link\x20rel=\"stylesheet\"\x20type=\"text/cs
SF:s\"\x20href=\"app/skins/base_skin/master\.css\"\x20/>
\x20\x20<link\x2
SF:0rel=\"stylesheet\"\x20type=\"text/css\"\x20href=\"app/skins/base_skin/
SF:s");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port443-TCP:V=7.70%T=SSL%I=7%D=4/4%Time=624AA1B4%P=x86_64-pc-linux-gnu%
SF:r(GetRequest,24C2,"HTTP/1\.1\x20200\x20OK
date:\x20Mon,\x2004\x20Apr
SF:\x202022\x2007:43:47\x20GMT
server:\x20Apache/2\.2\.22\x20\(Debian\)
SF:
x-powered-by:\x20PHP/5\.4\.45-0\+deb7u7
set-cookie:\x20vulnlib=j
SF:8tknt7mna04h3s85qfbmvq4j7;\x20path=/
expires:\x20Thu,\x2019\x20Nov\x
SF:201981\x2008:52:00\x20GMT
cache-control:\x20no-store,\x20no-cache,\x
SF:20must-revalidate,\x20post-check=0,\x20pre-check=0
pragma:\x20no-cac
SF:he
vary:\x20Accept-Encoding
content-type:\x20text/html
connect
SF:ion:\x20close

<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20XH
SF:TML\x201\.0\x20Transitional//EN\"
	\"http://www\.w3\.org/TR/xhtml1/DT
SF:D/xhtml1-transitional\.dtd\">
<html\x20xmlns=\"http://www\.w3\.org/199
SF:9/xhtml\"\x20xml:lang=\"en\"\x20lang=\"en\">
<head>
\x20\x20<meta\x20
SF:http-equiv=\"Content-Type\"\x20content=\"text/html;\x20charset=UTF-8\"\
SF:x20/>
\x20\x20<title>
\x20\x20VulnLIB\x20-\x20Eine\x20umfassende\x20B
SF:ibliothek\x20f\xc3\xbcr\x20IT-Schwachstellen\x20und\x20L\xc3\xb6sungen<
SF:/title>
\x20\x20
\x20\x20<link\x20rel=\"stylesheet\"\x20type=\"text/c
SF:ss\"\x20href=\"app/skins/base_skin/master\.css\"\x20/>
\x20\x20<link\x
SF:20rel=\"stylesheet\"\x20type=\"text/css\"\x20href=\"app/skins/base_skin
SF:/s")%r(HTTPOptions,24C2,"HTTP/1\.1\x20200\x20OK
date:\x20Mon,\x2004\
SF:x20Apr\x202022\x2007:43:48\x20GMT
server:\x20Apache/2\.2\.22\x20\(De
SF:bian\)
x-powered-by:\x20PHP/5\.4\.45-0\+deb7u4
set-cookie:\x20vul
SF:nlib=uju15v3ajq9dnjqbc08h7g9lh3;\x20path=/
expires:\x20Thu,\x2019\x2
SF:0Nov\x201981\x2008:52:00\x20GMT
cache-control:\x20no-store,\x20no-ca
SF:che,\x20must-revalidate,\x20post-check=0,\x20pre-check=0
pragma:\x20
SF:no-cache
vary:\x20Accept-Encoding
content-type:\x20text/html
c
SF:onnection:\x20close

<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD
SF:\x20XHTML\x201\.0\x20Transitional//EN\"
	\"http://www\.w3\.org/TR/xht
SF:ml1/DTD/xhtml1-transitional\.dtd\">
<html\x20xmlns=\"http://www\.w3\.o
SF:rg/1999/xhtml\"\x20xml:lang=\"en\"\x20lang=\"en\">
<head>
\x20\x20<me
SF:ta\x20http-equiv=\"Content-Type\"\x20content=\"text/html;\x20charset=UT
SF:F-8\"\x20/>
\x20\x20<title>
\x20\x20VulnLIB\x20-\x20Eine\x20umfassend
SF:e\x20Bibliothek\x20f\xc3\xbcr\x20IT-Schwachstellen\x20und\x20L\xc3\xb6s
SF:ungen</title>
\x20\x20
\x20\x20<link\x20rel=\"stylesheet\"\x20type=\"
SF:text/css\"\x20href=\"app/skins/base_skin/master\.css\"\x20/>
\x20\x20<
SF:link\x20rel=\"stylesheet\"\x20type=\"text/css\"\x20href=\"app/skins/bas
SF:e_skin/s");

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 38.16 seconds
------- START: mail01.add2web.de
Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 09:39 CEST
Nmap scan report for mail01.add2web.de (109.233.144.67)
Host is up (0.0012s latency).
Not shown: 988 filtered ports
PORT     STATE  SERVICE    VERSION
20/tcp   closed ftp-data
21/tcp   open   ftp        Pure-FTPd
25/tcp   open   smtp       Postfix smtpd
80/tcp   open   http       Apache httpd 2.4.25
| http-headers: 
|   Date: Mon, 04 Apr 2022 07:40:20 GMT
|   Server: Apache/2.4.25
|   Last-Modified: Wed, 23 Mar 2016 13:53:12 GMT
|   ETag: "0-52eb7a6918200"
|   Accept-Ranges: bytes
|   Connection: close
|   Content-Type: text/html
|   
|_  (Request type: HEAD)
|_http-server-header: Apache/2.4.25
110/tcp  open   pop3       Dovecot pop3d
143/tcp  open   imap       Dovecot imapd
443/tcp  open   ssl/http   Apache httpd 2.4.25
| http-headers: 
|   Date: Mon, 04 Apr 2022 07:40:23 GMT
|   Server: Apache/2.4.25
|   X-Powered-By: PHP/5.6.33-0+deb8u1
|   Vary: Accept-Encoding,Cookie
|   X-Redirect-By: WordPress
|   Location: https://ahornapotheke-ma.de/
|   Content-Length: 0
|   Connection: close
|   Content-Type: text/html; charset=UTF-8
|   
|_  (Request type: GET)
|_http-server-header: Apache/2.4.25
465/tcp  open   ssl/smtp   Postfix smtpd
587/tcp  open   smtp       Postfix smtpd
993/tcp  open   ssl/imaps?
995/tcp  open   ssl/pop3s?
5225/tcp open   smtp       Postfix smtpd
Service Info: Host:  mail01.add2web.de

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 42.78 seconds
------- START: mail01.ciproc.de
Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 09:30 CEST
Nmap scan report for mail01.ciproc.de (172.21.11.11)
Host is up (0.00066s latency).
Not shown: 824 filtered ports, 173 closed ports
PORT    STATE SERVICE VERSION
21/tcp  open  ftp     Pure-FTPd
25/tcp  open  smtp    Postfix smtpd
110/tcp open  pop3    Dovecot pop3d
MAC Address: 00:16:C1:A1:A0:01 (Eleksen)

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 247.99 seconds
------- START: 109.233.144.66_ssl
Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 07:51 CEST
Nmap scan report for mail01.ciproc.de (109.233.144.66)
Host is up (0.0013s latency).
Not shown: 1023 filtered ports
PORT    STATE  SERVICE
20/tcp  closed ftp-data
21/tcp  open   ftp
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|     warnings: 
|       Weak certificate signature: SHA1
|   TLSv1.1: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|     warnings: 
|       Weak certificate signature: SHA1
|   TLSv1.2: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|     warnings: 
|       Weak certificate signature: SHA1
|_  least strength: A
25/tcp  open   smtp
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|_  least strength: A
80/tcp  open   http
110/tcp open   pop3
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|_  least strength: A
143/tcp open   imap
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|_  least strength: A
443/tcp open   https
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|   TLSv1.1: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|   TLSv1.2: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|_  least strength: A
465/tcp open   smtps
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|_  least strength: A
587/tcp open   submission
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|_  least strength: A
993/tcp open   imaps
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|_  least strength: A
995/tcp open   pop3s
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|_  least strength: A

Nmap done: 1 IP address (1 host up) scanned in 32.37 seconds
------- START: 109.233.144.67_ssl
Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 08:00 CEST
Nmap scan report for mail01.add2web.de (109.233.144.67)
Host is up (0.0013s latency).
Not shown: 1023 filtered ports
PORT    STATE  SERVICE
20/tcp  closed ftp-data
21/tcp  open   ftp
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|     warnings: 
|       Weak certificate signature: SHA1
|   TLSv1.1: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|     warnings: 
|       Weak certificate signature: SHA1
|   TLSv1.2: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|     warnings: 
|       Weak certificate signature: SHA1
|_  least strength: A
25/tcp  open   smtp
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|_  least strength: A
80/tcp  open   http
110/tcp open   pop3
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|_  least strength: A
143/tcp open   imap
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|_  least strength: A
443/tcp open   https
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|   TLSv1.1: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|   TLSv1.2: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|_  least strength: A
465/tcp open   smtps
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|_  least strength: A
587/tcp open   submission
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|_  least strength: A
993/tcp open   imaps
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|_  least strength: A
995/tcp open   pop3s
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|_  least strength: A

