Vulnerability scans are performed using Nessus Professional. Some additional tools are also used to supplement the Nessus findings.
Overall risk (highest found):
Major Findings:
Risk Rating | Finding |
---|---|
CRITICAL | The remote host contains an unsupported version of a web application scripting language. |
CRITICAL | The operating system running on the remote host is no longer supported. |
HIGH | The remote web server is affected by multiple vulnerabilities. |
HIGH | The remote web server is affected by multiple vulnerabilities. |
HIGH | The remote service encrypts traffic using a protocol with known weaknesses. |
HIGH | The remote web server is affected by multiple vulnerabilities. |
HIGH | The remote name server is affected by an assertion failure vulnerability. |
HIGH | The remote Samba server is potentially affected by multiple vulnerabilities. |
HIGH | The remote web server is affected by a vulnerability. |
HIGH | The remote web server is affected by multiple vulnerabilities. |
HIGH | The remote web server is affected by multiple vulnerabilities. |
HIGH | The remote web server is affected by multiple vulnerabilities. |
MEDIUM | The remote web server is affected by multiple vulnerabilities. |
MEDIUM | The remote web server is affected by a denial of service vulnerability. |
MEDIUM | The remote web server is affected by multiple vulnerabilities. |
MEDIUM | The remote web server is affected by multiple vulnerabilities. |
MEDIUM | The SSL certificate chain for this service ends in an unrecognized self-signed certificate. |
MEDIUM | The remote web server is affected by multiple vulnerabilities. |
MEDIUM | Debugging functions are enabled on the remote web server. |
MEDIUM | The remote service encrypts traffic using an older version of TLS. |
MEDIUM | The SSL certificate for this service cannot be trusted. |
MEDIUM | An SSL certificate in the certificate chain has been signed using a weak hash algorithm. |
MEDIUM | The remote name server is affected by a denial of service vulnerability. |
MEDIUM | The remote name server is affected by Service Downgrade / Reflected DoS vulnerabilities. |
MEDIUM | The remote web server is affected by an information disclosure vulnerability. |
MEDIUM | The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. |
MEDIUM | The remote web server is affected by multiple vulnerabilities. |
MEDIUM | The remote NTP server responds to mode 6 queries. |
MEDIUM | The remote web server is affected by multiple vulnerabilities. |
MEDIUM | The version of PHP running on the remote web server is affected by multiple vulnerabilities. |
MEDIUM | It is possible to obtain sensitive information from the remote host with SSL/TLS-enabled services. |
MEDIUM | The remote service supports the use of the RC4 cipher. |
MEDIUM | The SSL certificate for this service is for a different host. |
MEDIUM | The remote service supports the use of medium strength SSL ciphers. |
MEDIUM | The remote host has IP forwarding enabled. |
MEDIUM | Signing is not required on the remote SMB server. |
MEDIUM | The version of PHP running on the remote web server is affected by an email header injection vulnerability. |
MEDIUM | The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities. |
MEDIUM | The remote web server is affected by multiple vulnerabilities. |
MEDIUM | The remote web server is affected by an information disclosure vulnerability. |
MEDIUM | The remote server's SSL certificate has already expired. |
MEDIUM | The remote web server is affected by an information disclosure vulnerability. |
MEDIUM | The remote web server is affected by multiple cross site scripting vulnerability. |
MEDIUM | The remote web server is affected by a vulnerability. |
MEDIUM | The remote web server is affected by a vulnerability. |
MEDIUM | The remote NTP server is affected by a denial of service vulnerability. |
MEDIUM | The remote DNS server is vulnerable to cache snooping attacks. |
This table summarizes each of the detected vulnerabilities. Please use the drop down selector in the table header to switch between management summaries and detailed technical information.
Changes | Risk Rating | References | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVSS3: 10.0 CVSS: 10.0 |
The remote host contains an unsupported version of a web application scripting language. Je nach Version wird die Installation von PHP auf dem Remote-Host nicht mehr unterstützt. Mangelnder Support bedeutet, dass vom Hersteller keine neuen Sicherheitspatches für das Produkt veröffentlicht werden. Infolgedessen ist es wahrscheinlich, dass es Sicherheitslücken enthält. According to its version, the installation of PHP on the remote host is no longer supported. Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it is likely to contain security vulnerabilities. Upgrade to a version of PHP that is currently supported.
|
CVE: N/A CWE: N/A VPR: N/A |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 10.0 CVSS: 10.0 |
The operating system running on the remote host is no longer supported. According to its self-reported version number, the Unix operating system running on the remote host is no longer supported. Lack of support implies that no new security patches for the product will be released by the vendor. As a result, it is likely to contain security vulnerabilities. Upgrade to a version of the Unix operating system that is currently supported.
|
CVE: N/A CWE: N/A VPR: N/A |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 8.8 CVSS: 9.0 |
The remote Samba server is potentially affected by multiple vulnerabilities. Die Version von Samba, die auf dem Remote-Host eingesetzt wird, ist 4.13.x vor 4.13.17, 4.14.x vor 4.14.12 oder 4.15.x vor 4.15.5. Es ist daher von mehreren Schwachstellen betroffen: 1. Out-of-Bounds Heap-Lese-/Schreibschwachstelle im VFS-Modul vfs_fruit die die Ausführung von Code ermöglicht. (CVE-2021-44142); 2. Informationsleck über Symlinks über die Existenz von Dateien oder Verzeichnissen außerhalb der exportierten Freigabe. (CVE-2021-44141); 3. Samba AD-Benutzer mit der Berechtigung, in ein Konto zu schreiben, können sich als beliebige Dienste ausgeben (CVE-2022-0336). Beachten Sie, dass Nessus nicht auf diese Probleme getestet hat, sondern sich nur auf die selbst gemeldete Versionsnummer der Anwendung verlassen hat. The version of Samba running on the remote host is 4.13.x prior to 4.13.17, 4.14.x prior to 4.14.12, or 4.15.x prior to 4.15.5. It is, therefore, affected by multiple vulnerabilities: - Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution. (CVE-2021-44142) - Information leak via symlinks of existence of files or directories outside of the exported share. (CVE-2021-44141) - Samba AD users with permission to write to an account can impersonate arbitrary services. (CVE-2022-0336) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number. Upgrade to Samba version 4.13.17, 4.14.12, or 4.15.5 or later.
|
CVE: CWE: N/A VPR: 8.4 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 7.5 CVSS: 7.8 |
The remote name server is affected by an assertion failure vulnerability. A denial of service (DoS) vulnerability exists in ISC BIND versions 9.11.18 / 9.11.18-S1 / 9.12.4-P2 / 9.13 / 9.14.11 / 9.15 / 9.16.2 / 9.17 / 9.17.1 and earlier. An unauthenticated, remote attacker can exploit this issue, via a specially-crafted message, to cause the service to stop responding. Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Upgrade to the patched release most closely related to your current version of BIND.
|
CVE: CWE: N/A VPR: 5.1 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 9.8 CVSS: 7.5 |
The remote web server is affected by multiple vulnerabilities. Die auf dem Remote-Host installierte Version von Apache httpd (2.4) liegt vor 2.4.47. Es ist daher von mehreren Schwachstellen betroffen, auf die im Changelog 2.4.47 verwiesen wird. (CVE-2021-30641, CVE-2020-35452, CVE-2021-26691, CVE-2021-26690, CVE-2020-13950, CVE-2020-13938, CVE-2019-17567) Beachten Sie, dass die Schwachstellen nicht auf diese Probleme getestet wurden, sondern diese Meldung nur wegen der selbst gemeldeten Versionsnummer der Anwendung angezeigt wird. The version of Apache httpd installed on the remote host is prior to 2.4.47. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.47 changelog: - Unexpected <Location> section matching with 'MergeSlashes OFF' (CVE-2021-30641) - mod_auth_digest: possible stack overflow by one nul byte while validating the Digest nonce. (CVE-2020-35452) - mod_session: Fix possible crash due to NULL pointer dereference, which could be used to cause a Denial of Service with a malicious backend server and SessionHeader. (CVE-2021-26691) - mod_session: Fix possible crash due to NULL pointer dereference, which could be used to cause a Denial of Service. (CVE-2021-26690) - mod_proxy_http: Fix possible crash due to NULL pointer dereference, which could be used to cause a Denial of Service. (CVE-2020-13950) - Windows: Prevent local users from stopping the httpd process (CVE-2020-13938) - mod_proxy_wstunnel, mod_proxy_http: Handle Upgradable protocols end-to-end negotiation. (CVE-2019-17567) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Upgrade to Apache version 2.4.47 or later.
|
CVE: CWE: N/A VPR: 6.7 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 9.8 CVSS: 7.5 |
The remote web server is affected by a vulnerability. Die auf dem Remote-Host installierte Version von Apache httpd (2.4) liegt vor 2.4.49. Es ist daher von mehreren Schwachstellen betroffen, auf die im Changelog 2.4.49 verwiesen wird. (CVE-2021-39275, CVE-2021-34798) Beachten Sie, dass die Schwachstellen nicht auf diese Probleme getestet wurden, sondern diese Meldung nur wegen der selbst gemeldeten Versionsnummer der Anwendung angezeigt wird. The version of Apache httpd installed on the remote host is prior to 2.4.49. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.49 changelog. - ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. (CVE-2021-39275) - Malformed requests may cause the server to dereference a NULL pointer. (CVE-2021-34798) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Upgrade to Apache version 2.4.49 or later.
|
CVE: CWE: N/A VPR: 6.7 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 9.8 CVSS: 7.5 |
The remote web server is affected by multiple vulnerabilities. Die auf dem Remote-Host installierte Version von Apache httpd (2.4) liegt vor 2.4.52. Es ist daher von mehreren Sicherheitsanfälligkeiten betroffen, auf die in der Empfehlung 2.4.52 verwiesen wird. (CVE-2021-44224, CVE-2021-44790) Beachten Sie, dass die Schwachstellen nicht auf diese Probleme getestet wurden, sondern diese Meldung nur wegen der selbst gemeldeten Versionsnummer der Anwendung angezeigt wird. The version of Apache httpd installed on the remote host is prior to 2.4.52. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.52 advisory. - A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included). (CVE-2021-44224) - A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier. (CVE-2021-44790) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Upgrade to Apache version 2.4.52 or later.
|
CVE: CWE: N/A VPR: 9.0 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 9.8 CVSS: 7.5 |
The remote web server is affected by multiple vulnerabilities. Die auf dem Remote-Host installierte Version von Apache httpd liegt vor 2.4.53. Es ist daher von mehreren Sicherheitsanfälligkeiten betroffen, auf die in der Empfehlung 2.4.53 verwiesen wird. (CVE-2022-22719, CVE-2022-22720, CVE-2022-22721, CVE-2022-23943) Beachten Sie, dass die Schwachstellen nicht auf diese Probleme getestet wurden, sondern diese Meldung nur wegen der selbst gemeldeten Versionsnummer der Anwendung angezeigt wird. The version of Apache httpd installed on the remote host is prior to 2.4.53. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.53 advisory. - mod_lua Use of uninitialized value of in r:parsebodyA carefully crafted request body can cause a read to a random memory area which could cause the process to crash. This issue affects Apache HTTP Server 2.4.52 and earlier. Acknowledgements: Chamal De Silva (CVE-2022-22719) - HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlierApache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling Acknowledgements: James Kettle <james.kettle portswigger.net> (CVE-2022-22720) - core: Possible buffer overflow with very large or unlimited LimitXMLRequestBodyIf LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier. Acknowledgements: Anonymous working with Trend Micro Zero Day Initiative (CVE-2022-22721) - mod_sed: Read/write beyond boundsOut-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions. Acknowledgements: Ronald Crane (Zippenhop LLC) (CVE-2022-23943) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Upgrade to Apache version 2.4.53 or later.
|
CVE: CWE: N/A VPR: 5.9 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 9.8 CVSS: 7.5 |
The remote web server is affected by multiple vulnerabilities. According to its banner, the version of Apache running on the remote host is 2.2.x prior to 2.2.33-dev or 2.4.x prior to 2.4.26. It is, therefore, affected by the following vulnerabilities : - An authentication bypass vulnerability exists due to third-party modules using the ap_get_basic_auth_pw() function outside of the authentication phase. An unauthenticated, remote attacker can exploit this to bypass authentication requirements. (CVE-2017-3167) - A NULL pointer dereference flaw exists due to third-party module calls to the mod_ssl ap_hook_process_connection() function during an HTTP request to an HTTPS port. An unauthenticated, remote attacker can exploit this to cause a denial of service condition. (CVE-2017-3169) - A NULL pointer dereference flaw exists in mod_http2 that is triggered when handling a specially crafted HTTP/2 request. An unauthenticated, remote attacker can exploit this to cause a denial of service condition. Note that this vulnerability does not affect 2.2.x. (CVE-2017-7659) - An out-of-bounds read error exists in the ap_find_token() function due to improper handling of header sequences. An unauthenticated, remote attacker can exploit this, via a specially crafted header sequence, to cause a denial of service condition. (CVE-2017-7668) - An out-of-bounds read error exists in mod_mime due to improper handling of Content-Type response headers. An unauthenticated, remote attacker can exploit this, via a specially crafted Content-Type response header, to cause a denial of service condition or the disclosure of sensitive information. (CVE-2017-7679) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number. Upgrade to Apache version 2.2.33-dev / 2.4.26 or later.
|
CVE: CWE: N/A VPR: 6.7 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 9.8 CVSS: 7.5 |
The remote web server is affected by multiple vulnerabilities. The version of Apache httpd installed on the remote host is prior to 2.4.46. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.46 advisory. - Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE (CVE-2020-11984) - Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above info will mitigate this vulnerability for unpatched servers. (CVE-2020-11993) - Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via H2Push off will mitigate this vulnerability for unpatched servers. (CVE-2020-9490) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Upgrade to Apache version 2.4.46 or later.
|
CVE: CWE: N/A VPR: 8.4 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 7.8 CVSS: 7.2 |
The remote web server is affected by multiple vulnerabilities. According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.39. It is, therefore, affected by multiple vulnerabilities: - A privilege escalation vulnerability exists in module scripts due to an ability to execute arbitrary code as the parent process by manipulating the scoreboard. (CVE-2019-0211) - An access control bypass vulnerability exists in mod_auth_digest due to a race condition when running in a threaded server. An attacker with valid credentials could authenticate using another username. (CVE-2019-0217) - An access control bypass vulnerability exists in mod_ssl when using per-location client certificate verification with TLSv1.3. (CVE-2019-0215) In addition, Apache httpd is also affected by several additional vulnerabilities including a denial of service, read-after-free and URL path normalization inconsistencies. Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number. Upgrade to Apache version 2.4.39 or later.
|
CVE: CWE: N/A VPR: 7.4 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 7.5 CVSS: 7.1 |
The remote service encrypts traffic using a protocol with known weaknesses. Der Remotedienst akzeptiert Verbindungen, die mit SSL 2.0 und/oder SSL 3.0 verschlüsselt wurden. Diese Versionen von SSL sind von mehreren kryptografischen Fehlern betroffen, darunter: 1. Ein unsicheres Auffüllungsschema mit CBC-Chiffren; 2. Unsichere Neuverbindungen und Wiederaufnahme einer Session. Ein Angreifer kann diese Fehler ausnutzen, um Man-in-the-Middle-Angriffe durchzuführen oder die Kommunikation zwischen dem betroffenen Dienst und Clients zu entschlüsseln. Obwohl SSL/TLS über ein sicheres Mittel zur Auswahl der am höchsten unterstützten Version des Protokolls verfügt (so dass diese Versionen nur verwendet werden, wenn der Client oder Server nichts Besseres unterstützt), implementieren viele Webbrowser dies auf eine unsichere Weise, die es einem Angreifer ermöglicht, eine Verbindung herunterzustufen (z. B. in POODLE). Daher wird empfohlen, diese Protokolle vollständig zu deaktivieren. NIST hat festgestellt, dass SSL 3.0 für eine sichere Kommunikation nicht mehr akzeptabel ist. Ab dem Datum der Durchsetzung in PCI DSS v3.1 entspricht keine SSL-Version der Definition von PCI SSC für "starke Kryptografie". The remote service accepts connections encrypted using SSL 2.0 and/or SSL 3.0. These versions of SSL are affected by several cryptographic flaws, including: - An insecure padding scheme with CBC ciphers. - Insecure session renegotiation and resumption schemes. An attacker can exploit these flaws to conduct man-in-the-middle attacks or to decrypt communications between the affected service and clients. Although SSL/TLS has a secure means for choosing the highest supported version of the protocol (so that these versions will be used only if the client or server support nothing better), many web browsers implement this in an unsafe way that allows an attacker to downgrade a connection (such as in POODLE). Therefore, it is recommended that these protocols be disabled entirely. NIST has determined that SSL 3.0 is no longer acceptable for secure communications. As of the date of enforcement found in PCI DSS v3.1, any version of SSL will not meet the PCI SSC's definition of 'strong cryptography'. Consult the application's documentation to disable SSL 2.0 and 3.0.
Use TLS 1.2 (with approved cipher suites) or higher instead.
|
CVE: N/A CWE: N/A VPR: N/A |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 9.8 CVSS: 6.8 |
The remote web server is affected by multiple vulnerabilities. According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.33. It is, therefore, affected by multiple vulnerabilities: - An out of bounds write vulnerability exists in mod_authnz_ldap with AuthLDAPCharsetConfig enabled. An unauthenticated, remote attacker can exploit this, via the Accept-Language header value, to cause the application to stop responding. (CVE-2017-15710) - An arbitrary file upload vulnerability exists in the FilesMatch component where a malicious filename can be crafted to match the expression check for a newline character. An unauthenticated, remote attacker can exploit this, via newline character, to upload arbitrary files on the remote host subject to the privileges of the user. (CVE-2017-15715) - A session management vulnerability exists in the mod_session component due to SessionEnv being enabled and forwarding it's session data to the CGI Application. An unauthenticated, remote attacker can exploit this, via tampering the HTTP_SESSION and using a session header, to influence content. (CVE-2018-1283) - An out of bounds access vulnerability exists when the size limit is reached. An unauthenticated, remote attacker can exploit this, to cause the Apache HTTP Server to crash. (CVE-2018-1301) - A write after free vulnerability exists in HTTP/2 stream due to a NULL pointer being written to an area of freed memory. An unauthenticated, remote attacker can exploit this to execute arbitrary code. (CVE-2018-1302) - An out of bounds read vulnerability exists in mod_cache_socache. An unauthenticated, remote attacker can exploit this, via a specially crafted HTTP request header to cause the application to stop responding. (CVE-2018-1303) - A weak digest vulnerability exists in the HTTP digest authentication challenge. An unauthenticated, remote attacker can exploit this in a cluster of servers configured to use a common digest authentication, to replay HTTP requests across servers without being detected. (CVE-2018-1312) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number. Upgrade to Apache version 2.4.33 or later.
|
CVE: CWE: N/A VPR: 7.4 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 9.0 CVSS: 6.8 |
The remote web server is affected by a vulnerability. Die auf dem Remote-Host installierte Version von Apache httpd (2.4) liegt vor 2.4.49. Es ist daher von mehreren Schwachstellen betroffen, auf die im Changelog 2.4.49 verwiesen wird. (CVE-2021-39275, CVE-2021-34798) Beachten Sie, dass die Schwachstellen nicht auf diese Probleme getestet wurden, sondern diese Meldung nur wegen der selbst gemeldeten Versionsnummer der Anwendung angezeigt wird. The version of Apache httpd installed on the remote host is prior to 2.4.49. It is, therefore, affected by a vulnerability as referenced in the 2.4.49 changelog. - A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. (CVE-2021-40438) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Upgrade to Apache version 2.4.49 or later.
|
CVE: CWE: N/A VPR: 10.0 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 9.1 CVSS: 6.4 |
The remote web server is affected by multiple vulnerabilities. The version of Apache httpd installed on the remote host is prior to 2.4.41. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.41 advisory, including the following: - A limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed. (CVE-2019-10092) - HTTP/2 (2.4.20 through 2.4.39) very early pushes, for example configured with H2PushResource, could lead to an overwrite of memory in the pushing request's pool, leading to crashes. The memory copied is that of the configured push link header values, not data supplied by the client. (CVE-2019-10081) - Some HTTP/2 implementations are vulnerable to unconstrained internal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both. (CVE-2019-9517) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Upgrade to Apache version 2.4.41 or later.
|
CVE: CWE: N/A VPR: 5.9 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 6.5 CVSS: 6.4 |
The SSL certificate for this service cannot be trusted. Das X.509 Zertifikat des Servers ist nicht vertrauenswürdig. Dies kann zum Beispiel daran liegen, dass das Zertifikat ein Selbst-signiertes ist oder die Informationen des Zertifikats passen nicht zu der eingesetzten Domain. The server's X.509 certificate cannot be trusted. This situation can occur in three different ways, in which the chain of trust can be broken, as stated below : - First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority. - Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificate's 'notBefore' dates, or after one of the certificate's 'notAfter' dates. - Third, the certificate chain may contain a signature that either didn't match the certificate's information or could not be verified. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificate's issuer using a signing algorithm that Nessus either does not support or does not recognize. If the remote host is a public host in production, any break in the chain makes it more difficult for users to verify the authenticity and identity of the web server. This could make it easier to carry out man-in-the-middle attacks against the remote host. Purchase or generate a proper SSL certificate for this service.
|
CVE: N/A CWE: N/A VPR: N/A |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 9.1 CVSS: 6.4 |
The remote web server is affected by multiple vulnerabilities. According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.27. It is, therefore, affected by the following vulnerabilities : - A denial of service vulnerability exists in httpd due to a failure to initialize or reset the value placeholder in [Proxy-]Authorization headers of type 'Digest' before or between successive key=value assignments by mod_auth_digest. An unauthenticated, remote attacker can exploit this, by providing an initial key with no '=' assignment, to disclose sensitive information or cause a denial of service condition. (CVE-2017-9788) - A read-after-free error exists in httpd that is triggered when closing a large number of connections. An unauthenticated, remote attacker can exploit this to have an unspecified impact. (CVE-2017-9789) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number. Upgrade to Apache version 2.4.27 or later.
|
CVE: CWE: N/A VPR: 6.0 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: N/A CVSS: 6.4 |
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. Die X.509-Zertifikatkette für den HTTPS-Dienst ist nicht von einer anerkannten Zertifizierungsstelle signiert. Wenn der betroffene Host öffentlich in der Produktion ist, wird die sichere Verwendung von SSL ausgehebelt, da ein Man-in-the-Middle-Angriff wieder möglich wird. The X.509 certificate chain for this service is not signed by a recognized certificate authority. If the remote host is a public host in production, this nullifies the use of SSL as anyone could establish a man-in-the-middle attack against the remote host. Note that this plugin does not check for certificate chains that end in a certificate that is not self-signed, but is signed by an unrecognized certificate authority. Purchase or generate a proper SSL certificate for this service.
|
CVE: N/A CWE: N/A VPR: N/A |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 6.5 CVSS: 6.1 |
The remote service encrypts traffic using an older version of TLS. The remote service accepts connections encrypted using TLS 1.0. TLS 1.0 has a number of cryptographic design flaws. Modern implementations of TLS 1.0 mitigate these problems, but newer versions of TLS like 1.2 and 1.3 are designed against these flaws and should be used whenever possible. As of March 31, 2020, Endpoints that aren’t enabled for TLS 1.2 and higher will no longer function properly with major web browsers and major vendors. PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30, 2018, except for POS POI terminals (and the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any known exploits. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
CVE: N/A CWE: N/A VPR: N/A |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 6.5 CVSS: 5.8 |
The remote host has IP forwarding enabled. Auf dem Remotehost ist die IP-Weiterleitung aktiviert. Ein Angreifer kann dies ausnutzen, um Pakete durch den Host zu leiten und möglicherweise einige Firewalls / Router zu umgehen. Sofern es sich bei dem Remotehost nicht um einen Router handelt, wird empfohlen, die IP-Weiterleitung zu deaktivieren. The remote host has IP forwarding enabled. An attacker can exploit this to route packets through the host and potentially bypass some firewalls / routers / NAC filtering. Unless the remote host is a router, it is recommended that you disable IP forwarding. On Linux, you can disable IP forwarding by doing :
echo 0 > /proc/sys/net/ipv4/ip_forward
On Windows, set the key 'IPEnableRouter' to 0 under
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
On Mac OS X, you can disable IP forwarding by executing the command :
sysctl -w net.inet.ip.forwarding=0
For other systems, check with your vendor.
|
CVE: CWE: N/A VPR: 4.0 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 6.1 CVSS: 5.8 |
The remote web server is affected by multiple vulnerabilities. The version of Apache httpd installed on the remote host is prior to 2.4.42. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.42 advisory. - In Apache HTTP Server 2.4.0 to 2.4.41, mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server. (CVE-2020-1934) - In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an unexpected URL within the request URL. (CVE-2020-1927) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Upgrade to Apache version 2.4.42 or later.
|
CVE: CWE: N/A VPR: 3.8 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 7.5 CVSS: 5.0 |
An SSL certificate in the certificate chain has been signed using a weak hash algorithm. The remote service uses an SSL certificate chain that has been signed using a cryptographically weak hashing algorithm (e.g. MD2, MD4, MD5, or SHA1). These signature algorithms are known to be vulnerable to collision attacks. An attacker can exploit this to generate another certificate with the same digital signature, allowing an attacker to masquerade as the affected service. Note that this plugin reports all SSL certificate chains signed with SHA-1 that expire after January 1, 2017 as vulnerable. This is in accordance with Google's gradual sunsetting of the SHA-1 cryptographic hash algorithm. Note that certificates in the chain that are contained in the Nessus CA database (known_CA.inc) have been ignored. Contact the Certificate Authority to have the SSL certificate reissued.
|
CVE: CWE: VPR: 6.1 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 8.6 CVSS: 5.0 |
The remote name server is affected by Service Downgrade / Reflected DoS vulnerabilities. According to its self-reported version, the instance of ISC BIND 9 running on the remote name server is affected by performance downgrade and Reflected DoS vulnerabilities. This is due to BIND DNS not sufficiently limiting the number fetches which may be performed while processing a referral response. An unauthenticated, remote attacker can exploit this to cause degrade the service of the recursive server or to use the affected server as a reflector in a reflection attack. Upgrade to the ISC BIND version referenced in the vendor advisory.
|
CVE: CWE: N/A VPR: 5.2 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 7.5 CVSS: 5.0 |
The remote web server is affected by multiple vulnerabilities. According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.34. It is, therefore, affected by the following vulnerabilities: - By specially crafting HTTP/2 requests, workers would be allocated 60 seconds longer than necessary, leading to worker exhaustion and a denial of service. (CVE-2018-1333) - By specially crafting HTTP requests, the mod_md challenge handler would dereference a NULL pointer and cause the child process to segfault. This could be used to DoS the server. (CVE-2018-8011) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number. Upgrade to Apache version 2.4.34 or later.
|
CVE: CWE: N/A VPR: 3.6 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 7.5 CVSS: 5.0 |
The remote web server is affected by multiple vulnerabilities. According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.28. It is, therefore, affected by an HTTP vulnerability related to the <Limit {method}> directive in an .htaccess file. Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number. Upgrade to Apache version 2.4.28 or later.
|
CVE: CWE: N/A VPR: 6.1 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 5.3 CVSS: 5.0 |
Debugging functions are enabled on the remote web server. The remote web server supports the TRACE and/or TRACK methods. TRACE and TRACK are HTTP methods that are used to debug web server connections. Disable these HTTP methods. Refer to the plugin output for more information.
|
CVE: CWE: VPR: 4.0 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 5.3 CVSS: 5.0 |
The remote DNS server is vulnerable to cache snooping attacks. The remote DNS server responds to queries for third-party domains that do not have the recursion bit set. This may allow a remote attacker to determine which domains have recently been resolved via this name server, and therefore which hosts have been recently visited. For instance, if an attacker was interested in whether your company utilizes the online services of a particular financial institution, they would be able to use this attack to build a statistical model regarding company usage of that financial institution. Of course, the attack can also be used to find B2B partners, web-surfing patterns, external mail servers, and more. Note: If this is an internal DNS server not accessible to outside networks, attacks would be limited to the internal network. This may include employees, consultants and potentially users on a guest network or WiFi connection if supported. Contact the vendor of the DNS software for a fix.
|
CVE: N/A CWE: N/A VPR: N/A |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 7.5 CVSS: 5.0 |
The remote web server is affected by multiple vulnerabilities. According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.38. It is, therefore, affected by multiple vulnerabilities: - A denial of service (DoS) vulnerability exists in HTTP/2 steam handling. An unauthenticated, remote attacker can exploit this issue, via sending request bodies in a slow loris way to plain resources, to occupy a server thread. (CVE-2018-17189) - A vulnerability exists in mod_sesion_cookie, as it does not properly check the expiry time of cookies. (CVE-2018-17199) - A denial of service (DoS) vulnerability exists in mod_ssl when used with OpenSSL 1.1.1 due to an interaction in changes to handling of renegotiation attempts. An unauthenticated, remote attacker can exploit this issue to cause mod_ssl to stop responding. (CVE-2019-0190) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number. Upgrade to Apache version 2.4.38 or later.
|
CVE: CWE: N/A VPR: 3.6 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 5.8 CVSS: 5.0 |
The remote NTP server responds to mode 6 queries. Der vom Server eingesetzte NTP Dienst weist eine Schwachstelle auf, die von Angreifern für eine Denial of Service Attacke genutzt werden kann. Der Dienst sollte umkonfiguriert werden, um dies zu verhindern. The remote NTP server responds to mode 6 queries. Devices that respond to these queries have the potential to be used in NTP amplification attacks. An unauthenticated, remote attacker could potentially exploit this, via a specially crafted mode 6 query, to cause a reflected denial of service condition. Restrict NTP mode 6 queries.
|
CVE: N/A CWE: N/A VPR: N/A |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 7.5 CVSS: 5.0 |
The remote NTP server is affected by a denial of service vulnerability. In der Version von ntpd, die auf dem Remote-Host ausgeführt wird, ist der Befehl "monlist" aktiviert. Dieser Befehl gibt eine Liste mit IP-Adressen zurück, die eine Verbindung mit dem Dienst hergestellt haben. Diese Version des ntpd ist verwundbar und ermöglicht einem nicht authentifizierten Remoteangreifer, den Netzwerkverkehr mithilfe gefälschter Anfragen zu manipulieren. Darüber hinaus kann ein Angreifer dieses Problem ausnutzen, um Aufklärungs- oder Distributed-Denial-of-Service-Angriffe (DDoS) durchzuführen. The version of ntpd running on the remote host has the 'monlist' command enabled. This command returns a list of recent hosts that have connected to the service. However, it is affected by a denial of service vulnerability in ntp_request.c that allows an unauthenticated, remote attacker to saturate network traffic to a specific IP address by using forged REQ_MON_GETLIST or REQ_MON_GETLIST_1 requests. Furthermore, an attacker can exploit this issue to conduct reconnaissance or distributed denial of service (DDoS) attacks. If using NTP from the Network Time Protocol Project, upgrade to NTP version 4.2.7-p26 or later. Alternatively, add 'disable monitor' to the ntp.conf configuration file and restart the service. Otherwise, limit access to the affected service to trusted hosts, or contact the vendor for a fix.
|
CVE: CWE: N/A VPR: 4.4 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 7.5 CVSS: 5.0 |
The version of PHP running on the remote web server is affected by multiple vulnerabilities. Gemäß der selbst gemeldeten Versionsnummer liegt die php-Version, die auf dem Remote-Webserver ausgeführt wird, vor 7.3.24. Es ist daher von mehreren Schwachstellen betroffen. According to its self-reported version number, the version of PHP running on the remote web server is prior to 7.3.24. It is, therefore affected by multiple vulnerabilities Upgrade to PHP version 7.3.24 or later.
|
CVE: N/A CWE: N/A VPR: N/A |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 5.3 CVSS: 5.0 |
The SSL certificate for this service is for a different host. Das Attribut 'commonName' (CN) des SSL-Zertifikats ist nicht für den angebotenen Dienst ausgestellt. The 'commonName' (CN) attribute of the SSL certificate presented for this service is for a different machine. Purchase or generate a proper SSL certificate for this service.
|
CVE: N/A CWE: N/A VPR: N/A |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 7.5 CVSS: 5.0 |
The remote web server is affected by a vulnerability. Die auf dem Remote-Host installierte Version von Apache httpd ist größer als 2.4.17 und kleiner 2.4.49. Es ist daher von einer Schwachstelle betroffen, auf die im Changelog 2.4.49 verwiesen wird. Eine gestaltete Methode, die über HTTP/2 gesendet wird, umgeht die Validierung und wird von mod_proxy weitergeleitet, was zu Anforderungsaufteilung oder Cache-Poisoning führen kann. Beachten Sie, dass die Schwachstellen nicht auf diese Probleme getestet wurden, sondern diese Meldung nur wegen der selbst gemeldeten Versionsnummer der Anwendung angezeigt wird. The version of Apache httpd installed on the remote host is greater than 2.4.17 and prior to 2.4.49. It is, therefore, affected by a vulnerability as referenced in the 2.4.49 changelog. A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Upgrade to Apache version 2.4.49 or later.
|
CVE: CWE: N/A VPR: 5.1 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 5.3 CVSS: 5.0 |
Signing is not required on the remote SMB server. Signing is not required on the remote SMB server. An unauthenticated, remote attacker can exploit this to conduct man-in-the-middle attacks against the SMB server. Enforce message signing in the host's configuration. On Windows, this is found in the policy setting 'Microsoft network server: Digitally sign communications (always)'. On Samba, the setting is called 'server signing'. See the 'see also' links for further details.
|
CVE: N/A CWE: N/A VPR: N/A |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 5.3 CVSS: 5.0 |
The version of PHP running on the remote web server is affected by an email header injection vulnerability. Gemäß der selbst angegebenen Versionsnummer liegt die php-Version, die auf dem Remote-Webserver ausgeführt wird, vor 7.3.28. Es ist daher von einer E-Mail-Header-Injection-Schwachstelle betroffen, die auf ein Versäumnis zurückzuführen ist, die CR-LF-Sequenzen in Header-Feldern ordnungsgemäß zu verarbeiten. Ein nicht authentifizierter, entfernter Angreifer kann dies ausnutzen, indem er Zeilenvorschubzeichen in E-Mail-Header einfügt, um die volle Kontrolle über den Inhalt von E-Mail-Headern zu erhalten. According to its self-reported version number, the version of PHP running on the remote web server is prior to 7.3.28. It is, therefore affected by an email header injection vulnerability, due to a failure to properly handle CR-LF sequences in header fields. An unauthenticated, remote attacker can exploit this, by inserting line feed characters into email headers, to gain full control of email header content. Upgrade to PHP version 7.3.28 or later.
|
CVE: N/A CWE: N/A VPR: N/A |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 7.5 CVSS: 5.0 |
The remote service supports the use of medium strength SSL ciphers. Auf dem Webserver verwendete Verfahren erlauben Zugriff auf einige Sicherungsdateien. Es sollte sichergestellt werden, daß diese keine sensitiven Informationen enthalten, wie Passwörter für Datenbanken. Nicht benötigte Dateien sollten gelöscht werden. The remote host supports the use of SSL ciphers that offer medium strength encryption. Nessus regards medium strength as any encryption that uses key lengths at least 64 bits and less than 112 bits, or else that uses the 3DES encryption suite. Note that it is considerably easier to circumvent medium strength encryption if the attacker is on the same physical network. Reconfigure the affected application if possible to avoid use of medium strength ciphers.
|
CVE: CWE: N/A VPR: 4.4 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 5.3 CVSS: 5.0 |
The remote server's SSL certificate has already expired. Das vom Webdienst verwendete SSL Zertifikat ist nicht mehr gültig. Der Dienst sollte umgehend konfiguriert und ein neues Zertifikat verwendet werden. This plugin checks expiry dates of certificates associated with SSL- enabled services on the target and reports whether any have already expired. Purchase or generate a new SSL certificate to replace the existing one.
|
CVE: N/A CWE: N/A VPR: N/A |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 5.3 CVSS: 5.0 |
The remote web server is affected by an information disclosure vulnerability. The Apache web server running on the remote host is affected by an information disclosure vulnerability. An unauthenticated, remote attacker can exploit this, by sending a crafted request, to display a listing of a remote directory, even if a valid index file exists in the directory. For Apache web server later than 1.3.22, review listing directory configuration to avoid disclosing sensitive information Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.