Nmap done: 1 IP address (1 host up) scanned in 35.27 seconds
------- START: 109.233.144.80_ssl
Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 08:02 CEST
Nmap scan report for 109.233.144.80
Host is up (0.0013s latency).
Not shown: 1032 filtered ports
PORT    STATE SERVICE
80/tcp  open  http
443/tcp open  https
| ssl-enum-ciphers: 
|   TLSv1.2: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|_  least strength: A

Nmap done: 1 IP address (1 host up) scanned in 13.54 seconds
------- START: 109.233.144.83_ssl
Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 08:03 CEST
Nmap scan report for 109.233.144.83
Host is up (0.0013s latency).
Not shown: 1032 filtered ports
PORT    STATE SERVICE
80/tcp  open  http
443/tcp open  https
| ssl-enum-ciphers: 
|   TLSv1.2: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|_  least strength: A

Nmap done: 1 IP address (1 host up) scanned in 15.12 seconds
------- START: 109.233.144.86_ssl
Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 08:03 CEST
Nmap scan report for 109.233.144.86
Host is up (0.0013s latency).
Not shown: 1032 filtered ports
PORT    STATE SERVICE
80/tcp  open  http
443/tcp open  https
| ssl-enum-ciphers: 
|   TLSv1.2: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|_  least strength: A

Nmap done: 1 IP address (1 host up) scanned in 14.84 seconds
------- START: mail01.add2web.de_ssl
Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 08:00 CEST
Nmap scan report for mail01.add2web.de (109.233.144.67)
Host is up (0.0013s latency).
Not shown: 1023 filtered ports
PORT    STATE  SERVICE
20/tcp  closed ftp-data
21/tcp  open   ftp
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|     warnings: 
|       Weak certificate signature: SHA1
|   TLSv1.1: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|     warnings: 
|       Weak certificate signature: SHA1
|   TLSv1.2: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|     warnings: 
|       Weak certificate signature: SHA1
|_  least strength: A
25/tcp  open   smtp
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|_  least strength: A
80/tcp  open   http
110/tcp open   pop3
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|_  least strength: A
143/tcp open   imap
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|_  least strength: A
443/tcp open   https
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|   TLSv1.1: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|   TLSv1.2: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|_  least strength: A
465/tcp open   smtps
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|_  least strength: A
587/tcp open   submission
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|_  least strength: A
993/tcp open   imaps
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|_  least strength: A
995/tcp open   pop3s
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|_  least strength: A

Nmap done: 1 IP address (1 host up) scanned in 30.45 seconds
------- START: mail01.ciproc.de_ssl
Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 07:51 CEST
Nmap scan report for mail01.ciproc.de (109.233.144.66)
Host is up (0.0012s latency).
Not shown: 1023 filtered ports
PORT    STATE  SERVICE
20/tcp  closed ftp-data
21/tcp  open   ftp
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|     warnings: 
|       Weak certificate signature: SHA1
|   TLSv1.1: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|     warnings: 
|       Weak certificate signature: SHA1
|   TLSv1.2: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|     warnings: 
|       Weak certificate signature: SHA1
|_  least strength: A
25/tcp  open   smtp
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|_  least strength: A
80/tcp  open   http
110/tcp open   pop3
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|_  least strength: A
143/tcp open   imap
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|_  least strength: A
443/tcp open   https
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|   TLSv1.1: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|   TLSv1.2: 
|     ciphers: 
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: server
|_  least strength: A
465/tcp open   smtps
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|_  least strength: A
587/tcp open   submission
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|_  least strength: A
993/tcp open   imaps
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|_  least strength: A
995/tcp open   pop3s
| ssl-enum-ciphers: 
|   TLSv1.0: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.1: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|   TLSv1.2: 
|     ciphers: 
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
|       TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A
|       TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A
|     compressors: 
|       NULL
|     cipher preference: client
|     warnings: 
|       Key exchange (dh 1024) of lower strength than certificate key
|_  least strength: A

Nmap done: 1 IP address (1 host up) scanned in 23.58 seconds

Scan subtype:
Origin IP:
Details:
Command:
Version: (official web site)
Output:
unable to load certificate
140096431465856:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
140424623244672:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
140254868620672:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
140409987429760:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
140472452547968:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
140224113870208:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
140562270815616:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
139683323512192:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
140175975970176:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
139843384882560:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
------- START: 109.233.144.66:443
subject=CN = 00.ciproc.de
notBefore=Jan 14 02:06:25 2022 GMT
notAfter=Apr 14 02:06:24 2022 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
------- START: 109.233.144.66:465
subject=CN = mail01.ciproc.de
notBefore=Jan 30 12:49:21 2022 GMT
notAfter=Apr 30 12:49:20 2022 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
------- START: 109.233.144.66:993
subject=CN = mail01.ciproc.de
notBefore=Dec  1 06:54:35 2021 GMT
notAfter=Mar  1 06:54:34 2022 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
------- START: 109.233.144.66:995
subject=CN = mail01.ciproc.de
notBefore=Dec  1 06:54:35 2021 GMT
notAfter=Mar  1 06:54:34 2022 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
------- START: 109.233.144.67:443
subject=CN = ahornapotheke-ma.de
notBefore=Jan  3 02:01:18 2022 GMT
notAfter=Apr  3 02:01:17 2022 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
------- START: 109.233.144.67:465
subject=CN = mail01.add2web.de
notBefore=Jan 29 16:03:48 2022 GMT
notAfter=Apr 29 16:03:47 2022 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
------- START: 109.233.144.67:993
subject=CN = mail01.add2web.de
notBefore=Nov 30 13:31:29 2021 GMT
notAfter=Feb 28 13:31:28 2022 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
------- START: 109.233.144.67:995
subject=CN = mail01.add2web.de
notBefore=Nov 30 13:31:29 2021 GMT
notAfter=Feb 28 13:31:28 2022 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
------- START: 109.233.144.80:443
subject=C = DE, ST = Baden-W\C3\C2\BCrttemberg, L = Leingarten, O = Push Corporation, OU = IT, CN = abnehm-challenge-2017.de, emailAddress = webmaster@abnehm-challenge-2017.de
notBefore=Oct 23 15:57:01 2016 GMT
notAfter=Oct 21 15:57:01 2026 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
------- START: 109.233.144.83:443
subject=C = DE, ST = Baden-W\C3\C2\BCrttemberg, L = Leingarten, O = Push Corporation, OU = IT, CN = abnehm-challenge-2017.de, emailAddress = webmaster@abnehm-challenge-2017.de
notBefore=Oct 23 15:57:01 2016 GMT
notAfter=Oct 21 15:57:01 2026 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
------- START: 109.233.144.86:443
subject=C = DE, ST = Baden-W\C3\C2\BCrttemberg, L = Leingarten, O = Push Corporation, OU = IT, CN = abnehm-challenge-2017.de, emailAddress = webmaster@abnehm-challenge-2017.de
notBefore=Oct 23 15:57:01 2016 GMT
notAfter=Oct 21 15:57:01 2026 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
unable to load certificate
140134108157312:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
140164034307456:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
139621473469824:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
140011323794816:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
139828785882496:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
140401488729472:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
139939707667840:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
140028051215744:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
139964078327168:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
140019789034880:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
139956359808384:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
139947696715136:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
140187465807232:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
140518249780608:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
139702932227456:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
139835147654528:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
140061896353152:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
140338255959424:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
140379133822336:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
unable to load certificate
140457703781760:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE
------- START: 109.233.144.66:443
subject=CN = 00.ciproc.de
notBefore=Apr  4 02:03:27 2022 GMT
notAfter=Jul  3 02:03:26 2022 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
------- START: 109.233.144.66:465
subject=CN = mail01.ciproc.de
notBefore=Mar  1 09:15:08 2022 GMT
notAfter=May 30 09:15:07 2022 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
------- START: 109.233.144.66:993
subject=CN = mail01.ciproc.de
notBefore=Mar  1 09:15:08 2022 GMT
notAfter=May 30 09:15:07 2022 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
------- START: 109.233.144.66:995
subject=CN = mail01.ciproc.de
notBefore=Mar  1 09:15:08 2022 GMT
notAfter=May 30 09:15:07 2022 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
------- START: 109.233.144.67:443
subject=CN = ahornapotheke-ma.de
notBefore=Mar  4 02:07:51 2022 GMT
notAfter=Jun  2 02:07:50 2022 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
------- START: 109.233.144.67:465
subject=CN = mail01.add2web.de
notBefore=Mar 30 18:17:10 2022 GMT
notAfter=Jun 28 18:17:09 2022 GMT
-----BEGIN CERTIFICATE-----
MIIFKDCCBBCgAwIBAgISAz3ziDIEP42NxgR4K+tVUtBoMA0GCSqGSIb3DQEBCwUA
MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD
EwJSMzAeFw0yMjAzMzAxODE3MTBaFw0yMjA2MjgxODE3MDlaMBwxGjAYBgNVBAMT
EW1haWwwMS5hZGQyd2ViLmRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC
AQEAyHAJh99L/225DKMqzwZNXlY4u18jluGfZKXw/b/Q8hDkEs5Jtq7NgYGLX0dv
ofqM+GeCtDfJx3BHSHNf3WfsraZhjvl7qhO1PVe+0qnTh1yvxc/Zyb9ref8IcwDQ
8t0CEFW6aDOrG4vGoZDB/hMQ3owFEzlpNS2d8itu9L1c1XJ8TbTM6WAUMAIWh5h6
u4ble55HMzhI+RWnhiG573FlOCTJ/ySjeIuNMT6xW7MN57pfe/5UXra0uCmenKDy
AtI1QS9DSrffxija3P0CwgkoxSBWM82/9N8h6qZxsVyMeloNkGCFKO12ktCj0JAl
1ShG73ZMIfB4wdEDYMpQga51YQIDAQABo4ICTDCCAkgwDgYDVR0PAQH/BAQDAgWg
MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0G
A1UdDgQWBBS/LttdJ8mpbRSBzblssK2eT90YJjAfBgNVHSMEGDAWgBQULrMXt1hW
y65QCUDmH6+dixTCxjBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6
Ly9yMy5vLmxlbmNyLm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL3IzLmkubGVuY3Iu
b3JnLzAcBgNVHREEFTATghFtYWlsMDEuYWRkMndlYi5kZTBMBgNVHSAERTBDMAgG
BmeBDAECATA3BgsrBgEEAYLfEwEBATAoMCYGCCsGAQUFBwIBFhpodHRwOi8vY3Bz
LmxldHNlbmNyeXB0Lm9yZzCCAQQGCisGAQQB1nkCBAIEgfUEgfIA8AB1AEalVet1
+pEgMLWiiWn0830RLEF0vv1JuIWr8vxw/m1HAAABf9xCp58AAAQDAEYwRAIgel2r
G2j9NhXUtQTdKtJIa/q0pYrTfm9RSNCwXLNSuCgCIFMuLaGxbE1pnaMVF0+pQirf
s5iq+7DKNx2LZFYrT/XOAHcAQcjKsd8iRkoQxqE6CUKHXk4xixsD6+tLx2jwkGKW
BvYAAAF/3EKn2AAABAMASDBGAiEAvFkVgEd201KfqTojhpkx4Jg5SlR7RxGD/lmk
M4xfwToCIQCW7m0EEmLs/Y1FjZI+n6P0JQuJXlyJdE0GXG8mStXaRzANBgkqhkiG
9w0BAQsFAAOCAQEAdfGxr4pHizFjEyciZ7Mp7pKGaYdJifLS2f+JKrPnrdG6zNHl
1lybpWpaT6GMIt9QqvlSNbEbQZw/lFzoUBgDHAmUs2N9UwTUXNM9DZsKMsT1haib
9njqLmROmDoDxuaPWWajEcJJGtfPv0a0oSRoIsOEzWlmzFtvx4tDTBJkp3b7dXsh
zCqAOzpLBwwfgzLkwye3YEkevO8GTgLbEykZkQUraOCvEEymFoDXJfCStBtzh7T4
7ENhlYUnj4HlZ21A2DcKajZOqK855y7PuQOrnuq//XpgcX1Rhv3AzaYX2O6jHo7E
ePNcuy8UEK4IoCeF04eFk5AAFnLNqwgkKHGAcA==
-----END CERTIFICATE-----
------- START: 109.233.144.67:993
subject=CN = mail01.add2web.de
notBefore=Jan 29 16:03:48 2022 GMT
notAfter=Apr 29 16:03:47 2022 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
------- START: 109.233.144.67:995
subject=CN = mail01.add2web.de
notBefore=Jan 29 16:03:48 2022 GMT
notAfter=Apr 29 16:03:47 2022 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
------- START: 109.233.144.80:443
subject=C = DE, ST = Baden-W\C3\C2\BCrttemberg, L = Leingarten, O = Push Corporation, OU = IT, CN = abnehm-challenge-2017.de, emailAddress = webmaster@abnehm-challenge-2017.de
notBefore=Oct 23 15:57:01 2016 GMT
notAfter=Oct 21 15:57:01 2026 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
------- START: 109.233.144.83:443
subject=C = DE, ST = Baden-W\C3\C2\BCrttemberg, L = Leingarten, O = Push Corporation, OU = IT, CN = abnehm-challenge-2017.de, emailAddress = webmaster@abnehm-challenge-2017.de