|
CVE: CWE: N/A VPR: 2.2 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 5.3 CVSS: 4.3 |
The remote web server is affected by an information disclosure vulnerability. Laut dem Server-Antwort-Header liegt die installierte Version von nginx vor 1.17.7. Es ist daher von einer Schwachstelle zur Offenlegung von Informationen betroffen. According to its Server response header, the installed version of nginx is prior to 1.17.7. It is, therefore, affected by an information disclosure vulnerability. Upgrade to nginx version 1.17.7 or later.
|
CVE: CWE: N/A VPR: 1.4 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 3.7 CVSS: 4.3 |
The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities. Die Webanwendung auf dem Remote-Host ist von einer Cross-Site-Scripting-Schwachstelle betroffen, die auf eine anfällige Version von Apache Struts 2 zurückzuführen ist, die die Parameter in den Tags "s:a" und "s:url" nicht richtig kodiert. Ein entfernter Angreifer kann dies ausnutzen, indem er einen Benutzer dazu verleitet, eine Seite mit beliebigem Skriptcode anzufordern. Dies kann Konsequenzen haben, z. B. gestohlene Anmeldeinformationen für die Authentifizierung. The web application on the remote host is affected by a cross-site scripting vulnerability due to a vulnerable version of Apache Struts 2 that fails to properly encode the parameters in the 's:a' and 's:url' tags. A remote attacker can exploit this by tricking a user into requesting a page with arbitrary script code injected. This could have consequences such as stolen authentication credentials. Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.
|
CVE: CWE: VPR: 1.4 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 6.8 CVSS: 4.3 |
It is possible to obtain sensitive information from the remote host with SSL/TLS-enabled services. Der Remotehost ist von einer Man-in-the-Middle-Angriff (MitM) betroffen, die als POODLE bezeichnet wird. Die Sicherheitsanfälligkeit ist auf die Art und Weise zurückzuführen, wie SSL 3.0 beim Entschlüsseln von Nachrichten, die mit Blockchiffren verschlüsselt wurden, im CBC-Modus (Cipher Block Chaining, Verschlüsselung) verarbeitet. MitM-Angreifer können ein ausgewähltes Byte eines Chiffretextes in nur 256 Versuchen entschlüsseln, wenn sie die betroffene Applikation zwingen können, wiederholt dieselben Daten über neu erstellte SSL 3.0-Verbindungen zu senden. Solange sowohl ein Client als auch ein Dienst SSLv3 unterstützen, kann eine Verbindung auf SSLv3 "zurückgesetzt" werden, auch wenn TLSv1 oder neuer vom Client und Dienst unterstützt wird. Der TLS Fallback SCSV-Mechanismus verhindert "Versions-Rollback"-Angriffe, ohne Legacy-Clients zu beeinträchtigen. Verbindungen können jedoch nur geschützt werden, wenn Client und Dienst den Mechanismus unterstützen. Websites, die SSLv3 nicht sofort deaktivieren können, sollten diesen Mechanismus aktivieren. Dies ist eine Schwachstelle in der SSLv3-Spezifikation, nicht in einer bestimmten SSL-Implementierung. Das Deaktivieren von SSLv3 ist die einzige Möglichkeit, die Schwachstelle vollständig zu verringern. The remote host is affected by a man-in-the-middle (MitM) information disclosure vulnerability known as POODLE. The vulnerability is due to the way SSL 3.0 handles padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode. MitM attackers can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections. As long as a client and service both support SSLv3, a connection can be 'rolled back' to SSLv3, even if TLSv1 or newer is supported by the client and service. The TLS Fallback SCSV mechanism prevents 'version rollback' attacks without impacting legacy clients; however, it can only protect connections when the client and service support the mechanism. Sites that cannot disable SSLv3 immediately should enable this mechanism. This is a vulnerability in the SSLv3 specification, not in any particular SSL implementation. Disabling SSLv3 is the only way to completely mitigate the vulnerability. Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV mechanism until SSLv3 can be disabled.
|
CVE: CWE: N/A VPR: 5.7 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: N/A CVSS: 4.3 |
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. Die vom Webdienst verwendeten Verschlüsselungsalgorithmen weisen Konfigurationsschwächen auf. Die Konfiguration sollte geändert und arcfour Algorithmen gelöscht werden. Nessus has detected that the remote SSH server is configured to use the Arcfour stream cipher or no cipher at all. RFC 4253 advises against using Arcfour due to an issue with weak keys. Contact the vendor or consult product documentation to remove the weak ciphers.
|
CVE: N/A CWE: N/A VPR: N/A |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 5.3 CVSS: 4.3 |
The remote web server is affected by an information disclosure vulnerability. The remote web server is affected by an information disclosure vulnerability due to the ETag header providing sensitive information that could aid an attacker, such as the inode number of requested files. Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
|
CVE: CWE: VPR: 1.4 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 5.9 CVSS: 4.3 |
The remote service supports the use of the RC4 cipher. Die vom Webdienst verwendeten Verschlüsselungsalgorithmen weisen Konfigurationsschwächen auf. Die Konfiguration sollte geändert und RC4 gelöscht werden. The remote host supports the use of RC4 in one or more cipher suites. The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small biases are introduced into the stream, decreasing its randomness. If plaintext is repeatedly encrypted (e.g., HTTP cookies), and an attacker is able to obtain many (i.e., tens of millions) ciphertexts, the attacker may be able to derive the plaintext. Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.
|
CVE: CWE: N/A VPR: 3.6 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 6.1 CVSS: 4.3 |
The remote web server is affected by multiple cross site scripting vulnerability. Gemäß der selbstberichteten Version im Skript ist die auf dem Remotewebserver gehostete Version von JQuery größer oder gleich 1.2 und vor 3.5.0. Es ist daher von mehreren Cross-Site-Scripting-Schwachstellen betroffen. Beachten Sie, dass die Schwachstellen, auf die in diesem Plugin verwiesen wird, keine Sicherheitsauswirkungen auf PAN-OS haben und/oder die szenarien, die für eine erfolgreiche Ausnutzung erforderlich sind, auf Geräten, auf denen eine PAN-OS-Version ausgeführt wird, nicht vorhanden sind. According to the self-reported version in the script, the version of JQuery hosted on the remote web server is greater than or equal to 1.2 and prior to 3.5.0. It is, therefore, affected by multiple cross site scripting vulnerabilities. Note, the vulnerabilities referenced in this plugin have no security impact on PAN-OS, and/or the scenarios required for successful exploitation do not exist on devices running a PAN-OS release. Upgrade to JQuery version 3.5.0 or later.
|
CVE: CWE: N/A VPR: 5.7 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 5.9 CVSS: 4.3 |
The remote web server is affected by a denial of service vulnerability. According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.35. It is, therefore, affected by the following vulnerability: - By sending continuous SETTINGS frames of maximum size an ongoing HTTP/2 connection could be kept busy and would never time out. This can be abused for a DoS on the server. This only affect a server that has enabled the h2 protocol. Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number. Upgrade to Apache version 2.4.35 or later.
|
CVE: CWE: N/A VPR: 3.6 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 6.5 CVSS: 4.0 |
The remote name server is affected by a denial of service vulnerability. According to its self-reported version number, the installation of ISC BIND running on the remote name server is version 9.x prior to 9.11.22, 9.12.x prior to 9.16.6 or 9.17.x prior to 9.17.4. It is, therefore, affected by a denial of service (DoS) vulnerability due to an assertion failure when attempting to verify a truncated response to a TSIG-signed request. An authenticated, remote attacker can exploit this issue by sending a truncated response to a TSIG-signed request to trigger an assertion failure, causing the server to exit. Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Upgrade to BIND 9.11.22, 9.16.6, 9.17.4 or later.
|
CVE: CWE: N/A VPR: 4.4 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: N/A CVSS: N/A |
The X.509 certificate chain used by this service contains certificates with RSA keys shorter than 2048 bits. Mindestens eines der vom Remotehost gesendeten X.509-Zertifikate hat einen Schlüssel, der kürzer als 2048 Bit ist. Gemäß den vom Certification Authority/Browser (CA/B) Forum festgelegten Industriestandards müssen Zertifikate, die nach dem 1. Januar 2014 ausgestellt wurden, mindestens 2048 Bit groß sein. Einige Browser-SSL-Implementierungen können Schlüssel mit weniger als 2048 Bit nach dem 1. Januar 2014 ablehnen. Darüber hinaus können einige SSL-Zertifikatanbieter Zertifikate mit weniger als 2048 Bit vor dem 1. Januar 2014 widerrufen. At least one of the X.509 certificates sent by the remote host has a key that is shorter than 2048 bits. According to industry standards set by the Certification Authority/Browser (CA/B) Forum, certificates issued after January 1, 2014 must be at least 2048 bits. Some browser SSL implementations may reject keys less than 2048 bits after January 1, 2014. Additionally, some SSL certificate vendors may revoke certificates less than 2048 bits before January 1, 2014. Note that Nessus will not flag root certificates with RSA keys less than 2048 bits if they were issued prior to December 31, 2010, as the standard considers them exempt. Replace the certificate in the chain with the RSA key less than 2048 bits in length with a longer key, and reissue any certificates signed by the old certificate.
|
CVE: N/A CWE: N/A VPR: N/A |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 5.9 CVSS: 2.6 |
The remote service supports the use of anonymous SSL ciphers. Der Remote-Host unterstützt die Verwendung anonymer SSL-Verschlüsselung. Auf diese Weise kann ein Administrator einen Dienst einrichten, der den Datenverkehr verschlüsselt, ohne dass SSL-Zertifikate generiert und konfiguriert werden müssen. Er bietet jedoch keine Möglichkeit, die Identität des Remotehosts zu überprüfen und macht den Dienst anfällig für Man-in-the-Middle-Angriffe. The remote host supports the use of anonymous SSL ciphers. While this enables an administrator to set up a service that encrypts traffic without having to generate and configure SSL certificates, it offers no way to verify the remote host's identity and renders the service vulnerable to a man-in-the-middle attack. Note: This is considerably easier to exploit if the attacker is on the same physical network. Reconfigure the affected application if possible to avoid use of weak ciphers.
|
CVE: CWE: N/A VPR: 4.4 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: N/A CVSS: 2.6 |
The remote POP3 daemon allows credentials to be transmitted in cleartext. The remote host is running a POP3 daemon that allows cleartext logins over unencrypted connections. An attacker can uncover user names and passwords by sniffing traffic to the POP3 daemon if a less secure authentication mechanism (eg, USER command, AUTH PLAIN, AUTH LOGIN) is used. Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.
|
CVE: N/A CWE: N/A VPR: N/A |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 3.7 CVSS: 2.6 |
The remote SSH server is configured to allow weak key exchange algorithms. The remote SSH server is configured to allow key exchange algorithms which are considered weak. This is based on the IETF draft document Key Exchange (KEX) Method Updates and Recommendations for Secure Shell (SSH) draft-ietf-curdle-ssh-kex-sha2-20. Section 4 lists guidance on key exchange algorithms that SHOULD NOT and MUST NOT be enabled. This includes: diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 gss-gex-sha1-* gss-group1-sha1-* gss-group14-sha1-* rsa1024-sha1 Note that this plugin only checks for the options of the SSH server, and it does not check for vulnerable software versions. Contact the vendor or consult product documentation to disable the weak algorithms.
|
CVE: N/A CWE: N/A VPR: N/A |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: N/A CVSS: 2.6 |
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The remote SSH server is configured to allow either MD5 or 96-bit MAC algorithms, both of which are considered weak. Note that this plugin only checks for the options of the SSH server, and it does not check for vulnerable software versions. Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
|
CVE: N/A CWE: N/A VPR: N/A |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: N/A CVSS: 2.6 |
The SSH server is configured to use Cipher Block Chaining. The SSH server is configured to support Cipher Block Chaining (CBC) encryption. This may allow an attacker to recover the plaintext message from the ciphertext. Note that this plugin only checks for the options of the SSH server and does not check for vulnerable software versions. Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
|
CVE: CWE: VPR: 2.5 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: N/A CVSS: 2.6 |
The remote service has a configuration that may make it vulnerable to the CRIME attack. Der Remotedienst verfügt über eine von zwei Konfigurationen, von denen bekannt ist, dass sie für den CRIME-Angriff erforderlich sind: 1. SSL / TLS-Komprimierung ist aktiviert 0der 2. TLS kündigt das SPDY-Protokoll vor Version 4 an. The remote service has one of two configurations that are known to be required for the CRIME attack : - SSL / TLS compression is enabled. - TLS advertises the SPDY protocol earlier than version 4. Note that Nessus did not attempt to launch the CRIME attack against the remote service. Disable compression and / or the SPDY service.
|
CVE: CWE: N/A VPR: 5.9 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 0.0 CVSS: 0.0 |
An ONC RPC portmapper is running on the remote host. The RPC portmapper is running on this port. The portmapper allows someone to get the port number of each RPC service running on the remote host by sending either multiple lookup requests or a DUMP request. n/a
|
CVE: CWE: N/A VPR: N/A |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS3: 0.0 CVSS: 0.0 |
It is possible to determine the exact time set on the remote host. The remote host answers to an ICMP timestamp request. This allows an attacker to know the date that is set on the targeted machine, which may assist an unauthenticated, remote attacker in defeating time-based authentication protocols. Timestamps returned from machines running Windows Vista / 7 / 2008 / 2008 R2 are deliberately incorrect, but usually within 1000 seconds of the actual system time. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
CVE: CWE: VPR: N/A |
Full detection information for each system can be found in this section. Changes observed since the previous scan are highlighted.
172.21.17.13 (VulnLIB) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:57:04 | 2022-03-26 22:25:40 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote host contains an unsupported version of a web application scripting language. Source : X-Powered-By: PHP/5.4.45-0+deb7u7 Installed version : 5.4.45-0+deb7u7 End of support date : 2015/09/03 Announcement : http://php.net/supported-versions.php Supported versions : 7.3.x / 7.4.x / 8.0.x Upgrade to a version of PHP that is currently supported.
The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities. Nessus was able to exploit the issue using the following URL : http://172.21.17.13:9292/?"><script>alert('struts_sa_surl_xss.nasl-1647596530')</script> Nessus was able to exploit the issue using the following URL : http://172.21.17.13/?"><script>alert('struts_sa_surl_xss.nasl-1647596528')</script> Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.
The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities. Nessus was able to exploit the issue using the following URL : http://172.21.17.13:9292/?"><script>alert('struts_sa_surl_xss.nasl-1647596530')</script> Nessus was able to exploit the issue using the following URL : http://172.21.17.13/?"><script>alert('struts_sa_surl_xss.nasl-1647596528')</script> Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The remote web server is affected by multiple cross site scripting vulnerability. URL : http://172.21.17.13:9292/lib/3rd_party/jquery.js Installed version : 1.9.1 Fixed version : 3.5.0 URL : http://172.21.17.13/lib/3rd_party/jquery.js Installed version : 1.9.1 Fixed version : 3.5.0 Upgrade to JQuery version 3.5.0 or later.
The remote web server is affected by multiple cross site scripting vulnerability. URL : http://172.21.17.13:9292/lib/3rd_party/jquery.js Installed version : 1.9.1 Fixed version : 3.5.0 URL : http://172.21.17.13/lib/3rd_party/jquery.js Installed version : 1.9.1 Fixed version : 3.5.0 Upgrade to JQuery version 3.5.0 or later.
The version of PHP running on the remote web server is affected by multiple vulnerabilities. URL : http://172.21.17.13:9292/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7) Installed version : 5.4.45-0+deb7u7 Fixed version : 7.3.24 URL : http://172.21.17.13/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7) Installed version : 5.4.45-0+deb7u7 Fixed version : 7.3.24 Upgrade to PHP version 7.3.24 or later.
The version of PHP running on the remote web server is affected by multiple vulnerabilities. URL : http://172.21.17.13:9292/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7) Installed version : 5.4.45-0+deb7u7 Fixed version : 7.3.24 URL : http://172.21.17.13/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7) Installed version : 5.4.45-0+deb7u7 Fixed version : 7.3.24 Upgrade to PHP version 7.3.24 or later.
The version of PHP running on the remote web server is affected by an email header injection vulnerability. URL : http://172.21.17.13:9292/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7) Installed version : 5.4.45-0+deb7u7 Fixed version : 7.3.28 URL : http://172.21.17.13/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7) Installed version : 5.4.45-0+deb7u7 Fixed version : 7.3.28 Upgrade to PHP version 7.3.28 or later.
The version of PHP running on the remote web server is affected by an email header injection vulnerability. URL : http://172.21.17.13:9292/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7) Installed version : 5.4.45-0+deb7u7 Fixed version : 7.3.28 URL : http://172.21.17.13/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7) Installed version : 5.4.45-0+deb7u7 Fixed version : 7.3.28 Upgrade to PHP version 7.3.28 or later.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote host contains an unsupported version of a web application scripting language. Source : X-Powered-By: PHP/5.4.45-0+deb7u7 Installed version : 5.4.45-0+deb7u7 End of support date : 2015/09/03 Announcement : http://php.net/supported-versions.php Supported versions : 7.3.x / 7.4.x / 8.0.x Upgrade to a version of PHP that is currently supported.
The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities. Nessus was able to exploit the issue using the following URL : http://172.21.17.13:9292/?"><script>alert('struts_sa_surl_xss.nasl-1648329041')</script> Nessus was able to exploit the issue using the following URL : http://172.21.17.13/?"><script>alert('struts_sa_surl_xss.nasl-1648329041')</script> Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.
The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities. Nessus was able to exploit the issue using the following URL : http://172.21.17.13:9292/?"><script>alert('struts_sa_surl_xss.nasl-1648329041')</script> Nessus was able to exploit the issue using the following URL : http://172.21.17.13/?"><script>alert('struts_sa_surl_xss.nasl-1648329041')</script> Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The remote web server is affected by multiple cross site scripting vulnerability. URL : http://172.21.17.13/lib/3rd_party/jquery.js Installed version : 1.9.1 Fixed version : 3.5.0 Upgrade to JQuery version 3.5.0 or later.
The version of PHP running on the remote web server is affected by multiple vulnerabilities. URL : http://172.21.17.13:9292/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7) Installed version : 5.4.45-0+deb7u7 Fixed version : 7.3.24 URL : http://172.21.17.13/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7) Installed version : 5.4.45-0+deb7u7 Fixed version : 7.3.24 Upgrade to PHP version 7.3.24 or later.
The version of PHP running on the remote web server is affected by multiple vulnerabilities. URL : http://172.21.17.13:9292/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7) Installed version : 5.4.45-0+deb7u7 Fixed version : 7.3.24 URL : http://172.21.17.13/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7) Installed version : 5.4.45-0+deb7u7 Fixed version : 7.3.24 Upgrade to PHP version 7.3.24 or later.
The version of PHP running on the remote web server is affected by an email header injection vulnerability. URL : http://172.21.17.13:9292/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7) Installed version : 5.4.45-0+deb7u7 Fixed version : 7.3.28 URL : http://172.21.17.13/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7) Installed version : 5.4.45-0+deb7u7 Fixed version : 7.3.28 Upgrade to PHP version 7.3.28 or later.
The version of PHP running on the remote web server is affected by an email header injection vulnerability. URL : http://172.21.17.13:9292/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7) Installed version : 5.4.45-0+deb7u7 Fixed version : 7.3.28 URL : http://172.21.17.13/ (5.4.45-0+deb7u7 under X-Powered-By: PHP/5.4.45-0+deb7u7) Installed version : 5.4.45-0+deb7u7 Fixed version : 7.3.28 Upgrade to PHP version 7.3.28 or later.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.221.211 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:46:32 | 2022-03-26 23:17:54 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 on Debian 5.0 (lenny) | Linux Kernel 2.6 on Debian 5.0 (lenny) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 5.0 support ended on 2012-02-06. Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The remote service encrypts traffic using a protocol with known weaknesses. - SSLv3 is enabled and the server supports at least one cipher. Explanation: TLS 1.0 and SSL 3.0 cipher suites may be used with SSLv3 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EDH-RSA-DES-CBC3-SHA DH RSA 3DES-CBC(168) SHA1 DES-CBC3-SHA RSA RSA 3DES-CBC(168) SHA1 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DHE-RSA-AES128-SHA DH RSA AES-CBC(128) SHA1 DHE-RSA-AES256-SHA DH RSA AES-CBC(256) SHA1 AES128-SHA RSA RSA AES-CBC(128) SHA1 AES256-SHA RSA RSA AES-CBC(256) SHA1 RC4-MD5 RSA RSA RC4(128) MD5 RC4-SHA RSA RSA RC4(128) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Consult the application's documentation to disable SSL 2.0 and 3.0.
Use TLS 1.2 (with approved cipher suites) or higher instead.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=hellphone.de Purchase or generate a proper SSL certificate for this service.
It is possible to obtain sensitive information from the remote host with SSL/TLS-enabled services. Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV mechanism until SSLv3 can be disabled.
Debugging functions are enabled on the remote web server. To disable these methods, add the following lines for each virtual host in your configuration file : RewriteEngine on RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK) RewriteRule .* - [F] Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2 support disabling the TRACE method natively via the 'TraceEnable' directive. Nessus sent the following TRACE request : ------------------------------ snip ------------------------------ TRACE /Nessus1272578831.html HTTP/1.1 Connection: Close Host: 172.21.221.211 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------ and received the following response from the remote server : ------------------------------ snip ------------------------------ HTTP/1.1 200 OK Date: Fri, 18 Mar 2022 10:31:07 GMT Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g Connection: close Transfer-Encoding: chunked Content-Type: message/http TRACE /Nessus1272578831.html HTTP/1.1 Connection: Close Host: 172.21.221.211 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------ To disable these methods, add the following lines for each virtual host in your configuration file : RewriteEngine on RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK) RewriteRule .* - [F] Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2 support disabling the TRACE method natively via the 'TraceEnable' directive. Nessus sent the following TRACE request : ------------------------------ snip ------------------------------ TRACE /Nessus1749210743.html HTTP/1.1 Connection: Close Host: 172.21.221.211 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------ and received the following response from the remote server : ------------------------------ snip ------------------------------ HTTP/1.1 200 OK Date: Fri, 18 Mar 2022 10:31:07 GMT Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g Keep-Alive: timeout=15, max=100 Connection: Keep-Alive Transfer-Encoding: chunked Content-Type: message/http TRACE /Nessus1749210743.html HTTP/1.1 Connection: Keep-Alive Host: 172.21.221.211 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------ Disable these HTTP methods. Refer to the plugin output for more information.
The remote server's SSL certificate has already expired. The SSL certificate has already expired : Subject : CN=hellphone.de Issuer : CN=hellphone.de Not valid before : Jul 22 21:59:53 2009 GMT Not valid after : Jul 20 21:59:53 2019 GMT Purchase or generate a new SSL certificate to replace the existing one.
An SSL certificate in the certificate chain has been signed using a weak hash algorithm. The following certificates were part of the certificate chain sent by the remote host, but contain hashes that are considered to be weak. Subject : CN=hellphone.de Signature Algorithm : SHA-1 With RSA Encryption Valid From : Jul 22 21:59:53 2009 GMT Valid To : Jul 20 21:59:53 2019 GMT Raw PEM certificate : -----BEGIN CERTIFICATE----- MIIBpTCCAQ4CCQD/cVrwLpJICzANBgkqhkiG9w0BAQUFADAXMRUwEwYDVQQDEwxoZWxscGhvbmUuZGUwHhcNMDkwNzIyMjE1OTUzWhcNMTkwNzIwMjE1OTUzWjAXMRUwEwYDVQQDEwxoZWxscGhvbmUuZGUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBALMDVlNPzgoOTtr/IQhI75PQ17cSx1yJ9BZ08aJ6J/3gOWWWqeX/ho+N5hjZWob2yBPe8TkyFqSkc+OEtUSB9dG2CoqygTtPTgEPMevsduc8DiyJAJFzS3FyOWAYTuARmR8mu3bhwe8iGPKrO/AWWi37kHKwO0meHwp3dUz+WSSvAgMBAAEwDQYJKoZIhvcNAQEFBQADgYEAegqhwT4Ti8fmjDrTtMx/VUfFKqYQ1qGK5mxDEKIQ5lL/MLGl0S602E7IVjrcfp5wPSh6ZrNL9mb4d4RLnBYEh0qLOFKv5AFo+vlaERNFS/sjRu0y2A2sO66Z8Drvh+mk6KitDQK3jYTDWwJfWSkgE4eyiy1D9v4pxUynMejZ+0Q= -----END CERTIFICATE----- Contact the Certificate Authority to have the SSL certificate reissued.
The remote service supports the use of medium strength SSL ciphers. Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168) SHA1 DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Reconfigure the affected application if possible to avoid use of medium strength ciphers.
The SSL certificate for this service cannot be trusted. The following certificate was part of the certificate chain sent by the remote host, but it has expired : |-Subject : CN=hellphone.de |-Not After : Jul 20 21:59:53 2019 GMT The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=hellphone.de |-Issuer : CN=hellphone.de Purchase or generate a proper SSL certificate for this service.
Debugging functions are enabled on the remote web server. To disable these methods, add the following lines for each virtual host in your configuration file : RewriteEngine on RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK) RewriteRule .* - [F] Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2 support disabling the TRACE method natively via the 'TraceEnable' directive. Nessus sent the following TRACE request : ------------------------------ snip ------------------------------ TRACE /Nessus1272578831.html HTTP/1.1 Connection: Close Host: 172.21.221.211 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------ and received the following response from the remote server : ------------------------------ snip ------------------------------ HTTP/1.1 200 OK Date: Fri, 18 Mar 2022 10:31:07 GMT Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g Connection: close Transfer-Encoding: chunked Content-Type: message/http TRACE /Nessus1272578831.html HTTP/1.1 Connection: Close Host: 172.21.221.211 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------ To disable these methods, add the following lines for each virtual host in your configuration file : RewriteEngine on RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK) RewriteRule .* - [F] Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2 support disabling the TRACE method natively via the 'TraceEnable' directive. Nessus sent the following TRACE request : ------------------------------ snip ------------------------------ TRACE /Nessus1749210743.html HTTP/1.1 Connection: Close Host: 172.21.221.211 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------ and received the following response from the remote server : ------------------------------ snip ------------------------------ HTTP/1.1 200 OK Date: Fri, 18 Mar 2022 10:31:07 GMT Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g Keep-Alive: timeout=15, max=100 Connection: Keep-Alive Transfer-Encoding: chunked Content-Type: message/http TRACE /Nessus1749210743.html HTTP/1.1 Connection: Keep-Alive Host: 172.21.221.211 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------ Disable these HTTP methods. Refer to the plugin output for more information.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The remote service supports the use of the RC4 cipher. List of RC4 cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- RC4-MD5 0x00, 0x04 RSA RSA RC4(128) MD5 RC4-SHA 0x00, 0x05 RSA RSA RC4(128) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "191d-0-50e6b7e7d8c80" Inode number : 6429 File size : 0 bytes File modification time : Feb. 6, 2015 at 13:35:30 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote service has a configuration that may make it vulnerable to the CRIME attack. The following configuration indicates that the remote service may be vulnerable to the CRIME attack : - SSL / TLS compression is enabled. Disable compression and / or the SPDY service.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The operating system running on the remote host is no longer supported. Debian 5.0 support ended on 2012-02-06. Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The remote service encrypts traffic using a protocol with known weaknesses. - SSLv3 is enabled and the server supports at least one cipher. Explanation: TLS 1.0 and SSL 3.0 cipher suites may be used with SSLv3 Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EDH-RSA-DES-CBC3-SHA DH RSA 3DES-CBC(168) SHA1 DES-CBC3-SHA RSA RSA 3DES-CBC(168) SHA1 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DHE-RSA-AES128-SHA DH RSA AES-CBC(128) SHA1 DHE-RSA-AES256-SHA DH RSA AES-CBC(256) SHA1 AES128-SHA RSA RSA AES-CBC(128) SHA1 AES256-SHA RSA RSA AES-CBC(256) SHA1 RC4-MD5 RSA RSA RC4(128) MD5 RC4-SHA RSA RSA RC4(128) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Consult the application's documentation to disable SSL 2.0 and 3.0.
Use TLS 1.2 (with approved cipher suites) or higher instead.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=hellphone.de Purchase or generate a proper SSL certificate for this service.
It is possible to obtain sensitive information from the remote host with SSL/TLS-enabled services. Nessus determined that the remote server supports SSLv3 with at least one CBC cipher suite, indicating that this server is vulnerable. It appears that TLSv1 or newer is supported on the server. However, the Fallback SCSV mechanism is not supported, allowing connections to be "rolled back" to SSLv3. Disable SSLv3.
Services that must support SSLv3 should enable the TLS Fallback SCSV mechanism until SSLv3 can be disabled.
Debugging functions are enabled on the remote web server. To disable these methods, add the following lines for each virtual host in your configuration file : RewriteEngine on RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK) RewriteRule .* - [F] Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2 support disabling the TRACE method natively via the 'TraceEnable' directive. Nessus sent the following TRACE request : ------------------------------ snip ------------------------------ TRACE /Nessus1266746963.html HTTP/1.1 Connection: Close Host: 172.21.221.211 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------ and received the following response from the remote server : ------------------------------ snip ------------------------------ HTTP/1.1 200 OK Date: Sat, 26 Mar 2022 22:02:29 GMT Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g Connection: close Transfer-Encoding: chunked Content-Type: message/http TRACE /Nessus1266746963.html HTTP/1.1 Connection: Close Host: 172.21.221.211 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------ To disable these methods, add the following lines for each virtual host in your configuration file : RewriteEngine on RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK) RewriteRule .* - [F] Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2 support disabling the TRACE method natively via the 'TraceEnable' directive. Nessus sent the following TRACE request : ------------------------------ snip ------------------------------ TRACE /Nessus753427652.html HTTP/1.1 Connection: Close Host: 172.21.221.211 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------ and received the following response from the remote server : ------------------------------ snip ------------------------------ HTTP/1.1 200 OK Date: Sat, 26 Mar 2022 22:02:29 GMT Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g Keep-Alive: timeout=15, max=100 Connection: Keep-Alive Transfer-Encoding: chunked Content-Type: message/http TRACE /Nessus753427652.html HTTP/1.1 Connection: Keep-Alive Host: 172.21.221.211 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------ Disable these HTTP methods. Refer to the plugin output for more information.
The remote server's SSL certificate has already expired. The SSL certificate has already expired : Subject : CN=hellphone.de Issuer : CN=hellphone.de Not valid before : Jul 22 21:59:53 2009 GMT Not valid after : Jul 20 21:59:53 2019 GMT Purchase or generate a new SSL certificate to replace the existing one.
An SSL certificate in the certificate chain has been signed using a weak hash algorithm. The following certificates were part of the certificate chain sent by the remote host, but contain hashes that are considered to be weak. Subject : CN=hellphone.de Signature Algorithm : SHA-1 With RSA Encryption Valid From : Jul 22 21:59:53 2009 GMT Valid To : Jul 20 21:59:53 2019 GMT Raw PEM certificate : -----BEGIN CERTIFICATE----- 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 -----END CERTIFICATE----- Contact the Certificate Authority to have the SSL certificate reissued.
The remote service supports the use of medium strength SSL ciphers. Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- EDH-RSA-DES-CBC3-SHA 0x00, 0x16 DH RSA 3DES-CBC(168) SHA1 DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Reconfigure the affected application if possible to avoid use of medium strength ciphers.
The SSL certificate for this service cannot be trusted. The following certificate was part of the certificate chain sent by the remote host, but it has expired : |-Subject : CN=hellphone.de |-Not After : Jul 20 21:59:53 2019 GMT The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=hellphone.de |-Issuer : CN=hellphone.de Purchase or generate a proper SSL certificate for this service.
Debugging functions are enabled on the remote web server. To disable these methods, add the following lines for each virtual host in your configuration file : RewriteEngine on RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK) RewriteRule .* - [F] Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2 support disabling the TRACE method natively via the 'TraceEnable' directive. Nessus sent the following TRACE request : ------------------------------ snip ------------------------------ TRACE /Nessus1266746963.html HTTP/1.1 Connection: Close Host: 172.21.221.211 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------ and received the following response from the remote server : ------------------------------ snip ------------------------------ HTTP/1.1 200 OK Date: Sat, 26 Mar 2022 22:02:29 GMT Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g Connection: close Transfer-Encoding: chunked Content-Type: message/http TRACE /Nessus1266746963.html HTTP/1.1 Connection: Close Host: 172.21.221.211 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------ To disable these methods, add the following lines for each virtual host in your configuration file : RewriteEngine on RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK) RewriteRule .* - [F] Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2 support disabling the TRACE method natively via the 'TraceEnable' directive. Nessus sent the following TRACE request : ------------------------------ snip ------------------------------ TRACE /Nessus753427652.html HTTP/1.1 Connection: Close Host: 172.21.221.211 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------ and received the following response from the remote server : ------------------------------ snip ------------------------------ HTTP/1.1 200 OK Date: Sat, 26 Mar 2022 22:02:29 GMT Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_ssl/2.2.9 OpenSSL/0.9.8g Keep-Alive: timeout=15, max=100 Connection: Keep-Alive Transfer-Encoding: chunked Content-Type: message/http TRACE /Nessus753427652.html HTTP/1.1 Connection: Keep-Alive Host: 172.21.221.211 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------ Disable these HTTP methods. Refer to the plugin output for more information.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The remote service supports the use of the RC4 cipher. List of RC4 cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- RC4-MD5 0x00, 0x04 RSA RSA RC4(128) MD5 RC4-SHA 0x00, 0x05 RSA RSA RC4(128) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "191d-0-50e6b7e7d8c80" Inode number : 6429 File size : 0 bytes File modification time : Feb. 6, 2015 at 13:35:30 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote service has a configuration that may make it vulnerable to the CRIME attack. The following configuration indicates that the remote service may be vulnerable to the CRIME attack : - SSL / TLS compression is enabled. Disable compression and / or the SPDY service.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.11.12 (ISP) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:51:36 | 2022-03-26 22:20:22 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Ubuntu 14.04 Linux Kernel 3.13 | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.53 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.53 Upgrade to Apache version 2.4.53 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.39 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.39 Upgrade to Apache version 2.4.39 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.53 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.53 Upgrade to Apache version 2.4.53 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.52 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.52 Upgrade to Apache version 2.4.52 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.52 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.52 Upgrade to Apache version 2.4.52 or later.
The remote web server is affected by a vulnerability. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.49 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.49 Upgrade to Apache version 2.4.49 or later.
The remote web server is affected by a vulnerability. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.49 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.49 Upgrade to Apache version 2.4.49 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.47 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.47 Upgrade to Apache version 2.4.47 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.47 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.47 Upgrade to Apache version 2.4.47 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.46 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.46 Upgrade to Apache version 2.4.46 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.46 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.46 Upgrade to Apache version 2.4.46 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.39 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.39 Upgrade to Apache version 2.4.39 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.26 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.26 Upgrade to Apache version 2.2.33-dev / 2.4.26 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.26 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.26 Upgrade to Apache version 2.2.33-dev / 2.4.26 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.34 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.34 Upgrade to Apache version 2.4.34 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.28 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.28 Upgrade to Apache version 2.4.28 or later.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1 |-Issuer : O=Digital Signature Trust Co./CN=DST Root CA X3 Purchase or generate a proper SSL certificate for this service.
The remote web server is affected by a vulnerability. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.49 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.49 Upgrade to Apache version 2.4.49 or later.
The remote web server is affected by a vulnerability. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.49 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.49 Upgrade to Apache version 2.4.49 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.27 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.27 Upgrade to Apache version 2.4.27 or later.
The remote web server is affected by a vulnerability. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.49 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.49 Upgrade to Apache version 2.4.49 or later.
The remote web server is affected by a vulnerability. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.49 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.49 Upgrade to Apache version 2.4.49 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.27 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.27 Upgrade to Apache version 2.4.27 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.28 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.28 Upgrade to Apache version 2.4.28 or later.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The remote web server is affected by a denial of service vulnerability. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.35 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.35 Upgrade to Apache version 2.4.35 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.42 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.42 Upgrade to Apache version 2.4.42 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.42 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.42 Upgrade to Apache version 2.4.42 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.41 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.41 Upgrade to Apache version 2.4.41 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.41 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.41 Upgrade to Apache version 2.4.41 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.34 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.34 Upgrade to Apache version 2.4.34 or later.