notBefore=Oct 23 15:57:01 2016 GMT
notAfter=Oct 21 15:57:01 2026 GMT
-----BEGIN CERTIFICATE-----
MIID+DCCAuACCQDVGTWe3FMMozANBgkqhkiG9w0BAQsFADCBvTELMAkGA1UEBhMC
REUxGzAZBgNVBAgUEkJhZGVuLVfDvHJ0dGVtYmVyZzETMBEGA1UEBxMKTGVpbmdh
cnRlbjEZMBcGA1UEChMQUHVzaCBDb3Jwb3JhdGlvbjELMAkGA1UECxMCSVQxITAf
BgNVBAMTGGFibmVobS1jaGFsbGVuZ2UtMjAxNy5kZTExMC8GCSqGSIb3DQEJARYi
d2VibWFzdGVyQGFibmVobS1jaGFsbGVuZ2UtMjAxNy5kZTAeFw0xNjEwMjMxNTU3
MDFaFw0yNjEwMjExNTU3MDFaMIG9MQswCQYDVQQGEwJERTEbMBkGA1UECBQSQmFk
ZW4tV8O8cnR0ZW1iZXJnMRMwEQYDVQQHEwpMZWluZ2FydGVuMRkwFwYDVQQKExBQ
dXNoIENvcnBvcmF0aW9uMQswCQYDVQQLEwJJVDEhMB8GA1UEAxMYYWJuZWhtLWNo
YWxsZW5nZS0yMDE3LmRlMTEwLwYJKoZIhvcNAQkBFiJ3ZWJtYXN0ZXJAYWJuZWht
LWNoYWxsZW5nZS0yMDE3LmRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC
AQEA0lygrhHc9h8knsbmVUnJzp4kKBwC3kgDdPpjqKrr6g0xUwsjdhoofwEH2OaP
33SVTsZjXw7ov2KJQuqNpdYmIQaDi89w5EPJGXhhOg9VevAFBQmlnXNE0gNX1j4m
AXUEtHSCjN9WpfuPMuKdzDnvuMQVjV1WGcQ5MCVSCHmgpC1IhQPjvYgre0kHTOYs
pmJ+mBPghhc5DZJx9WIkhRBXjszzoe8nn0q1K8MO/DWHA3GlIdt8kLpXovRHGeU/
4rfITwrBfsIzeD7Yc4Qsf4iBNYoe+d7BkRGRsV5GsaNsC57IXk/JW/+34FxSV4lF
jxXJwDdg022GR5ia4+vEaD1vdwIDAQABMA0GCSqGSIb3DQEBCwUAA4IBAQBkLVfB
FM/AgGsmPCEooMzSGaHH2xD9zuRlxIyCAJedyCkeqsiVmy3X0d9JVgUVheaXfDrd
Y4oB6NvXLYjNfJdnag4HSI6khgQC9REsuDj+M7M50ZQG+W5NJIpt59ETjYJCNHOB
H3LzvI2O3/MKebKnknvlLtZfa54L47jHw3mkLvMq5fCtB7iapAGP5hMqBHjFQJ4l
jZ6H85pYCHrxH2TjFa5F70vAPQIMkir6sk/9K7nLtg4CookrYltgiRY0GWdcMyYh
ukRVaxNWcTkr1a0o3n61km0Kq/NU/ZZsui6Mj53cg92/acnLCeApsBgoKsvX8ttg
ZMZS00YFY6Kp9GOD
-----END CERTIFICATE-----
------- START: 109.233.144.86:443
subject=C = DE, ST = Baden-W\C3\C2\BCrttemberg, L = Leingarten, O = Push Corporation, OU = IT, CN = abnehm-challenge-2017.de, emailAddress = webmaster@abnehm-challenge-2017.de
notBefore=Oct 23 15:57:01 2016 GMT
notAfter=Oct 21 15:57:01 2026 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
------- START: mail01.add2web.de:443
subject=CN = ahornapotheke-ma.de
notBefore=Mar  4 02:07:51 2022 GMT
notAfter=Jun  2 02:07:50 2022 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
------- START: mail01.add2web.de:465
subject=CN = mail01.add2web.de
notBefore=Mar 30 18:17:10 2022 GMT
notAfter=Jun 28 18:17:09 2022 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
------- START: mail01.add2web.de:993
subject=CN = mail01.add2web.de
notBefore=Jan 29 16:03:48 2022 GMT
notAfter=Apr 29 16:03:47 2022 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
------- START: mail01.add2web.de:995
subject=CN = mail01.add2web.de
notBefore=Jan 29 16:03:48 2022 GMT
notAfter=Apr 29 16:03:47 2022 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
------- START: mail01.ciproc.de:443
subject=CN = mail01.ciproc.de
notBefore=Mar  1 09:15:08 2022 GMT
notAfter=May 30 09:15:07 2022 GMT
-----BEGIN CERTIFICATE-----
MIIFJjCCBA6gAwIBAgISA2OGA5XXQ1B3pDiAnp1worHFMA0GCSqGSIb3DQEBCwUA
MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD
EwJSMzAeFw0yMjAzMDEwOTE1MDhaFw0yMjA1MzAwOTE1MDdaMBsxGTAXBgNVBAMT
EG1haWwwMS5laXByb2MuZGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
AQDeKS9oSZ+/vqVuwatbrP+C0Bplno9IcaFr6ZxQ8UQPgWRKyRfSCbXu99akvsy2
80zH6/1+pHuWwzrkP6tgljzagPR4TN3NcUY8ZrxiYUIpmpBdUm3Z8myza9jirZiS
Pke+CGZe3NROdSTuFfNlmgxUu29cfYqKIRdPyqUhazca9psBwlEQtnJ1wQpvtgsr
BtmOLTyms4dppWqEfiAKs+a8x3rzaxblzwwTQU5RfTp4pXlsHhKkz++JnewM6TG7
cIWrRdfSCGHiZZ3pr6En+ls4//hOuF1WO01G6/k6U9HhP5HU2QGQaQy3/2tB3EQK
CSYr2PpFgP8/U9b2agKqRCOhAgMBAAGjggJLMIICRzAOBgNVHQ8BAf8EBAMCBaAw
HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYD
VR0OBBYEFHApnikjXSEeS7bT7VWtMQcje2LKMB8GA1UdIwQYMBaAFBQusxe3WFbL
rlAJQOYfr52LFMLGMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDov
L3IzLm8ubGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vcjMuaS5sZW5jci5v
cmcvMBsGA1UdEQQUMBKCEG1haWwwMS5laXByb2MuZGUwTAYDVR0gBEUwQzAIBgZn
gQwBAgEwNwYLKwYBBAGC3xMBAQEwKDAmBggrBgEFBQcCARYaaHR0cDovL2Nwcy5s
ZXRzZW5jcnlwdC5vcmcwggEEBgorBgEEAdZ5AgQCBIH1BIHyAPAAdgDfpV6raIJP
H2yt7rhfTj5a6s2iEqRqXo47EsAgRFwqcwAAAX9E+f2SAAAEAwBHMEUCIQD7GCH7
+SxSmlJH3KJTL5MAHHae/0jQ5JgjOjO2pKbnegIgNYv2U7BQkO7WGgtFFe1BG5RZ
zUjWO46SDmPGhCNFPZIAdgBGpVXrdfqRIDC1oolp9PN9ESxBdL79SbiFq/L8cP5t
RwAAAX9E+f20AAAEAwBHMEUCIQCJL7uj8BhCL2rEbdn8Ke9GCaxGHM4R00dAaBoe
f/hinAIgQ87CI4CYY6bzIq4i0HPzJEqp6rvkX5iUSyQJqkOaJn8wDQYJKoZIhvcN
AQELBQADggEBAAZ0qkY8yd1Jq8UUiIIza1cMXloa3xxcPGz4kfvBOQEqyC4Eaipv
eHjP3RuOI5lnQJSFb2SYFg5Toj90qJY4vCt6p2zMsXfvgqBD5XGpTQ+LRNOCO3Bh
gj/IVswfQDiAOADdmqhUmwsGJNEKaG++9uql+K0j/dGm1qWgbSp4/DTVmbpQQAMM
VfbrkUR666H0NJuGK5HhiUcGFJup3JNqMCv2yRcYie3nqredmxE+B0me4QOY+ku1
UhUwAUpVCm13DhedNqsqj81jzVlqNwT+N0DHz3Emv/FqoxdbARLzfdCM6ycmhxe8
ByWpqnGeigWzemSnkkKADG1cqSsclGlKkUI=
-----END CERTIFICATE-----
------- START: mail01.ciproc.de:465
subject=CN = mail01.ciproc.de
notBefore=Mar  1 09:15:08 2022 GMT
notAfter=May 30 09:15:07 2022 GMT
-----BEGIN CERTIFICATE-----
MIIFJjCCBA6gAwIBAgISA2OGA5XXQ1B3pDiAnp1worHFMA0GCSqGSIb3DQEBCwUA
MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD
EwJSMzAeFw0yMjAzMDEwOTE1MDhaFw0yMjA1MzAwOTE1MDdaMBsxGTAXBgNVBAMT
EG1haWwwMS5laXByb2MuZGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
AQDeKS9oSZ+/vqVuwatbrP+C0Bplno9IcaFr6ZxQ8UQPgWRKyRfSCbXu99akvsy2
80zH6/1+pHuWwzrkP6tgljzagPR4TN3NcUY8ZrxiYUIpmpBdUm3Z8myza9jirZiS
Pke+CGZe3NROdSTuFfNlmgxUu29cfYqKIRdPyqUhazca9psBwlEQtnJ1wQpvtgsr
BtmOLTyms4dppWqEfiAKs+a8x3rzaxblzwwTQU5RfTp4pXlsHhKkz++JnewM6TG7
cIWrRdfSCGHiZZ3pr6En+ls4//hOuF1WO01G6/k6U9HhP5HU2QGQaQy3/2tB3EQK
CSYr2PpFgP8/U9b2agKqRCOhAgMBAAGjggJLMIICRzAOBgNVHQ8BAf8EBAMCBaAw
HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYD
VR0OBBYEFHApnikjXSEeS7bT7VWtMQcje2LKMB8GA1UdIwQYMBaAFBQusxe3WFbL
rlAJQOYfr52LFMLGMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDov
L3IzLm8ubGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vcjMuaS5sZW5jci5v
cmcvMBsGA1UdEQQUMBKCEG1haWwwMS5laXByb2MuZGUwTAYDVR0gBEUwQzAIBgZn
gQwBAgEwNwYLKwYBBAGC3xMBAQEwKDAmBggrBgEFBQcCARYaaHR0cDovL2Nwcy5s
ZXRzZW5jcnlwdC5vcmcwggEEBgorBgEEAdZ5AgQCBIH1BIHyAPAAdgDfpV6raIJP
H2yt7rhfTj5a6s2iEqRqXo47EsAgRFwqcwAAAX9E+f2SAAAEAwBHMEUCIQD7GCH7
+SxSmlJH3KJTL5MAHHae/0jQ5JgjOjO2pKbnegIgNYv2U7BQkO7WGgtFFe1BG5RZ
zUjWO46SDmPGhCNFPZIAdgBGpVXrdfqRIDC1oolp9PN9ESxBdL79SbiFq/L8cP5t
RwAAAX9E+f20AAAEAwBHMEUCIQCJL7uj8BhCL2rEbdn8Ke9GCaxGHM4R00dAaBoe
f/hinAIgQ87CI4CYY6bzIq4i0HPzJEqp6rvkX5iUSyQJqkOaJn8wDQYJKoZIhvcN
AQELBQADggEBAAZ0qkY8yd1Jq8UUiIIza1cMXloa3xxcPGz4kfvBOQEqyC4Eaipv
eHjP3RuOI5lnQJSFb2SYFg5Toj90qJY4vCt6p2zMsXfvgqBD5XGpTQ+LRNOCO3Bh
gj/IVswfQDiAOADdmqhUmwsGJNEKaG++9uql+K0j/dGm1qWgbSp4/DTVmbpQQAMM
VfbrkUR666H0NJuGK5HhiUcGFJup3JNqMCv2yRcYie3nqredmxE+B0me4QOY+ku1
UhUwAUpVCm13DhedNqsqj81jzVlqNwT+N0DHz3Emv/FqoxdbARLzfdCM6ycmhxe8
ByWpqnGeigWzemSnkkKADG1cqSsclGlKkUI=
-----END CERTIFICATE-----
------- START: mail01.ciproc.de:993
subject=CN = mail01.ciproc.de
notBefore=Mar  1 09:15:08 2022 GMT
notAfter=May 30 09:15:07 2022 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
------- START: mail01.ciproc.de:995
subject=CN = mail01.ciproc.de
notBefore=Mar  1 09:15:08 2022 GMT
notAfter=May 30 09:15:07 2022 GMT
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Scan subtype:
Origin IP:
Details:
Command:
Version: (official web site)
Output:
/usr/bin/testssl: connect: Connection timed out
/usr/bin/testssl: line 10454: /dev/tcp/172.21.11.11/143: Connection timed out
Fatal error: Can't connect to "172.21.11.11:143"
Make sure a firewall is not between you and your scanning target!
/usr/bin/testssl: connect: Connection timed out
/usr/bin/testssl: line 10454: /dev/tcp/172.21.11.11/443: Connection timed out
Fatal error: Can't connect to "172.21.11.11:443"
Make sure a firewall is not between you and your scanning target!
/usr/bin/testssl: connect: Connection timed out
/usr/bin/testssl: line 10454: /dev/tcp/172.21.11.11/465: Connection timed out
Fatal error: Can't connect to "172.21.11.11:465"
Make sure a firewall is not between you and your scanning target!
/usr/bin/testssl: connect: Connection timed out
/usr/bin/testssl: line 10454: /dev/tcp/172.21.11.11/993: Connection timed out
Fatal error: Can't connect to "172.21.11.11:993"
Make sure a firewall is not between you and your scanning target!
/usr/bin/testssl: connect: Connection timed out
/usr/bin/testssl: line 10454: /dev/tcp/172.21.11.11/995: Connection timed out
Fatal error: Can't connect to "172.21.11.11:995"
Make sure a firewall is not between you and your scanning target!
------- START: 109.233.144.66:p110
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t pop3 109.233.144.66:110"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:19:38        -->> 109.233.144.66:110 (109.233.144.66) <<--

rDNS (109.233.144.66):  mail01.ciproc.de.
Service set:            STARTTLS via POP3

 Testing protocols via sockets 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 384   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 1024    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 384   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 1024    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 1024    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 1024    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 384   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 384   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 1024    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 1024    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 1024    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 384   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:21:43 [ 146s] -->> 109.233.144.66:110 (109.233.144.66) <<--


------- START: 109.233.144.66:p143
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t imap 109.233.144.66:143"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:20:58        -->> 109.233.144.66:143 (109.233.144.66) <<--

rDNS (109.233.144.66):  mail01.ciproc.de.
Service set:            STARTTLS via IMAP

 Testing protocols via sockets 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 384   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 1024    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 384   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 1024    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 1024    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 1024    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 384   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 384   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 1024    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 1024    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 1024    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 384   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:22:57 [ 140s] -->> 109.233.144.66:143 (109.233.144.66) <<--


------- START: 109.233.144.66:p21
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t ftp 109.233.144.66:21"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:16:55        -->> 109.233.144.66:21 (109.233.144.66) <<--

rDNS (109.233.144.66):  mail01.ciproc.de.
Service set:            STARTTLS via FTP

 Testing protocols via sockets 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 256   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 2048    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 256   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 2048    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 2048    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 2048    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 256   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 256   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 2048    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 2048    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 2048    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 256   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:18:56 [ 140s] -->> 109.233.144.66:21 (109.233.144.66) <<--


------- START: 109.233.144.66:p25
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t smtp 109.233.144.66:25"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:18:17        -->> 109.233.144.66:25 (109.233.144.66) <<--

rDNS (109.233.144.66):  mail01.ciproc.de.
Service set:            STARTTLS via SMTP

 Testing protocols via sockets 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 2048    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 2048    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 256   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 2048    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 256   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 2048    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 2048    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 2048    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 256   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 256   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 2048    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 2048    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 2048    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 256   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x9a     DHE-RSA-SEED-SHA                  DH 2048    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:20:28 [ 152s] -->> 109.233.144.66:25 (109.233.144.66) <<--


------- START: 109.233.144.66:p443
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ 109.233.144.66:443"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:22:17        -->> 109.233.144.66:443 (109.233.144.66) <<--

rDNS (109.233.144.66):  mail01.ciproc.de.
Service detected:       HTTP


 Testing protocols via sockets except NPN+ALPN 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol
 NPN/SPDY   not offered
 ALPN/HTTP2 http/1.1 (offered)

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 256   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 2048    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
x6b     DHE-RSA-AES256-SHA256             DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 256   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 2048    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
x67     DHE-RSA-AES128-SHA256             DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:23:37 [ 100s] -->> 109.233.144.66:443 (109.233.144.66) <<--


------- START: 109.233.144.66:p465
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ 109.233.144.66:465"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:23:37        -->> 109.233.144.66:465 (109.233.144.66) <<--

rDNS (109.233.144.66):  mail01.ciproc.de.
Service detected:       Couldn't determine what's running on port 465, assuming no HTTP service => skipping all HTTP checks


 Testing protocols via sockets except NPN+ALPN 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol
 NPN/SPDY   not offered
 ALPN/HTTP2 not offered

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 256   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 2048    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 256   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 2048    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 2048    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 2048    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 256   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 256   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 2048    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 2048    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 2048    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 256   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:25:25 [ 128s] -->> 109.233.144.66:465 (109.233.144.66) <<--


------- START: 109.233.144.66:p993
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ 109.233.144.66:993"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:24:57        -->> 109.233.144.66:993 (109.233.144.66) <<--

rDNS (109.233.144.66):  mail01.ciproc.de.
Service detected:       IMAP, thus skipping HTTP specific checks


 Testing protocols via sockets except NPN+ALPN 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol
 NPN/SPDY   not offered
 ALPN/HTTP2 not offered

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 384   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 1024    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 384   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 1024    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 1024    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 1024    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 384   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 384   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 1024    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 1024    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 1024    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 384   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:26:54 [ 136s] -->> 109.233.144.66:993 (109.233.144.66) <<--


------- START: 109.233.144.66:p995
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ 109.233.144.66:995"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:26:18        -->> 109.233.144.66:995 (109.233.144.66) <<--

rDNS (109.233.144.66):  mail01.ciproc.de.
Service detected:       POP, thus skipping HTTP specific checks


 Testing protocols via sockets except NPN+ALPN 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol
 NPN/SPDY   not offered
 ALPN/HTTP2 not offered

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 384   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 1024    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 384   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 1024    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 1024    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 1024    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 384   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 384   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 1024    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 1024    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 1024    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 384   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:28:16 [ 138s] -->> 109.233.144.66:995 (109.233.144.66) <<--


------- START: 109.233.144.67:p110
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t pop3 109.233.144.67:110"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:30:23        -->> 109.233.144.67:110 (109.233.144.67) <<--

rDNS (109.233.144.67):  mail01.add2web.de.
Service set:            STARTTLS via POP3

 Testing protocols via sockets 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 384   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 1024    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 384   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 1024    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 1024    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 1024    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 384   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 384   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 1024    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 1024    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 1024    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 384   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:32:34 [ 152s] -->> 109.233.144.67:110 (109.233.144.67) <<--


------- START: 109.233.144.67:p143
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t imap 109.233.144.67:143"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:31:44        -->> 109.233.144.67:143 (109.233.144.67) <<--

rDNS (109.233.144.67):  mail01.add2web.de.
Service set:            STARTTLS via IMAP

 Testing protocols via sockets 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 384   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 1024    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 384   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 1024    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 1024    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 1024    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 384   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 384   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 1024    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 1024    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 1024    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 384   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:33:54 [ 151s] -->> 109.233.144.67:143 (109.233.144.67) <<--


------- START: 109.233.144.67:p21
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t ftp 109.233.144.67:21"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:27:41        -->> 109.233.144.67:21 (109.233.144.67) <<--

rDNS (109.233.144.67):  mail01.add2web.de.
Service set:            STARTTLS via FTP

 Testing protocols via sockets 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 256   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 2048    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 256   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 2048    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 2048    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 2048    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 256   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 256   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 2048    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 2048    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 2048    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 256   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:29:47 [ 145s] -->> 109.233.144.67:21 (109.233.144.67) <<--