Debugging functions are enabled on the remote web server. To disable these methods, add the following lines for each virtual host in your configuration file : RewriteEngine on RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK) RewriteRule .* - [F] Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2 support disabling the TRACE method natively via the 'TraceEnable' directive. Nessus sent the following TRACE request : ------------------------------ snip ------------------------------ TRACE /Nessus2146448736.html HTTP/1.1 Connection: Close Host: 172.21.11.12 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------ and received the following response from the remote server : ------------------------------ snip ------------------------------ HTTP/1.1 200 OK Date: Fri, 18 Mar 2022 09:36:22 GMT Server: Apache/2.4.25 Keep-Alive: timeout=5, max=100 Connection: Keep-Alive Transfer-Encoding: chunked Content-Type: message/http TRACE /Nessus2146448736.html HTTP/1.1 Connection: Keep-Alive Host: 172.21.11.12 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 GEOIP_ADDR: 172.21.172.24 ------------------------------ snip ------------------------------ To disable these methods, add the following lines for each virtual host in your configuration file : RewriteEngine on RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK) RewriteRule .* - [F] Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2 support disabling the TRACE method natively via the 'TraceEnable' directive. Nessus sent the following TRACE request : ------------------------------ snip ------------------------------ TRACE /Nessus109676596.html HTTP/1.1 Connection: Close Host: 172.21.11.12 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------ and received the following response from the remote server : ------------------------------ snip ------------------------------ HTTP/1.1 200 OK Date: Fri, 18 Mar 2022 09:36:22 GMT Server: Apache/2.4.25 Keep-Alive: timeout=5, max=100 Connection: Keep-Alive Transfer-Encoding: chunked Content-Type: message/http TRACE /Nessus109676596.html HTTP/1.1 Connection: Keep-Alive Host: 172.21.11.12 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 GEOIP_ADDR: 172.21.172.24 ------------------------------ snip ------------------------------ Disable these HTTP methods. Refer to the plugin output for more information.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.33 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.33 Upgrade to Apache version 2.4.33 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.33 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.33 Upgrade to Apache version 2.4.33 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.38 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.38 Upgrade to Apache version 2.4.38 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.38 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.38 Upgrade to Apache version 2.4.38 or later.
The remote web server is affected by a denial of service vulnerability. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.35 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.35 Upgrade to Apache version 2.4.35 or later.
Debugging functions are enabled on the remote web server. To disable these methods, add the following lines for each virtual host in your configuration file : RewriteEngine on RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK) RewriteRule .* - [F] Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2 support disabling the TRACE method natively via the 'TraceEnable' directive. Nessus sent the following TRACE request : ------------------------------ snip ------------------------------ TRACE /Nessus2146448736.html HTTP/1.1 Connection: Close Host: 172.21.11.12 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------ and received the following response from the remote server : ------------------------------ snip ------------------------------ HTTP/1.1 200 OK Date: Fri, 18 Mar 2022 09:36:22 GMT Server: Apache/2.4.25 Keep-Alive: timeout=5, max=100 Connection: Keep-Alive Transfer-Encoding: chunked Content-Type: message/http TRACE /Nessus2146448736.html HTTP/1.1 Connection: Keep-Alive Host: 172.21.11.12 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 GEOIP_ADDR: 172.21.172.24 ------------------------------ snip ------------------------------ To disable these methods, add the following lines for each virtual host in your configuration file : RewriteEngine on RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK) RewriteRule .* - [F] Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2 support disabling the TRACE method natively via the 'TraceEnable' directive. Nessus sent the following TRACE request : ------------------------------ snip ------------------------------ TRACE /Nessus109676596.html HTTP/1.1 Connection: Close Host: 172.21.11.12 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------ and received the following response from the remote server : ------------------------------ snip ------------------------------ HTTP/1.1 200 OK Date: Fri, 18 Mar 2022 09:36:22 GMT Server: Apache/2.4.25 Keep-Alive: timeout=5, max=100 Connection: Keep-Alive Transfer-Encoding: chunked Content-Type: message/http TRACE /Nessus109676596.html HTTP/1.1 Connection: Keep-Alive Host: 172.21.11.12 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 GEOIP_ADDR: 172.21.172.24 ------------------------------ snip ------------------------------ Disable these HTTP methods. Refer to the plugin output for more information.
The remote POP3 daemon allows credentials to be transmitted in cleartext. The following cleartext methods are supported : USER SASL PLAIN LOGIN Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.
|
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.53 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.53 Upgrade to Apache version 2.4.53 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.39 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.39 Upgrade to Apache version 2.4.39 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.53 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.53 Upgrade to Apache version 2.4.53 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.52 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.52 Upgrade to Apache version 2.4.52 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.52 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.52 Upgrade to Apache version 2.4.52 or later.
The remote web server is affected by a vulnerability. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.49 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.49 Upgrade to Apache version 2.4.49 or later.
The remote web server is affected by a vulnerability. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.49 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.49 Upgrade to Apache version 2.4.49 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.47 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.47 Upgrade to Apache version 2.4.47 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.47 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.47 Upgrade to Apache version 2.4.47 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.46 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.46 Upgrade to Apache version 2.4.46 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.46 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.46 Upgrade to Apache version 2.4.46 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.39 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.39 Upgrade to Apache version 2.4.39 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.26 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.26 Upgrade to Apache version 2.2.33-dev / 2.4.26 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.26 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.26 Upgrade to Apache version 2.2.33-dev / 2.4.26 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.34 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.34 Upgrade to Apache version 2.4.34 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.28 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.28 Upgrade to Apache version 2.4.28 or later.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1 |-Issuer : O=Digital Signature Trust Co./CN=DST Root CA X3 Purchase or generate a proper SSL certificate for this service.
The remote web server is affected by a vulnerability. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.49 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.49 Upgrade to Apache version 2.4.49 or later.
The remote web server is affected by a vulnerability. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.49 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.49 Upgrade to Apache version 2.4.49 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.27 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.27 Upgrade to Apache version 2.4.27 or later.
The remote web server is affected by a vulnerability. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.49 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.49 Upgrade to Apache version 2.4.49 or later.
The remote web server is affected by a vulnerability. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.49 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.49 Upgrade to Apache version 2.4.49 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.27 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.27 Upgrade to Apache version 2.4.27 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.28 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.28 Upgrade to Apache version 2.4.28 or later.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The remote web server is affected by a denial of service vulnerability. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.35 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.35 Upgrade to Apache version 2.4.35 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.42 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.42 Upgrade to Apache version 2.4.42 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.42 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.42 Upgrade to Apache version 2.4.42 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.41 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.41 Upgrade to Apache version 2.4.41 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.41 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.41 Upgrade to Apache version 2.4.41 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.34 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.34 Upgrade to Apache version 2.4.34 or later.
Debugging functions are enabled on the remote web server. To disable these methods, add the following lines for each virtual host in your configuration file : RewriteEngine on RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK) RewriteRule .* - [F] Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2 support disabling the TRACE method natively via the 'TraceEnable' directive. Nessus sent the following TRACE request : ------------------------------ snip ------------------------------ TRACE /Nessus1354742777.html HTTP/1.1 Connection: Close Host: 172.21.11.12 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------ and received the following response from the remote server : ------------------------------ snip ------------------------------ HTTP/1.1 200 OK Date: Sat, 26 Mar 2022 21:05:08 GMT Server: Apache/2.4.25 Keep-Alive: timeout=5, max=100 Connection: Keep-Alive Transfer-Encoding: chunked Content-Type: message/http TRACE /Nessus1354742777.html HTTP/1.1 Connection: Keep-Alive Host: 172.21.11.12 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 GEOIP_ADDR: 172.21.172.24 ------------------------------ snip ------------------------------ To disable these methods, add the following lines for each virtual host in your configuration file : RewriteEngine on RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK) RewriteRule .* - [F] Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2 support disabling the TRACE method natively via the 'TraceEnable' directive. Nessus sent the following TRACE request : ------------------------------ snip ------------------------------ TRACE /Nessus2063119116.html HTTP/1.1 Connection: Close Host: 172.21.11.12 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------ and received the following response from the remote server : ------------------------------ snip ------------------------------ HTTP/1.1 200 OK Date: Sat, 26 Mar 2022 21:05:08 GMT Server: Apache/2.4.25 Keep-Alive: timeout=5, max=100 Connection: Keep-Alive Transfer-Encoding: chunked Content-Type: message/http TRACE /Nessus2063119116.html HTTP/1.1 Connection: Keep-Alive Host: 172.21.11.12 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 GEOIP_ADDR: 172.21.172.24 ------------------------------ snip ------------------------------ Disable these HTTP methods. Refer to the plugin output for more information.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.33 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.33 Upgrade to Apache version 2.4.33 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.33 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.33 Upgrade to Apache version 2.4.33 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.38 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.38 Upgrade to Apache version 2.4.38 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.38 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.38 Upgrade to Apache version 2.4.38 or later.
The remote web server is affected by a denial of service vulnerability. URL : http://172.21.11.12/ Installed version : 2.4.25 Fixed version : 2.4.35 URL : http://172.21.11.12:443/ Installed version : 2.4.25 Fixed version : 2.4.35 Upgrade to Apache version 2.4.35 or later.
Debugging functions are enabled on the remote web server. To disable these methods, add the following lines for each virtual host in your configuration file : RewriteEngine on RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK) RewriteRule .* - [F] Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2 support disabling the TRACE method natively via the 'TraceEnable' directive. Nessus sent the following TRACE request : ------------------------------ snip ------------------------------ TRACE /Nessus1354742777.html HTTP/1.1 Connection: Close Host: 172.21.11.12 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------ and received the following response from the remote server : ------------------------------ snip ------------------------------ HTTP/1.1 200 OK Date: Sat, 26 Mar 2022 21:05:08 GMT Server: Apache/2.4.25 Keep-Alive: timeout=5, max=100 Connection: Keep-Alive Transfer-Encoding: chunked Content-Type: message/http TRACE /Nessus1354742777.html HTTP/1.1 Connection: Keep-Alive Host: 172.21.11.12 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 GEOIP_ADDR: 172.21.172.24 ------------------------------ snip ------------------------------ To disable these methods, add the following lines for each virtual host in your configuration file : RewriteEngine on RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK) RewriteRule .* - [F] Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2 support disabling the TRACE method natively via the 'TraceEnable' directive. Nessus sent the following TRACE request : ------------------------------ snip ------------------------------ TRACE /Nessus2063119116.html HTTP/1.1 Connection: Close Host: 172.21.11.12 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 ------------------------------ snip ------------------------------ and received the following response from the remote server : ------------------------------ snip ------------------------------ HTTP/1.1 200 OK Date: Sat, 26 Mar 2022 21:05:08 GMT Server: Apache/2.4.25 Keep-Alive: timeout=5, max=100 Connection: Keep-Alive Transfer-Encoding: chunked Content-Type: message/http TRACE /Nessus2063119116.html HTTP/1.1 Connection: Keep-Alive Host: 172.21.11.12 Pragma: no-cache User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0) Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */* Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 GEOIP_ADDR: 172.21.172.24 ------------------------------ snip ------------------------------ Disable these HTTP methods. Refer to the plugin output for more information.
The remote POP3 daemon allows credentials to be transmitted in cleartext. The following cleartext methods are supported : USER SASL PLAIN LOGIN Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.
|
172.21.21.11 (ciproc intern) |
||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:45:18 | 2022-03-26 22:13:35 | ||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||
OS detected: | Microsoft Windows 7 Microsoft Windows Server 2008 R2 | Microsoft Windows 7 Microsoft Windows Server 2008 R2 | ||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote Samba server is potentially affected by multiple vulnerabilities. Installed version : 4.9.5-Debian Fixed version : 4.13.17 Upgrade to Samba version 4.13.17, 4.14.12, or 4.15.5 or later.
Signing is not required on the remote SMB server. Enforce message signing in the host's configuration. On Windows, this is found in the policy setting 'Microsoft network server: Digitally sign communications (always)'. On Samba, the setting is called 'server signing'. See the 'see also' links for further details.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote Samba server is potentially affected by multiple vulnerabilities. Installed version : 4.9.5-Debian Fixed version : 4.13.17 Upgrade to Samba version 4.13.17, 4.14.12, or 4.15.5 or later.
Signing is not required on the remote SMB server. Enforce message signing in the host's configuration. On Windows, this is found in the policy setting 'Microsoft network server: Digitally sign communications (always)'. On Samba, the setting is called 'server signing'. See the 'see also' links for further details.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.11.250 (ISP) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:53:54 | 2022-03-26 22:20:33 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by an information disclosure vulnerability. Nessus was able to exploit the issue using the following request : http://172.21.11.250:8081/?M=A This produced the following truncated output (limited to 10 lines) : ------------------------------ snip ------------------------------ <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN"> <html> <head> <title>Index of /</title> </head> <body> <h1>Index of /</h1> <table> <tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr> <tr><th colspan="5"><hr></th></tr> [...] ------------------------------ snip ------------------------------ Nessus was able to exploit the issue using the following request : http://172.21.11.250:443/?M=A This produced the following truncated output (limited to 10 lines) : ------------------------------ snip ------------------------------ <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN"> <html> <head> <title>Index of /</title> </head> <body> <h1>Index of /</h1> <table> <tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr> <tr><th colspan="5"><hr></th></tr> [...] ------------------------------ snip ------------------------------ Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.
The remote web server is affected by an information disclosure vulnerability. Nessus was able to exploit the issue using the following request : http://172.21.11.250:8081/?M=A This produced the following truncated output (limited to 10 lines) : ------------------------------ snip ------------------------------ <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN"> <html> <head> <title>Index of /</title> </head> <body> <h1>Index of /</h1> <table> <tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr> <tr><th colspan="5"><hr></th></tr> [...] ------------------------------ snip ------------------------------ Nessus was able to exploit the issue using the following request : http://172.21.11.250:443/?M=A This produced the following truncated output (limited to 10 lines) : ------------------------------ snip ------------------------------ <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN"> <html> <head> <title>Index of /</title> </head> <body> <h1>Index of /</h1> <table> <tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr> <tr><th colspan="5"><hr></th></tr> [...] ------------------------------ snip ------------------------------ Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.
An SSL certificate in the certificate chain has been signed using a weak hash algorithm. The following certificates were part of the certificate chain sent by the remote host, but contain hashes that are considered to be weak. Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de Signature Algorithm : SHA-1 With RSA Encryption Valid From : May 02 01:14:29 2012 GMT Valid To : Apr 27 01:14:29 2032 GMT Raw PEM certificate : -----BEGIN CERTIFICATE----- MIIEjzCCA3egAwIBAgIJAOojX+kzagfTMA0GCSqGSIb3DQEBBQUAMIGLMQswCQYDVQQGEwJERTEQMA4GA1UECBMHQmFkLVd1ZTETMBEGA1UEBxMKSGVpZGVsYmVyZzEQMA4GA1UEChMHYWRkMndlYjERMA8GA1UECxMIV2ViYWRtaW4xCzAJBgNVBAMTAkFFMSMwIQYJKoZIhvcNAQkBFhR3ZWJtYXN0ZXJAYWRkMndlYi5kZTAeFw0xMjA1MDIwMTE0MjlaFw0zMjA0MjcwMTE0MjlaMIGLMQswCQYDVQQGEwJERTEQMA4GA1UECBMHQmFkLVd1ZTETMBEGA1UEBxMKSGVpZGVsYmVyZzEQMA4GA1UEChMHYWRkMndlYjERMA8GA1UECxMIV2ViYWRtaW4xCzAJBgNVBAMTAkFFMSMwIQYJKoZIhvcNAQkBFhR3ZWJtYXN0ZXJAYWRkMndlYi5kZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMas0iNl3NE6L/y0Lr3yijaTfKcH0TBwi2ok2iZ+NAguYTZdCrBqwP/EIyiJr+AFLnJYarRyySGUD6VXOG4pc9Wp+3fjGB2WNhfet/yU3U41uctoBG1/8vJ73e4/jPUuheo5Olf9aF+aoAAFRCINtw8LfMpffoaBl10r7WmvGivb6quJfxU2S/fPndDHQBIwqowjYgg1I/y8IzwD8DAjU5EIdAAJjt2/S7EfIILkI6U3VnaVY5yXKhqWVfB50RG9jRX5tgtLscYT+XKLZWIJ/uiVLmBEmMLMFego6AOqSRc5nntEcwgHgJd/Uj9N0VT4/0Ze/sxIg7tkHuArrYNspKcCAwEAAaOB8zCB8DAdBgNVHQ4EFgQUYge5RGWbE/C3YdCqWcEtVIUltSIwgcAGA1UdIwSBuDCBtYAUYge5RGWbE/C3YdCqWcEtVIUltSKhgZGkgY4wgYsxCzAJBgNVBAYTAkRFMRAwDgYDVQQIEwdCYWQtV3VlMRMwEQYDVQQHEwpIZWlkZWxiZXJnMRAwDgYDVQQKEwdhZGQyd2ViMREwDwYDVQQLEwhXZWJhZG1pbjELMAkGA1UEAxMCQUUxIzAhBgkqhkiG9w0BCQEWFHdlYm1hc3RlckBhZGQyd2ViLmRlggkA6iNf6TNqB9MwDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQUFAAOCAQEAwZUtNNzhKzcow7k3TrYyDhttWuT5cFb6wGg/4phmoQ9imdHZdkyopi7hDO+SoJXQqm+kXLYfZk6TZbmG6b4l9iYYNJ+st02Zdem8xeaFpI7vzTIHqStYw2pqfQ9NuGRLSjL9ltMVvQ34+tUSdTV3WreUEb+YHY1Jpo9YAMijKqjE/mlF8sqi3kGHxAMrK+uf3pV8bz3oJuZjije9Oz/d+RUcEz8BDOjxiexWXqrXf5jj4TQKihTnXBOWQCbMgT52OYSCgO0wLaOXT0Jv6NKNDuTFaHdjtMJ5p231+vubt/o1tPSglxAWGNwXOch6PLsXhTAKmCMA+u0/ff9RWoqL2w== -----END CERTIFICATE----- Contact the Certificate Authority to have the SSL certificate reissued.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de |-Issuer : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de |-Issuer : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de Purchase or generate a proper SSL certificate for this service.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de |-Issuer : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de |-Issuer : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The remote web server is affected by multiple cross site scripting vulnerability. URL : https://172.21.11.250:8080/js/jquery.min.js Installed version : 2.1.3 Fixed version : 3.5.0 Upgrade to JQuery version 3.5.0 or later.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote web server is affected by an information disclosure vulnerability. Nessus was able to exploit the issue using the following request : http://172.21.11.250:8081/?M=A This produced the following truncated output (limited to 10 lines) : ------------------------------ snip ------------------------------ <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN"> <html> <head> <title>Index of /</title> </head> <body> <h1>Index of /</h1> <table> <tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr> <tr><th colspan="5"><hr></th></tr> [...] ------------------------------ snip ------------------------------ Nessus was able to exploit the issue using the following request : http://172.21.11.250:443/?M=A This produced the following truncated output (limited to 10 lines) : ------------------------------ snip ------------------------------ <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN"> <html> <head> <title>Index of /</title> </head> <body> <h1>Index of /</h1> <table> <tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr> <tr><th colspan="5"><hr></th></tr> [...] ------------------------------ snip ------------------------------ Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.
The remote web server is affected by an information disclosure vulnerability. Nessus was able to exploit the issue using the following request : http://172.21.11.250:8081/?M=A This produced the following truncated output (limited to 10 lines) : ------------------------------ snip ------------------------------ <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN"> <html> <head> <title>Index of /</title> </head> <body> <h1>Index of /</h1> <table> <tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr> <tr><th colspan="5"><hr></th></tr> [...] ------------------------------ snip ------------------------------ Nessus was able to exploit the issue using the following request : http://172.21.11.250:443/?M=A This produced the following truncated output (limited to 10 lines) : ------------------------------ snip ------------------------------ <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN"> <html> <head> <title>Index of /</title> </head> <body> <h1>Index of /</h1> <table> <tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr> <tr><th colspan="5"><hr></th></tr> [...] ------------------------------ snip ------------------------------ Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.
An SSL certificate in the certificate chain has been signed using a weak hash algorithm. The following certificates were part of the certificate chain sent by the remote host, but contain hashes that are considered to be weak. Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de Signature Algorithm : SHA-1 With RSA Encryption Valid From : May 02 01:14:29 2012 GMT Valid To : Apr 27 01:14:29 2032 GMT Raw PEM certificate : -----BEGIN CERTIFICATE----- MIIEjzCCA3egAwIBAgIJAOojX+kzagfTMA0GCSqGSIb3DQEBBQUAMIGLMQswCQYDVQQGEwJERTEQMA4GA1UECBMHQmFkLVd1ZTETMBEGA1UEBxMKSGVpZGVsYmVyZzEQMA4GA1UEChMHYWRkMndlYjERMA8GA1UECxMIV2ViYWRtaW4xCzAJBgNVBAMTAkFFMSMwIQYJKoZIhvcNAQkBFhR3ZWJtYXN0ZXJAYWRkMndlYi5kZTAeFw0xMjA1MDIwMTE0MjlaFw0zMjA0MjcwMTE0MjlaMIGLMQswCQYDVQQGEwJERTEQMA4GA1UECBMHQmFkLVd1ZTETMBEGA1UEBxMKSGVpZGVsYmVyZzEQMA4GA1UEChMHYWRkMndlYjERMA8GA1UECxMIV2ViYWRtaW4xCzAJBgNVBAMTAkFFMSMwIQYJKoZIhvcNAQkBFhR3ZWJtYXN0ZXJAYWRkMndlYi5kZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMas0iNl3NE6L/y0Lr3yijaTfKcH0TBwi2ok2iZ+NAguYTZdCrBqwP/EIyiJr+AFLnJYarRyySGUD6VXOG4pc9Wp+3fjGB2WNhfet/yU3U41uctoBG1/8vJ73e4/jPUuheo5Olf9aF+aoAAFRCINtw8LfMpffoaBl10r7WmvGivb6quJfxU2S/fPndDHQBIwqowjYgg1I/y8IzwD8DAjU5EIdAAJjt2/S7EfIILkI6U3VnaVY5yXKhqWVfB50RG9jRX5tgtLscYT+XKLZWIJ/uiVLmBEmMLMFego6AOqSRc5nntEcwgHgJd/Uj9N0VT4/0Ze/sxIg7tkHuArrYNspKcCAwEAAaOB8zCB8DAdBgNVHQ4EFgQUYge5RGWbE/C3YdCqWcEtVIUltSIwgcAGA1UdIwSBuDCBtYAUYge5RGWbE/C3YdCqWcEtVIUltSKhgZGkgY4wgYsxCzAJBgNVBAYTAkRFMRAwDgYDVQQIEwdCYWQtV3VlMRMwEQYDVQQHEwpIZWlkZWxiZXJnMRAwDgYDVQQKEwdhZGQyd2ViMREwDwYDVQQLEwhXZWJhZG1pbjELMAkGA1UEAxMCQUUxIzAhBgkqhkiG9w0BCQEWFHdlYm1hc3RlckBhZGQyd2ViLmRlggkA6iNf6TNqB9MwDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQUFAAOCAQEAwZUtNNzhKzcow7k3TrYyDhttWuT5cFb6wGg/4phmoQ9imdHZdkyopi7hDO+SoJXQqm+kXLYfZk6TZbmG6b4l9iYYNJ+st02Zdem8xeaFpI7vzTIHqStYw2pqfQ9NuGRLSjL9ltMVvQ34+tUSdTV3WreUEb+YHY1Jpo9YAMijKqjE/mlF8sqi3kGHxAMrK+uf3pV8bz3oJuZjije9Oz/d+RUcEz8BDOjxiexWXqrXf5jj4TQKihTnXBOWQCbMgT52OYSCgO0wLaOXT0Jv6NKNDuTFaHdjtMJ5p231+vubt/o1tPSglxAWGNwXOch6PLsXhTAKmCMA+u0/ff9RWoqL2w== -----END CERTIFICATE----- Contact the Certificate Authority to have the SSL certificate reissued.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de |-Issuer : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de |-Issuer : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de Purchase or generate a proper SSL certificate for this service.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de |-Issuer : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de |-Issuer : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : C=DE/ST=BadWue/L=Heidelberg/O=ciproc GmbH/OU=IT/CN=ispadmin/E=ca@ciproc.de Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.172.37 (ciproc intern) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:50:24 | 2022-03-26 22:22:34 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | An SSL certificate in the certificate chain has been signed using a weak hash algorithm. The following certificates were part of the certificate chain sent by the remote host, but contain hashes that are considered to be weak. Subject : CN=wiki.ciproc.de Signature Algorithm : SHA-1 With RSA Encryption Valid From : Aug 01 10:28:30 2014 GMT Valid To : Jul 29 10:28:30 2024 GMT Raw PEM certificate : -----BEGIN CERTIFICATE----- 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 -----END CERTIFICATE----- Contact the Certificate Authority to have the SSL certificate reissued.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=wiki.ciproc.de |-Issuer : CN=wiki.ciproc.de Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=wiki.ciproc.de Purchase or generate a proper SSL certificate for this service.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The remote service supports the use of anonymous SSL ciphers. The following is a list of SSL anonymous ciphers supported by the remote TCP server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- AECDH-AES128-SHA 0xC0, 0x18 ECDH None AES-CBC(128) SHA1 AECDH-AES256-SHA 0xC0, 0x19 ECDH None AES-CBC(256) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Reconfigure the affected application if possible to avoid use of weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 516 seconds. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The remote service supports the use of anonymous SSL ciphers. The following is a list of SSL anonymous ciphers supported by the remote TCP server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- AECDH-AES128-SHA 0xC0, 0x18 ECDH None AES-CBC(128) SHA1 AECDH-AES256-SHA 0xC0, 0x19 ECDH None AES-CBC(256) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Reconfigure the affected application if possible to avoid use of weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 539 seconds. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.198.31 (publior) |
||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:04:30 | 2022-03-26 22:34:32 | ||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||
OS detected: | Microsoft Windows Server 2012 R2 | Linux Kernel 3.1 | ||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by multiple denial of service vulnerabilities. URL : http://172.21.198.31/ Installed version : 1.14.2 Fixed version : 1.16.1 / 1.17.3 Upgrade to nginx version 1.16.1 / 1.17.3 or later.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1 |-Issuer : O=Digital Signature Trust Co./CN=DST Root CA X3 Purchase or generate a proper SSL certificate for this service.
The remote web server is affected by an information disclosure vulnerability. URL : http://172.21.198.31/ Installed version : 1.14.2 Fixed version : 1.17.7 Upgrade to nginx version 1.17.7 or later.
The remote web server is affected by a remote code execution vulnerability. URL : http://172.21.198.31/ Installed version : 1.14.2 Fixed version : 1.20.1 / 1.21.0 Upgrade to nginx 1.20.1 or later.
|
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1 |-Issuer : O=Digital Signature Trust Co./CN=DST Root CA X3 Purchase or generate a proper SSL certificate for this service.
The remote web server is affected by an information disclosure vulnerability. URL : http://172.21.198.31/ Installed version : 1.14.2 Fixed version : 1.17.7 Upgrade to nginx version 1.17.7 or later.
|
172.21.11.221 (ISP) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:52:40 | 2022-03-26 22:21:06 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.1 | Linux Kernel 3.1 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by multiple denial of service vulnerabilities. URL : https://172.21.11.221/ Installed version : 1.14.2 Fixed version : 1.16.1 / 1.17.3 URL : http://172.21.11.221/ Installed version : 1.14.2 Fixed version : 1.16.1 / 1.17.3 Upgrade to nginx version 1.16.1 / 1.17.3 or later.
The remote web server is affected by multiple denial of service vulnerabilities. URL : https://172.21.11.221/ Installed version : 1.14.2 Fixed version : 1.16.1 / 1.17.3 URL : http://172.21.11.221/ Installed version : 1.14.2 Fixed version : 1.16.1 / 1.17.3 Upgrade to nginx version 1.16.1 / 1.17.3 or later.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1 |-Issuer : O=Digital Signature Trust Co./CN=DST Root CA X3 Purchase or generate a proper SSL certificate for this service.
The remote web server is affected by an information disclosure vulnerability. URL : https://172.21.11.221/ Installed version : 1.14.2 Fixed version : 1.17.7 URL : http://172.21.11.221/ Installed version : 1.14.2 Fixed version : 1.17.7 Upgrade to nginx version 1.17.7 or later.
The remote web server is affected by an information disclosure vulnerability. URL : https://172.21.11.221/ Installed version : 1.14.2 Fixed version : 1.17.7 URL : http://172.21.11.221/ Installed version : 1.14.2 Fixed version : 1.17.7 Upgrade to nginx version 1.17.7 or later.
The remote web server is affected by a remote code execution vulnerability. URL : https://172.21.11.221/ Installed version : 1.14.2 Fixed version : 1.20.1 / 1.21.0 URL : http://172.21.11.221/ Installed version : 1.14.2 Fixed version : 1.20.1 / 1.21.0 Upgrade to nginx 1.20.1 or later.
The remote web server is affected by a remote code execution vulnerability. URL : https://172.21.11.221/ Installed version : 1.14.2 Fixed version : 1.20.1 / 1.21.0 URL : http://172.21.11.221/ Installed version : 1.14.2 Fixed version : 1.20.1 / 1.21.0 Upgrade to nginx 1.20.1 or later.
|
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1 |-Issuer : O=Digital Signature Trust Co./CN=DST Root CA X3 Purchase or generate a proper SSL certificate for this service.
The remote web server is affected by an information disclosure vulnerability. URL : https://172.21.11.221/ Installed version : 1.14.2 Fixed version : 1.17.7 URL : http://172.21.11.221/ Installed version : 1.14.2 Fixed version : 1.17.7 Upgrade to nginx version 1.17.7 or later.
The remote web server is affected by an information disclosure vulnerability. URL : https://172.21.11.221/ Installed version : 1.14.2 Fixed version : 1.17.7 URL : http://172.21.11.221/ Installed version : 1.14.2 Fixed version : 1.17.7 Upgrade to nginx version 1.17.7 or later.
|
172.21.11.230 (ISP) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:44:04 | 2022-03-26 22:07:27 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 | Linux Kernel 2.6 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by an information disclosure vulnerability. Nessus was able to exploit the issue using the following request : https://172.21.11.230/?M=A This produced the following truncated output (limited to 10 lines) : ------------------------------ snip ------------------------------ <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN"> <html> <head> <title>Index of /</title> </head> <body> <h1>Index of /</h1> <table> <tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr> <tr><th colspan="5"><hr></th></tr> [...] ------------------------------ snip ------------------------------ Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.
An SSL certificate in the certificate chain has been signed using a weak hash algorithm. The following certificates were part of the certificate chain sent by the remote host, but contain hashes that are considered to be weak. Subject : CN=spider01 Signature Algorithm : SHA-1 With RSA Encryption Valid From : Apr 23 13:53:20 2014 GMT Valid To : Apr 20 13:53:20 2024 GMT Raw PEM certificate : -----BEGIN CERTIFICATE----- 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 -----END CERTIFICATE----- Contact the Certificate Authority to have the SSL certificate reissued.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=spider01 |-Issuer : CN=spider01 Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=spider01 Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=spider01 |-Issuer : CN=spider01 Purchase or generate a proper SSL certificate for this service.
An SSL certificate in the certificate chain has been signed using a weak hash algorithm. The following certificates were part of the certificate chain sent by the remote host, but contain hashes that are considered to be weak. Subject : CN=spider01 Signature Algorithm : SHA-1 With RSA Encryption Valid From : Apr 23 13:53:20 2014 GMT Valid To : Apr 20 13:53:20 2024 GMT Raw PEM certificate : -----BEGIN CERTIFICATE----- MIICtjCCAZ6gAwIBAgIJAIpiZqrfh90jMA0GCSqGSIb3DQEBBQUAMBMxETAPBgNVBAMTCHNwaWRlcjAxMB4XDTE0MDQyMzEzNTMyMFoXDTI0MDQyMDEzNTMyMFowEzERMA8GA1UEAxMIc3BpZGVyMDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCbOaEF5Amp3F8EBylU9xaK+r9ohK8rYJBn+G8DYfMTdottIrNgXH8d/4s9x0zVpAlf+5ypsV+Q7QUtFNTXDYNDRenxM8T9sTjySG0B54dFjkfBZ9gYkNWPw8k+jXFJltnPAmJzB66W9H6TogWIugh11AOXzClLUC4+GcjcKfyhQXaSNu05krK1/meKLDBb1V8zuRHvCswMLGFkXyBP2kf7pi4tkiSW4hdyzydbgFVtQNicHQ/hD6ila2gEECcaXW4iqD429xp/vJCoEo22fNPDgsERxHf1bU129x0y6XeFL75gpe5QzPHflf/pEeUgjg+F5k2P05jMd/DkGFjXoJ3bAgMBAAGjDTALMAkGA1UdEwQCMAAwDQYJKoZIhvcNAQEFBQADggEBAEqNDGjAOnXhQtyCa+QRlG+tidMVWRi3nf1HMCJbBj4CyaWFUmoX4Xy5S6Kxc/aHAmUBArVv3FaAPm4p4uSaj0FqUn4SnnMtm9kvplmgVymLkL1XGqOvMuZuOHeme5ko6sRQGG/UaVN/wIRWWbB8Hop2LHU790Pqf4gG0JlL60EaB0PMaJUuZmuOqFJKlEOIuzirejyWzqTSkPC2wuOyyk8J6OwlO5gz+QDdd4Ck6LjQsrAWV6Wd+6rJmmyGxvnmyQrqcDTr4LOtEfSmACsE4D/959Y9cZVZmDwhNMlFNlRJzBfndsO2i00KFvzfG+bQLyFk2dePSDEFIpkSkceqy3I= -----END CERTIFICATE----- Contact the Certificate Authority to have the SSL certificate reissued.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=spider01 Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.17.11 (VulnLIB) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:47:18 | 2022-03-26 22:23:28 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote host contains an unsupported version of a web application scripting language. Source : X-Powered-By: PHP/5.4.45-0+deb7u4 Installed version : 5.4.45-0+deb7u4 End of support date : 2015/09/03 Announcement : http://php.net/supported-versions.php Supported versions : 7.3.x / 7.4.x / 8.0.x Upgrade to a version of PHP that is currently supported.
The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities. Nessus was able to exploit the issue using the following URL : http://172.21.17.11:9292/?"><script>alert('struts_sa_surl_xss.nasl-1647596479')</script> Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The version of PHP running on the remote web server is affected by multiple vulnerabilities. URL : http://172.21.17.11:9292/ (5.4.45-0+deb7u4 under X-Powered-By: PHP/5.4.45-0+deb7u4) Installed version : 5.4.45-0+deb7u4 Fixed version : 7.3.24 Upgrade to PHP version 7.3.24 or later.
The version of PHP running on the remote web server is affected by an email header injection vulnerability. URL : http://172.21.17.11:9292/ (5.4.45-0+deb7u4 under X-Powered-By: PHP/5.4.45-0+deb7u4) Installed version : 5.4.45-0+deb7u4 Fixed version : 7.3.28 Upgrade to PHP version 7.3.28 or later.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities. Nessus was able to exploit the issue using the following URL : http://172.21.17.11:9292/?"><script>alert('struts_sa_surl_xss.nasl-1648328907')</script> Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 9292 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "3e0d3-343-50ed2ef0bc400" Inode number : 254163 File size : 835 bytes File modification time : Feb. 11, 2015 at 17:00:00 GMT Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "3e0d3-343-50ed2ef0bc400" Inode number : 254163 File size : 835 bytes File modification time : Feb. 11, 2015 at 17:00:00 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 9292 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "3e0d3-343-50ed2ef0bc400" Inode number : 254163 File size : 835 bytes File modification time : Feb. 11, 2015 at 17:00:00 GMT Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "3e0d3-343-50ed2ef0bc400" Inode number : 254163 File size : 835 bytes File modification time : Feb. 11, 2015 at 17:00:00 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.17.12 (VulnLIB) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:47:20 | 2022-03-26 22:23:42 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote host contains an unsupported version of a web application scripting language. Source : X-Powered-By: PHP/5.4.45-0+deb7u4 Installed version : 5.4.45-0+deb7u4 End of support date : 2015/09/03 Announcement : http://php.net/supported-versions.php Supported versions : 7.3.x / 7.4.x / 8.0.x Upgrade to a version of PHP that is currently supported.
The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities. Nessus was able to exploit the issue using the following URL : http://172.21.17.12/?"><script>alert('struts_sa_surl_xss.nasl-1647596487')</script> Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The remote web server is affected by multiple cross site scripting vulnerability. URL : http://172.21.17.12/lib/3rd_party/jquery.js Installed version : 1.9.1 Fixed version : 3.5.0 Upgrade to JQuery version 3.5.0 or later.
The version of PHP running on the remote web server is affected by multiple vulnerabilities. URL : http://172.21.17.12/ (5.4.45-0+deb7u4 under X-Powered-By: PHP/5.4.45-0+deb7u4) Installed version : 5.4.45-0+deb7u4 Fixed version : 7.3.24 Upgrade to PHP version 7.3.24 or later.