------- START: 109.233.144.67:p25
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t smtp 109.233.144.67:25"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:29:03        -->> 109.233.144.67:25 (109.233.144.67) <<--

rDNS (109.233.144.67):  mail01.add2web.de.
Service set:            STARTTLS via SMTP

 Testing protocols via sockets 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 2048    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 2048    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 256   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 2048    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 256   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 2048    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 2048    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 2048    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 256   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 256   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 2048    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 2048    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 2048    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 256   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x9a     DHE-RSA-SEED-SHA                  DH 2048    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:31:16 [ 154s] -->> 109.233.144.67:25 (109.233.144.67) <<--


------- START: 109.233.144.67:p443
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ 109.233.144.67:443"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:33:04        -->> 109.233.144.67:443 (109.233.144.67) <<--

rDNS (109.233.144.67):  mail01.add2web.de.
Service detected:       HTTP


 Testing protocols via sockets except NPN+ALPN 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol
 NPN/SPDY   not offered
 ALPN/HTTP2 http/1.1 (offered)

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 256   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 2048    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
x6b     DHE-RSA-AES256-SHA256             DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 256   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 2048    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
x67     DHE-RSA-AES128-SHA256             DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:34:35 [ 112s] -->> 109.233.144.67:443 (109.233.144.67) <<--


------- START: 109.233.144.67:p465
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ 109.233.144.67:465"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:34:24        -->> 109.233.144.67:465 (109.233.144.67) <<--

rDNS (109.233.144.67):  mail01.add2web.de.
Service detected:       Couldn't determine what's running on port 465, assuming no HTTP service => skipping all HTTP checks


 Testing protocols via sockets except NPN+ALPN 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol
 NPN/SPDY   not offered
 ALPN/HTTP2 not offered

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 256   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 2048    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 256   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 2048    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 2048    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 2048    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 256   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 256   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 2048    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 2048    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 2048    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 256   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:36:22 [ 139s] -->> 109.233.144.67:465 (109.233.144.67) <<--


------- START: 109.233.144.67:p993
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ 109.233.144.67:993"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:35:44        -->> 109.233.144.67:993 (109.233.144.67) <<--

rDNS (109.233.144.67):  mail01.add2web.de.
Service detected:       IMAP, thus skipping HTTP specific checks


 Testing protocols via sockets except NPN+ALPN 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol
 NPN/SPDY   not offered
 ALPN/HTTP2 not offered

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 384   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 1024    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 384   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 1024    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 1024    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 1024    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 384   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 384   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 1024    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 1024    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 1024    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 384   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:37:54 [ 151s] -->> 109.233.144.67:993 (109.233.144.67) <<--


------- START: 109.233.144.67:p995
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ 109.233.144.67:995"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:37:05        -->> 109.233.144.67:995 (109.233.144.67) <<--

rDNS (109.233.144.67):  mail01.add2web.de.
Service detected:       POP, thus skipping HTTP specific checks


 Testing protocols via sockets except NPN+ALPN 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol
 NPN/SPDY   not offered
 ALPN/HTTP2 not offered

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 384   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 1024    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 384   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 1024    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 1024    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 1024    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 384   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 384   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 1024    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 1024    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 1024    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 384   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:39:08 [ 144s] -->> 109.233.144.67:995 (109.233.144.67) <<--


------- START: 109.233.144.80:p443
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ 109.233.144.80:443"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:39:52        -->> 109.233.144.80:443 (109.233.144.80) <<--

rDNS (109.233.144.80):  --
Service detected:       HTTP


 Testing protocols via sockets except NPN+ALPN 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      not offered
 TLS 1.1    not offered
 TLS 1.2    offered (OK)
 TLS 1.3    offered (OK): final
 NPN/SPDY   not offered
 ALPN/HTTP2 not offered

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
TLS 1.1
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 253   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 253   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 253   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 2048    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 253   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 2048    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 2048    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 2048    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 253   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc051   ARIA256-GCM-SHA384                RSA        ARIAGCM     256      TLS_RSA_WITH_ARIA_256_GCM_SHA384
xc053   DHE-RSA-ARIA256-GCM-SHA384        DH 2048    ARIAGCM     256      TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384
xc061   ECDHE-ARIA256-GCM-SHA384          ECDH 253   ARIAGCM     256      TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 253   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 253   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 253   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 2048    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 2048    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 2048    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 253   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
xc050   ARIA128-GCM-SHA256                RSA        ARIAGCM     128      TLS_RSA_WITH_ARIA_128_GCM_SHA256
xc052   DHE-RSA-ARIA128-GCM-SHA256        DH 2048    ARIAGCM     128      TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256
xc060   ECDHE-ARIA128-GCM-SHA256          ECDH 253   ARIAGCM     128      TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256
TLS 1.3
x1302   TLS_AES_256_GCM_SHA384            ECDH 253   AESGCM      256      TLS_AES_256_GCM_SHA384
x1303   TLS_CHACHA20_POLY1305_SHA256      ECDH 253   ChaCha20    256      TLS_CHACHA20_POLY1305_SHA256
x1301   TLS_AES_128_GCM_SHA256            ECDH 253   AESGCM      128      TLS_AES_128_GCM_SHA256

 Done 2022-04-04 09:41:14 [ 100s] -->> 109.233.144.80:443 (109.233.144.80) <<--


------- START: 109.233.144.83:p443
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ 109.233.144.83:443"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:41:00        -->> 109.233.144.83:443 (109.233.144.83) <<--

rDNS (109.233.144.83):  --
Service detected:       HTTP


 Testing protocols via sockets except NPN+ALPN 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      not offered
 TLS 1.1    not offered
 TLS 1.2    offered (OK)
 TLS 1.3    offered (OK): final
 NPN/SPDY   not offered
 ALPN/HTTP2 not offered

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
TLS 1.1
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 253   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 253   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 253   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 2048    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 253   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 2048    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 2048    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 2048    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 253   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc051   ARIA256-GCM-SHA384                RSA        ARIAGCM     256      TLS_RSA_WITH_ARIA_256_GCM_SHA384
xc053   DHE-RSA-ARIA256-GCM-SHA384        DH 2048    ARIAGCM     256      TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384
xc061   ECDHE-ARIA256-GCM-SHA384          ECDH 253   ARIAGCM     256      TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 253   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 253   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 253   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 2048    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 2048    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 2048    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 253   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
xc050   ARIA128-GCM-SHA256                RSA        ARIAGCM     128      TLS_RSA_WITH_ARIA_128_GCM_SHA256
xc052   DHE-RSA-ARIA128-GCM-SHA256        DH 2048    ARIAGCM     128      TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256
xc060   ECDHE-ARIA128-GCM-SHA256          ECDH 253   ARIAGCM     128      TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256
TLS 1.3
x1302   TLS_AES_256_GCM_SHA384            ECDH 253   AESGCM      256      TLS_AES_256_GCM_SHA384
x1303   TLS_CHACHA20_POLY1305_SHA256      ECDH 253   ChaCha20    256      TLS_CHACHA20_POLY1305_SHA256
x1301   TLS_AES_128_GCM_SHA256            ECDH 253   AESGCM      128      TLS_AES_128_GCM_SHA256

 Done 2022-04-04 09:42:25 [ 103s] -->> 109.233.144.83:443 (109.233.144.83) <<--


------- START: 109.233.144.86:p443
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ 109.233.144.86:443"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:42:03        -->> 109.233.144.86:443 (109.233.144.86) <<--

rDNS (109.233.144.86):  --
Service detected:       HTTP


 Testing protocols via sockets except NPN+ALPN 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      not offered
 TLS 1.1    not offered
 TLS 1.2    offered (OK)
 TLS 1.3    offered (OK): final
 NPN/SPDY   not offered
 ALPN/HTTP2 not offered

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
TLS 1.1
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 253   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 253   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 253   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 2048    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 253   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 2048    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 2048    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 2048    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 253   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc051   ARIA256-GCM-SHA384                RSA        ARIAGCM     256      TLS_RSA_WITH_ARIA_256_GCM_SHA384
xc053   DHE-RSA-ARIA256-GCM-SHA384        DH 2048    ARIAGCM     256      TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384
xc061   ECDHE-ARIA256-GCM-SHA384          ECDH 253   ARIAGCM     256      TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 253   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 253   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 253   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 2048    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 2048    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 2048    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 253   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
xc050   ARIA128-GCM-SHA256                RSA        ARIAGCM     128      TLS_RSA_WITH_ARIA_128_GCM_SHA256
xc052   DHE-RSA-ARIA128-GCM-SHA256        DH 2048    ARIAGCM     128      TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256
xc060   ECDHE-ARIA128-GCM-SHA256          ECDH 253   ARIAGCM     128      TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256
TLS 1.3
x1302   TLS_AES_256_GCM_SHA384            ECDH 253   AESGCM      256      TLS_AES_256_GCM_SHA384
x1303   TLS_CHACHA20_POLY1305_SHA256      ECDH 253   ChaCha20    256      TLS_CHACHA20_POLY1305_SHA256
x1301   TLS_AES_128_GCM_SHA256            ECDH 253   AESGCM      128      TLS_AES_128_GCM_SHA256