The version of PHP running on the remote web server is affected by an email header injection vulnerability. URL : http://172.21.17.12/ (5.4.45-0+deb7u4 under X-Powered-By: PHP/5.4.45-0+deb7u4) Installed version : 5.4.45-0+deb7u4 Fixed version : 7.3.28 Upgrade to PHP version 7.3.28 or later.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities. Nessus was able to exploit the issue using the following URL : http://172.21.17.12:9292/?"><script>alert('struts_sa_surl_xss.nasl-1648328936')</script> Nessus was able to exploit the issue using the following URL : http://172.21.17.12/?"><script>alert('struts_sa_surl_xss.nasl-1648328935')</script> Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.
The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities. Nessus was able to exploit the issue using the following URL : http://172.21.17.12:9292/?"><script>alert('struts_sa_surl_xss.nasl-1648328936')</script> Nessus was able to exploit the issue using the following URL : http://172.21.17.12/?"><script>alert('struts_sa_surl_xss.nasl-1648328935')</script> Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 9292 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "3e05e-343-50ed2ef0bc400" Inode number : 254046 File size : 835 bytes File modification time : Feb. 11, 2015 at 17:00:00 GMT Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "3e05e-343-50ed2ef0bc400" Inode number : 254046 File size : 835 bytes File modification time : Feb. 11, 2015 at 17:00:00 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 9292 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "3e05e-343-50ed2ef0bc400" Inode number : 254046 File size : 835 bytes File modification time : Feb. 11, 2015 at 17:00:00 GMT Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "3e05e-343-50ed2ef0bc400" Inode number : 254046 File size : 835 bytes File modification time : Feb. 11, 2015 at 17:00:00 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.172.105 (monkeySYS) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:54:09 | 2022-03-26 22:28:48 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 | Linux Kernel 2.6 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=ponkeyAGENTS |-Issuer : CN=ponkeyAGENTS Purchase or generate a proper SSL certificate for this service.
The remote host has IP forwarding enabled. IP forwarding appears to be enabled on the remote host. Detected local MAC Address : 00113c1500b4 Response from local MAC Address : 00113c1500b4 Detected Gateway MAC Address : 00163e15ae12 Response from Gateway MAC Address : 00163e15ae12 On Linux, you can disable IP forwarding by doing :
echo 0 > /proc/sys/net/ipv4/ip_forward
On Windows, set the key 'IPEnableRouter' to 0 under
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
On Mac OS X, you can disable IP forwarding by executing the command :
sysctl -w net.inet.ip.forwarding=0
For other systems, check with your vendor.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=ponkeyAGENTS Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote web server is affected by an information disclosure vulnerability. Nessus was able to exploit the issue using the following request : https://172.21.172.105/?M=A This produced the following truncated output (limited to 10 lines) : ------------------------------ snip ------------------------------ <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN"> <html> <head> <title>Index of /</title> </head> <body> <h1>Index of /</h1> <table> <tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr> <tr><th colspan="5"><hr></th></tr> [...] ------------------------------ snip ------------------------------ Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.
The remote host has IP forwarding enabled. IP forwarding appears to be enabled on the remote host. Detected local MAC Address : 00113c1500b4 Response from local MAC Address : 00113c1500b4 Detected Gateway MAC Address : 00163e15ae12 Response from Gateway MAC Address : 00163e15ae12 On Linux, you can disable IP forwarding by doing :
echo 0 > /proc/sys/net/ipv4/ip_forward
On Windows, set the key 'IPEnableRouter' to 0 under
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
On Mac OS X, you can disable IP forwarding by executing the command :
sysctl -w net.inet.ip.forwarding=0
For other systems, check with your vendor.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=ponkeyAGENTS |-Issuer : CN=ponkeyAGENTS Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=ponkeyAGENTS Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.198.5 (publior) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:14:08 | 2022-03-26 22:44:06 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 | Linux Kernel 3.1 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote DNS server is vulnerable to cache snooping attacks. Nessus sent a non-recursive query for example.com and received 1 answer : 93.184.216.34 Contact the vendor of the DNS software for a fix.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1 |-Issuer : O=Digital Signature Trust Co./CN=DST Root CA X3 Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The remote POP3 daemon allows credentials to be transmitted in cleartext. The following cleartext methods are supported : USER SASL PLAIN LOGIN DIGEST-MD5 CRAM-MD5 Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.
|
The remote DNS server is vulnerable to cache snooping attacks. Nessus sent a non-recursive query for example.com and received 1 answer : 93.184.216.34 Contact the vendor of the DNS software for a fix.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1 |-Issuer : O=Digital Signature Trust Co./CN=DST Root CA X3 Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The remote POP3 daemon allows credentials to be transmitted in cleartext. The following cleartext methods are supported : USER SASL PLAIN LOGIN DIGEST-MD5 CRAM-MD5 Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.
|
172.21.198.20 (publior) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:01:45 | 2022-03-26 22:32:45 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by multiple denial of service vulnerabilities. URL : http://172.21.198.20/ Installed version : 1.12.0 Fixed version : 1.16.1 / 1.17.3 Upgrade to nginx version 1.16.1 / 1.17.3 or later.
The remote web server is affected by a data disclosure vulnerability. URL : http://172.21.198.20/ Installed version : 1.12.0 Fixed version : 1.12.1 Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.198.20/ Installed version : 1.12.0 Fixed version : 1.14.1 Upgrade to nginx 1.14.1 / 1.15.6 or later.
The remote web server is affected by an information disclosure vulnerability. URL : http://172.21.198.20/ Installed version : 1.12.0 Fixed version : 1.17.7 Upgrade to nginx version 1.17.7 or later.
The remote web server is affected by a remote code execution vulnerability. URL : http://172.21.198.20/ Installed version : 1.12.0 Fixed version : 1.20.1 / 1.21.0 Upgrade to nginx 1.20.1 or later.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote web server is affected by an information disclosure vulnerability. URL : http://172.21.198.20/ Installed version : 1.12.0 Fixed version : 1.17.7 Upgrade to nginx version 1.17.7 or later.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.198.21 (publior) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:02:28 | 2022-03-26 22:32:43 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by multiple vulnerabilities. URL : http://172.21.198.21/ Installed version : 1.6.2 Fixed version : 1.8.1 Upgrade to nginx version 1.8.1 / 1.9.10 or later.
The remote web server is affected by a data disclosure vulnerability. URL : http://172.21.198.21/ Installed version : 1.6.2 Fixed version : 1.12.1 / 1.13.3 Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.198.21/ Installed version : 1.6.2 Fixed version : 1.14.1 Upgrade to nginx 1.14.1 / 1.15.6 or later.
The remote web server is affected by an information disclosure vulnerability. URL : http://172.21.198.21/ Installed version : 1.6.2 Fixed version : 1.17.7 Upgrade to nginx version 1.17.7 or later.
The remote web server is affected by a remote code execution vulnerability. URL : http://172.21.198.21/ Installed version : 1.6.2 Fixed version : 1.20.1 / 1.21.0 Upgrade to nginx 1.20.1 or later.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote web server is affected by an information disclosure vulnerability. URL : http://172.21.198.21/ Installed version : 1.6.2 Fixed version : 1.17.7 Upgrade to nginx version 1.17.7 or later.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.198.22 (publior) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:03:05 | 2022-03-26 22:33:13 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by multiple vulnerabilities. URL : http://172.21.198.22/ Installed version : 1.6.2 Fixed version : 1.8.1 Upgrade to nginx version 1.8.1 / 1.9.10 or later.
The remote web server is affected by a data disclosure vulnerability. URL : http://172.21.198.22/ Installed version : 1.6.2 Fixed version : 1.12.1 / 1.13.3 Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.198.22/ Installed version : 1.6.2 Fixed version : 1.14.1 Upgrade to nginx 1.14.1 / 1.15.6 or later.
The remote web server is affected by an information disclosure vulnerability. URL : http://172.21.198.22/ Installed version : 1.6.2 Fixed version : 1.17.7 Upgrade to nginx version 1.17.7 or later.
The remote web server is affected by a remote code execution vulnerability. URL : http://172.21.198.22/ Installed version : 1.6.2 Fixed version : 1.20.1 / 1.21.0 Upgrade to nginx 1.20.1 or later.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote web server is affected by an information disclosure vulnerability. URL : http://172.21.198.22/ Installed version : 1.6.2 Fixed version : 1.17.7 Upgrade to nginx version 1.17.7 or later.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.198.23 (publior) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:03:08 | 2022-03-26 22:33:51 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by multiple denial of service vulnerabilities. URL : http://172.21.198.23/ Installed version : 1.10.3 Fixed version : 1.16.1 / 1.17.3 Upgrade to nginx version 1.16.1 / 1.17.3 or later.
The remote web server is affected by a data disclosure vulnerability. URL : http://172.21.198.23/ Installed version : 1.10.3 Fixed version : 1.12.1 / 1.13.3 Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.198.23/ Installed version : 1.10.3 Fixed version : 1.14.1 Upgrade to nginx 1.14.1 / 1.15.6 or later.
The remote web server is affected by an information disclosure vulnerability. URL : http://172.21.198.23/ Installed version : 1.10.3 Fixed version : 1.17.7 Upgrade to nginx version 1.17.7 or later.
The remote web server is affected by a remote code execution vulnerability. URL : http://172.21.198.23/ Installed version : 1.10.3 Fixed version : 1.20.1 / 1.21.0 Upgrade to nginx 1.20.1 or later.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote web server is affected by an information disclosure vulnerability. URL : http://172.21.198.23/ Installed version : 1.10.3 Fixed version : 1.17.7 Upgrade to nginx version 1.17.7 or later.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.198.110 (publior) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:04:03 | 2022-03-26 22:33:53 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by multiple vulnerabilities. URL : http://172.21.198.110/ Installed version : 1.6.2 Fixed version : 1.8.1 Upgrade to nginx version 1.8.1 / 1.9.10 or later.
The remote web server is affected by a data disclosure vulnerability. URL : http://172.21.198.110/ Installed version : 1.6.2 Fixed version : 1.12.1 / 1.13.3 Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.198.110/ Installed version : 1.6.2 Fixed version : 1.14.1 Upgrade to nginx 1.14.1 / 1.15.6 or later.
The remote web server is affected by an information disclosure vulnerability. URL : http://172.21.198.110/ Installed version : 1.6.2 Fixed version : 1.17.7 Upgrade to nginx version 1.17.7 or later.
The remote web server is affected by a remote code execution vulnerability. URL : http://172.21.198.110/ Installed version : 1.6.2 Fixed version : 1.20.1 / 1.21.0 Upgrade to nginx 1.20.1 or later.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote web server is affected by an information disclosure vulnerability. URL : http://172.21.198.110/ Installed version : 1.6.2 Fixed version : 1.17.7 Upgrade to nginx version 1.17.7 or later.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.198.111 (publior) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:04:57 | 2022-03-26 22:35:13 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by multiple vulnerabilities. URL : http://172.21.198.111/ Installed version : 1.6.2 Fixed version : 1.8.1 Upgrade to nginx version 1.8.1 / 1.9.10 or later.
The remote web server is affected by a data disclosure vulnerability. URL : http://172.21.198.111/ Installed version : 1.6.2 Fixed version : 1.12.1 / 1.13.3 Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.198.111/ Installed version : 1.6.2 Fixed version : 1.14.1 Upgrade to nginx 1.14.1 / 1.15.6 or later.
The remote web server is affected by an information disclosure vulnerability. URL : http://172.21.198.111/ Installed version : 1.6.2 Fixed version : 1.17.7 Upgrade to nginx version 1.17.7 or later.
The remote web server is affected by a remote code execution vulnerability. URL : http://172.21.198.111/ Installed version : 1.6.2 Fixed version : 1.20.1 / 1.21.0 Upgrade to nginx 1.20.1 or later.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote web server is affected by an information disclosure vulnerability. URL : http://172.21.198.111/ Installed version : 1.6.2 Fixed version : 1.17.7 Upgrade to nginx version 1.17.7 or later.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.198.112 (publior) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:05:52 | 2022-03-26 22:36:18 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by multiple vulnerabilities. URL : http://172.21.198.112/ Installed version : 1.6.2 Fixed version : 1.8.1 Upgrade to nginx version 1.8.1 / 1.9.10 or later.
The remote web server is affected by a data disclosure vulnerability. URL : http://172.21.198.112/ Installed version : 1.6.2 Fixed version : 1.12.1 / 1.13.3 Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.198.112/ Installed version : 1.6.2 Fixed version : 1.14.1 Upgrade to nginx 1.14.1 / 1.15.6 or later.
The remote web server is affected by an information disclosure vulnerability. URL : http://172.21.198.112/ Installed version : 1.6.2 Fixed version : 1.17.7 Upgrade to nginx version 1.17.7 or later.
The remote web server is affected by a remote code execution vulnerability. URL : http://172.21.198.112/ Installed version : 1.6.2 Fixed version : 1.20.1 / 1.21.0 Upgrade to nginx 1.20.1 or later.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote web server is affected by an information disclosure vulnerability. URL : http://172.21.198.112/ Installed version : 1.6.2 Fixed version : 1.17.7 Upgrade to nginx version 1.17.7 or later.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.198.113 (publior) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:07:01 | 2022-03-26 22:38:46 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by multiple denial of service vulnerabilities. URL : http://172.21.198.113/ Installed version : 1.10.3 Fixed version : 1.16.1 / 1.17.3 Upgrade to nginx version 1.16.1 / 1.17.3 or later.
The remote web server is affected by a data disclosure vulnerability. URL : http://172.21.198.113/ Installed version : 1.10.3 Fixed version : 1.12.1 / 1.13.3 Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.198.113/ Installed version : 1.10.3 Fixed version : 1.14.1 Upgrade to nginx 1.14.1 / 1.15.6 or later.
The remote web server is affected by an information disclosure vulnerability. URL : http://172.21.198.113/ Installed version : 1.10.3 Fixed version : 1.17.7 Upgrade to nginx version 1.17.7 or later.
The remote web server is affected by a remote code execution vulnerability. URL : http://172.21.198.113/ Installed version : 1.10.3 Fixed version : 1.20.1 / 1.21.0 Upgrade to nginx 1.20.1 or later.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote web server is affected by an information disclosure vulnerability. URL : http://172.21.198.113/ Installed version : 1.10.3 Fixed version : 1.17.7 Upgrade to nginx version 1.17.7 or later.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.198.250 (publior) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:10:54 | 2022-03-26 22:42:34 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by multiple vulnerabilities. URL : http://172.21.198.250/ Installed version : 1.6.2 Fixed version : 1.8.1 Upgrade to nginx version 1.8.1 / 1.9.10 or later.
The remote web server is affected by a data disclosure vulnerability. URL : http://172.21.198.250/ Installed version : 1.6.2 Fixed version : 1.12.1 / 1.13.3 Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.198.250/ Installed version : 1.6.2 Fixed version : 1.14.1 Upgrade to nginx 1.14.1 / 1.15.6 or later.
The remote web server is affected by an information disclosure vulnerability. URL : http://172.21.198.250/ Installed version : 1.6.2 Fixed version : 1.17.7 Upgrade to nginx version 1.17.7 or later.
The remote web server is affected by a remote code execution vulnerability. URL : http://172.21.198.250/ Installed version : 1.6.2 Fixed version : 1.20.1 / 1.21.0 Upgrade to nginx 1.20.1 or later.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote web server is affected by an information disclosure vulnerability. URL : http://172.21.198.250/ Installed version : 1.6.2 Fixed version : 1.17.7 Upgrade to nginx version 1.17.7 or later.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.198.251 (publior) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:10:59 | 2022-03-26 22:42:48 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by multiple vulnerabilities. URL : http://172.21.198.251/ Installed version : 1.6.2 Fixed version : 1.8.1 Upgrade to nginx version 1.8.1 / 1.9.10 or later.
The remote web server is affected by a data disclosure vulnerability. URL : http://172.21.198.251/ Installed version : 1.6.2 Fixed version : 1.12.1 / 1.13.3 Either apply the patch manually or upgrade to nginx 1.12.1 / 1.13.3 or later.
The remote web server is affected by multiple vulnerabilities. URL : http://172.21.198.251/ Installed version : 1.6.2 Fixed version : 1.14.1 Upgrade to nginx 1.14.1 / 1.15.6 or later.
The remote web server is affected by an information disclosure vulnerability. URL : http://172.21.198.251/ Installed version : 1.6.2 Fixed version : 1.17.7 Upgrade to nginx version 1.17.7 or later.
The remote web server is affected by a remote code execution vulnerability. URL : http://172.21.198.251/ Installed version : 1.6.2 Fixed version : 1.20.1 / 1.21.0 Upgrade to nginx 1.20.1 or later.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote web server is affected by an information disclosure vulnerability. URL : http://172.21.198.251/ Installed version : 1.6.2 Fixed version : 1.17.7 Upgrade to nginx version 1.17.7 or later.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.199.19 (Hosting) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:21:40 | 2022-03-26 22:43:53 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Windows Server 2019 Standard 17763 | Windows Server 2019 Standard 17763 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote service supports the use of medium strength SSL ciphers. Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Reconfigure the affected application if possible to avoid use of medium strength ciphers.
The SSL certificate for this service is for a different host. The identities known by Nessus are : 172.21.199.19 172.21.199.19 The Common Name in the certificate is : TAU.hbmedia.lan Purchase or generate a proper SSL certificate for this service.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=TAU.hbmedia.lan |-Issuer : CN=TAU.hbmedia.lan Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=TAU.hbmedia.lan Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
The remote service supports the use of medium strength SSL ciphers. Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Reconfigure the affected application if possible to avoid use of medium strength ciphers.
The SSL certificate for this service is for a different host. The identities known by Nessus are : 172.21.199.19 172.21.199.19 The Common Name in the certificate is : TAU.hbmedia.lan Purchase or generate a proper SSL certificate for this service.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=TAU.hbmedia.lan |-Issuer : CN=TAU.hbmedia.lan Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=TAU.hbmedia.lan Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
172.21.199.201 (Hosting) |
||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:20:13 | 2022-03-26 22:50:08 | ||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 | Linux Kernel 2.6 | ||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1 |-Issuer : O=Digital Signature Trust Co./CN=DST Root CA X3 Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote server's SSL certificate has already expired. The SSL certificate has already expired : Subject : CN=mail.hbmedia.net Issuer : C=US, O=Let's Encrypt, CN=R3 Not valid before : Dec 25 04:58:08 2021 GMT Not valid after : Mar 25 04:58:07 2022 GMT Purchase or generate a new SSL certificate to replace the existing one.
The SSL certificate for this service cannot be trusted. The following certificate was part of the certificate chain sent by the remote host, but it has expired : |-Subject : CN=mail.hbmedia.net |-Not After : Mar 25 04:58:07 2022 GMT The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1 |-Issuer : O=Digital Signature Trust Co./CN=DST Root CA X3 Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.221.24 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:15:17 | 2022-03-26 22:46:02 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | FreePBX SIP Device | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "1a3fc-221-4f4552e1ea380" Inode number : 107516 File size : 545 bytes File modification time : Mar. 11, 2014 at 14:03:10 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "1a3fc-221-4f4552e1ea380" Inode number : 107516 File size : 545 bytes File modification time : Mar. 11, 2014 at 14:03:10 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.221.238 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:48:22 | 2022-03-26 23:19:31 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Asterisk SIP Device | Linux Kernel 2.6 | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-buster-b/O=tel-buster-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate for this service cannot be trusted. The following certificate was part of the certificate chain sent by the remote host, but it has an invalid signature : |-Subject : CN=tel-buster-b/O=tel-buster-b |-Hash : The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-buster-b/O=tel-buster-b |-Issuer : CN=tel-buster-b/O=tel-buster-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-buster-b/O=tel-buster-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate for this service cannot be trusted. The following certificate was part of the certificate chain sent by the remote host, but it has an invalid signature : |-Subject : CN=tel-buster-b/O=tel-buster-b |-Hash : The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-buster-b/O=tel-buster-b |-Issuer : CN=tel-buster-b/O=tel-buster-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.11.17 (ISP) |
||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:40:32 | 2022-03-26 22:07:15 | ||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||
OS detected: | Ubuntu 14.04 Linux Kernel 3.13 | Ubuntu 14.04 Linux Kernel 3.13 | ||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||
Vulnerabilities detected: | The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1 |-Issuer : O=Digital Signature Trust Co./CN=DST Root CA X3 Purchase or generate a proper SSL certificate for this service.
The remote POP3 daemon allows credentials to be transmitted in cleartext. The following cleartext methods are supported : USER SASL PLAIN LOGIN Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.
|
The remote POP3 daemon allows credentials to be transmitted in cleartext. The following cleartext methods are supported : USER SASL PLAIN LOGIN Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.
|
172.21.1.1 (Gateways) |
||||||||||||||
Previous scan | Current scan | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:34:30 | 2022-03-26 22:03:30 | ||||||||||||
WAFs detected: |
|
|
||||||||||||
OS detected: | Unknown | Unknown | ||||||||||||
Ports detected: |
|
|
||||||||||||
Vulnerabilities detected: | None | It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.174.32 (darkhill) |
||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:04:10 | 2022-03-26 22:27:26 | ||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | ||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||
Vulnerabilities detected: | The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=web02.alevi.de |-Issuer : CN=web02.alevi.de Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=web02.alevi.de Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.198.24 (publior) |
||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:02:47 | 2022-03-26 22:33:53 | ||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||
OS detected: | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | ||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by a remote code execution vulnerability. URL : http://172.21.198.24/ Installed version : 1.18.0 Fixed version : 1.20.1 / 1.21.0 Upgrade to nginx 1.20.1 or later.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.198.30 (publior) |
||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:12:15 | 2022-03-26 22:41:32 | ||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||
OS detected: | Ubuntu 14.04 Linux Kernel 3.13 | Ubuntu 14.04 Linux Kernel 3.13 | ||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by a remote code execution vulnerability. URL : http://172.21.198.30/ Installed version : 1.18.0 Fixed version : 1.20.1 / 1.21.0 Upgrade to nginx 1.20.1 or later.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.198.32 (publior) |
||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:03:52 | 2022-03-26 22:34:10 | ||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||
OS detected: | Linux Kernel 2.6 | Linux Kernel 2.6 | ||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by a remote code execution vulnerability. URL : http://172.21.198.32/ Installed version : 1.18.0 Fixed version : 1.20.1 / 1.21.0 Upgrade to nginx 1.20.1 or later.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.198.114 (publior) |
||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:08:38 | 2022-03-26 22:38:23 | ||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||
OS detected: | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | ||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by a remote code execution vulnerability. URL : http://172.21.198.114/ Installed version : 1.18.0 Fixed version : 1.20.1 / 1.21.0 Upgrade to nginx 1.20.1 or later.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.221.43 (Telephony) |
||||||||||||||
Previous scan | Current scan | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:15:22 | 2022-03-26 22:46:02 | ||||||||||||
WAFs detected: |
|
|
||||||||||||
OS detected: | FreePBX SIP Device | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||
Ports detected: |
|
|
||||||||||||
Vulnerabilities detected: | None | None |
172.21.0.2 (Hosts) |
||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:39:35 | 2022-03-26 22:09:02 | ||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The remote DNS server is vulnerable to cache snooping attacks. Nessus sent a non-recursive query for example.com and received 1 answer : 93.184.216.34 Contact the vendor of the DNS software for a fix.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The remote DNS server is vulnerable to cache snooping attacks. Nessus sent a non-recursive query for example.com and received 1 answer : 93.184.216.34 Contact the vendor of the DNS software for a fix.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.0.16 (Hosts) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:39:35 | 2022-03-26 22:09:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 on Debian 6.0 (squeeze) | Linux Kernel 2.6 on Debian 6.0 (squeeze) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The remote name server is affected by an assertion failure vulnerability. Installed version : 9.7.3 Fixed version : 9.11.19 Upgrade to the patched release most closely related to your current version of BIND.
The remote DNS server is vulnerable to cache snooping attacks. Nessus sent a non-recursive query for example.com and received 1 answer : 93.184.216.34 Contact the vendor of the DNS software for a fix.
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "3c8835-b1-4c12d8ed73440" Inode number : 3967029 File size : 177 bytes File modification time : May. 29, 2012 at 14:22:01 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The remote name server is affected by Service Downgrade / Reflected DoS vulnerabilities. Installed version : 9.7.3 Fixed version : 9.11.19 Upgrade to the ISC BIND version referenced in the vendor advisory.
The remote name server is affected by a denial of service vulnerability. Installed version : 9.7.3 Fixed version : 9.11.22, 9.16.6, 9.17.4 or later Upgrade to BIND 9.11.22, 9.16.6, 9.17.4 or later.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The operating system running on the remote host is no longer supported. Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The remote name server is affected by an assertion failure vulnerability. Installed version : 9.7.3 Fixed version : 9.11.19 Upgrade to the patched release most closely related to your current version of BIND.
The remote DNS server is vulnerable to cache snooping attacks. Nessus sent a non-recursive query for example.com and received 1 answer : 93.184.216.34 Contact the vendor of the DNS software for a fix.
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "3c8835-b1-4c12d8ed73440" Inode number : 3967029 File size : 177 bytes File modification time : May. 29, 2012 at 14:22:01 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The remote name server is affected by Service Downgrade / Reflected DoS vulnerabilities. Installed version : 9.7.3 Fixed version : 9.11.19 Upgrade to the ISC BIND version referenced in the vendor advisory.
The remote name server is affected by a denial of service vulnerability. Installed version : 9.7.3 Fixed version : 9.11.22, 9.16.6, 9.17.4 or later Upgrade to BIND 9.11.22, 9.16.6, 9.17.4 or later.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.11.121 (ISP) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:42:03 | 2022-03-26 22:10:48 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=sysmonkeyWEB |-Issuer : CN=sysmonkeyWEB Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=sysmonkeyWEB Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The remote web server is affected by multiple cross site scripting vulnerability. URL : https://172.21.11.121/lib/3rd_party/jquery/jquery.js Installed version : 1.7.1 Fixed version : 3.5.0 Upgrade to JQuery version 3.5.0 or later.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=sysmonkeyWEB |-Issuer : CN=sysmonkeyWEB Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=sysmonkeyWEB Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The remote web server is affected by multiple cross site scripting vulnerability. URL : https://172.21.11.121/lib/3rd_party/jquery/jquery.js Installed version : 1.7.1 Fixed version : 3.5.0 Upgrade to JQuery version 3.5.0 or later.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.17.14 (VulnLIB) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:56:58 | 2022-03-26 22:25:20 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote host contains an unsupported version of a web application scripting language. Source : X-Powered-By: PHP/5.4.45-0+deb7u4 Installed version : 5.4.45-0+deb7u4 End of support date : 2015/09/03 Announcement : http://php.net/supported-versions.php Supported versions : 7.3.x / 7.4.x / 8.0.x Upgrade to a version of PHP that is currently supported.
The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities. Nessus was able to exploit the issue using the following URL : http://172.21.17.14:9292/?"><script>alert('struts_sa_surl_xss.nasl-1647596523')</script> Nessus was able to exploit the issue using the following URL : http://172.21.17.14/?"><script>alert('struts_sa_surl_xss.nasl-1647596522')</script> Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.
The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities. Nessus was able to exploit the issue using the following URL : http://172.21.17.14:9292/?"><script>alert('struts_sa_surl_xss.nasl-1647596523')</script> Nessus was able to exploit the issue using the following URL : http://172.21.17.14/?"><script>alert('struts_sa_surl_xss.nasl-1647596522')</script> Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 9292 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "3e05e-343-50ed2ef0bc400" Inode number : 254046 File size : 835 bytes File modification time : Feb. 11, 2015 at 17:00:00 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The version of PHP running on the remote web server is affected by multiple vulnerabilities. URL : http://172.21.17.14/ (5.4.45-0+deb7u4 under X-Powered-By: PHP/5.4.45-0+deb7u4) Installed version : 5.4.45-0+deb7u4 Fixed version : 7.3.24 Upgrade to PHP version 7.3.24 or later.
The version of PHP running on the remote web server is affected by an email header injection vulnerability. URL : http://172.21.17.14/ (5.4.45-0+deb7u4 under X-Powered-By: PHP/5.4.45-0+deb7u4) Installed version : 5.4.45-0+deb7u4 Fixed version : 7.3.28 Upgrade to PHP version 7.3.28 or later.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote host contains an unsupported version of a web application scripting language. Source : X-Powered-By: PHP/5.4.45-0+deb7u4 Installed version : 5.4.45-0+deb7u4 End of support date : 2015/09/03 Announcement : http://php.net/supported-versions.php Supported versions : 7.3.x / 7.4.x / 8.0.x Upgrade to a version of PHP that is currently supported.
The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities. Nessus was able to exploit the issue using the following URL : http://172.21.17.14:9292/?"><script>alert('struts_sa_surl_xss.nasl-1648329034')</script> Nessus was able to exploit the issue using the following URL : http://172.21.17.14/?"><script>alert('struts_sa_surl_xss.nasl-1648329033')</script> Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.
The remote host is running a web application that is affected by multiple cross-site scripting vulnerabilities. Nessus was able to exploit the issue using the following URL : http://172.21.17.14:9292/?"><script>alert('struts_sa_surl_xss.nasl-1648329034')</script> Nessus was able to exploit the issue using the following URL : http://172.21.17.14/?"><script>alert('struts_sa_surl_xss.nasl-1648329033')</script> Upgrade to Struts version 2.1.1 / 2.0.11.1 or later.
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 9292 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "3e05e-343-50ed2ef0bc400" Inode number : 254046 File size : 835 bytes File modification time : Feb. 11, 2015 at 17:00:00 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The version of PHP running on the remote web server is affected by multiple vulnerabilities. URL : http://172.21.17.14/ (5.4.45-0+deb7u4 under X-Powered-By: PHP/5.4.45-0+deb7u4) Installed version : 5.4.45-0+deb7u4 Fixed version : 7.3.24 Upgrade to PHP version 7.3.24 or later.
The version of PHP running on the remote web server is affected by an email header injection vulnerability. URL : http://172.21.17.14/ (5.4.45-0+deb7u4 under X-Powered-By: PHP/5.4.45-0+deb7u4) Installed version : 5.4.45-0+deb7u4 Fixed version : 7.3.28 Upgrade to PHP version 7.3.28 or later.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.172.146 (monkeySYS) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:57:52 | 2022-03-26 22:29:57 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The remote web server is affected by an information disclosure vulnerability. Nessus was able to exploit the issue using the following request : https://donkeyA01.devmonkey.ciproc/?M=A This produced the following truncated output (limited to 10 lines) : ------------------------------ snip ------------------------------ <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN"> <html> <head> <title>Index of /</title> </head> <body> <h1>Index of /</h1> <table> <tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr> <tr><th colspan="5"><hr></th></tr> [...] ------------------------------ snip ------------------------------ Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.
The remote host has IP forwarding enabled. IP forwarding appears to be enabled on the remote host. Detected local MAC Address : 00113c1500b4 Response from local MAC Address : 00113c1500b4 Detected Gateway MAC Address : 00163e15ae12 Response from Gateway MAC Address : 00163e15ae12 On Linux, you can disable IP forwarding by doing :
echo 0 > /proc/sys/net/ipv4/ip_forward
On Windows, set the key 'IPEnableRouter' to 0 under
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
On Mac OS X, you can disable IP forwarding by executing the command :
sysctl -w net.inet.ip.forwarding=0
For other systems, check with your vendor.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=sysmonkey |-Issuer : CN=sysmonkey Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=sysmonkey Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The remote web server is affected by an information disclosure vulnerability. Nessus was able to exploit the issue using the following request : https://172.21.172.146/?M=A This produced the following truncated output (limited to 10 lines) : ------------------------------ snip ------------------------------ <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN"> <html> <head> <title>Index of /</title> </head> <body> <h1>Index of /</h1> <table> <tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr> <tr><th colspan="5"><hr></th></tr> [...] ------------------------------ snip ------------------------------ Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.
The remote host has IP forwarding enabled. IP forwarding appears to be enabled on the remote host. Detected local MAC Address : 00113c1500b4 Response from local MAC Address : 00113c1500b4 Detected Gateway MAC Address : 00163e15ae12 Response from Gateway MAC Address : 00163e15ae12 On Linux, you can disable IP forwarding by doing :
echo 0 > /proc/sys/net/ipv4/ip_forward
On Windows, set the key 'IPEnableRouter' to 0 under
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
On Mac OS X, you can disable IP forwarding by executing the command :
sysctl -w net.inet.ip.forwarding=0
For other systems, check with your vendor.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=sysmonkey |-Issuer : CN=sysmonkey Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=sysmonkey Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.173.11 (darkhill) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:07:57 | 2022-03-26 22:37:08 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=horde.eitun.de |-Issuer : CN=horde.eitun.de Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=horde.eitun.de Purchase or generate a proper SSL certificate for this service.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1034 seconds. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=horde.eitun.de |-Issuer : CN=horde.eitun.de Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=horde.eitun.de Purchase or generate a proper SSL certificate for this service.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1045 seconds. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.198.230 (publior) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:10:12 | 2022-03-26 22:42:15 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 3 seconds. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.220.11 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:21:37 | 2022-03-26 22:51:33 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The remote server's SSL certificate has already expired. The SSL certificate has already expired : Subject : CN=ciproc.nextgentel.de, O=Ciproc GmbH Issuer : CN=Asterisk Private CA, O=Ciproc GmbH Not valid before : Mar 22 19:12:24 2020 GMT Not valid after : Mar 22 19:12:24 2021 GMT Purchase or generate a new SSL certificate to replace the existing one.
The remote service supports the use of medium strength SSL ciphers. Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-DES-CBC3-SHA 0xC0, 0x12 ECDH RSA 3DES-CBC(168) SHA1 AECDH-DES-CBC3-SHA 0xC0, 0x17 ECDH None 3DES-CBC(168) SHA1 DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Reconfigure the affected application if possible to avoid use of medium strength ciphers.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b The following certificates were part of the certificate chain sent by the remote host, but they have expired : |-Subject : CN=Asterisk Private CA/O=Ciproc GmbH |-Not After : Mar 22 19:12:20 2021 GMT |-Subject : CN=ciproc.nextgentel.de/O=Ciproc GmbH |-Not After : Mar 22 19:12:24 2021 GMT The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=Asterisk Private CA/O=Ciproc GmbH |-Issuer : CN=Asterisk Private CA/O=Ciproc GmbH Purchase or generate a proper SSL certificate for this service.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b The following certificates were part of the certificate chain sent by the remote host, but they have expired : |-Subject : CN=Asterisk Private CA/O=Ciproc GmbH |-Not After : Mar 22 19:12:20 2021 GMT |-Subject : CN=ciproc.nextgentel.de/O=Ciproc GmbH |-Not After : Mar 22 19:12:24 2021 GMT The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=Asterisk Private CA/O=Ciproc GmbH |-Issuer : CN=Asterisk Private CA/O=Ciproc GmbH Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=Asterisk Private CA/O=Ciproc GmbH Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=Asterisk Private CA/O=Ciproc GmbH Purchase or generate a proper SSL certificate for this service.
The remote service supports the use of the RC4 cipher. List of RC4 cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-RC4-SHA 0xC0, 0x11 ECDH RSA RC4(128) SHA1 AECDH-RC4-SHA 0xC0, 0x16 ECDH None RC4(128) SHA1 RC4-MD5 0x00, 0x04 RSA RSA RC4(128) MD5 RC4-SHA 0x00, 0x05 RSA RSA RC4(128) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The remote service supports the use of anonymous SSL ciphers. The following is a list of SSL anonymous ciphers supported by the remote TCP server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- AECDH-DES-CBC3-SHA 0xC0, 0x17 ECDH None 3DES-CBC(168) SHA1 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- AECDH-AES128-SHA 0xC0, 0x18 ECDH None AES-CBC(128) SHA1 AECDH-AES256-SHA 0xC0, 0x19 ECDH None AES-CBC(256) SHA1 AECDH-RC4-SHA 0xC0, 0x16 ECDH None RC4(128) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Reconfigure the affected application if possible to avoid use of weak ciphers.
The X.509 certificate chain used by this service contains certificates with RSA keys shorter than 2048 bits. The following certificates were part of the certificate chain sent by the remote host, but contain RSA keys that are considered to be weak : |-Subject : CN=ciproc.nextgentel.de/O=Ciproc GmbH |-RSA Key Length : 1024 bits Replace the certificate in the chain with the RSA key less than 2048 bits in length with a longer key, and reissue any certificates signed by the old certificate.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The remote server's SSL certificate has already expired. The SSL certificate has already expired : Subject : CN=ciproc.nextgentel.de, O=Ciproc GmbH Issuer : CN=Asterisk Private CA, O=Ciproc GmbH Not valid before : Mar 22 19:12:24 2020 GMT Not valid after : Mar 22 19:12:24 2021 GMT Purchase or generate a new SSL certificate to replace the existing one.
The remote service supports the use of medium strength SSL ciphers. Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-DES-CBC3-SHA 0xC0, 0x12 ECDH RSA 3DES-CBC(168) SHA1 AECDH-DES-CBC3-SHA 0xC0, 0x17 ECDH None 3DES-CBC(168) SHA1 DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Reconfigure the affected application if possible to avoid use of medium strength ciphers.
The SSL certificate for this service cannot be trusted. The following certificates were part of the certificate chain sent by the remote host, but they have expired : |-Subject : CN=Asterisk Private CA/O=Ciproc GmbH |-Not After : Mar 22 19:12:20 2021 GMT |-Subject : CN=ciproc.nextgentel.de/O=Ciproc GmbH |-Not After : Mar 22 19:12:24 2021 GMT The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=Asterisk Private CA/O=Ciproc GmbH |-Issuer : CN=Asterisk Private CA/O=Ciproc GmbH The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate for this service cannot be trusted. The following certificates were part of the certificate chain sent by the remote host, but they have expired : |-Subject : CN=Asterisk Private CA/O=Ciproc GmbH |-Not After : Mar 22 19:12:20 2021 GMT |-Subject : CN=ciproc.nextgentel.de/O=Ciproc GmbH |-Not After : Mar 22 19:12:24 2021 GMT The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=Asterisk Private CA/O=Ciproc GmbH |-Issuer : CN=Asterisk Private CA/O=Ciproc GmbH The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=Asterisk Private CA/O=Ciproc GmbH The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=Asterisk Private CA/O=Ciproc GmbH The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service supports the use of the RC4 cipher. List of RC4 cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-RC4-SHA 0xC0, 0x11 ECDH RSA RC4(128) SHA1 AECDH-RC4-SHA 0xC0, 0x16 ECDH None RC4(128) SHA1 RC4-MD5 0x00, 0x04 RSA RSA RC4(128) MD5 RC4-SHA 0x00, 0x05 RSA RSA RC4(128) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The remote service supports the use of anonymous SSL ciphers. The following is a list of SSL anonymous ciphers supported by the remote TCP server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- AECDH-DES-CBC3-SHA 0xC0, 0x17 ECDH None 3DES-CBC(168) SHA1 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- AECDH-AES128-SHA 0xC0, 0x18 ECDH None AES-CBC(128) SHA1 AECDH-AES256-SHA 0xC0, 0x19 ECDH None AES-CBC(256) SHA1 AECDH-RC4-SHA 0xC0, 0x16 ECDH None RC4(128) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Reconfigure the affected application if possible to avoid use of weak ciphers.
The X.509 certificate chain used by this service contains certificates with RSA keys shorter than 2048 bits. The following certificates were part of the certificate chain sent by the remote host, but contain RSA keys that are considered to be weak : |-Subject : CN=ciproc.nextgentel.de/O=Ciproc GmbH |-RSA Key Length : 1024 bits Replace the certificate in the chain with the RSA key less than 2048 bits in length with a longer key, and reissue any certificates signed by the old certificate.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 2 seconds. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.220.12 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:20:57 | 2022-03-26 22:50:43 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 2 seconds. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.221.9 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:14:09 | 2022-03-26 22:44:46 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 on Debian 6.0 (squeeze) | Linux Kernel 2.6 on Debian 6.0 (squeeze) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "1a3fc-25a-4b2015ecc4780" Inode number : 107516 File size : 602 bytes File modification time : Nov. 18, 2011 at 12:21:02 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
|
The operating system running on the remote host is no longer supported. Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "1a3fc-25a-4b2015ecc4780" Inode number : 107516 File size : 602 bytes File modification time : Nov. 18, 2011 at 12:21:02 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
|
172.21.221.26 (Telephony) |
||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:16:10 | 2022-03-26 22:46:29 | ||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.221.31 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:16:57 | 2022-03-26 22:48:32 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote host contains an unsupported version of a web application scripting language. Source : X-Powered-By: PHP/5.4.45-0+deb7u13 Installed version : 5.4.45-0+deb7u13 End of support date : 2015/09/03 Announcement : http://php.net/supported-versions.php Supported versions : 7.3.x / 7.4.x / 8.0.x Upgrade to a version of PHP that is currently supported.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The version of PHP running on the remote web server is affected by multiple vulnerabilities. URL : http://172.21.221.31/ (5.4.45-0+deb7u13 under X-Powered-By: PHP/5.4.45-0+deb7u13) Installed version : 5.4.45-0+deb7u13 Fixed version : 7.3.24 Upgrade to PHP version 7.3.24 or later.
The version of PHP running on the remote web server is affected by an email header injection vulnerability. URL : http://172.21.221.31/ (5.4.45-0+deb7u13 under X-Powered-By: PHP/5.4.45-0+deb7u13) Installed version : 5.4.45-0+deb7u13 Fixed version : 7.3.28 Upgrade to PHP version 7.3.28 or later.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote host contains an unsupported version of a web application scripting language. Source : X-Powered-By: PHP/5.4.45-0+deb7u13 Installed version : 5.4.45-0+deb7u13 End of support date : 2015/09/03 Announcement : http://php.net/supported-versions.php Supported versions : 7.3.x / 7.4.x / 8.0.x Upgrade to a version of PHP that is currently supported.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The version of PHP running on the remote web server is affected by multiple vulnerabilities. URL : http://172.21.221.31/ (5.4.45-0+deb7u13 under X-Powered-By: PHP/5.4.45-0+deb7u13) Installed version : 5.4.45-0+deb7u13 Fixed version : 7.3.24 Upgrade to PHP version 7.3.24 or later.
The version of PHP running on the remote web server is affected by an email header injection vulnerability. URL : http://172.21.221.31/ (5.4.45-0+deb7u13 under X-Powered-By: PHP/5.4.45-0+deb7u13) Installed version : 5.4.45-0+deb7u13 Fixed version : 7.3.28 Upgrade to PHP version 7.3.28 or later.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.221.45 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:31:33 | 2022-03-26 23:01:25 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
172.21.221.52 (Telephony) |
||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:25:13 | 2022-03-26 22:55:51 | ||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
|
172.21.221.53 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:34:40 | 2022-03-26 23:04:53 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
172.21.221.54 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:26:14 | 2022-03-26 22:57:55 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
172.21.221.55 (Telephony) |
||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:26:48 | 2022-03-26 22:58:06 | ||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
|
172.21.221.56 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:26:48 | 2022-03-26 22:57:56 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 2 seconds. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.221.59 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:27:38 | 2022-03-26 22:58:33 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
172.21.221.61 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:27:44 | 2022-03-26 22:59:24 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
172.21.221.62 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:37:00 | 2022-03-26 23:08:07 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
172.21.221.65 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:28:34 | 2022-03-26 23:00:44 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
172.21.221.66 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:29:18 | 2022-03-26 23:01:01 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
172.21.221.67 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:30:05 | 2022-03-26 23:01:10 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
172.21.221.68 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:30:08 | 2022-03-26 23:01:31 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
172.21.221.69 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:31:58 | 2022-03-26 23:03:07 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
172.21.221.70 (Uncategorized) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:33:34 | 2022-03-26 23:05:08 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
172.21.221.71 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:34:36 | 2022-03-26 23:07:05 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
172.21.221.72 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:35:14 | 2022-03-26 23:07:24 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
172.21.221.73 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:35:21 | 2022-03-26 23:07:12 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
172.21.221.74 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:36:07 | 2022-03-26 23:07:47 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
172.21.221.76 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:44:49 | 2022-03-26 23:16:29 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The remote server's SSL certificate has already expired. The SSL certificate has already expired : Subject : CN=ciproc.nextgentel.de, O=Ciproc GmbH Issuer : CN=Asterisk Private CA, O=Ciproc GmbH Not valid before : Mar 22 19:12:24 2020 GMT Not valid after : Mar 22 19:12:24 2021 GMT Purchase or generate a new SSL certificate to replace the existing one.
The remote service supports the use of medium strength SSL ciphers. Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-DES-CBC3-SHA 0xC0, 0x12 ECDH RSA 3DES-CBC(168) SHA1 AECDH-DES-CBC3-SHA 0xC0, 0x17 ECDH None 3DES-CBC(168) SHA1 DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Reconfigure the affected application if possible to avoid use of medium strength ciphers.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b The following certificates were part of the certificate chain sent by the remote host, but they have expired : |-Subject : CN=Asterisk Private CA/O=Ciproc GmbH |-Not After : Mar 22 19:12:20 2021 GMT |-Subject : CN=ciproc.nextgentel.de/O=Ciproc GmbH |-Not After : Mar 22 19:12:24 2021 GMT The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=Asterisk Private CA/O=Ciproc GmbH |-Issuer : CN=Asterisk Private CA/O=Ciproc GmbH Purchase or generate a proper SSL certificate for this service.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b The following certificates were part of the certificate chain sent by the remote host, but they have expired : |-Subject : CN=Asterisk Private CA/O=Ciproc GmbH |-Not After : Mar 22 19:12:20 2021 GMT |-Subject : CN=ciproc.nextgentel.de/O=Ciproc GmbH |-Not After : Mar 22 19:12:24 2021 GMT The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=Asterisk Private CA/O=Ciproc GmbH |-Issuer : CN=Asterisk Private CA/O=Ciproc GmbH Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=Asterisk Private CA/O=Ciproc GmbH Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=Asterisk Private CA/O=Ciproc GmbH Purchase or generate a proper SSL certificate for this service.
The remote service supports the use of the RC4 cipher. List of RC4 cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-RC4-SHA 0xC0, 0x11 ECDH RSA RC4(128) SHA1 AECDH-RC4-SHA 0xC0, 0x16 ECDH None RC4(128) SHA1 RC4-MD5 0x00, 0x04 RSA RSA RC4(128) MD5 RC4-SHA 0x00, 0x05 RSA RSA RC4(128) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The remote service supports the use of anonymous SSL ciphers. The following is a list of SSL anonymous ciphers supported by the remote TCP server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- AECDH-DES-CBC3-SHA 0xC0, 0x17 ECDH None 3DES-CBC(168) SHA1 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- AECDH-AES128-SHA 0xC0, 0x18 ECDH None AES-CBC(128) SHA1 AECDH-AES256-SHA 0xC0, 0x19 ECDH None AES-CBC(256) SHA1 AECDH-RC4-SHA 0xC0, 0x16 ECDH None RC4(128) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Reconfigure the affected application if possible to avoid use of weak ciphers.
The X.509 certificate chain used by this service contains certificates with RSA keys shorter than 2048 bits. The following certificates were part of the certificate chain sent by the remote host, but contain RSA keys that are considered to be weak : |-Subject : CN=ciproc.nextgentel.de/O=Ciproc GmbH |-RSA Key Length : 1024 bits Replace the certificate in the chain with the RSA key less than 2048 bits in length with a longer key, and reissue any certificates signed by the old certificate.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The remote server's SSL certificate has already expired. The SSL certificate has already expired : Subject : CN=ciproc.nextgentel.de, O=Ciproc GmbH Issuer : CN=Asterisk Private CA, O=Ciproc GmbH Not valid before : Mar 22 19:12:24 2020 GMT Not valid after : Mar 22 19:12:24 2021 GMT Purchase or generate a new SSL certificate to replace the existing one.
The remote service supports the use of medium strength SSL ciphers. Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-DES-CBC3-SHA 0xC0, 0x12 ECDH RSA 3DES-CBC(168) SHA1 AECDH-DES-CBC3-SHA 0xC0, 0x17 ECDH None 3DES-CBC(168) SHA1 DES-CBC3-SHA 0x00, 0x0A RSA RSA 3DES-CBC(168) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Reconfigure the affected application if possible to avoid use of medium strength ciphers.
The SSL certificate for this service cannot be trusted. The following certificates were part of the certificate chain sent by the remote host, but they have expired : |-Subject : CN=Asterisk Private CA/O=Ciproc GmbH |-Not After : Mar 22 19:12:20 2021 GMT |-Subject : CN=ciproc.nextgentel.de/O=Ciproc GmbH |-Not After : Mar 22 19:12:24 2021 GMT The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=Asterisk Private CA/O=Ciproc GmbH |-Issuer : CN=Asterisk Private CA/O=Ciproc GmbH The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate for this service cannot be trusted. The following certificates were part of the certificate chain sent by the remote host, but they have expired : |-Subject : CN=Asterisk Private CA/O=Ciproc GmbH |-Not After : Mar 22 19:12:20 2021 GMT |-Subject : CN=ciproc.nextgentel.de/O=Ciproc GmbH |-Not After : Mar 22 19:12:24 2021 GMT The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=Asterisk Private CA/O=Ciproc GmbH |-Issuer : CN=Asterisk Private CA/O=Ciproc GmbH The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=Asterisk Private CA/O=Ciproc GmbH The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=Asterisk Private CA/O=Ciproc GmbH The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service supports the use of the RC4 cipher. List of RC4 cipher suites supported by the remote server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- ECDHE-RSA-RC4-SHA 0xC0, 0x11 ECDH RSA RC4(128) SHA1 AECDH-RC4-SHA 0xC0, 0x16 ECDH None RC4(128) SHA1 RC4-MD5 0x00, 0x04 RSA RSA RC4(128) MD5 RC4-SHA 0x00, 0x05 RSA RSA RC4(128) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Reconfigure the affected application, if possible, to avoid use of RC4 ciphers. Consider using TLS 1.2 with AES-GCM suites subject to browser and web server support.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The remote service supports the use of anonymous SSL ciphers. The following is a list of SSL anonymous ciphers supported by the remote TCP server : Medium Strength Ciphers (> 64-bit and < 112-bit key, or 3DES) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- AECDH-DES-CBC3-SHA 0xC0, 0x17 ECDH None 3DES-CBC(168) SHA1 High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- AECDH-AES128-SHA 0xC0, 0x18 ECDH None AES-CBC(128) SHA1 AECDH-AES256-SHA 0xC0, 0x19 ECDH None AES-CBC(256) SHA1 AECDH-RC4-SHA 0xC0, 0x16 ECDH None RC4(128) SHA1 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Reconfigure the affected application if possible to avoid use of weak ciphers.
The X.509 certificate chain used by this service contains certificates with RSA keys shorter than 2048 bits. The following certificates were part of the certificate chain sent by the remote host, but contain RSA keys that are considered to be weak : |-Subject : CN=ciproc.nextgentel.de/O=Ciproc GmbH |-RSA Key Length : 1024 bits Replace the certificate in the chain with the RSA key less than 2048 bits in length with a longer key, and reissue any certificates signed by the old certificate.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.221.78 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:36:36 | 2022-03-26 23:09:36 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
172.21.221.162 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:45:59 | 2022-03-26 23:18:10 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
The operating system running on the remote host is no longer supported. Debian 8.0 support ended on 2018-06-17 (end of regular support) / 2020-06-30 (end of long-term support for Jessie-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
172.21.221.233 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:38:35 | 2022-03-26 23:10:23 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 on Debian 6.0 (squeeze) | Linux Kernel 2.6 on Debian 6.0 (squeeze) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "d9-b1-4e71f19852040" Inode number : 217 File size : 177 bytes File modification time : Sep. 24, 2013 at 11:04:25 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The operating system running on the remote host is no longer supported. Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "d9-b1-4e71f19852040" Inode number : 217 File size : 177 bytes File modification time : Sep. 24, 2013 at 11:04:25 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.221.240 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:40:33 | 2022-03-26 23:12:44 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 on Debian 6.0 (squeeze) | Linux Kernel 2.6 on Debian 6.0 (squeeze) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "400c0-b1-56e0ecc601640" Inode number : 262336 File size : 177 bytes File modification time : Jun. 7, 2018 at 15:18:41 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The operating system running on the remote host is no longer supported. Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "400c0-b1-56e0ecc601640" Inode number : 262336 File size : 177 bytes File modification time : Jun. 7, 2018 at 15:18:41 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.221.241 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:40:52 | 2022-03-26 23:12:43 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 on Debian 6.0 (squeeze) | Linux Kernel 2.6 on Debian 6.0 (squeeze) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "d9-b1-4e71f18dd4780" Inode number : 217 File size : 177 bytes File modification time : Sep. 24, 2013 at 11:04:14 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The operating system running on the remote host is no longer supported. Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "d9-b1-4e71f18dd4780" Inode number : 217 File size : 177 bytes File modification time : Sep. 24, 2013 at 11:04:14 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.221.243 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:41:29 | 2022-03-26 23:12:42 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 on Debian 6.0 (squeeze) | Linux Kernel 2.6 on Debian 6.0 (squeeze) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The operating system running on the remote host is no longer supported. Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "d9-b1-4e71f18dd4780" Inode number : 217 File size : 177 bytes File modification time : Sep. 24, 2013 at 11:04:14 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The operating system running on the remote host is no longer supported. Debian 6.0 support ended on 2014-05-31 (end of regular support) / 2016-02-29 (end of long-term support for Squeeze-LTS). Upgrade to Debian Linux 10.x ("Buster"). For more information, see : http://www.debian.org/releases/ Upgrade to a version of the Unix operating system that is currently supported.
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "d9-b1-4e71f18dd4780" Inode number : 217 File size : 177 bytes File modification time : Sep. 24, 2013 at 11:04:14 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.0.4 (Hosts) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:37:09 | 2022-03-26 22:02:46 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 2 seconds. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.0.9 (Hosts) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:33:44 | 2022-03-26 22:02:46 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 2 seconds. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.0.10 (Hosts) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:34:02 | 2022-03-26 22:02:45 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 2 seconds. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 4 seconds. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.0.15 (Hosts) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:34:00 | 2022-03-26 22:02:47 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 2932 seconds. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 2951 seconds. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.11.5 (ISP) |
||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:35:15 | 2022-03-26 22:04:03 | ||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 | Linux Kernel 2.6 | ||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||
Vulnerabilities detected: | The remote DNS server is vulnerable to cache snooping attacks. Nessus sent a non-recursive query for example.com and received 1 answer : 93.184.216.34 Contact the vendor of the DNS software for a fix.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote DNS server is vulnerable to cache snooping attacks. Nessus sent a non-recursive query for example.com and received 1 answer : 93.184.216.34 Contact the vendor of the DNS software for a fix.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.11.11 (ISP) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:42:21 | 2022-03-26 22:11:11 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Ubuntu 14.04 Linux Kernel 3.13 | Ubuntu 14.04 Linux Kernel 3.13 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | An SSL certificate in the certificate chain has been signed using a weak hash algorithm. The following certificates were part of the certificate chain sent by the remote host, but contain hashes that are considered to be weak. Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de Signature Algorithm : SHA-1 With RSA Encryption Valid From : May 02 01:14:19 2012 GMT Valid To : Apr 27 01:14:19 2032 GMT Raw PEM certificate : -----BEGIN CERTIFICATE----- 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 -----END CERTIFICATE----- Contact the Certificate Authority to have the SSL certificate reissued.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de |-Issuer : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1 |-Issuer : O=Digital Signature Trust Co./CN=DST Root CA X3 Purchase or generate a proper SSL certificate for this service.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de |-Issuer : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1 |-Issuer : O=Digital Signature Trust Co./CN=DST Root CA X3 Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The remote POP3 daemon allows credentials to be transmitted in cleartext. The following cleartext methods are supported : USER SASL PLAIN LOGIN Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.
|
An SSL certificate in the certificate chain has been signed using a weak hash algorithm. The following certificates were part of the certificate chain sent by the remote host, but contain hashes that are considered to be weak. Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de Signature Algorithm : SHA-1 With RSA Encryption Valid From : May 02 01:14:19 2012 GMT Valid To : Apr 27 01:14:19 2032 GMT Raw PEM certificate : -----BEGIN CERTIFICATE----- MIIEjzCCA3egAwIBAgIJALxec1HGKsjeMA0GCSqGSIb3DQEBBQUAMIGLMQswCQYDVQQGEwJERTEQMA4GA1UECBMHQmFkLVd1ZTETMBEGA1UEBxMKSGVpZGVsYmVyZzEQMA4GA1UEChMHYWRkMndlYjERMA8GA1UECxMIV2ViYWRtaW4xCzAJBgNVBAMTAkFFMSMwIQYJKoZIhvcNAQkBFhR3ZWJtYXN0ZXJAYWRkMndlYi5kZTAeFw0xMjA1MDIwMTE0MTlaFw0zMjA0MjcwMTE0MTlaMIGLMQswCQYDVQQGEwJERTEQMA4GA1UECBMHQmFkLVd1ZTETMBEGA1UEBxMKSGVpZGVsYmVyZzEQMA4GA1UEChMHYWRkMndlYjERMA8GA1UECxMIV2ViYWRtaW4xCzAJBgNVBAMTAkFFMSMwIQYJKoZIhvcNAQkBFhR3ZWJtYXN0ZXJAYWRkMndlYi5kZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKrotrDVgvzpoZscuZRlzTFie4aShiMn7vVGzuBsQTuG1xa15LHV9OHYizu6v9wqSappjyr5tYQHuZ51Zf2BWNjLe3X+K7zakme7Vtxb6Qg+ate+30XN0tra3c8NKOMcWCH6XL1b9g9KnLgb/RxyksMSb94FUaskvqUy0E/YnK9TD62K/Erdwhzu8W1W7HHqcbPqx4aCky4o5vVq25kMOyYVDry50WNgCTS43U4vqBeXSaMr0j+76/QIfxVrP2st0uA4hb/Uv1tRMGUcru3+Z47SL7v8cIfOlI8BNR+jV0mTMNCEP4gm1Krphztwg7VCa4GdnPbhfYt2VqBUewSC4MMCAwEAAaOB8zCB8DAdBgNVHQ4EFgQU4yEAYwD2gWX1kdIq6wyWH5PLpRswgcAGA1UdIwSBuDCBtYAU4yEAYwD2gWX1kdIq6wyWH5PLpRuhgZGkgY4wgYsxCzAJBgNVBAYTAkRFMRAwDgYDVQQIEwdCYWQtV3VlMRMwEQYDVQQHEwpIZWlkZWxiZXJnMRAwDgYDVQQKEwdhZGQyd2ViMREwDwYDVQQLEwhXZWJhZG1pbjELMAkGA1UEAxMCQUUxIzAhBgkqhkiG9w0BCQEWFHdlYm1hc3RlckBhZGQyd2ViLmRlggkAvF5zUcYqyN4wDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQUFAAOCAQEAQyJyayr15RavuJ5uWnVJIOVj552z1kqeWNf+r0NDuiGlBN/Pn2yt7txP0RDOm14n6P0UYEtzbxr9pYV2+fBqO84VnmZ9m2F4V+4KgEjDj5hsSFt9b2SVPOjJAWDZicA/EScwiEh3jdRXW0wUhfFpcsTnmTB/+gs/98NLJYvlyyF3dYg0ZfDBqr7QidZcB2LGnqt12XEYanKXD4ZEEyCXFkRrhePJxBOrIgPTLEixlT0n5E4Zl6IH98ie2Grr1iASmGlYgoAXbD3D2SaO5fIMQ2/URJvKslfzJtTejdVgwqBFMYOvDk7vHgeXofz2H6qq3etZlTKYsv4dXMYdvJL1cQ== -----END CERTIFICATE----- Contact the Certificate Authority to have the SSL certificate reissued.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de |-Issuer : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1 |-Issuer : O=Digital Signature Trust Co./CN=DST Root CA X3 Purchase or generate a proper SSL certificate for this service.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de |-Issuer : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1 |-Issuer : O=Digital Signature Trust Co./CN=DST Root CA X3 Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : C=DE/ST=Bad-Wue/L=Heidelberg/O=add2web/OU=Webadmin/CN=AE/E=webmaster@add2web.de Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The remote POP3 daemon allows credentials to be transmitted in cleartext. The following cleartext methods are supported : USER SASL PLAIN LOGIN Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.
|
172.21.11.14 (ISP) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:49:59 | 2022-03-26 22:20:25 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1 |-Issuer : O=Digital Signature Trust Co./CN=DST Root CA X3 Purchase or generate a proper SSL certificate for this service.
The remote POP3 daemon allows credentials to be transmitted in cleartext. The following cleartext methods are supported : USER SASL PLAIN LOGIN Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.
|
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1 |-Issuer : O=Digital Signature Trust Co./CN=DST Root CA X3 Purchase or generate a proper SSL certificate for this service.
The remote POP3 daemon allows credentials to be transmitted in cleartext. The following cleartext methods are supported : USER SASL PLAIN LOGIN Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.
|
172.21.11.15 (ISP) |
||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:40:11 | 2022-03-26 22:09:12 | ||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||
OS detected: | Ubuntu 14.04 Linux Kernel 3.13 | Ubuntu 14.04 Linux Kernel 3.13 | ||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1 |-Issuer : O=Digital Signature Trust Co./CN=DST Root CA X3 Purchase or generate a proper SSL certificate for this service.
The remote POP3 daemon allows credentials to be transmitted in cleartext. The following cleartext methods are supported : USER SASL PLAIN LOGIN Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.
|
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1 |-Issuer : O=Digital Signature Trust Co./CN=DST Root CA X3 Purchase or generate a proper SSL certificate for this service.
The remote POP3 daemon allows credentials to be transmitted in cleartext. The following cleartext methods are supported : USER SASL PLAIN LOGIN Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.
|
172.21.11.20 (ISP) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:52:13 | 2022-03-26 22:20:59 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1 |-Issuer : O=Digital Signature Trust Co./CN=DST Root CA X3 Purchase or generate a proper SSL certificate for this service.
The remote POP3 daemon allows credentials to be transmitted in cleartext. The following cleartext methods are supported : USER SASL PLAIN LOGIN Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.
|
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1 |-Issuer : O=Digital Signature Trust Co./CN=DST Root CA X3 Purchase or generate a proper SSL certificate for this service.
The remote POP3 daemon allows credentials to be transmitted in cleartext. The following cleartext methods are supported : USER SASL PLAIN LOGIN Contact your vendor for a fix or encrypt traffic with SSL / TLS using stunnel.
|
172.21.11.22 (ISP) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:43:56 | 2022-03-26 22:12:45 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 | Linux Kernel 2.6 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=dib.eitun.de |-Issuer : CN=dib.eitun.de Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=dib.eitun.de Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The remote service supports the use of anonymous SSL ciphers. The following is a list of SSL anonymous ciphers supported by the remote TCP server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DH-AES128-SHA256 0x00, 0xA6 DH None AES-GCM(128) SHA256 DH-AES256-SHA384 0x00, 0xA7 DH None AES-GCM(256) SHA384 ADH-AES128-SHA 0x00, 0x34 DH None AES-CBC(128) SHA1 ADH-AES256-SHA 0x00, 0x3A DH None AES-CBC(256) SHA1 ADH-CAMELLIA128-SHA 0x00, 0x46 DH None Camellia-CBC(128) SHA1 ADH-CAMELLIA256-SHA 0x00, 0x89 DH None Camellia-CBC(256) SHA1 ADH-SEED-SHA 0x00, 0x9B DH None SEED-CBC(128) SHA1 AECDH-AES128-SHA 0xC0, 0x18 ECDH None AES-CBC(128) SHA1 AECDH-AES256-SHA 0xC0, 0x19 ECDH None AES-CBC(256) SHA1 DH-AES128-SHA256 0x00, 0x6C DH None AES-CBC(128) SHA256 DH-AES256-SHA256 0x00, 0x6D DH None AES-CBC(256) SHA256 DH-CAMELLIA128-SHA256 0x00, 0xBF DH None Camellia-CBC(128) SHA256 DH-CAMELLIA256-SHA256 0x00, 0xC5 DH None Camellia-CBC(256) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Reconfigure the affected application if possible to avoid use of weak ciphers.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=dib.eitun.de |-Issuer : CN=dib.eitun.de Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=dib.eitun.de Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The remote service supports the use of anonymous SSL ciphers. The following is a list of SSL anonymous ciphers supported by the remote TCP server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DH-AES128-SHA256 0x00, 0xA6 DH None AES-GCM(128) SHA256 DH-AES256-SHA384 0x00, 0xA7 DH None AES-GCM(256) SHA384 ADH-AES128-SHA 0x00, 0x34 DH None AES-CBC(128) SHA1 ADH-AES256-SHA 0x00, 0x3A DH None AES-CBC(256) SHA1 ADH-CAMELLIA128-SHA 0x00, 0x46 DH None Camellia-CBC(128) SHA1 ADH-CAMELLIA256-SHA 0x00, 0x89 DH None Camellia-CBC(256) SHA1 ADH-SEED-SHA 0x00, 0x9B DH None SEED-CBC(128) SHA1 AECDH-AES128-SHA 0xC0, 0x18 ECDH None AES-CBC(128) SHA1 AECDH-AES256-SHA 0xC0, 0x19 ECDH None AES-CBC(256) SHA1 DH-AES128-SHA256 0x00, 0x6C DH None AES-CBC(128) SHA256 DH-AES256-SHA256 0x00, 0x6D DH None AES-CBC(256) SHA256 DH-CAMELLIA128-SHA256 0x00, 0xBF DH None Camellia-CBC(128) SHA256 DH-CAMELLIA256-SHA256 0x00, 0xC5 DH None Camellia-CBC(256) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Reconfigure the affected application if possible to avoid use of weak ciphers.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.11.122 (ISP) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:38:15 | 2022-03-26 22:07:04 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 | Linux Kernel 2.6 | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=ponkeyMON Purchase or generate a proper SSL certificate for this service.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=ponkeyMON |-Issuer : CN=ponkeyMON Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=ponkeyMON Purchase or generate a proper SSL certificate for this service.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=ponkeyMON |-Issuer : CN=ponkeyMON Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.11.145 (ISP) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:52:11 | 2022-03-26 22:20:58 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote server's SSL certificate has already expired. The SSL certificate has already expired : Subject : CN=hbmedia.info Issuer : C=US, O=Let's Encrypt, CN=R3 Not valid before : Nov 15 15:59:49 2021 GMT Not valid after : Feb 13 15:59:48 2022 GMT Purchase or generate a new SSL certificate to replace the existing one.
The remote web server is affected by an information disclosure vulnerability. Nessus was able to exploit the issue using the following request : https://172.21.11.145/?M=A This produced the following truncated output (limited to 10 lines) : ------------------------------ snip ------------------------------ <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN"> <html> <head> <title>Index of /</title> </head> <body> <h1>Index of /</h1> <table> <tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr> <tr><th colspan="5"><hr></th></tr> [...] ------------------------------ snip ------------------------------ Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.
The SSL certificate for this service cannot be trusted. The following certificate was part of the certificate chain sent by the remote host, but it has expired : |-Subject : CN=hbmedia.info |-Not After : Feb 13 15:59:48 2022 GMT The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1 |-Issuer : O=Digital Signature Trust Co./CN=DST Root CA X3 Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote server's SSL certificate has already expired. The SSL certificate has already expired : Subject : CN=hbmedia.info Issuer : C=US, O=Let's Encrypt, CN=R3 Not valid before : Nov 15 15:59:49 2021 GMT Not valid after : Feb 13 15:59:48 2022 GMT Purchase or generate a new SSL certificate to replace the existing one.
The remote web server is affected by an information disclosure vulnerability. Nessus was able to exploit the issue using the following request : https://172.21.11.145/?M=A This produced the following truncated output (limited to 10 lines) : ------------------------------ snip ------------------------------ <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN"> <html> <head> <title>Index of /</title> </head> <body> <h1>Index of /</h1> <table> <tr><th valign="top"><img src="/icons/blank.gif" alt="[ICO]"></th><th><a href="?C=N;O=D">Name</a></th><th><a href="?C=M;O=A">Last modified</a></th><th><a href="?C=S;O=A">Size</a></th><th><a href="?C=D;O=A">Description</a></th></tr> <tr><th colspan="5"><hr></th></tr> [...] ------------------------------ snip ------------------------------ Upgrade to Apache version 1.3.22 or later. Alternatively, as a workaround, disable Multiviews.
The SSL certificate for this service cannot be trusted. The following certificate was part of the certificate chain sent by the remote host, but it has expired : |-Subject : CN=hbmedia.info |-Not After : Feb 13 15:59:48 2022 GMT The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : C=US/O=Internet Security Research Group/CN=ISRG Root X1 |-Issuer : O=Digital Signature Trust Co./CN=DST Root CA X3 Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.147.1 (Hosting) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:46:24 | 2022-03-26 22:14:35 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 3526 seconds. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 3538 seconds. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.172.21 (monkeySYS) |
||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:46:51 | 2022-03-26 22:14:51 | ||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 | Linux Kernel 2.6 | ||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||
Vulnerabilities detected: | The remote host has IP forwarding enabled. IP forwarding appears to be enabled on the remote host. Detected local MAC Address : 00113c1500b4 Response from local MAC Address : 00113c1500b4 Detected Gateway MAC Address : 00163e15ae12 Response from Gateway MAC Address : 00163e15ae12 On Linux, you can disable IP forwarding by doing :
echo 0 > /proc/sys/net/ipv4/ip_forward
On Windows, set the key 'IPEnableRouter' to 0 under
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
On Mac OS X, you can disable IP forwarding by executing the command :
sysctl -w net.inet.ip.forwarding=0
For other systems, check with your vendor.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote host has IP forwarding enabled. IP forwarding appears to be enabled on the remote host. Detected local MAC Address : 00113c1500b4 Response from local MAC Address : 00113c1500b4 Detected Gateway MAC Address : 00163e15ae12 Response from Gateway MAC Address : 00163e15ae12 On Linux, you can disable IP forwarding by doing :
echo 0 > /proc/sys/net/ipv4/ip_forward
On Windows, set the key 'IPEnableRouter' to 0 under
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
On Mac OS X, you can disable IP forwarding by executing the command :
sysctl -w net.inet.ip.forwarding=0
For other systems, check with your vendor.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.172.22 (VulnLIB) |
||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:48:47 | 2022-03-26 22:17:07 | ||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
|
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
|
172.21.172.24 (ciproc intern) |
||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:52:48 | 2022-03-26 22:21:27 | ||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16.0-4-amd64 | Linux Kernel 3.16.0-4-amd64 | ||||||||||||||||||||||||||||||||||||
Ports detected: | None | None | ||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote server's SSL certificate has already expired. The SSL certificate has already expired : Subject : O=Nessus Users United, OU=Nessus Server, L=New York, C=US, ST=NY, CN=pent01.ciproc.de Issuer : O=Nessus Users United, OU=Nessus Certification Authority (6d2a629d), L=New York, C=US, ST=NY, CN=Nessus Certification Authority (6d2a629d) Not valid before : Jan 5 22:37:57 2013 GMT Not valid after : Jan 5 22:37:57 2014 GMT Purchase or generate a new SSL certificate to replace the existing one.
The SSL certificate for this service cannot be trusted. The following certificate was part of the certificate chain sent by the remote host, but it has expired : |-Subject : O=Nessus Users United/OU=Nessus Server/L=New York/C=US/ST=NY/CN=pent01.ciproc.de |-Not After : Jan 05 22:37:57 2014 GMT The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : O=Nessus Users United/OU=Nessus Server/L=New York/C=US/ST=NY/CN=pent01.ciproc.de |-Issuer : O=Nessus Users United/OU=Nessus Certification Authority (6d2a629d)/L=New York/C=US/ST=NY/CN=Nessus Certification Authority (6d2a629d) Purchase or generate a proper SSL certificate for this service.
The X.509 certificate chain used by this service contains certificates with RSA keys shorter than 2048 bits. The following certificates were part of the certificate chain sent by the remote host, but contain RSA keys that are considered to be weak : |-Subject : O=Nessus Users United/OU=Nessus Server/L=New York/C=US/ST=NY/CN=pent01.ciproc.de |-RSA Key Length : 1024 bits Replace the certificate in the chain with the RSA key less than 2048 bits in length with a longer key, and reissue any certificates signed by the old certificate.
|
The remote server's SSL certificate has already expired. The SSL certificate has already expired : Subject : O=Nessus Users United, OU=Nessus Server, L=New York, C=US, ST=NY, CN=pent01.ciproc.de Issuer : O=Nessus Users United, OU=Nessus Certification Authority (6d2a629d), L=New York, C=US, ST=NY, CN=Nessus Certification Authority (6d2a629d) Not valid before : Jan 5 22:37:57 2013 GMT Not valid after : Jan 5 22:37:57 2014 GMT Purchase or generate a new SSL certificate to replace the existing one.
The SSL certificate for this service cannot be trusted. The following certificate was part of the certificate chain sent by the remote host, but it has expired : |-Subject : O=Nessus Users United/OU=Nessus Server/L=New York/C=US/ST=NY/CN=pent01.ciproc.de |-Not After : Jan 05 22:37:57 2014 GMT The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : O=Nessus Users United/OU=Nessus Server/L=New York/C=US/ST=NY/CN=pent01.ciproc.de |-Issuer : O=Nessus Users United/OU=Nessus Certification Authority (6d2a629d)/L=New York/C=US/ST=NY/CN=Nessus Certification Authority (6d2a629d) Purchase or generate a proper SSL certificate for this service.