 Done 2022-04-04 09:43:27 [ 103s] -->> 109.233.144.86:443 (109.233.144.86) <<--


------- START: 109.233.144.87:p3306
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t mysql 109.233.144.87:3306"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:42:55        -->> 109.233.144.87:3306 (109.233.144.87) <<--

rDNS (109.233.144.87):  --

 109.233.144.87:3306 doesn't seem to be a TLS/SSL enabled server
 The results might look ok but they could be nonsense. Really proceed ? ("yes" to continue) --> 
------- START: mail01.add2web.de:p110
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t pop3 mail01.add2web.de:110"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:30:25        -->> 109.233.144.67:110 (mail01.add2web.de) <<--

rDNS (109.233.144.67):  mail01.add2web.de.
Service set:            STARTTLS via POP3

 Testing protocols via sockets 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 384   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 1024    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 384   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 1024    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 1024    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 1024    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 384   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 384   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 1024    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 1024    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 1024    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 384   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:32:36 [ 153s] -->> 109.233.144.67:110 (mail01.add2web.de) <<--


------- START: mail01.add2web.de:p143
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t imap mail01.add2web.de:143"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:31:45        -->> 109.233.144.67:143 (mail01.add2web.de) <<--

rDNS (109.233.144.67):  mail01.add2web.de.
Service set:            STARTTLS via IMAP

 Testing protocols via sockets 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 384   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 1024    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 384   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 1024    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 1024    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 1024    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 384   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 384   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 1024    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 1024    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 1024    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 384   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:33:57 [ 154s] -->> 109.233.144.67:143 (mail01.add2web.de) <<--


------- START: mail01.add2web.de:p21
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t ftp mail01.add2web.de:21"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:27:43        -->> 109.233.144.67:21 (mail01.add2web.de) <<--

rDNS (109.233.144.67):  mail01.add2web.de.
Service set:            STARTTLS via FTP

 Testing protocols via sockets 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 256   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 2048    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 256   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 2048    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 2048    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 2048    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 256   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 256   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 2048    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 2048    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 2048    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 256   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:29:51 [ 148s] -->> 109.233.144.67:21 (mail01.add2web.de) <<--


------- START: mail01.add2web.de:p25
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t smtp mail01.add2web.de:25"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:29:05        -->> 109.233.144.67:25 (mail01.add2web.de) <<--

rDNS (109.233.144.67):  mail01.add2web.de.
Service set:            STARTTLS via SMTP

 Testing protocols via sockets 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 2048    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 2048    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 256   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 2048    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 256   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 2048    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 2048    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 2048    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 256   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 256   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 2048    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 2048    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 2048    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 256   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x9a     DHE-RSA-SEED-SHA                  DH 2048    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:31:19 [ 157s] -->> 109.233.144.67:25 (mail01.add2web.de) <<--


------- START: mail01.add2web.de:p443
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ mail01.add2web.de:443"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:33:05        -->> 109.233.144.67:443 (mail01.add2web.de) <<--

rDNS (109.233.144.67):  mail01.add2web.de.
Service detected:       HTTP


 Testing protocols via sockets except NPN+ALPN 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol
 NPN/SPDY   not offered
 ALPN/HTTP2 http/1.1 (offered)

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 256   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 2048    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
x6b     DHE-RSA-AES256-SHA256             DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 256   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 2048    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
x67     DHE-RSA-AES128-SHA256             DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:34:41 [ 118s] -->> 109.233.144.67:443 (mail01.add2web.de) <<--


------- START: mail01.add2web.de:p465
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ mail01.add2web.de:465"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:34:25        -->> 109.233.144.67:465 (mail01.add2web.de) <<--

rDNS (109.233.144.67):  mail01.add2web.de.
Service detected:       Couldn't determine what's running on port 465, assuming no HTTP service => skipping all HTTP checks


 Testing protocols via sockets except NPN+ALPN 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol
 NPN/SPDY   not offered
 ALPN/HTTP2 not offered

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 256   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 2048    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 256   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 2048    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 2048    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 2048    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 256   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 256   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 2048    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 2048    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 2048    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 256   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:36:25 [ 141s] -->> 109.233.144.67:465 (mail01.add2web.de) <<--


------- START: mail01.add2web.de:p993
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ mail01.add2web.de:993"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:35:45        -->> 109.233.144.67:993 (mail01.add2web.de) <<--

rDNS (109.233.144.67):  mail01.add2web.de.
Service detected:       IMAP, thus skipping HTTP specific checks


 Testing protocols via sockets except NPN+ALPN 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol
 NPN/SPDY   not offered
 ALPN/HTTP2 not offered

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 384   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 1024    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 384   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 1024    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 1024    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 1024    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 384   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 384   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 1024    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 1024    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 1024    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 384   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:37:57 [ 154s] -->> 109.233.144.67:993 (mail01.add2web.de) <<--


------- START: mail01.add2web.de:p995
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ mail01.add2web.de:995"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:37:06        -->> 109.233.144.67:995 (mail01.add2web.de) <<--

rDNS (109.233.144.67):  mail01.add2web.de.
Service detected:       POP, thus skipping HTTP specific checks


 Testing protocols via sockets except NPN+ALPN 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol
 NPN/SPDY   not offered
 ALPN/HTTP2 not offered

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 384   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 1024    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 384   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 1024    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 1024    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 1024    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 384   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 384   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 1024    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 1024    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 1024    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 384   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:39:10 [ 146s] -->> 109.233.144.67:995 (mail01.add2web.de) <<--


------- START: mail01.ciproc.de:p110
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t pop3 mail01.ciproc.de:110"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:19:39        -->> 172.21.11.11:110 (mail01.ciproc.de) <<--

A record via:           /etc/hosts
rDNS (172.21.11.11):    --
Service set:            STARTTLS via POP3

 Testing protocols via sockets 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 384   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 384   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 1024    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 384   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 1024    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 1024    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 1024    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 1024    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 384   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 1024    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 384   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 384   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 1024    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 1024    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 1024    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 1024    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 384   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x9a     DHE-RSA-SEED-SHA                  DH 1024    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 1024    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:21:44 [ 147s] -->> 172.21.11.11:110 (mail01.ciproc.de) <<--


------- START: mail01.ciproc.de:p143
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t imap mail01.ciproc.de:143"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:20:59        -->> 172.21.11.11:143 (mail01.ciproc.de) <<--

A record via:           /etc/hosts
rDNS (172.21.11.11):    -- Oops: TCP connect problem

Unable to open a socket to 172.21.11.11:143. 
Fatal error: Can't connect to "172.21.11.11:143"
Make sure a firewall is not between you and your scanning target!

------- START: mail01.ciproc.de:p21
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t ftp mail01.ciproc.de:21"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:16:56        -->> 172.21.11.11:21 (mail01.ciproc.de) <<--

A record via:           /etc/hosts
rDNS (172.21.11.11):    --
Service set:            STARTTLS via FTP

 Testing protocols via sockets 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 256   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 2048    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 256   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 2048    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 2048    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 2048    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 256   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 256   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 2048    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 2048    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 2048    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 256   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:18:59 [ 143s] -->> 172.21.11.11:21 (mail01.ciproc.de) <<--


------- START: mail01.ciproc.de:p25
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t smtp mail01.ciproc.de:25"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:18:18        -->> 172.21.11.11:25 (mail01.ciproc.de) <<--

A record via:           /etc/hosts
rDNS (172.21.11.11):    --
Service set:            STARTTLS via SMTP

 Testing protocols via sockets 

 SSLv2      not offered (OK)
 SSLv3      not offered (OK)
 TLS 1      offered (deprecated)
 TLS 1.1    offered (deprecated)
 TLS 1.2    offered (OK)
 TLS 1.3    not offered and downgraded to a weaker protocol

 Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength 

Hexcode  Cipher Suite Name (OpenSSL)       KeyExch.   Encryption  Bits     Cipher Suite Name (IANA/RFC)
-----------------------------------------------------------------------------------------------------------------------------
SSLv2
SSLv3
TLS 1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 2048    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.1
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
x9a     DHE-RSA-SEED-SHA                  DH 2048    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.2
xc030   ECDHE-RSA-AES256-GCM-SHA384       ECDH 256   AESGCM      256      TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
xc028   ECDHE-RSA-AES256-SHA384           ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014   ECDHE-RSA-AES256-SHA              ECDH 256   AES         256      TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9f     DHE-RSA-AES256-GCM-SHA384         DH 2048    AESGCM      256      TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
xcca8   ECDHE-RSA-CHACHA20-POLY1305       ECDH 256   ChaCha20    256      TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xccaa   DHE-RSA-CHACHA20-POLY1305         DH 2048    ChaCha20    256      TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
xc0a3   DHE-RSA-AES256-CCM8               DH 2048    AESCCM8     256      TLS_DHE_RSA_WITH_AES_256_CCM_8
xc09f   DHE-RSA-AES256-CCM                DH 2048    AESCCM      256      TLS_DHE_RSA_WITH_AES_256_CCM
x6b     DHE-RSA-AES256-SHA256             DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
x39     DHE-RSA-AES256-SHA                DH 2048    AES         256      TLS_DHE_RSA_WITH_AES_256_CBC_SHA
xc077   ECDHE-RSA-CAMELLIA256-SHA384      ECDH 256   Camellia    256      TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
xc4     DHE-RSA-CAMELLIA256-SHA256        DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
x88     DHE-RSA-CAMELLIA256-SHA           DH 2048    Camellia    256      TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
x9d     AES256-GCM-SHA384                 RSA        AESGCM      256      TLS_RSA_WITH_AES_256_GCM_SHA384
xc0a1   AES256-CCM8                       RSA        AESCCM8     256      TLS_RSA_WITH_AES_256_CCM_8
xc09d   AES256-CCM                        RSA        AESCCM      256      TLS_RSA_WITH_AES_256_CCM
x3d     AES256-SHA256                     RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA256
x35     AES256-SHA                        RSA        AES         256      TLS_RSA_WITH_AES_256_CBC_SHA
xc0     CAMELLIA256-SHA256                RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
x84     CAMELLIA256-SHA                   RSA        Camellia    256      TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
xc02f   ECDHE-RSA-AES128-GCM-SHA256       ECDH 256   AESGCM      128      TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
xc027   ECDHE-RSA-AES128-SHA256           ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013   ECDHE-RSA-AES128-SHA              ECDH 256   AES         128      TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9e     DHE-RSA-AES128-GCM-SHA256         DH 2048    AESGCM      128      TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
xc0a2   DHE-RSA-AES128-CCM8               DH 2048    AESCCM8     128      TLS_DHE_RSA_WITH_AES_128_CCM_8
xc09e   DHE-RSA-AES128-CCM                DH 2048    AESCCM      128      TLS_DHE_RSA_WITH_AES_128_CCM
xc0a0   AES128-CCM8                       RSA        AESCCM8     128      TLS_RSA_WITH_AES_128_CCM_8
xc09c   AES128-CCM                        RSA        AESCCM      128      TLS_RSA_WITH_AES_128_CCM
x67     DHE-RSA-AES128-SHA256             DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
x33     DHE-RSA-AES128-SHA                DH 2048    AES         128      TLS_DHE_RSA_WITH_AES_128_CBC_SHA
xc076   ECDHE-RSA-CAMELLIA128-SHA256      ECDH 256   Camellia    128      TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
xbe     DHE-RSA-CAMELLIA128-SHA256        DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
x9a     DHE-RSA-SEED-SHA                  DH 2048    SEED        128      TLS_DHE_RSA_WITH_SEED_CBC_SHA
x45     DHE-RSA-CAMELLIA128-SHA           DH 2048    Camellia    128      TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
x9c     AES128-GCM-SHA256                 RSA        AESGCM      128      TLS_RSA_WITH_AES_128_GCM_SHA256
x3c     AES128-SHA256                     RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA256
x2f     AES128-SHA                        RSA        AES         128      TLS_RSA_WITH_AES_128_CBC_SHA
xba     CAMELLIA128-SHA256                RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
x96     SEED-SHA                          RSA        SEED        128      TLS_RSA_WITH_SEED_CBC_SHA
x41     CAMELLIA128-SHA                   RSA        Camellia    128      TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
TLS 1.3

 Done 2022-04-04 09:20:30 [ 153s] -->> 172.21.11.11:25 (mail01.ciproc.de) <<--


------- START: mail01.ciproc.de:p443
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ mail01.ciproc.de:443"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:22:18        -->> 172.21.11.11:443 (mail01.ciproc.de) <<--

A record via:           /etc/hosts
rDNS (172.21.11.11):    -- Oops: TCP connect problem

Unable to open a socket to 172.21.11.11:443. 
Fatal error: Can't connect to "172.21.11.11:443"
Make sure a firewall is not between you and your scanning target!

------- START: mail01.ciproc.de:p465
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ mail01.ciproc.de:465"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:23:38        -->> 172.21.11.11:465 (mail01.ciproc.de) <<--

A record via:           /etc/hosts
rDNS (172.21.11.11):    -- Oops: TCP connect problem

Unable to open a socket to 172.21.11.11:465. 
Fatal error: Can't connect to "172.21.11.11:465"
Make sure a firewall is not between you and your scanning target!

------- START: mail01.ciproc.de:p993
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ mail01.ciproc.de:993"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:24:58        -->> 172.21.11.11:993 (mail01.ciproc.de) <<--

A record via:           /etc/hosts
rDNS (172.21.11.11):    -- Oops: TCP connect problem

Unable to open a socket to 172.21.11.11:993. 
Fatal error: Can't connect to "172.21.11.11:993"
Make sure a firewall is not between you and your scanning target!

------- START: mail01.ciproc.de:p995
## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ mail01.ciproc.de:995"
## at pent01:/usr/bin/openssl
## version testssl: 3.0.7  from
## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021")

 Start 2022-04-04 09:26:19        -->> 172.21.11.11:995 (mail01.ciproc.de) <<--

A record via:           /etc/hosts
rDNS (172.21.11.11):    -- Oops: TCP connect problem

Unable to open a socket to 172.21.11.11:995. 
Fatal error: Can't connect to "172.21.11.11:995"
Make sure a firewall is not between you and your scanning target!

The status of each available reporting module for ciproc gmbh:

ModuleStatus

Vulnerability Scan

This performs a thorough scan of the targetted systems to detect known vulnerabilities. The report provides both management-level summaries and in-depth technical information about each finding, tracks changes relative to the previous status report, and recommends solutions to resolve any remaining threats.


Enabled

Port Scan

This performs a thorough scan to detect open TCP and UDP ports on the targetted systems. The report tracks changes relative to the previous status report and provides details of the services that are likely running on each of the detected ports.


Enabled

Certificate Check

This checks the expiry date of all SSL certificates associated with the targetted systems, and checks for cipher conformity. The report alerts administrators about certificates that are almost due to expire so they can be renewed in time to avoid any costly or embarrassing service disruptions.


Enabled

It may interest you to know that we also offer a report that provides longer term tracking of security vulnerabilities that is especially suitable for auditing purposes.

For more information about any of our other services, please visit us at ciproc.de, or contact your ciproc representative directly.

Please verify that the following information is accurate and up-to-date. If there are any changes, please notify your ciproc gmbh contact (see below).

ciproc gmbh

Contact address

  • Schillerstrasse 1a
    69115 Heidelberg
    Germany

General contacts

Persons allowed to request incident handling

Recipients of reports

ciproc gmbh

General contact information

  • ciproc gmbh
    Schillerstrasse 1a
    69115 Heidelberg
    Germany

    +49.621.3969100
    ciproc@ciproc.de

    GPG key:
    0FED44FB

    Fingerprint:
    9F5E 48D3 BCD7 B58A CA81 F5D7 8A57 CC41 0FED 44FB

Report contact

  • Elci, Ali
    tel. +49-621-39691 15
    fax +49-621-39691 01
    mobile +49-176-31341530
    elci@ciproc.de

    GPG key:
    0208112227F98925

    Fingerprint:
    2540 2344 3CEC 5B35 F598 02A8 0208 1122 27F9 8925

Mr. Elci was responsible for generating this report, and for performing each of the security checks on which it is based.

Disclaimer

ciproc gmbh understands and agrees that the vulnerability testing performed by ciproc gmbh has been performed in a professional manner, reflecting the level of knowledge and expertise possessed by those individuals performing the vulnerability testing at the time such testing has been performed.

The information in this document is provided as a service to customers of ciproc gmbh. ciproc gmbh makes no warranty, expressed or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process contained herein, or represents that its use would not infringe any privately owned rights. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation or favouring by ciproc gmbh. The views and opinions of authors expressed herein do not necessarily state or reflect those of ciproc gmbh, and may not be used for advertising or product endorsement purposes.