The X.509 certificate chain used by this service contains certificates with RSA keys shorter than 2048 bits. The following certificates were part of the certificate chain sent by the remote host, but contain RSA keys that are considered to be weak : |-Subject : O=Nessus Users United/OU=Nessus Server/L=New York/C=US/ST=NY/CN=pent01.ciproc.de |-RSA Key Length : 1024 bits Replace the certificate in the chain with the RSA key less than 2048 bits in length with a longer key, and reissue any certificates signed by the old certificate.
|
172.21.172.45 (monkeySYS) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:51:48 | 2022-03-26 22:20:53 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 | Linux Kernel 2.6 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=sysmonkey |-Issuer : CN=sysmonkey Purchase or generate a proper SSL certificate for this service.
The remote host has IP forwarding enabled. IP forwarding appears to be enabled on the remote host. Detected local MAC Address : 00113c1500b4 Response from local MAC Address : 00113c1500b4 Detected Gateway MAC Address : 00163e15ae12 Response from Gateway MAC Address : 00163e15ae12 On Linux, you can disable IP forwarding by doing :
echo 0 > /proc/sys/net/ipv4/ip_forward
On Windows, set the key 'IPEnableRouter' to 0 under
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
On Mac OS X, you can disable IP forwarding by executing the command :
sysctl -w net.inet.ip.forwarding=0
For other systems, check with your vendor.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=sysmonkey Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=sysmonkey |-Issuer : CN=sysmonkey Purchase or generate a proper SSL certificate for this service.
The remote host has IP forwarding enabled. IP forwarding appears to be enabled on the remote host. Detected local MAC Address : 00113c1500b4 Response from local MAC Address : 00113c1500b4 Detected Gateway MAC Address : 00163e15ae12 Response from Gateway MAC Address : 00163e15ae12 On Linux, you can disable IP forwarding by doing :
echo 0 > /proc/sys/net/ipv4/ip_forward
On Windows, set the key 'IPEnableRouter' to 0 under
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
On Mac OS X, you can disable IP forwarding by executing the command :
sysctl -w net.inet.ip.forwarding=0
For other systems, check with your vendor.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=sysmonkey Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.172.46 (monkeySYS) |
||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:50:22 | 2022-03-26 22:19:31 | ||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 | Linux Kernel 2.6 | ||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||
Vulnerabilities detected: | The remote host has IP forwarding enabled. IP forwarding appears to be enabled on the remote host. Detected local MAC Address : 00113c1500b4 Response from local MAC Address : 00113c1500b4 Detected Gateway MAC Address : 00163e15ae12 Response from Gateway MAC Address : 00163e15ae12 On Linux, you can disable IP forwarding by doing :
echo 0 > /proc/sys/net/ipv4/ip_forward
On Windows, set the key 'IPEnableRouter' to 0 under
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
On Mac OS X, you can disable IP forwarding by executing the command :
sysctl -w net.inet.ip.forwarding=0
For other systems, check with your vendor.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote host has IP forwarding enabled. IP forwarding appears to be enabled on the remote host. Detected local MAC Address : 00113c1500b4 Response from local MAC Address : 00113c1500b4 Detected Gateway MAC Address : 00163e15ae12 Response from Gateway MAC Address : 00163e15ae12 On Linux, you can disable IP forwarding by doing :
echo 0 > /proc/sys/net/ipv4/ip_forward
On Windows, set the key 'IPEnableRouter' to 0 under
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
On Mac OS X, you can disable IP forwarding by executing the command :
sysctl -w net.inet.ip.forwarding=0
For other systems, check with your vendor.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.172.47 (monkeySYS) |
||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:50:47 | 2022-03-26 22:20:32 | ||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 | Linux Kernel 2.6 | ||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||
Vulnerabilities detected: | The remote host has IP forwarding enabled. IP forwarding appears to be enabled on the remote host. Detected local MAC Address : 00113c1500b4 Response from local MAC Address : 00113c1500b4 Detected Gateway MAC Address : 00163e15ae12 Response from Gateway MAC Address : 00163e15ae12 On Linux, you can disable IP forwarding by doing :
echo 0 > /proc/sys/net/ipv4/ip_forward
On Windows, set the key 'IPEnableRouter' to 0 under
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
On Mac OS X, you can disable IP forwarding by executing the command :
sysctl -w net.inet.ip.forwarding=0
For other systems, check with your vendor.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote host has IP forwarding enabled. IP forwarding appears to be enabled on the remote host. Detected local MAC Address : 00113c1500b4 Response from local MAC Address : 00113c1500b4 Detected Gateway MAC Address : 00163e15ae12 Response from Gateway MAC Address : 00163e15ae12 On Linux, you can disable IP forwarding by doing :
echo 0 > /proc/sys/net/ipv4/ip_forward
On Windows, set the key 'IPEnableRouter' to 0 under
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
On Mac OS X, you can disable IP forwarding by executing the command :
sysctl -w net.inet.ip.forwarding=0
For other systems, check with your vendor.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.172.100 (monkeySYS) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:53:11 | 2022-03-26 22:22:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 | Linux Kernel 2.6 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=ponkeySYS |-Issuer : CN=ponkeySYS Purchase or generate a proper SSL certificate for this service.
The remote host has IP forwarding enabled. IP forwarding appears to be enabled on the remote host. Detected local MAC Address : 00113c1500b4 Response from local MAC Address : 00113c1500b4 Detected Gateway MAC Address : 00163e15ae12 Response from Gateway MAC Address : 00163e15ae12 On Linux, you can disable IP forwarding by doing :
echo 0 > /proc/sys/net/ipv4/ip_forward
On Windows, set the key 'IPEnableRouter' to 0 under
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
On Mac OS X, you can disable IP forwarding by executing the command :
sysctl -w net.inet.ip.forwarding=0
For other systems, check with your vendor.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=ponkeySYS Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=ponkeySYS |-Issuer : CN=ponkeySYS Purchase or generate a proper SSL certificate for this service.
The remote host has IP forwarding enabled. IP forwarding appears to be enabled on the remote host. Detected local MAC Address : 00113c1500b4 Response from local MAC Address : 00113c1500b4 Detected Gateway MAC Address : 00163e15ae12 Response from Gateway MAC Address : 00163e15ae12 On Linux, you can disable IP forwarding by doing :
echo 0 > /proc/sys/net/ipv4/ip_forward
On Windows, set the key 'IPEnableRouter' to 0 under
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
On Mac OS X, you can disable IP forwarding by executing the command :
sysctl -w net.inet.ip.forwarding=0
For other systems, check with your vendor.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=ponkeySYS Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.172.101 (monkeySYS) |
||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:51:34 | 2022-03-26 22:20:52 | ||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 | Linux Kernel 2.6 | ||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||
Vulnerabilities detected: | The remote host has IP forwarding enabled. IP forwarding appears to be enabled on the remote host. Detected local MAC Address : 00113c1500b4 Response from local MAC Address : 00113c1500b4 Detected Gateway MAC Address : 00163e15ae12 Response from Gateway MAC Address : 00163e15ae12 On Linux, you can disable IP forwarding by doing :
echo 0 > /proc/sys/net/ipv4/ip_forward
On Windows, set the key 'IPEnableRouter' to 0 under
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
On Mac OS X, you can disable IP forwarding by executing the command :
sysctl -w net.inet.ip.forwarding=0
For other systems, check with your vendor.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote host has IP forwarding enabled. IP forwarding appears to be enabled on the remote host. Detected local MAC Address : 00113c1500b4 Response from local MAC Address : 00113c1500b4 Detected Gateway MAC Address : 00163e15ae12 Response from Gateway MAC Address : 00163e15ae12 On Linux, you can disable IP forwarding by doing :
echo 0 > /proc/sys/net/ipv4/ip_forward
On Windows, set the key 'IPEnableRouter' to 0 under
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
On Mac OS X, you can disable IP forwarding by executing the command :
sysctl -w net.inet.ip.forwarding=0
For other systems, check with your vendor.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.172.106 (monkeySYS) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:54:07 | 2022-03-26 22:24:27 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 | Linux Kernel 2.6 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=ponkeyA01 |-Issuer : CN=ponkeyA01 Purchase or generate a proper SSL certificate for this service.
The remote host has IP forwarding enabled. IP forwarding appears to be enabled on the remote host. Detected local MAC Address : 00113c1500b4 Response from local MAC Address : 00113c1500b4 Detected Gateway MAC Address : 00163e15ae12 Response from Gateway MAC Address : 00163e15ae12 On Linux, you can disable IP forwarding by doing :
echo 0 > /proc/sys/net/ipv4/ip_forward
On Windows, set the key 'IPEnableRouter' to 0 under
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
On Mac OS X, you can disable IP forwarding by executing the command :
sysctl -w net.inet.ip.forwarding=0
For other systems, check with your vendor.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=ponkeyA01 Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=ponkeyA01 |-Issuer : CN=ponkeyA01 Purchase or generate a proper SSL certificate for this service.
The remote host has IP forwarding enabled. IP forwarding appears to be enabled on the remote host. Detected local MAC Address : 00113c1500b4 Response from local MAC Address : 00113c1500b4 Detected Gateway MAC Address : 00163e15ae12 Response from Gateway MAC Address : 00163e15ae12 On Linux, you can disable IP forwarding by doing :
echo 0 > /proc/sys/net/ipv4/ip_forward
On Windows, set the key 'IPEnableRouter' to 0 under
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
On Mac OS X, you can disable IP forwarding by executing the command :
sysctl -w net.inet.ip.forwarding=0
For other systems, check with your vendor.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=ponkeyA01 Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.172.147 (monkeySYS) |
||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:52:36 | 2022-03-26 22:22:36 | ||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 | Linux Kernel 2.6 | ||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||
Vulnerabilities detected: | The remote host has IP forwarding enabled. IP forwarding appears to be enabled on the remote host. Detected local MAC Address : 00113c1500b4 Response from local MAC Address : 00113c1500b4 Detected Gateway MAC Address : 00163e15ae12 Response from Gateway MAC Address : 00163e15ae12 On Linux, you can disable IP forwarding by doing :
echo 0 > /proc/sys/net/ipv4/ip_forward
On Windows, set the key 'IPEnableRouter' to 0 under
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
On Mac OS X, you can disable IP forwarding by executing the command :
sysctl -w net.inet.ip.forwarding=0
For other systems, check with your vendor.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote host has IP forwarding enabled. IP forwarding appears to be enabled on the remote host. Detected local MAC Address : 00113c1500b4 Response from local MAC Address : 00113c1500b4 Detected Gateway MAC Address : 00163e15ae12 Response from Gateway MAC Address : 00163e15ae12 On Linux, you can disable IP forwarding by doing :
echo 0 > /proc/sys/net/ipv4/ip_forward
On Windows, set the key 'IPEnableRouter' to 0 under
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
On Mac OS X, you can disable IP forwarding by executing the command :
sysctl -w net.inet.ip.forwarding=0
For other systems, check with your vendor.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.172.200 (monkeySYS) |
||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:53:51 | 2022-03-26 22:23:25 | ||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 | Linux Kernel 2.6 | ||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||
Vulnerabilities detected: | The remote host has IP forwarding enabled. IP forwarding appears to be enabled on the remote host. Detected local MAC Address : 00113c1500b4 Response from local MAC Address : 00113c1500b4 Detected Gateway MAC Address : 00163e15ae12 Response from Gateway MAC Address : 00163e15ae12 On Linux, you can disable IP forwarding by doing :
echo 0 > /proc/sys/net/ipv4/ip_forward
On Windows, set the key 'IPEnableRouter' to 0 under
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
On Mac OS X, you can disable IP forwarding by executing the command :
sysctl -w net.inet.ip.forwarding=0
For other systems, check with your vendor.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote host has IP forwarding enabled. IP forwarding appears to be enabled on the remote host. Detected local MAC Address : 00113c1500b4 Response from local MAC Address : 00113c1500b4 Detected Gateway MAC Address : 00163e15ae12 Response from Gateway MAC Address : 00163e15ae12 On Linux, you can disable IP forwarding by doing :
echo 0 > /proc/sys/net/ipv4/ip_forward
On Windows, set the key 'IPEnableRouter' to 0 under
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
On Mac OS X, you can disable IP forwarding by executing the command :
sysctl -w net.inet.ip.forwarding=0
For other systems, check with your vendor.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.172.240 (monkeySYS) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:58:49 | 2022-03-26 22:24:24 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 | Linux Kernel 2.6 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=donkeyAGENTS |-Issuer : CN=donkeyAGENTS Purchase or generate a proper SSL certificate for this service.
The remote host has IP forwarding enabled. IP forwarding appears to be enabled on the remote host. Detected local MAC Address : 00113c1500b4 Response from local MAC Address : 00113c1500b4 Detected Gateway MAC Address : 00163e15ae12 Response from Gateway MAC Address : 00163e15ae12 On Linux, you can disable IP forwarding by doing :
echo 0 > /proc/sys/net/ipv4/ip_forward
On Windows, set the key 'IPEnableRouter' to 0 under
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
On Mac OS X, you can disable IP forwarding by executing the command :
sysctl -w net.inet.ip.forwarding=0
For other systems, check with your vendor.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=donkeyAGENTS Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=donkeyAGENTS |-Issuer : CN=donkeyAGENTS Purchase or generate a proper SSL certificate for this service.
The remote host has IP forwarding enabled. IP forwarding appears to be enabled on the remote host. Detected local MAC Address : 00113c1500b4 Response from local MAC Address : 00113c1500b4 Detected Gateway MAC Address : 00163e15ae12 Response from Gateway MAC Address : 00163e15ae12 On Linux, you can disable IP forwarding by doing :
echo 0 > /proc/sys/net/ipv4/ip_forward
On Windows, set the key 'IPEnableRouter' to 0 under
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
On Mac OS X, you can disable IP forwarding by executing the command :
sysctl -w net.inet.ip.forwarding=0
For other systems, check with your vendor.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=donkeyAGENTS Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.173.111 (darkhill) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:55:42 | 2022-03-26 22:24:48 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 | Linux Kernel 2.6 | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=bulut.darkhill.de Purchase or generate a proper SSL certificate for this service.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=bulut.darkhill.de |-Issuer : CN=bulut.darkhill.de Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=bulut.darkhill.de Purchase or generate a proper SSL certificate for this service.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=bulut.darkhill.de |-Issuer : CN=bulut.darkhill.de Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.173.112 (darkhill) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:55:42 | 2022-03-26 22:24:55 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=bulut.alielci.de Purchase or generate a proper SSL certificate for this service.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=bulut.alielci.de |-Issuer : CN=bulut.alielci.de Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=bulut.alielci.de Purchase or generate a proper SSL certificate for this service.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=bulut.alielci.de |-Issuer : CN=bulut.alielci.de Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.173.121 (ciproc intern) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:55:55 | 2022-03-26 22:24:59 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=cirrus.ciproc.de Purchase or generate a proper SSL certificate for this service.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=cirrus.ciproc.de |-Issuer : CN=cirrus.ciproc.de Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=cirrus.ciproc.de Purchase or generate a proper SSL certificate for this service.
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=cirrus.ciproc.de |-Issuer : CN=cirrus.ciproc.de Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.174.31 (darkhill) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:11:26 | 2022-03-26 22:29:34 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=web01.alevi.de |-Issuer : CN=web01.alevi.de Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=web01.alevi.de Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The remote service supports the use of anonymous SSL ciphers. The following is a list of SSL anonymous ciphers supported by the remote TCP server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DH-AES128-SHA256 0x00, 0xA6 DH None AES-GCM(128) SHA256 DH-AES256-SHA384 0x00, 0xA7 DH None AES-GCM(256) SHA384 ADH-AES128-SHA 0x00, 0x34 DH None AES-CBC(128) SHA1 ADH-AES256-SHA 0x00, 0x3A DH None AES-CBC(256) SHA1 ADH-CAMELLIA128-SHA 0x00, 0x46 DH None Camellia-CBC(128) SHA1 ADH-CAMELLIA256-SHA 0x00, 0x89 DH None Camellia-CBC(256) SHA1 ADH-SEED-SHA 0x00, 0x9B DH None SEED-CBC(128) SHA1 AECDH-AES128-SHA 0xC0, 0x18 ECDH None AES-CBC(128) SHA1 AECDH-AES256-SHA 0xC0, 0x19 ECDH None AES-CBC(256) SHA1 DH-AES128-SHA256 0x00, 0x6C DH None AES-CBC(128) SHA256 DH-AES256-SHA256 0x00, 0x6D DH None AES-CBC(256) SHA256 DH-CAMELLIA128-SHA256 0x00, 0xBF DH None Camellia-CBC(128) SHA256 DH-CAMELLIA256-SHA256 0x00, 0xC5 DH None Camellia-CBC(256) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Reconfigure the affected application if possible to avoid use of weak ciphers.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=web01.alevi.de |-Issuer : CN=web01.alevi.de Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=web01.alevi.de Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The remote service supports the use of anonymous SSL ciphers. The following is a list of SSL anonymous ciphers supported by the remote TCP server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DH-AES128-SHA256 0x00, 0xA6 DH None AES-GCM(128) SHA256 DH-AES256-SHA384 0x00, 0xA7 DH None AES-GCM(256) SHA384 ADH-AES128-SHA 0x00, 0x34 DH None AES-CBC(128) SHA1 ADH-AES256-SHA 0x00, 0x3A DH None AES-CBC(256) SHA1 ADH-CAMELLIA128-SHA 0x00, 0x46 DH None Camellia-CBC(128) SHA1 ADH-CAMELLIA256-SHA 0x00, 0x89 DH None Camellia-CBC(256) SHA1 ADH-SEED-SHA 0x00, 0x9B DH None SEED-CBC(128) SHA1 AECDH-AES128-SHA 0xC0, 0x18 ECDH None AES-CBC(128) SHA1 AECDH-AES256-SHA 0xC0, 0x19 ECDH None AES-CBC(256) SHA1 DH-AES128-SHA256 0x00, 0x6C DH None AES-CBC(128) SHA256 DH-AES256-SHA256 0x00, 0x6D DH None AES-CBC(256) SHA256 DH-CAMELLIA128-SHA256 0x00, 0xBF DH None Camellia-CBC(128) SHA256 DH-CAMELLIA256-SHA256 0x00, 0xC5 DH None Camellia-CBC(256) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Reconfigure the affected application if possible to avoid use of weak ciphers.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.174.33 (darkhill) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:59:58 | 2022-03-26 22:33:53 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=webdev.alevi.de |-Issuer : CN=webdev.alevi.de Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=webdev.alevi.de Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The remote service supports the use of anonymous SSL ciphers. The following is a list of SSL anonymous ciphers supported by the remote TCP server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DH-AES128-SHA256 0x00, 0xA6 DH None AES-GCM(128) SHA256 DH-AES256-SHA384 0x00, 0xA7 DH None AES-GCM(256) SHA384 ADH-AES128-SHA 0x00, 0x34 DH None AES-CBC(128) SHA1 ADH-AES256-SHA 0x00, 0x3A DH None AES-CBC(256) SHA1 ADH-CAMELLIA128-SHA 0x00, 0x46 DH None Camellia-CBC(128) SHA1 ADH-CAMELLIA256-SHA 0x00, 0x89 DH None Camellia-CBC(256) SHA1 ADH-SEED-SHA 0x00, 0x9B DH None SEED-CBC(128) SHA1 AECDH-AES128-SHA 0xC0, 0x18 ECDH None AES-CBC(128) SHA1 AECDH-AES256-SHA 0xC0, 0x19 ECDH None AES-CBC(256) SHA1 DH-AES128-SHA256 0x00, 0x6C DH None AES-CBC(128) SHA256 DH-AES256-SHA256 0x00, 0x6D DH None AES-CBC(256) SHA256 DH-CAMELLIA128-SHA256 0x00, 0xBF DH None Camellia-CBC(128) SHA256 DH-CAMELLIA256-SHA256 0x00, 0xC5 DH None Camellia-CBC(256) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Reconfigure the affected application if possible to avoid use of weak ciphers.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=webdev.alevi.de |-Issuer : CN=webdev.alevi.de Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=webdev.alevi.de Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
The remote service supports the use of anonymous SSL ciphers. The following is a list of SSL anonymous ciphers supported by the remote TCP server : High Strength Ciphers (>= 112-bit key) Name Code KEX Auth Encryption MAC ---------------------- ---------- --- ---- --------------------- --- DH-AES128-SHA256 0x00, 0xA6 DH None AES-GCM(128) SHA256 DH-AES256-SHA384 0x00, 0xA7 DH None AES-GCM(256) SHA384 ADH-AES128-SHA 0x00, 0x34 DH None AES-CBC(128) SHA1 ADH-AES256-SHA 0x00, 0x3A DH None AES-CBC(256) SHA1 ADH-CAMELLIA128-SHA 0x00, 0x46 DH None Camellia-CBC(128) SHA1 ADH-CAMELLIA256-SHA 0x00, 0x89 DH None Camellia-CBC(256) SHA1 ADH-SEED-SHA 0x00, 0x9B DH None SEED-CBC(128) SHA1 AECDH-AES128-SHA 0xC0, 0x18 ECDH None AES-CBC(128) SHA1 AECDH-AES256-SHA 0xC0, 0x19 ECDH None AES-CBC(256) SHA1 DH-AES128-SHA256 0x00, 0x6C DH None AES-CBC(128) SHA256 DH-AES256-SHA256 0x00, 0x6D DH None AES-CBC(256) SHA256 DH-CAMELLIA128-SHA256 0x00, 0xBF DH None Camellia-CBC(128) SHA256 DH-CAMELLIA256-SHA256 0x00, 0xC5 DH None Camellia-CBC(256) SHA256 The fields above are : {Tenable ciphername} {Cipher ID code} Kex={key exchange} Auth={authentication} Encrypt={symmetric encryption method} MAC={message authentication code} {export flag} Reconfigure the affected application if possible to avoid use of weak ciphers.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.199.211 (Hosting) |
||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:06:30 | 2022-03-26 22:36:17 | ||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 | Linux Kernel 2.6 | ||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||
Vulnerabilities detected: | Signing is not required on the remote SMB server. Enforce message signing in the host's configuration. On Windows, this is found in the policy setting 'Microsoft network server: Digitally sign communications (always)'. On Samba, the setting is called 'server signing'. See the 'see also' links for further details.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
Signing is not required on the remote SMB server. Enforce message signing in the host's configuration. On Windows, this is found in the policy setting 'Microsoft network server: Digitally sign communications (always)'. On Samba, the setting is called 'server signing'. See the 'see also' links for further details.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.221.4 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:08:07 | 2022-03-26 22:38:19 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 | Linux Kernel 2.6 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.221.27 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:11:14 | 2022-03-26 22:41:32 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
|
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
|
172.21.221.32 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:17:59 | 2022-03-26 22:48:34 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "1a068-221-4f911ed8c5580" Inode number : 106600 File size : 545 bytes File modification time : May. 10, 2014 at 20:55:02 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
|
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "1a068-221-4f911ed8c5580" Inode number : 106600 File size : 545 bytes File modification time : May. 10, 2014 at 20:55:02 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
|
172.21.221.36 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:18:29 | 2022-03-26 22:48:52 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "1a0ad-221-4fbf23504b140" Inode number : 106669 File size : 545 bytes File modification time : Jun. 16, 2014 at 11:19:57 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 2 seconds. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "1a0ad-221-4fbf23504b140" Inode number : 106669 File size : 545 bytes File modification time : Jun. 16, 2014 at 11:19:57 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 4 seconds. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.221.37 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:19:16 | 2022-03-26 22:51:03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "1a3fc-25a-4fc86e5f99940" Inode number : 107516 File size : 602 bytes File modification time : Jun. 23, 2014 at 20:43:41 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
|
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "1a3fc-25a-4fc86e5f99940" Inode number : 107516 File size : 602 bytes File modification time : Jun. 23, 2014 at 20:43:41 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
|
172.21.221.40 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:19:21 | 2022-03-26 22:51:22 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "1a3fc-221-4f4552e1ea380" Inode number : 107516 File size : 545 bytes File modification time : Mar. 11, 2014 at 14:03:10 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "1a3fc-221-4f4552e1ea380" Inode number : 107516 File size : 545 bytes File modification time : Mar. 11, 2014 at 14:03:10 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.221.41 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:19:35 | 2022-03-26 22:51:29 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "1a0cf-25a-50f8bffbcfe40" Inode number : 106703 File size : 602 bytes File modification time : Feb. 20, 2015 at 21:47:29 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 2 seconds. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "1a0cf-25a-50f8bffbcfe40" Inode number : 106703 File size : 602 bytes File modification time : Feb. 20, 2015 at 21:47:29 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 9 seconds. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.221.42 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:19:47 | 2022-03-26 22:52:00 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "1a3fc-221-4f4552e1ea380" Inode number : 107516 File size : 545 bytes File modification time : Mar. 11, 2014 at 14:03:10 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
|
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "1a3fc-221-4f4552e1ea380" Inode number : 107516 File size : 545 bytes File modification time : Mar. 11, 2014 at 14:03:10 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
|
172.21.221.46 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:17:16 | 2022-03-26 22:47:21 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
|
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
|
172.21.221.47 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:23:39 | 2022-03-26 22:53:51 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "1a3fc-221-4f4552e1ea380" Inode number : 107516 File size : 545 bytes File modification time : Mar. 11, 2014 at 14:03:10 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
|
The remote web server is affected by an information disclosure vulnerability. Nessus was able to determine that the Apache Server listening on port 80 leaks the servers inode numbers in the ETag HTTP Header field : Source : ETag: "1a3fc-221-4f4552e1ea380" Inode number : 107516 File size : 545 bytes File modification time : Mar. 11, 2014 at 14:03:10 GMT Modify the HTTP ETag header of the web server to not include file inodes in the ETag header calculation. Refer to the linked Apache documentation for more information.
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
|
172.21.221.48 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:18:32 | 2022-03-26 22:49:12 | ||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
|
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
|
172.21.221.50 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:19:19 | 2022-03-26 22:49:11 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 3 seconds. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 3 seconds. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.221.58 (Telephony) |
||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:27:39 | 2022-03-26 22:58:23 | ||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||
OS detected: | FreePBX SIP Device | FreePBX SIP Device | ||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
172.21.221.64 (Telephony) |
||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:28:05 | 2022-03-26 23:00:21 | ||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||
OS detected: | FreePBX SIP Device | FreePBX SIP Device | ||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
172.21.221.200 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:30:40 | 2022-03-26 23:02:14 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.221.201 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:31:16 | 2022-03-26 23:02:33 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote SSH server is configured to allow weak encryption algorithms or no algorithm at all. The following weak server-to-client encryption algorithms are supported : arcfour arcfour128 arcfour256 The following weak client-to-server encryption algorithms are supported : arcfour arcfour128 arcfour256 Contact the vendor or consult product documentation to remove the weak ciphers.
The remote SSH server is configured to allow MD5 and 96-bit MAC algorithms. The following client-to-server Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 The following server-to-client Message Authentication Code (MAC) algorithms are supported : hmac-md5 hmac-md5-96 hmac-sha1-96 hmac-sha2-256-96 hmac-sha2-512-96 Contact the vendor or consult product documentation to disable MD5 and 96-bit MAC algorithms.
The SSH server is configured to use Cipher Block Chaining. The following client-to-server Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se The following server-to-client Cipher Block Chaining (CBC) algorithms are supported : 3des-cbc aes128-cbc aes192-cbc aes256-cbc blowfish-cbc cast128-cbc rijndael-cbc@lysator.liu.se Contact the vendor or consult product documentation to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.221.250 (Telephony) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:42:54 | 2022-03-26 23:14:27 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 3.16.0-4-amd64 (x86_64) | Linux Kernel 3.16.0-4-amd64 (x86_64) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerabilities detected: | The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote NTP server is affected by a denial of service vulnerability. Nessus was able to retrieve the following list of recent hosts to connect to this NTP server : 172.21.172.24 80.151.186.5 193.141.27.6 173.249.58.145 194.0.5.123 192.168.175.129 If using NTP from the Network Time Protocol Project, upgrade to NTP version 4.2.7-p26 or later. Alternatively, add 'disable monitor' to the ntp.conf configuration file and restart the service. Otherwise, limit access to the affected service to trusted hosts, or contact the vendor for a fix.
The remote NTP server responds to mode 6 queries. Nessus elicited the following response from the remote host by sending an NTP mode 6 query : 'version="ntpd 4.2.6p5@1.2349-o Tue May 5 09:53:03 UTC 2020 (1)", processor="x86_64", system="Linux/3.16.0-4-amd64", leap=0, stratum=3, precision=-19, rootdelay=17.436, rootdisp=39.352, refid=194.0.5.123, reftime=0xe5dedc5e.b802a6a7, clock=0xe5dedf10.35713a37, peer=56038, tc=10, mintc=3, offset=0.009, frequency=32.230, sys_jitter=1.125, clk_jitter=0.219, clk_wander=0.026' Restrict NTP mode 6 queries.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
The SSL certificate for this service cannot be trusted. The following certificate was at the top of the certificate chain sent by the remote host, but it is signed by an unknown certificate authority : |-Subject : CN=tel-jessie-b |-Issuer : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The SSL certificate chain for this service ends in an unrecognized self-signed certificate. The following certificate was found at the top of the certificate chain sent by the remote host, but is self-signed and was not found in the list of known certificate authorities : |-Subject : CN=tel-jessie-b Purchase or generate a proper SSL certificate for this service.
The remote NTP server is affected by a denial of service vulnerability. Nessus was able to retrieve the following list of recent hosts to connect to this NTP server : 172.21.172.24 173.249.58.145 172.21.172.48 193.141.27.6 194.0.5.123 80.151.186.5 If using NTP from the Network Time Protocol Project, upgrade to NTP version 4.2.7-p26 or later. Alternatively, add 'disable monitor' to the ntp.conf configuration file and restart the service. Otherwise, limit access to the affected service to trusted hosts, or contact the vendor for a fix.
The remote NTP server responds to mode 6 queries. Nessus elicited the following response from the remote host by sending an NTP mode 6 query : 'version="ntpd 4.2.6p5@1.2349-o Tue May 5 09:53:03 UTC 2020 (1)", processor="x86_64", system="Linux/3.16.0-4-amd64", leap=0, stratum=3, precision=-19, rootdelay=17.575, rootdisp=40.114, refid=194.0.5.123, reftime=0xe5ea0a48.b89c42f7, clock=0xe5ea0d00.204113dc, peer=56038, tc=10, mintc=3, offset=0.131, frequency=32.185, sys_jitter=0.819, clk_jitter=0.225, clk_wander=0.014' Restrict NTP mode 6 queries.
The remote service encrypts traffic using an older version of TLS. TLSv1 is enabled and the server supports at least one cipher. Enable support for TLS 1.2 and 1.3, and disable support for TLS 1.0.
|
172.21.198.171 (publior) |
||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:03:40 | 2022-03-26 22:33:58 | ||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||
Vulnerabilities detected: | The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.198.181 (publior) |
||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:03:55 | 2022-03-26 22:34:02 | ||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||
Vulnerabilities detected: | The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.198.182 (publior) |
||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:04:17 | 2022-03-26 22:34:25 | ||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||
OS detected: | Linux Kernel 3.2 on Debian 7.0 (wheezy) | Linux Kernel 3.2 on Debian 7.0 (wheezy) | ||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||
Vulnerabilities detected: | The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
The remote SSH server is configured to allow weak key exchange algorithms. The following weak key exchange algorithms are enabled : diffie-hellman-group-exchange-sha1 diffie-hellman-group1-sha1 Contact the vendor or consult product documentation to disable the weak algorithms.
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.0.23 (Hosts) |
||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:37:08 | 2022-03-26 22:02:49 | ||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||
OS detected: | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | ||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||
Vulnerabilities detected: | It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.0.24 (Hosts) |
||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:34:01 | 2022-03-26 22:02:46 | ||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||
OS detected: | Linux Kernel 3.12 | Linux Kernel 3.12 | ||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||
Vulnerabilities detected: | It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.0.25 (Hosts) |
||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:34:02 | 2022-03-26 22:02:42 | ||||||||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 | Linux Kernel 2.6 | ||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||
Vulnerabilities detected: | It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.0.101 (Hosts) |
||||||||||||||
Previous scan | Current scan | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:32:32 | 2022-03-26 22:01:12 | ||||||||||||
WAFs detected: |
|
|
||||||||||||
OS detected: | Unknown | Unknown | ||||||||||||
Ports detected: | None | None | ||||||||||||
Vulnerabilities detected: | It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.0.250 (Hosts) |
||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:34:02 | 2022-03-26 22:02:46 | ||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 | Linux Kernel 2.6 | ||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||
Vulnerabilities detected: | It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.1.11 (Gateways) |
||||||||||||||
Previous scan | Current scan | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:34:49 | 2022-03-26 22:03:24 | ||||||||||||
WAFs detected: |
|
|
||||||||||||
OS detected: | Unknown | Unknown | ||||||||||||
Ports detected: | None | None | ||||||||||||
Vulnerabilities detected: | It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.1.13 (Gateways) |
||||||||||||||
Previous scan | Current scan | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:34:31 | 2022-03-26 22:03:35 | ||||||||||||
WAFs detected: |
|
|
||||||||||||
OS detected: | Unknown | Unknown | ||||||||||||
Ports detected: | None | None | ||||||||||||
Vulnerabilities detected: | It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.1.101 (Gateways) |
||||||||||||||
Previous scan | Current scan | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:34:50 | 2022-03-26 22:03:34 | ||||||||||||
WAFs detected: |
|
|
||||||||||||
OS detected: | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | ||||||||||||
Ports detected: |
|
|
||||||||||||
Vulnerabilities detected: | It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.11.4 (ISP) |
||||||||||||||
Previous scan | Current scan | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:36:54 | 2022-03-26 22:05:54 | ||||||||||||
WAFs detected: |
|
|
||||||||||||
OS detected: | Unknown | Unknown | ||||||||||||
Ports detected: | None | None | ||||||||||||
Vulnerabilities detected: | It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 2 seconds. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 4 seconds. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.70.11 (Hosting) |
||||||||||||||
Previous scan | Current scan | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:45:51 | 2022-03-26 22:13:58 | ||||||||||||
WAFs detected: |
|
|
||||||||||||
OS detected: | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | ||||||||||||
Ports detected: |
|
|
||||||||||||
Vulnerabilities detected: | It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.172.42 (ciproc intern) |
||||||||||||||
Previous scan | Current scan | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:48:42 | 2022-03-26 22:18:13 | ||||||||||||
WAFs detected: |
|
|
||||||||||||
OS detected: | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | ||||||||||||
Ports detected: |
|
|
||||||||||||
Vulnerabilities detected: | It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.172.44 (ciproc intern) |
||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:54:31 | 2022-03-26 22:18:41 | ||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||
Vulnerabilities detected: | It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 516 seconds. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 539 seconds. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.173.200 (ciproc intern) |
||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:54:11 | 2022-03-26 22:23:29 | ||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||
OS detected: | Linux Kernel 2.6 | Linux Kernel 2.6 | ||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||
Vulnerabilities detected: | It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.174.11 (darkhill) |
||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:54:27 | 2022-03-26 22:23:54 | ||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||
OS detected: | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | ||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||
Vulnerabilities detected: | It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.174.220 (darkhill) |
||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:55:42 | 2022-03-26 22:24:41 | ||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||
OS detected: | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | ||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||
Vulnerabilities detected: | It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.174.230 (darkhill) |
||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:55:30 | 2022-03-26 22:24:58 | ||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||
OS detected: | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | ||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||
Vulnerabilities detected: | It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.198.11 (publior) |
||||||||||||||
Previous scan | Current scan | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 10:55:57 | 2022-03-26 22:25:42 | ||||||||||||
WAFs detected: |
|
|
||||||||||||
OS detected: | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | Linux Kernel 3.10 Linux Kernel 3.13 Linux Kernel 4.2 Linux Kernel 4.8 | ||||||||||||
Ports detected: |
|
|
||||||||||||
Vulnerabilities detected: | It is possible to determine the exact time set on the remote host. The difference between the local and remote clocks is 1 second. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.198.240 (publior) |
||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:04:46 | 2022-03-26 22:35:10 | ||||||||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||||||||
OS detected: | Linux Kernel 2.6 | Linux Kernel 2.6 | ||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||
Vulnerabilities detected: | It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.221.11 (Telephony) |
||||||||||||||
Previous scan | Current scan | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:09:40 | 2022-03-26 22:39:26 | ||||||||||||
WAFs detected: |
|
|
||||||||||||
OS detected: | Unknown | Unknown | ||||||||||||
Ports detected: | None | None | ||||||||||||
Vulnerabilities detected: | It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
It is possible to determine the exact time set on the remote host. The remote clock is synchronized with the local clock. Filter out the ICMP timestamp requests (13), and the outgoing ICMP timestamp replies (14).
|
172.21.11.2 (ISP) |
||
Previous scan | Current scan | |
---|---|---|
Scan completed: | 2022-03-18 10:34:50 | 2022-03-26 22:03:36 |
WAFs detected: |
|
|
OS detected: | Unknown | Unknown |
Ports detected: | None | None |
Vulnerabilities detected: | None | None |
172.21.11.3 (ISP) |
||
Previous scan | Current scan | |
---|---|---|
Scan completed: | 2022-03-18 10:34:52 | 2022-03-26 22:03:33 |
WAFs detected: |
|
|
OS detected: | Unknown | Unknown |
Ports detected: | None | None |
Vulnerabilities detected: | None | None |
172.21.12.1 (VulnLIB) |
||
Previous scan | Current scan | |
---|---|---|
Scan completed: | 2022-03-18 10:40:20 | 2022-03-26 22:09:08 |
WAFs detected: |
|
|
OS detected: | Unknown | Unknown |
Ports detected: | None | None |
Vulnerabilities detected: | None | None |
172.21.12.21 (VulnLIB) |
||
Previous scan | Current scan | |
---|---|---|
Scan completed: | 2022-03-18 10:41:28 | 2022-03-26 22:10:15 |
WAFs detected: |
|
|
OS detected: | Unknown | Unknown |
Ports detected: | None | None |
Vulnerabilities detected: | None | None |
172.21.17.251 (VulnLIB) |
||
Previous scan | Current scan | |
---|---|---|
Scan completed: | 2022-03-18 10:43:43 | 2022-03-26 22:12:19 |
WAFs detected: |
|
|
OS detected: | Unknown | Unknown |
Ports detected: | None | None |
Vulnerabilities detected: | None | None |
172.21.17.254 (VulnLIB) |
||
Previous scan | Current scan | |
---|---|---|
Scan completed: | 2022-03-18 10:44:39 | 2022-03-26 22:12:22 |
WAFs detected: |
|
|
OS detected: | Unknown | Unknown |
Ports detected: | None | None |
Vulnerabilities detected: | None | None |
172.21.18.1 (VulnLIB) |
||
Previous scan | Current scan | |
---|---|---|
Scan completed: | 2022-03-18 10:45:14 | 2022-03-26 22:13:27 |
WAFs detected: |
|
|
OS detected: | Unknown | Unknown |
Ports detected: | None | None |
Vulnerabilities detected: | None | None |
172.21.18.11 (Uncategorized) |
||
Previous scan | Current scan | |
---|---|---|
Scan completed: | 2022-03-18 10:45:34 | 2022-03-26 22:13:59 |
WAFs detected: |
|
|
OS detected: | Unknown | Unknown |
Ports detected: | None | None |
Vulnerabilities detected: | None | None |
172.21.18.12 (Uncategorized) |
||
Previous scan | Current scan | |
---|---|---|
Scan completed: | 2022-03-18 10:46:57 | 2022-03-26 22:14:22 |
WAFs detected: |
|
|
OS detected: | Unknown | Unknown |
Ports detected: | None | None |
Vulnerabilities detected: | None | None |
172.21.18.211 (Uncategorized) |
||
Previous scan | Current scan | |
---|---|---|
Scan completed: | 2022-03-18 10:47:08 | 2022-03-26 22:15:31 |
WAFs detected: |
|
|
OS detected: | Unknown | Unknown |
Ports detected: | None | None |
Vulnerabilities detected: | None | None |
172.21.172.23 (VulnLIB) |
||
Previous scan | Current scan | |
---|---|---|
Scan completed: | 2022-03-18 10:49:07 | 2022-03-26 22:17:15 |
WAFs detected: |
|
|
OS detected: | Unknown | Unknown |
Ports detected: | None | None |
Vulnerabilities detected: | None | None |
172.21.172.31 (VulnLIB) |
||
Previous scan | Current scan | |
---|---|---|
Scan completed: | 2022-03-18 10:50:03 | 2022-03-26 22:17:46 |
WAFs detected: |
|
|
OS detected: | Unknown | Unknown |
Ports detected: | None | None |
Vulnerabilities detected: | None | None |
172.21.172.38 (VulnLIB) |
||
Previous scan | Current scan | |
---|---|---|
Scan completed: | 2022-03-18 10:50:20 | 2022-03-26 22:18:43 |
WAFs detected: |
|
|
OS detected: | Unknown | Unknown |
Ports detected: | None | None |
Vulnerabilities detected: | None | None |
172.21.221.75 (Telephony) |
||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Scan completed: | 2022-03-18 11:30:50 | 2022-03-26 23:01:38 | ||||||||||||||||||
WAFs detected: |
|
|
||||||||||||||||||
OS detected: | Linux Kernel 3.16 on Debian 8.0 (jessie) | Linux Kernel 3.16 on Debian 8.0 (jessie) | ||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||
Vulnerabilities detected: | None | None |
172.21.221.230 (Telephony) |
||
Previous scan | Current scan | |
---|---|---|
Scan completed: | 2022-03-18 11:33:51 | 2022-03-26 23:04:48 |
WAFs detected: |
|
|
OS detected: | Unknown | Unknown |
Ports detected: | None | None |
Vulnerabilities detected: | None | None |
172.21.221.231 (Telephony) |
||
Previous scan | Current scan | |
---|---|---|
Scan completed: | 2022-03-18 11:34:02 | 2022-03-26 23:04:55 |
WAFs detected: |
|
|
OS detected: | Unknown | Unknown |
Ports detected: | None | None |
Vulnerabilities detected: | None | None |
172.21.221.232 (Telephony) |
||
Previous scan | Current scan | |
---|---|---|
Scan completed: | 2022-03-18 11:34:28 | 2022-03-26 23:05:32 |
WAFs detected: |
|
|
OS detected: | Unknown | Unknown |
Ports detected: | None | None |
Vulnerabilities detected: | None | None |
172.21.221.242 (Telephony) |
||
Previous scan | Current scan | |
---|---|---|
Scan completed: | 2022-03-18 11:37:14 | 2022-03-26 23:08:07 |
WAFs detected: |
|
|
OS detected: | Unknown | Unknown |
Ports detected: | None | None |
Vulnerabilities detected: | None | None |
Warning: One or more systems were detected that have not been assigned to a system group. Please let us know which group any uncategorized systems belong to so we can display them correctly.
The number of systems in each risk class by system group:
The raw output of some supplementary scans is available below.
Scan subtype: | |
Origin IP: | |
Details: | |
Command: |
|
Version: | (official web site) |
Output: |
2021-06-24 10:58:06,681 Could not find custom hooks file at /home/zap/.zap_hooks.py Jun 24, 2021 10:58:19 AM java.util.prefs.FileSystemPreferences\ run INFO: Created user preferences directory. Total of 4 URLs PASS: Vulnerable JS Library [10003] PASS: Cookie No HttpOnly Flag [10010] PASS: Cookie Without Secure Flag [10011] PASS: Cross-Domain JavaScript Source File Inclusion [10017] PASS: Content-Type Header Missing [10019] PASS: X-Frame-Options Header [10020] PASS: X-Content-Type-Options Header Missing [10021] PASS: Information Disclosure - Debug Error Messages [10023] PASS: Information Disclosure - Sensitive Information in URL [10024] PASS: Information Disclosure - Sensitive Information in HTTP Referrer Header [10025] PASS: HTTP Parameter Override [10026] PASS: Information Disclosure - Suspicious Comments [10027] PASS: Open Redirect [10028] PASS: Cookie Poisoning [10029] PASS: User Controllable Charset [10030] PASS: User Controllable HTML Element Attribute (Potential XSS) [10031] PASS: Viewstate [10032] PASS: Directory Browsing [10033] PASS: Heartbleed OpenSSL Vulnerability (Indicative) [10034] PASS: HTTP Server Response Header [10036] PASS: Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s) [10037] PASS: X-Backend-Server Header Information Leak [10039] PASS: Secure Pages Include Mixed Content [10040] PASS: HTTP to HTTPS Insecure Transition in Form Post [10041] PASS: HTTPS to HTTP Insecure Transition in Form Post [10042] PASS: User Controllable JavaScript Event (XSS) [10043] PASS: Big Redirect Detected (Potential Sensitive Information Leak) [10044] PASS: Retrieved from Cache [10050] PASS: X-ChromeLogger-Data (XCOLD) Header Information Leak [10052] PASS: Cookie without SameSite Attribute [10054] PASS: CSP [10055] PASS: X-Debug-Token Information Leak [10056] PASS: Username Hash Found [10057] PASS: X-AspNet-Version Response Header [10061] PASS: PII Disclosure [10062] PASS: Timestamp Disclosure [10096] PASS: Hash Disclosure [10097] PASS: Cross-Domain Misconfiguration [10098] PASS: Weak Authentication Method [10105] PASS: Reverse Tabnabbing [10108] PASS: Modern Web Application [10109] PASS: Absence of Anti-CSRF Tokens [10202] PASS: Private IP Disclosure [2] PASS: Session ID in URL Rewrite [3] PASS: Script Passive Scan Rules [50001] PASS: Insecure JSF ViewState [90001] PASS: Charset Mismatch [90011] PASS: Application Error Disclosure [90022] PASS: WSDL File Detection [90030] PASS: Loosely Scoped Cookie [90033] WARN-NEW: Incomplete or No Cache-control Header Set [10015] x 1 https://172.21.46.247/robots.txt (200 OK) WARN-NEW: Strict-Transport-Security Header Not Set [10035] x 3 https://172.21.46.247/ (403 Forbidden) https://172.21.46.247 (403 Forbidden) https://172.21.46.247/sitemap.xml (403 Forbidden) WARN-NEW: Content Security Policy (CSP) Header Not Set [10038] x 3 https://172.21.46.247/ (403 Forbidden) https://172.21.46.247 (403 Forbidden) https://172.21.46.247/sitemap.xml (403 Forbidden) FAIL-NEW: 0 FAIL-INPROG: 0 WARN-NEW: 3 WARN-INPROG: 0 INFO: 0 IGNORE: 0 PASS: 50
------- START: 172.21.46.108 - 2022-04-20 23:48:36 Total of 2 URLs PASS: Directory Browsing [0] PASS: Vulnerable JS Library [10003] PASS: Cookie No HttpOnly Flag [10010] PASS: Cookie Without Secure Flag [10011] PASS: Incomplete or No Cache-control Header Set [10015] PASS: Cross-Domain JavaScript Source File Inclusion [10017] PASS: Content-Type Header Missing [10019] PASS: X-Frame-Options Header [10020] PASS: X-Content-Type-Options Header Missing [10021] PASS: Information Disclosure - Debug Error Messages [10023] PASS: Information Disclosure - Sensitive Information in URL [10024] PASS: Information Disclosure - Sensitive Information in HTTP Referrer Header [10025] PASS: HTTP Parameter Override [10026] PASS: Information Disclosure - Suspicious Comments [10027] PASS: Open Redirect [10028] PASS: Cookie Poisoning [10029] PASS: User Controllable Charset [10030] PASS: User Controllable HTML Element Attribute (Potential XSS) [10031] PASS: Viewstate [10032] PASS: Directory Browsing [10033] PASS: Heartbleed OpenSSL Vulnerability (Indicative) [10034] PASS: Strict-Transport-Security Header [10035] PASS: HTTP Server Response Header [10036] PASS: Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s) [10037] PASS: Content Security Policy (CSP) Header Not Set [10038] PASS: X-Backend-Server Header Information Leak [10039] PASS: Secure Pages Include Mixed Content [10040] PASS: HTTP to HTTPS Insecure Transition in Form Post [10041] PASS: HTTPS to HTTP Insecure Transition in Form Post [10042] PASS: User Controllable JavaScript Event (XSS) [10043] PASS: Big Redirect Detected (Potential Sensitive Information Leak) [10044] PASS: Source Code Disclosure - /WEB-INF folder [10045] PASS: HTTPS Content Available via HTTP [10047] PASS: Remote Code Execution - Shell Shock [10048] PASS: Retrieved from Cache [10050] PASS: Relative Path Confusion [10051] PASS: X-ChromeLogger-Data (XCOLD) Header Information Leak [10052] PASS: Cookie without SameSite Attribute [10054] PASS: CSP [10055] PASS: X-Debug-Token Information Leak [10056] PASS: Username Hash Found [10057] PASS: GET for POST [10058] PASS: X-AspNet-Version Response Header [10061] PASS: PII Disclosure [10062] PASS: Backup File Disclosure [10095] PASS: Timestamp Disclosure [10096] PASS: Hash Disclosure [10097] PASS: Cross-Domain Misconfiguration [10098] PASS: User Agent Fuzzer [10104] PASS: Weak Authentication Method [10105] PASS: HTTP Only Site [10106] PASS: Httpoxy - Proxy Header Misuse [10107] PASS: Reverse Tabnabbing [10108] PASS: Modern Web Application [10109] PASS: Absence of Anti-CSRF Tokens [10202] PASS: Private IP Disclosure [2] PASS: Anti-CSRF Tokens Check [20012] PASS: HTTP Parameter Pollution [20014] PASS: Heartbleed OpenSSL Vulnerability [20015] PASS: Cross-Domain Misconfiguration [20016] PASS: Source Code Disclosure - CVE-2012-1823 [20017] PASS: Remote Code Execution - CVE-2012-1823 [20018] PASS: External Redirect [20019] PASS: Session ID in URL Rewrite [3] PASS: Buffer Overflow [30001] PASS: Format String Error [30002] PASS: Integer Overflow Error [30003] PASS: CRLF Injection [40003] PASS: Parameter Tampering [40008] PASS: Server Side Include [40009] PASS: Cross Site Scripting (Reflected) [40012] PASS: Session Fixation [40013] PASS: Cross Site Scripting (Persistent) [40014] PASS: Cross Site Scripting (Persistent) - Prime [40016] PASS: Cross Site Scripting (Persistent) - Spider [40017] PASS: SQL Injection [40018] PASS: SQL Injection - MySQL [40019] PASS: SQL Injection - Hypersonic SQL [40020] PASS: SQL Injection - Oracle [40021] PASS: SQL Injection - PostgreSQL [40022] PASS: Possible Username Enumeration [40023] PASS: SQL Injection - SQLite [40024] PASS: Proxy Disclosure [40025] PASS: Cross Site Scripting (DOM Based) [40026] PASS: SQL Injection - MsSQL [40027] PASS: ELMAH Information Leak [40028] PASS: Trace.axd Information Leak [40029] PASS: .htaccess Information Leak [40032] PASS: .env Information Leak [40034] PASS: Hidden File Finder [40035] PASS: Source Code Disclosure - Git [41] PASS: Source Code Disclosure - SVN [42] PASS: Source Code Disclosure - File Inclusion [43] PASS: Script Active Scan Rules [50000] PASS: Script Passive Scan Rules [50001] PASS: Path Traversal [6] PASS: Remote File Inclusion [7] PASS: Insecure JSF ViewState [90001] PASS: Charset Mismatch [90011] PASS: XSLT Injection [90017] PASS: Server Side Code Injection [90019] PASS: Remote OS Command Injection [90020] PASS: XPath Injection [90021] PASS: Application Error Disclosure [90022] PASS: XML External Entity Attack [90023] PASS: Generic Padding Oracle [90024] PASS: Expression Language Injection [90025] PASS: SOAP Action Spoofing [90026] PASS: Cookie Slack Detector [90027] PASS: Insecure HTTP Method [90028] PASS: SOAP XML Injection [90029] PASS: WSDL File Detection [90030] PASS: Loosely Scoped Cookie [90033] PASS: Cloud Metadata Potentially Exposed [90034] FAIL-NEW: 0 FAIL-INPROG: 0 WARN-NEW: 0 WARN-INPROG: 0 INFO: 0 IGNORE: 0 PASS: 114
------- START: 172.21.46.120 - 2022-04-21 01:10:15 Total of 245 URLs PASS: Directory Browsing [0] PASS: Vulnerable JS Library [10003] PASS: Cookie Without Secure Flag [10011] PASS: Cross-Domain JavaScript Source File Inclusion [10017] PASS: Content-Type Header Missing [10019] PASS: X-Frame-Options Header [10020] PASS: Information Disclosure - Debug Error Messages [10023] PASS: Information Disclosure - Sensitive Information in URL [10024] PASS: Information Disclosure - Sensitive Information in HTTP Referrer Header [10025] PASS: HTTP Parameter Override [10026] PASS: Information Disclosure - Suspicious Comments [10027] PASS: Open Redirect [10028] PASS: Cookie Poisoning [10029] PASS: User Controllable Charset [10030] PASS: User Controllable HTML Element Attribute (Potential XSS) [10031] PASS: Viewstate [10032] PASS: Directory Browsing [10033] PASS: Heartbleed OpenSSL Vulnerability (Indicative) [10034] PASS: Strict-Transport-Security Header [10035] PASS: HTTP Server Response Header [10036] PASS: Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s) [10037] PASS: Content Security Policy (CSP) Header Not Set [10038] PASS: X-Backend-Server Header Information Leak [10039] PASS: Secure Pages Include Mixed Content [10040] PASS: HTTP to HTTPS Insecure Transition in Form Post [10041] PASS: HTTPS to HTTP Insecure Transition in Form Post [10042] PASS: User Controllable JavaScript Event (XSS) [10043] PASS: Big Redirect Detected (Potential Sensitive Information Leak) [10044] PASS: Source Code Disclosure - /WEB-INF folder [10045] PASS: HTTPS Content Available via HTTP [10047] PASS: Remote Code Execution - Shell Shock [10048] PASS: Retrieved from Cache [10050] PASS: X-ChromeLogger-Data (XCOLD) Header Information Leak [10052] PASS: X-Debug-Token Information Leak [10056] PASS: Username Hash Found [10057] PASS: GET for POST [10058] PASS: X-AspNet-Version Response Header [10061] PASS: PII Disclosure [10062] PASS: Backup File Disclosure [10095] PASS: Timestamp Disclosure [10096] PASS: Hash Disclosure [10097] PASS: Cross-Domain Misconfiguration [10098] PASS: User Agent Fuzzer [10104] PASS: Weak Authentication Method [10105] PASS: HTTP Only Site [10106] PASS: Httpoxy - Proxy Header Misuse [10107] PASS: Reverse Tabnabbing [10108] PASS: Modern Web Application [10109] PASS: Private IP Disclosure [2] PASS: HTTP Parameter Pollution [20014] PASS: Heartbleed OpenSSL Vulnerability [20015] PASS: Cross-Domain Misconfiguration [20016] PASS: Source Code Disclosure - CVE-2012-1823 [20017] PASS: Remote Code Execution - CVE-2012-1823 [20018] PASS: External Redirect [20019] PASS: Buffer Overflow [30001] PASS: Format String Error [30002] PASS: CRLF Injection [40003] PASS: Parameter Tampering [40008] PASS: Server Side Include [40009] PASS: Cross Site Scripting (Reflected) [40012] PASS: Session Fixation [40013] PASS: Cross Site Scripting (Persistent) [40014] PASS: Cross Site Scripting (Persistent) - Prime [40016] PASS: Cross Site Scripting (Persistent) - Spider [40017] PASS: SQL Injection [40018] PASS: SQL Injection - MySQL [40019] PASS: SQL Injection - Hypersonic SQL [40020] PASS: SQL Injection - Oracle [40021] PASS: SQL Injection - PostgreSQL [40022] PASS: Possible Username Enumeration [40023] PASS: SQL Injection - SQLite [40024] PASS: Proxy Disclosure [40025] PASS: Cross Site Scripting (DOM Based) [40026] PASS: SQL Injection - MsSQL [40027] PASS: ELMAH Information Leak [40028] PASS: Trace.axd Information Leak [40029] PASS: .htaccess Information Leak [40032] PASS: .env Information Leak [40034] PASS: Source Code Disclosure - Git [41] PASS: Source Code Disclosure - SVN [42] PASS: Source Code Disclosure - File Inclusion [43] PASS: Script Active Scan Rules [50000] PASS: Script Passive Scan Rules [50001] PASS: Remote File Inclusion [7] PASS: Insecure JSF ViewState [90001] PASS: Charset Mismatch [90011] PASS: XSLT Injection [90017] PASS: Server Side Code Injection [90019] PASS: Remote OS Command Injection [90020] PASS: XPath Injection [90021] PASS: Application Error Disclosure [90022] PASS: XML External Entity Attack [90023] PASS: Generic Padding Oracle [90024] PASS: Expression Language Injection [90025] PASS: SOAP Action Spoofing [90026] PASS: Insecure HTTP Method [90028] PASS: SOAP XML Injection [90029] PASS: WSDL File Detection [90030] PASS: Loosely Scoped Cookie [90033] PASS: Cloud Metadata Potentially Exposed [90034] WARN-NEW: Cookie No HttpOnly Flag [10010] x 1 https://172.21.46.120/application/ (200 200) WARN-NEW: Incomplete or No Cache-control Header Set [10015] x 11 https://172.21.46.120/application/ (200 200) https://172.21.46.120/application/requestresetpassword (200 200) https://172.21.46.120/application/disclaimer;jsessionid=D3403DE2E3AEC97B9D24208432C14E11.eRepInka2 (200 200) https://172.21.46.120/application/imprint;jsessionid=D3403DE2E3AEC97B9D24208432C14E11.eRepInka2 (200 200) https://172.21.46.120/application/de/login (200 200) WARN-NEW: X-Content-Type-Options Header Missing [10021] x 11 https://172.21.46.120/application/ (200 200) https://172.21.46.120/application/requestresetpassword (200 200) https://172.21.46.120/application/disclaimer;jsessionid=D3403DE2E3AEC97B9D24208432C14E11.eRepInka2 (200 200) https://172.21.46.120/application/imprint;jsessionid=D3403DE2E3AEC97B9D24208432C14E11.eRepInka2 (200 200) https://172.21.46.120/application/assets/lKFMrOfjVN83D/application/services/impl/favicon.ico (200 200) WARN-NEW: Relative Path Confusion [10051] x 64 https://172.21.46.120/application/de/disclaimer.dialoglayout.sessiontimeoutform (200 200) https://172.21.46.120/application/de/imprint.dialoglayout.sessiontimeoutform (200 200) https://172.21.46.120/application/de/login.layout.sessiontimeoutform (200 200) https://172.21.46.120/application/de/requestresetpassword.passwordform (200 200) https://172.21.46.120/application/de/requestresetpassword.layoutnoheader.sessiontimeoutform (200 200) WARN-NEW: Cookie without SameSite Attribute [10054] x 2 https://172.21.46.120/application/ (200 200) https://172.21.46.120/application/ (200 200) WARN-NEW: CSP: Wildcard Directive [10055] x 9 https://172.21.46.120/application/ (200 200) https://172.21.46.120/application/ (200 200) https://172.21.46.120/application/ (200 200) https://172.21.46.120/application/requestresetpassword (200 200) https://172.21.46.120/application/requestresetpassword (200 200) WARN-NEW: Absence of Anti-CSRF Tokens [10202] x 11 https://172.21.46.120/application/ (200 200) https://172.21.46.120/application/ (200 200) https://172.21.46.120/application/ (200 200) https://172.21.46.120/application/requestresetpassword (200 200) https://172.21.46.120/application/requestresetpassword (200 200) WARN-NEW: Anti-CSRF Tokens Check [20012] x 34 https://172.21.46.120/application/ (200 200) https://172.21.46.120/application/assets (200 200) https://172.21.46.120/application/ (200 200) https://172.21.46.120/application/assets (200 200) https://172.21.46.120/application/assets/lKFMrOfjVN83D (200 200) WARN-NEW: Session ID in URL Rewrite [3] x 5 https://172.21.46.120/application/disclaimer;jsessionid=D3403DE2E3AEC97B9D24208432C14E11.eRepInka2 (200 200) https://172.21.46.120/application/disclaimer;jsessionid=D3403DE2E3AEC97B9D24208432C14E11.eRepInka2 (200 200) https://172.21.46.120/application/imprint;jsessionid=D3403DE2E3AEC97B9D24208432C14E11.eRepInka2 (200 200) https://172.21.46.120/application/imprint;jsessionid=D3403DE2E3AEC97B9D24208432C14E11.eRepInka2 (200 200) https://172.21.46.120/application/login.layout.sessiontimeoutform;jsessionid=D3403DE2E3AEC97B9D24208432C14E11.eRepInka2 (302 302) WARN-NEW: Integer Overflow Error [30003] x 3 https://172.21.46.120/application/de/login.usernameform (500 500) https://172.21.46.120/application/en/login.usernameform (500 500) https://172.21.46.120/application/login.usernameform (500 500) WARN-NEW: Hidden File Found [40035] x 1 https://172.21.46.120/.svn/entries (301 Moved Permanently) WARN-NEW: Path Traversal [6] x 5 https://172.21.46.120/application/de/login.layout.sessiontimeoutform (200 200) https://172.21.46.120/application/de/requestresetpassword.layoutnoheader.sessiontimeoutform (200 200) https://172.21.46.120/application/de/requestresetpassword.passwordform (200 200) https://172.21.46.120/application/de/login.usernameform (200 200) https://172.21.46.120/application/en/requestresetpassword.passwordform (200 200) WARN-NEW: Cookie Slack Detector [90027] x 59 https://172.21.46.120/application/de/disclaimer.dialoglayout.sessiontimeoutform (302 302) https://172.21.46.120/application/de/imprint.dialoglayout.sessiontimeoutform (302 302) https://172.21.46.120/application/de/login.layout.sessiontimeoutform (302 302) https://172.21.46.120/application/de/requestresetpassword.layoutnoheader.sessiontimeoutform (302 302) https://172.21.46.120/application/de/login.usernameform (302 302) FAIL-NEW: 0 FAIL-INPROG: 0 WARN-NEW: 13 WARN-INPROG: 0 INFO: 0 IGNORE: 0 PASS: 101
------- START: 172.21.46.144 - 2022-04-21 00:05:22 Total of 16 URLs PASS: Directory Browsing [0] PASS: Vulnerable JS Library [10003] PASS: Cookie No HttpOnly Flag [10010] PASS: Cookie Without Secure Flag [10011] PASS: Incomplete or No Cache-control Header Set [10015] PASS: Cross-Domain JavaScript Source File Inclusion [10017] PASS: Content-Type Header Missing [10019] PASS: X-Frame-Options Header [10020] PASS: X-Content-Type-Options Header Missing [10021] PASS: Information Disclosure - Debug Error Messages [10023] PASS: Information Disclosure - Sensitive Information in URL [10024] PASS: Information Disclosure - Sensitive Information in HTTP Referrer Header [10025] PASS: HTTP Parameter Override [10026] PASS: Information Disclosure - Suspicious Comments [10027] PASS: Open Redirect [10028] PASS: Cookie Poisoning [10029] PASS: User Controllable Charset [10030] PASS: User Controllable HTML Element Attribute (Potential XSS) [10031] PASS: Viewstate [10032] PASS: Directory Browsing [10033] PASS: Heartbleed OpenSSL Vulnerability (Indicative) [10034] PASS: Strict-Transport-Security Header [10035] PASS: HTTP Server Response Header [10036] PASS: Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s) [10037] PASS: Content Security Policy (CSP) Header Not Set [10038] PASS: X-Backend-Server Header Information Leak [10039] PASS: Secure Pages Include Mixed Content [10040] PASS: HTTP to HTTPS Insecure Transition in Form Post [10041] PASS: HTTPS to HTTP Insecure Transition in Form Post [10042] PASS: User Controllable JavaScript Event (XSS) [10043] PASS: Big Redirect Detected (Potential Sensitive Information Leak) [10044] PASS: Source Code Disclosure - /WEB-INF folder [10045] PASS: HTTPS Content Available via HTTP [10047] PASS: Remote Code Execution - Shell Shock [10048] PASS: Retrieved from Cache [10050] PASS: Relative Path Confusion [10051] PASS: X-ChromeLogger-Data (XCOLD) Header Information Leak [10052] PASS: X-Debug-Token Information Leak [10056] PASS: Username Hash Found [10057] PASS: GET for POST [10058] PASS: X-AspNet-Version Response Header [10061] PASS: PII Disclosure [10062] PASS: Backup File Disclosure [10095] PASS: Timestamp Disclosure [10096] PASS: Hash Disclosure [10097] PASS: Cross-Domain Misconfiguration [10098] PASS: User Agent Fuzzer [10104] PASS: Weak Authentication Method [10105] PASS: HTTP Only Site [10106] PASS: Httpoxy - Proxy Header Misuse [10107] PASS: Reverse Tabnabbing [10108] PASS: Modern Web Application [10109] PASS: Private IP Disclosure [2] PASS: HTTP Parameter Pollution [20014] PASS: Heartbleed OpenSSL Vulnerability [20015] PASS: Cross-Domain Misconfiguration [20016] PASS: Source Code Disclosure - CVE-2012-1823 [20017] PASS: Remote Code Execution - CVE-2012-1823 [20018] PASS: External Redirect [20019] PASS: Session ID in URL Rewrite [3] PASS: Buffer Overflow [30001] PASS: Format String Error [30002] PASS: Integer Overflow Error [30003] PASS: CRLF Injection [40003] PASS: Parameter Tampering [40008] PASS: Server Side Include [40009] PASS: Cross Site Scripting (Reflected) [40012] PASS: Session Fixation [40013] PASS: Cross Site Scripting (Persistent) [40014] PASS: Cross Site Scripting (Persistent) - Prime [40016] PASS: Cross Site Scripting (Persistent) - Spider [40017] PASS: SQL Injection - MySQL [40019] PASS: SQL Injection - Hypersonic SQL [40020] PASS: SQL Injection - Oracle [40021] PASS: SQL Injection - PostgreSQL [40022] PASS: Possible Username Enumeration [40023] PASS: SQL Injection - SQLite [40024] PASS: Proxy Disclosure [40025] PASS: Cross Site Scripting (DOM Based) [40026] PASS: SQL Injection - MsSQL [40027] PASS: ELMAH Information Leak [40028] PASS: Trace.axd Information Leak [40029] PASS: .htaccess Information Leak [40032] PASS: .env Information Leak [40034] PASS: Source Code Disclosure - Git [41] PASS: Source Code Disclosure - SVN [42] PASS: Source Code Disclosure - File Inclusion [43] PASS: Script Active Scan Rules [50000] PASS: Script Passive Scan Rules [50001] PASS: Path Traversal [6] PASS: Remote File Inclusion [7] PASS: Insecure JSF ViewState [90001] PASS: Charset Mismatch [90011] PASS: XSLT Injection [90017] PASS: Server Side Code Injection [90019] PASS: Remote OS Command Injection [90020] PASS: XPath Injection [90021] PASS: Application Error Disclosure [90022] PASS: XML External Entity Attack [90023] PASS: Generic Padding Oracle [90024] PASS: Expression Language Injection [90025] PASS: SOAP Action Spoofing [90026] PASS: Cookie Slack Detector [90027] PASS: Insecure HTTP Method [90028] PASS: SOAP XML Injection [90029] PASS: WSDL File Detection [90030] PASS: Loosely Scoped Cookie [90033] WARN-NEW: Cookie without SameSite Attribute [10054] x 3 https://172.21.46.144/ (200 OK) https://172.21.46.144/robots.txt (200 OK) https://172.21.46.144 (200 OK) WARN-NEW: CSP: Notices [10055] x 12 https://172.21.46.144/ (200 OK) https://172.21.46.144/ (200 OK) https://172.21.46.144/robots.txt (200 OK) https://172.21.46.144/robots.txt (200 OK) https://172.21.46.144/sitemap.xml (200 OK) WARN-NEW: Absence of Anti-CSRF Tokens [10202] x 10 https://172.21.46.144/ (200 OK) https://172.21.46.144/ (200 OK) https://172.21.46.144/robots.txt (200 OK) https://172.21.46.144/robots.txt (200 OK) https://172.21.46.144/sitemap.xml (200 OK) WARN-NEW: Anti-CSRF Tokens Check [20012] x 8 https://172.21.46.144/webauth (200 OK) https://172.21.46.144 (200 OK) https://172.21.46.144/ (200 OK) https://172.21.46.144/?sd_time=1650492025 (200 OK) https://172.21.46.144/robots.txt (200 OK) WARN-NEW: SQL Injection [40018] x 6 https://172.21.46.144/webauth?Cancel (200 OK) https://172.21.46.144/webauth?Cancel (200 OK) https://172.21.46.144/webauth (200 OK) https://172.21.46.144/webauth (200 OK) https://172.21.46.144/webauth (200 OK) WARN-NEW: Hidden File Found [40035] x 1 https://172.21.46.144/.svn/entries (200 OK) WARN-NEW: Cloud Metadata Potentially Exposed [90034] x 1 https://172.21.46.144/latest/meta-data/ (200 OK) FAIL-NEW: 0 FAIL-INPROG: 0 WARN-NEW: 7 WARN-INPROG: 0 INFO: 0 IGNORE: 0 PASS: 107
Total of 103 URLs PASS: Directory Browsing [0] PASS: Vulnerable JS Library [10003] PASS: Cookie No HttpOnly Flag [10010] PASS: Cookie Without Secure Flag [10011] PASS: Incomplete or No Cache-control Header Set [10015] PASS: Content-Type Header Missing [10019] PASS: X-Frame-Options Header [10020] PASS: Information Disclosure - Debug Error Messages [10023] PASS: Information Disclosure - Sensitive Information in URL [10024] PASS: Information Disclosure - Sensitive Information in HTTP Referrer Header [10025] PASS: HTTP Parameter Override [10026] PASS: Information Disclosure - Suspicious Comments [10027] PASS: Open Redirect [10028] PASS: Cookie Poisoning [10029] PASS: User Controllable Charset [10030] PASS: User Controllable HTML Element Attribute (Potential XSS) [10031] PASS: Viewstate [10032] PASS: Directory Browsing [10033] PASS: Heartbleed OpenSSL Vulnerability (Indicative) [10034] PASS: Strict-Transport-Security Header [10035] PASS: HTTP Server Response Header [10036] PASS: Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s) [10037] PASS: X-Backend-Server Header Information Leak [10039] PASS: Secure Pages Include Mixed Content [10040] PASS: HTTP to HTTPS Insecure Transition in Form Post [10041] PASS: HTTPS to HTTP Insecure Transition in Form Post [10042] PASS: User Controllable JavaScript Event (XSS) [10043] PASS: Big Redirect Detected (Potential Sensitive Information Leak) [10044] PASS: Source Code Disclosure - /WEB-INF folder [10045] PASS: HTTPS Content Available via HTTP [10047] PASS: Remote Code Execution - Shell Shock [10048] PASS: Retrieved from Cache [10050] PASS: X-ChromeLogger-Data (XCOLD) Header Information Leak [10052] PASS: CSP [10055] PASS: X-Debug-Token Information Leak [10056] PASS: Username Hash Found [10057] PASS: GET for POST [10058] PASS: X-AspNet-Version Response Header [10061] PASS: PII Disclosure [10062] PASS: Backup File Disclosure [10095] PASS: Timestamp Disclosure [10096] PASS: Hash Disclosure [10097] PASS: Cross-Domain Misconfiguration [10098] PASS: User Agent Fuzzer [10104] PASS: Weak Authentication Method [10105] PASS: HTTP Only Site [10106] PASS: Httpoxy - Proxy Header Misuse [10107] PASS: Reverse Tabnabbing [10108] PASS: Modern Web Application [10109] PASS: Private IP Disclosure [2] PASS: HTTP Parameter Pollution [20014] PASS: Heartbleed OpenSSL Vulnerability [20015] PASS: Cross-Domain Misconfiguration [20016] PASS: Source Code Disclosure - CVE-2012-1823 [20017] PASS: Remote Code Execution - CVE-2012-1823 [20018] PASS: External Redirect [20019] PASS: Session ID in URL Rewrite [3] PASS: Buffer Overflow [30001] PASS: Format String Error [30002] PASS: Integer Overflow Error [30003] PASS: CRLF Injection [40003] PASS: Parameter Tampering [40008] PASS: Server Side Include [40009] PASS: Cross Site Scripting (Reflected) [40012] PASS: Session Fixation [40013] PASS: Cross Site Scripting (Persistent) [40014] PASS: Cross Site Scripting (Persistent) - Prime [40016] PASS: Cross Site Scripting (Persistent) - Spider [40017] PASS: SQL Injection [40018] PASS: SQL Injection - MySQL [40019] PASS: SQL Injection - Hypersonic SQL [40020] PASS: SQL Injection - Oracle [40021] PASS: SQL Injection - PostgreSQL [40022] PASS: Possible Username Enumeration [40023] PASS: SQL Injection - SQLite [40024] PASS: Cross Site Scripting (DOM Based) [40026] PASS: SQL Injection - MsSQL [40027] PASS: ELMAH Information Leak [40028] PASS: Trace.axd Information Leak [40029] PASS: .htaccess Information Leak [40032] PASS: .env Information Leak [40034] PASS: Source Code Disclosure - Git [41] PASS: Source Code Disclosure - SVN [42] PASS: Source Code Disclosure - File Inclusion [43] PASS: Script Active Scan Rules [50000] PASS: Script Passive Scan Rules [50001] PASS: Path Traversal [6] PASS: Remote File Inclusion [7] PASS: Insecure JSF ViewState [90001] PASS: Charset Mismatch [90011] PASS: XSLT Injection [90017] PASS: Server Side Code Injection [90019] PASS: Remote OS Command Injection [90020] PASS: XPath Injection [90021] PASS: Application Error Disclosure [90022] PASS: XML External Entity Attack [90023] PASS: Generic Padding Oracle [90024] PASS: Expression Language Injection [90025] PASS: SOAP Action Spoofing [90026] PASS: Insecure HTTP Method [90028] PASS: SOAP XML Injection [90029] PASS: WSDL File Detection [90030] PASS: Loosely Scoped Cookie [90033] PASS: Cloud Metadata Potentially Exposed [90034] WARN-NEW: Cross-Domain JavaScript Source File Inclusion [10017] x 12 https://172.21.46.193/ (404 Not Found) https://172.21.46.193/ (404 Not Found) https://172.21.46.193/ (404 Not Found) https://172.21.46.193/robots.txt (404 Not Found) https://172.21.46.193/robots.txt (404 Not Found) WARN-NEW: X-Content-Type-Options Header Missing [10021] x 12 https://172.21.46.193/.resources/-theme/webresources/images/icons/favicon.ico (200 OK) https://172.21.46.193/fallback/.resources/-theme/webresources/css/bootstrap.min~2021-12-16-08-18-44-000~cache.css (200 OK) https://172.21.46.193/fallback/.resources/-theme/webresources/css/content~2021-12-16-08-18-44-000~cache.css (200 OK) https://172.21.46.193/fallback/.resources/-theme/webresources/css/~2021-12-16-08-18-44-000~cache.css (200 OK) https://172.21.46.193/fallback/.resources/-theme/webresources/css/custom~2021-01-12-10-47-01-507~cache.css (200 OK) WARN-NEW: Content Security Policy (CSP) Header Not Set [10038] x 10 https://172.21.46.193/ (404 Not Found) https://172.21.46.193/robots.txt (404 Not Found) https://172.21.46.193 (404 Not Found) https://172.21.46.193/sitemap.xml (404 Not Found) https://172.21.46.193/wp/ (404 Not Found) WARN-NEW: Relative Path Confusion [10051] x 27 https://172.21.46.193/.resources/-theme/webresources/images/icons/favicon.ico (404 Not Found) https://172.21.46.193/.resources/-theme/webresources/js/collapsabe-text.js (404 Not Found) https://172.21.46.193/.resources/-theme/webresources/js/Helper.js (404 Not Found) https://172.21.46.193/.resources/-theme/webresources/js/main.js (404 Not Found) https://172.21.46.193/.resources/-theme/webresources/js/snapshot.js (404 Not Found) WARN-NEW: Cookie without SameSite Attribute [10054] x 3 https://172.21.46.193/ (404 Not Found) https://172.21.46.193/robots.txt (404 Not Found) https://172.21.46.193 (404 Not Found) WARN-NEW: Absence of Anti-CSRF Tokens [10202] x 7 https://172.21.46.193/ (404 Not Found) https://172.21.46.193/robots.txt (404 Not Found) https://172.21.46.193 (404 Not Found) https://172.21.46.193/sitemap.xml (404 Not Found) https://172.21.46.193/.resources/-theme/webresources/js/vendor/footable.js (200 OK) WARN-NEW: Anti-CSRF Tokens Check [20012] x 7 https://172.21.46.193 (404 Not Found) https://172.21.46.193/?queryString=ZAP (404 Not Found) https://172.21.46.193/ (404 Not Found) https://172.21.46.193/fallback (404 Not Found) https://172.21.46.193/robots.txt (404 Not Found) WARN-NEW: Proxy Disclosure [40025] x 48 https://172.21.46.193/.resources (200 OK) https://172.21.46.193 (404 Not Found) https://172.21.46.193/.resources/-theme (200 OK) https://172.21.46.193/.resources/-theme/webresources (200 OK) https://172.21.46.193/.resources/-theme/webresources/images (400 Bad Request) WARN-NEW: Hidden File Found [40035] x 1 https://172.21.46.193/.svn/entries (200 OK) WARN-NEW: Cookie Slack Detector [90027] x 48 https://172.21.46.193/.resources (200 OK) https://172.21.46.193 (404 Not Found) https://172.21.46.193/.resources/-theme (200 OK) https://172.21.46.193/.resources/-theme/webresources (200 OK) https://172.21.46.193/.resources/-theme/webresources/images (400 Bad Request) FAIL-NEW: 0 FAIL-INPROG: 0 WARN-NEW: 10 WARN-INPROG: 0 INFO: 0 IGNORE: 0 PASS: 104
------- START: 172.21.46.196 - 2022-04-21 01:44:30 Total of 5 URLs PASS: Directory Browsing [0] PASS: Vulnerable JS Library [10003] PASS: Cookie No HttpOnly Flag [10010] PASS: Cross-Domain JavaScript Source File Inclusion [10017] PASS: Content-Type Header Missing [10019] PASS: Information Disclosure - Debug Error Messages [10023] PASS: Information Disclosure - Sensitive Information in URL [10024] PASS: Information Disclosure - Sensitive Information in HTTP Referrer Header [10025] PASS: HTTP Parameter Override [10026] PASS: Information Disclosure - Suspicious Comments [10027] PASS: Open Redirect [10028] PASS: Cookie Poisoning [10029] PASS: User Controllable Charset [10030] PASS: User Controllable HTML Element Attribute (Potential XSS) [10031] PASS: Viewstate [10032] PASS: Directory Browsing [10033] PASS: Heartbleed OpenSSL Vulnerability (Indicative) [10034] PASS: HTTP Server Response Header [10036] PASS: X-Backend-Server Header Information Leak [10039] PASS: Secure Pages Include Mixed Content [10040] PASS: HTTP to HTTPS Insecure Transition in Form Post [10041] PASS: HTTPS to HTTP Insecure Transition in Form Post [10042] PASS: User Controllable JavaScript Event (XSS) [10043] PASS: Big Redirect Detected (Potential Sensitive Information Leak) [10044] PASS: Source Code Disclosure - /WEB-INF folder [10045] PASS: HTTPS Content Available via HTTP [10047] PASS: Remote Code Execution - Shell Shock [10048] PASS: Retrieved from Cache [10050] PASS: Relative Path Confusion [10051] PASS: X-ChromeLogger-Data (XCOLD) Header Information Leak [10052] PASS: CSP [10055] PASS: X-Debug-Token Information Leak [10056] PASS: Username Hash Found [10057] PASS: GET for POST [10058] PASS: X-AspNet-Version Response Header [10061] PASS: PII Disclosure [10062] PASS: Backup File Disclosure [10095] PASS: Timestamp Disclosure [10096] PASS: Hash Disclosure [10097] PASS: Cross-Domain Misconfiguration [10098] PASS: User Agent Fuzzer [10104] PASS: Weak Authentication Method [10105] PASS: HTTP Only Site [10106] PASS: Httpoxy - Proxy Header Misuse [10107] PASS: Reverse Tabnabbing [10108] PASS: Modern Web Application [10109] PASS: Absence of Anti-CSRF Tokens [10202] PASS: Private IP Disclosure [2] PASS: Anti-CSRF Tokens Check [20012] PASS: HTTP Parameter Pollution [20014] PASS: Heartbleed OpenSSL Vulnerability [20015] PASS: Cross-Domain Misconfiguration [20016] PASS: Source Code Disclosure - CVE-2012-1823 [20017] PASS: Remote Code Execution - CVE-2012-1823 [20018] PASS: External Redirect [20019] PASS: Session ID in URL Rewrite [3] PASS: Buffer Overflow [30001] PASS: Format String Error [30002] PASS: Integer Overflow Error [30003] PASS: CRLF Injection [40003] PASS: Parameter Tampering [40008] PASS: Server Side Include [40009] PASS: Cross Site Scripting (Reflected) [40012] PASS: Session Fixation [40013] PASS: Cross Site Scripting (Persistent) [40014] PASS: Cross Site Scripting (Persistent) - Prime [40016] PASS: Cross Site Scripting (Persistent) - Spider [40017] PASS: SQL Injection [40018] PASS: SQL Injection - MySQL [40019] PASS: SQL Injection - Hypersonic SQL [40020] PASS: SQL Injection - Oracle [40021] PASS: SQL Injection - PostgreSQL [40022] PASS: Possible Username Enumeration [40023] PASS: SQL Injection - SQLite [40024] PASS: Proxy Disclosure [40025] PASS: Cross Site Scripting (DOM Based) [40026] PASS: SQL Injection - MsSQL [40027] PASS: ELMAH Information Leak [40028] PASS: Trace.axd Information Leak [40029] PASS: .htaccess Information Leak [40032] PASS: .env Information Leak [40034] PASS: Hidden File Finder [40035] PASS: Source Code Disclosure - Git [41] PASS: Source Code Disclosure - SVN [42] PASS: Source Code Disclosure - File Inclusion [43] PASS: Script Active Scan Rules [50000] PASS: Script Passive Scan Rules [50001] PASS: Path Traversal [6] PASS: Remote File Inclusion [7] PASS: Insecure JSF ViewState [90001] PASS: Charset Mismatch [90011] PASS: XSLT Injection [90017] PASS: Server Side Code Injection [90019] PASS: Remote OS Command Injection [90020] PASS: XPath Injection [90021] PASS: Application Error Disclosure [90022] PASS: XML External Entity Attack [90023] PASS: Generic Padding Oracle [90024] PASS: Expression Language Injection [90025] PASS: SOAP Action Spoofing [90026] PASS: Insecure HTTP Method [90028] PASS: SOAP XML Injection [90029] PASS: WSDL File Detection [90030] PASS: Loosely Scoped Cookie [90033] PASS: Cloud Metadata Potentially Exposed [90034] WARN-NEW: Cookie Without Secure Flag [10011] x 6 https://172.21.46.196/shop (200 OK) https://172.21.46.196/shop (200 OK) https://172.21.46.196/robots.txt (404 Not Found) https://172.21.46.196/robots.txt (404 Not Found) https://172.21.46.196/sitemap.xml (404 Not Found) WARN-NEW: Incomplete or No Cache-control Header Set [10015] x 2 https://172.21.46.196/shop (200 OK) https://172.21.46.196/shop (200 OK) WARN-NEW: X-Frame-Options Header Not Set [10020] x 1 https://172.21.46.196/shop (200 OK) WARN-NEW: X-Content-Type-Options Header Missing [10021] x 1 https://172.21.46.196/shop (200 OK) WARN-NEW: Strict-Transport-Security Header Not Set [10035] x 3 https://172.21.46.196/shop (200 OK) https://172.21.46.196/robots.txt (404 Not Found) https://172.21.46.196/sitemap.xml (404 Not Found) WARN-NEW: Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s) [10037] x 3 https://172.21.46.196/shop (200 OK) https://172.21.46.196/robots.txt (404 Not Found) https://172.21.46.196/sitemap.xml (404 Not Found) WARN-NEW: Content Security Policy (CSP) Header Not Set [10038] x 3 https://172.21.46.196/shop (200 OK) https://172.21.46.196/robots.txt (404 Not Found) https://172.21.46.196/sitemap.xml (404 Not Found) WARN-NEW: Cookie without SameSite Attribute [10054] x 6 https://172.21.46.196/shop (200 OK) https://172.21.46.196/shop (200 OK) https://172.21.46.196/robots.txt (404 Not Found) https://172.21.46.196/robots.txt (404 Not Found) https://172.21.46.196/sitemap.xml (404 Not Found) WARN-NEW: Cookie Slack Detector [90027] x 3 https://172.21.46.196/robots.txt (404 Not Found) https://172.21.46.196/shop (200 OK) https://172.21.46.196/sitemap.xml (404 Not Found) FAIL-NEW: 0 FAIL-INPROG: 0 WARN-NEW: 9 WARN-INPROG: 0 INFO: 0 IGNORE: 0 PASS: 105
------- START: 172.21.46.30 - 2022-04-20 01:40:18 Total of 60 URLs PASS: Directory Browsing [0] PASS: Cookie No HttpOnly Flag [10010] PASS: Cookie Without Secure Flag [10011] PASS: Cross-Domain JavaScript Source File Inclusion [10017] PASS: Content-Type Header Missing [10019] PASS: X-Frame-Options Header [10020] PASS: Information Disclosure - Debug Error Messages [10023] PASS: Information Disclosure - Sensitive Information in URL [10024] PASS: Information Disclosure - Sensitive Information in HTTP Referrer Header [10025] PASS: HTTP Parameter Override [10026] PASS: Information Disclosure - Suspicious Comments [10027] PASS: Open Redirect [10028] PASS: Cookie Poisoning [10029] PASS: User Controllable Charset [10030] PASS: User Controllable HTML Element Attribute (Potential XSS) [10031] PASS: Viewstate [10032] PASS: Directory Browsing [10033] PASS: Heartbleed OpenSSL Vulnerability (Indicative) [10034] PASS: HTTP Server Response Header [10036] PASS: Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s) [10037] PASS: Content Security Policy (CSP) Header Not Set [10038] PASS: X-Backend-Server Header Information Leak [10039] PASS: Secure Pages Include Mixed Content [10040] PASS: HTTP to HTTPS Insecure Transition in Form Post [10041] PASS: HTTPS to HTTP Insecure Transition in Form Post [10042] PASS: User Controllable JavaScript Event (XSS) [10043] PASS: Big Redirect Detected (Potential Sensitive Information Leak) [10044] PASS: Source Code Disclosure - /WEB-INF folder [10045] PASS: HTTPS Content Available via HTTP [10047] PASS: Remote Code Execution - Shell Shock [10048] PASS: Retrieved from Cache [10050] PASS: Relative Path Confusion [10051] PASS: X-ChromeLogger-Data (XCOLD) Header Information Leak [10052] PASS: Cookie without SameSite Attribute [10054] PASS: X-Debug-Token Information Leak [10056] PASS: Username Hash Found [10057] PASS: GET for POST [10058] PASS: X-AspNet-Version Response Header [10061] PASS: PII Disclosure [10062] PASS: Backup File Disclosure [10095] PASS: Timestamp Disclosure [10096] PASS: Hash Disclosure [10097] PASS: Cross-Domain Misconfiguration [10098] PASS: User Agent Fuzzer [10104] PASS: Weak Authentication Method [10105] PASS: HTTP Only Site [10106] PASS: Httpoxy - Proxy Header Misuse [10107] PASS: Reverse Tabnabbing [10108] PASS: Modern Web Application [10109] PASS: Private IP Disclosure [2] PASS: Anti-CSRF Tokens Check [20012] PASS: HTTP Parameter Pollution [20014] PASS: Heartbleed OpenSSL Vulnerability [20015] PASS: Cross-Domain Misconfiguration [20016] PASS: Source Code Disclosure - CVE-2012-1823 [20017] PASS: Remote Code Execution - CVE-2012-1823 [20018] PASS: External Redirect [20019] PASS: Session ID in URL Rewrite [3] PASS: Buffer Overflow [30001] PASS: Format String Error [30002] PASS: Integer Overflow Error [30003] PASS: CRLF Injection [40003] PASS: Parameter Tampering [40008] PASS: Server Side Include [40009] PASS: Cross Site Scripting (Reflected) [40012] PASS: Session Fixation [40013] PASS: Cross Site Scripting (Persistent) [40014] PASS: Cross Site Scripting (Persistent) - Prime [40016] PASS: Cross Site Scripting (Persistent) - Spider [40017] PASS: SQL Injection [40018] PASS: SQL Injection - MySQL [40019] PASS: SQL Injection - Hypersonic SQL [40020] PASS: SQL Injection - Oracle [40021] PASS: SQL Injection - PostgreSQL [40022] PASS: Possible Username Enumeration [40023] PASS: SQL Injection - SQLite [40024] PASS: Cross Site Scripting (DOM Based) [40026] PASS: SQL Injection - MsSQL [40027] PASS: ELMAH Information Leak [40028] PASS: Trace.axd Information Leak [40029] PASS: .htaccess Information Leak [40032] PASS: .env Information Leak [40034] PASS: Hidden File Finder [40035] PASS: Source Code Disclosure - Git [41] PASS: Source Code Disclosure - SVN [42] PASS: Source Code Disclosure - File Inclusion [43] PASS: Script Active Scan Rules [50000] PASS: Script Passive Scan Rules [50001] PASS: Path Traversal [6] PASS: Remote File Inclusion [7] PASS: Insecure JSF ViewState [90001] PASS: Charset Mismatch [90011] PASS: XSLT Injection [90017] PASS: Server Side Code Injection [90019] PASS: Remote OS Command Injection [90020] PASS: XPath Injection [90021] PASS: Application Error Disclosure [90022] PASS: XML External Entity Attack [90023] PASS: Generic Padding Oracle [90024] PASS: Expression Language Injection [90025] PASS: SOAP Action Spoofing [90026] PASS: Cookie Slack Detector [90027] PASS: Insecure HTTP Method [90028] PASS: SOAP XML Injection [90029] PASS: WSDL File Detection [90030] PASS: Loosely Scoped Cookie [90033] WARN-NEW: Vulnerable JS Library [10003] x 1 https://172.21.46.30/js/dependencies/angular.min.js (200 OK) WARN-NEW: Incomplete or No Cache-control Header Set [10015] x 3 https://172.21.46.30/ (200 OK) https://172.21.46.30/robots.txt (200 OK) https://172.21.46.30 (200 OK) WARN-NEW: X-Content-Type-Options Header Missing [10021] x 11 https://172.21.46.30/ (200 OK) https://172.21.46.30/robots.txt (200 OK) https://172.21.46.30 (200 OK) https://172.21.46.30/styles/common.css (200 OK) https://172.21.46.30/styles/icons.css (200 OK) WARN-NEW: Strict-Transport-Security Header Not Set [10035] x 12 https://172.21.46.30/robots.txt (200 OK) https://172.21.46.30/styles/common.css (200 OK) https://172.21.46.30/styles/icons.css (200 OK) https://172.21.46.30/styles/sweet-alert.css (200 OK) https://172.21.46.30/styles/loading-bar.min.css (200 OK) WARN-NEW: CSP: Wildcard Directive [10055] x 6 https://172.21.46.30/ (200 OK) https://172.21.46.30/ (200 OK) https://172.21.46.30/ (200 OK) https://172.21.46.30 (200 OK) https://172.21.46.30 (200 OK) WARN-NEW: Absence of Anti-CSRF Tokens [10202] x 2 https://172.21.46.30/styles/angular-material.min.css (200 OK) https://172.21.46.30/styles/angular-material.min.css (200 OK) WARN-NEW: Proxy Disclosure [40025] x 55 https://172.21.46.30 (200 OK) https://172.21.46.30/js (303 See Other) https://172.21.46.30/favicon.ico (200 OK) https://172.21.46.30/js/app.directives.js (200 OK) https://172.21.46.30/js/app.js (200 OK) WARN-NEW: Cloud Metadata Potentially Exposed [90034] x 1 https://172.21.46.30/latest/meta-data/ (200 OK) FAIL-NEW: 0 FAIL-INPROG: 0 WARN-NEW: 8 WARN-INPROG: 0 INFO: 0 IGNORE: 0 PASS: 106
------- START: 172.21.46.31 - 2022-04-20 01:50:30 Total of 6 URLs PASS: Directory Browsing [0] PASS: Vulnerable JS Library [10003] PASS: Cookie No HttpOnly Flag [10010] PASS: Cookie Without Secure Flag [10011] PASS: Incomplete or No Cache-control Header Set [10015] PASS: Cross-Domain JavaScript Source File Inclusion [10017] PASS: Content-Type Header Missing [10019] PASS: X-Frame-Options Header [10020] PASS: X-Content-Type-Options Header Missing [10021] PASS: Information Disclosure - Debug Error Messages [10023] PASS: Information Disclosure - Sensitive Information in URL [10024] PASS: Information Disclosure - Sensitive Information in HTTP Referrer Header [10025] PASS: HTTP Parameter Override [10026] PASS: Information Disclosure - Suspicious Comments [10027] PASS: Open Redirect [10028] PASS: Cookie Poisoning [10029] PASS: User Controllable Charset [10030] PASS: User Controllable HTML Element Attribute (Potential XSS) [10031] PASS: Viewstate [10032] PASS: Directory Browsing [10033] PASS: Heartbleed OpenSSL Vulnerability (Indicative) [10034] PASS: HTTP Server Response Header [10036] PASS: Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s) [10037] PASS: Content Security Policy (CSP) Header Not Set [10038] PASS: X-Backend-Server Header Information Leak [10039] PASS: Secure Pages Include Mixed Content [10040] PASS: HTTP to HTTPS Insecure Transition in Form Post [10041] PASS: HTTPS to HTTP Insecure Transition in Form Post [10042] PASS: User Controllable JavaScript Event (XSS) [10043] PASS: Big Redirect Detected (Potential Sensitive Information Leak) [10044] PASS: Source Code Disclosure - /WEB-INF folder [10045] PASS: HTTPS Content Available via HTTP [10047] PASS: Remote Code Execution - Shell Shock [10048] PASS: Retrieved from Cache [10050] PASS: Relative Path Confusion [10051] PASS: X-ChromeLogger-Data (XCOLD) Header Information Leak [10052] PASS: Cookie without SameSite Attribute [10054] PASS: CSP [10055] PASS: X-Debug-Token Information Leak [10056] PASS: Username Hash Found [10057] PASS: GET for POST [10058] PASS: X-AspNet-Version Response Header [10061] PASS: PII Disclosure [10062] PASS: Backup File Disclosure [10095] PASS: Timestamp Disclosure [10096] PASS: Hash Disclosure [10097] PASS: Cross-Domain Misconfiguration [10098] PASS: User Agent Fuzzer [10104] PASS: Weak Authentication Method [10105] PASS: HTTP Only Site [10106] PASS: Httpoxy - Proxy Header Misuse [10107] PASS: Reverse Tabnabbing [10108] PASS: Modern Web Application [10109] PASS: Absence of Anti-CSRF Tokens [10202] PASS: Private IP Disclosure [2] PASS: Anti-CSRF Tokens Check [20012] PASS: HTTP Parameter Pollution [20014] PASS: Heartbleed OpenSSL Vulnerability [20015] PASS: Cross-Domain Misconfiguration [20016] PASS: Source Code Disclosure - CVE-2012-1823 [20017] PASS: Remote Code Execution - CVE-2012-1823 [20018] PASS: External Redirect [20019] PASS: Session ID in URL Rewrite [3] PASS: Buffer Overflow [30001] PASS: Format String Error [30002] PASS: Integer Overflow Error [30003] PASS: CRLF Injection [40003] PASS: Parameter Tampering [40008] PASS: Server Side Include [40009] PASS: Cross Site Scripting (Reflected) [40012] PASS: Session Fixation [40013] PASS: Cross Site Scripting (Persistent) [40014] PASS: Cross Site Scripting (Persistent) - Prime [40016] PASS: Cross Site Scripting (Persistent) - Spider [40017] PASS: SQL Injection [40018] PASS: SQL Injection - MySQL [40019] PASS: SQL Injection - Hypersonic SQL [40020] PASS: SQL Injection - Oracle [40021] PASS: SQL Injection - PostgreSQL [40022] PASS: Possible Username Enumeration [40023] PASS: SQL Injection - SQLite [40024] PASS: Proxy Disclosure [40025] PASS: Cross Site Scripting (DOM Based) [40026] PASS: SQL Injection - MsSQL [40027] PASS: ELMAH Information Leak [40028] PASS: Trace.axd Information Leak [40029] PASS: .htaccess Information Leak [40032] PASS: .env Information Leak [40034] PASS: Hidden File Finder [40035] PASS: Source Code Disclosure - Git [41] PASS: Source Code Disclosure - SVN [42] PASS: Source Code Disclosure - File Inclusion [43] PASS: Script Active Scan Rules [50000] PASS: Script Passive Scan Rules [50001] PASS: Path Traversal [6] PASS: Remote File Inclusion [7] PASS: Insecure JSF ViewState [90001] PASS: Charset Mismatch [90011] PASS: XSLT Injection [90017] PASS: Server Side Code Injection [90019] PASS: Remote OS Command Injection [90020] PASS: XPath Injection [90021] PASS: Application Error Disclosure [90022] PASS: XML External Entity Attack [90023] PASS: Generic Padding Oracle [90024] PASS: Expression Language Injection [90025] PASS: SOAP Action Spoofing [90026] PASS: Cookie Slack Detector [90027] PASS: Insecure HTTP Method [90028] PASS: SOAP XML Injection [90029] PASS: WSDL File Detection [90030] PASS: Loosely Scoped Cookie [90033] PASS: Cloud Metadata Potentially Exposed [90034] WARN-NEW: Strict-Transport-Security Header Not Set [10035] x 4 https://172.21.46.31/ (302 Found) https://172.21.46.31 (302 Found) https://172.21.46.31/robots.txt (302 Found) https://172.21.46.31/sitemap.xml (302 Found) FAIL-NEW: 0 FAIL-INPROG: 0 WARN-NEW: 1 WARN-INPROG: 0 INFO: 0 IGNORE: 0 PASS: 113
Scan subtype: | |
Origin IP: | |
Details: | |
Command: |
|
Version: | (official web site) |
Output: |
ERROR:wafw00f:Something went wrong HTTPSConnectionPool(host='wp-info.ciproc.de', port=443): Read timed out. (read timeout=7) ERROR:wafw00f:Something went wrong HTTPSConnectionPool(host='wp-info.ciproc.de', port=443): Read timed out. (read timeout=7) ERROR:wafw00f:Something went wrong Exceeded 30 redirects. ------- START: 172.21.46.120:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.120:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.144:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.144:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.167:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.167:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.183:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.183:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.193:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.193:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.196:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.196:443 [+] The site https://172.21.46.196:443 is behind Barracuda (Barracuda Networks) WAF. [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.248:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.248:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.249:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.249:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.250:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.250:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.251:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.251:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.252:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.252:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.30:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.30:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.31:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.31:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.32:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.32:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.36:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.36:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.37:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.37:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.38:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.38:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.39:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.39:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.40:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.40:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.42:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.42:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.45:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.45:443 [+] The site https://172.21.46.45:443 is behind Barracuda (Barracuda Networks) WAF. [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.48:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.48:443 [+] The site https://172.21.46.48:443 is behind Barracuda (Barracuda Networks) WAF. [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.51:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.51:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.54:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.54:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.57:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.57:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.58:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.58:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.59:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.59:443 [+] The site https://172.21.46.59:443 is behind Barracuda (Barracuda Networks) WAF. [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.60:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.60:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.68:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.68:443 [+] Generic Detection results: [*] The site https://172.21.46.68:443 seems to be behind a WAF or some sort of security solution [~] Reason: The server returns a different response code when an attack string is used. Normal response code is "200", while the response code to cross-site scripting attack is "500" [~] Number of requests: 5 ------- START: 172.21.46.69:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.69:443 [+] Generic Detection results: [*] The site https://172.21.46.69:443 seems to be behind a WAF or some sort of security solution [~] Reason: Blocking is being done at connection/packet level. [~] Number of requests: 4 ------- START: 172.21.46.77:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.77:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.47.108:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.47.108:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.47.132:8443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.47.132:8443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.47.133:8443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.47.133:8443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: alt.ciproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://alt.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: docs.ciproc.de:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://docs.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: shop.ciproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://shop.ciproc.de:443 [+] The site https://shop.ciproc.de:443 is behind Barracuda (Barracuda Networks) WAF. [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: shop.voiproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://shop.voiproc.de:443 [+] The site https://shop.voiproc.de:443 is behind Barracuda (Barracuda Networks) WAF. [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: intern.ciproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://intern.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: prod.ciproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://prod.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: services.ciproc.de:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://services.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: jobs.ciproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://jobs.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: keys.ciproc.de:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://keys.ciproc.de:443 [+] Generic Detection results: [*] The site https://keys.ciproc.de:443 seems to be behind a WAF or some sort of security solution [~] Reason: The server returns a different response code when an attack string is used. Normal response code is "200", while the response code to cross-site scripting attack is "500" [~] Number of requests: 5 ------- START: keys.voiproc.com:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://keys.voiproc.com:443 [+] Generic Detection results: [*] The site https://keys.voiproc.com:443 seems to be behind a WAF or some sort of security solution [~] Reason: The server returns a different response code when an attack string is used. Normal response code is "200", while the response code to cross-site scripting attack is "500" [~] Number of requests: 5 ------- START: login.voiproc.com:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://login.voiproc.com:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: lu.ciproc.de:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://lu.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: lu.voiproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://lu.voiproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: mailgw01.ciproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://mailgw01.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: mailgw02.ciproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://mailgw02.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: mailgw03.ciproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://mailgw03.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: mailgw04.ciproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://mailgw04.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: post.voiproc.com:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://post.voiproc.com:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: post.eiproc.de:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://post.eiproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: multiweb.ciproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://multiweb.ciproc.de:443 [+] The site https://multiweb.ciproc.de:443 is behind Barracuda (Barracuda Networks) WAF. [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: webportal.ciproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://webportal.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: multiweb.siproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://multiweb.siproc.de:443 [+] The site https://multiweb.siproc.de:443 is behind Barracuda (Barracuda Networks) WAF. [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: logs.ciproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://logs.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: logs.voiproc.de:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://logs.voiproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: research.ciproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://research.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: mail.ciproc.de:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://mail.ciproc.de:443 [+] Generic Detection results: [*] The site https://mail.ciproc.de:443 seems to be behind a WAF or some sort of security solution [~] Reason: The server returns a different response code when an attack string is used. Normal response code is "200", while the response code to cross-site scripting attack is "500" [~] Number of requests: 5 ------- START: post.ciproc.de:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://post.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: rznet.ciproc.de:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://rznet.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: rznet-inte.ciproc.de:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://rznet-inte.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: wp-info.ciproc.de:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://wp-info.ciproc.de:443 [+] Generic Detection results: [*] The site https://wp-info.ciproc.de:443 seems to be behind a WAF or some sort of security solution [~] Reason: Blocking is being done at connection/packet level. [~] Number of requests: 5 ------- START: www.ciproc.com:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://www.ciproc.com:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: www.ciproc.net:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://www.ciproc.net:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: www.voiproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://www.voiproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: www.voiproc.com:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://www.voiproc.com:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: www.ciproc.com:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://www.ciproc.com:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: www..net:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://www..net:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: www..net:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://www..net:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7
ERROR:wafw00f:Something went wrong HTTPSConnectionPool(host='172.21.46.57', port=443): Read timed out. (read timeout=7) ERROR:wafw00f:Site 172.21.46.57 appears to be down ERROR:wafw00f:Something went wrong HTTPSConnectionPool(host='services.ciproc.de', port=443): Read timed out. (read timeout=7) ERROR:wafw00f:Site services.ciproc.de appears to be down ERROR:wafw00f:Something went wrong HTTPSConnectionPool(host='post.ciproc.de', port=443): Read timed out. (read timeout=7) ERROR:wafw00f:Site post.ciproc.de appears to be down ERROR:wafw00f:Something went wrong HTTPSConnectionPool(host='wp-info.ciproc.de', port=443): Read timed out. (read timeout=7) ERROR:wafw00f:Something went wrong HTTPSConnectionPool(host='wp-info.ciproc.de', port=443): Read timed out. (read timeout=7) ERROR:wafw00f:Something went wrong Exceeded 30 redirects. ------- START: 172.21.46.120:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.120:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.144:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.144:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.167:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.167:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.183:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.183:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.193:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.193:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.196:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.196:443 [+] The site https://172.21.46.196:443 is behind Barracuda (Barracuda Networks) WAF. [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.248:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.248:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.249:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.249:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.250:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.250:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.251:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.251:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.252:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.252:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.30:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.30:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.31:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.31:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.32:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.32:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.36:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.36:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.37:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.37:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.38:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.38:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.39:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.39:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.40:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.40:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.42:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.42:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.45:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.45:443 [+] The site https://172.21.46.45:443 is behind Barracuda (Barracuda Networks) WAF. [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.48:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.48:443 [+] The site https://172.21.46.48:443 is behind Barracuda (Barracuda Networks) WAF. [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.51:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.51:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.54:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.54:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.57:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.57:443 ------- START: 172.21.46.58:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.58:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.59:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.59:443 [+] The site https://172.21.46.59:443 is behind Barracuda (Barracuda Networks) WAF. [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.60:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.60:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.46.68:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.68:443 [+] Generic Detection results: [*] The site https://172.21.46.68:443 seems to be behind a WAF or some sort of security solution [~] Reason: The server returns a different response code when an attack string is used. Normal response code is "200", while the response code to cross-site scripting attack is "500" [~] Number of requests: 5 ------- START: 172.21.46.69:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.69:443 [+] Generic Detection results: [*] The site https://172.21.46.69:443 seems to be behind a WAF or some sort of security solution [~] Reason: Blocking is being done at connection/packet level. [~] Number of requests: 4 ------- START: 172.21.46.77:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.46.77:443 [+] Generic Detection results: [*] The site https://172.21.46.77:443 seems to be behind a WAF or some sort of security solution [~] Reason: The server returns a different response code when an attack string is used. Normal response code is "200", while the response code to cross-site scripting attack is "404" [~] Number of requests: 5 ------- START: 172.21.47.108:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.47.108:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.47.132:8443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.47.132:8443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: 172.21.47.133:8443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://172.21.47.133:8443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: alt.ciproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://alt.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: docs.ciproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://docs.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: shop.ciproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://shop.ciproc.de:443 [+] The site https://shop.ciproc.de:443 is behind Barracuda (Barracuda Networks) WAF. [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: shop.voiproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://shop.voiproc.de:443 [+] The site https://shop.voiproc.de:443 is behind Barracuda (Barracuda Networks) WAF. [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: intern.ciproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://intern.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: prod.ciproc.de:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://prod.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: services.ciproc.de:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://services.ciproc.de:443 ------- START: jobs.ciproc.de:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://jobs.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: keys.ciproc.de:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://keys.ciproc.de:443 [+] Generic Detection results: [*] The site https://keys.ciproc.de:443 seems to be behind a WAF or some sort of security solution [~] Reason: The server returns a different response code when an attack string is used. Normal response code is "200", while the response code to cross-site scripting attack is "500" [~] Number of requests: 5 ------- START: keys.voiproc.com:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://keys.voiproc.com:443 [+] Generic Detection results: [*] The site https://keys.voiproc.com:443 seems to be behind a WAF or some sort of security solution [~] Reason: The server returns a different response code when an attack string is used. Normal response code is "200", while the response code to cross-site scripting attack is "500" [~] Number of requests: 5 ------- START: login.voiproc.com:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://login.voiproc.com:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: lu.ciproc.de:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://lu.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: lu.voiproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://lu.voiproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: mailgw01.ciproc.de:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://mailgw01.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: mailgw02.ciproc.de:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://mailgw02.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: mailgw03.ciproc.de:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://mailgw03.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: mailgw04.ciproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://mailgw04.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: post.voiproc.com:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://post.voiproc.com:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: post.eiproc.de:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://post.eiproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: multiweb.ciproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://multiweb.ciproc.de:443 [+] The site https://multiweb.ciproc.de:443 is behind Barracuda (Barracuda Networks) WAF. [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: webportal.ciproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://webportal.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: multiweb.siproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://multiweb.siproc.de:443 [+] The site https://multiweb.siproc.de:443 is behind Barracuda (Barracuda Networks) WAF. [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: logs.ciproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://logs.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: logs.voiproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://logs.voiproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: research.ciproc.de:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://research.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: mail.ciproc.de:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://mail.ciproc.de:443 [+] Generic Detection results: [*] The site https://mail.ciproc.de:443 seems to be behind a WAF or some sort of security solution [~] Reason: The server returns a different response code when an attack string is used. Normal response code is "200", while the response code to cross-site scripting attack is "500" [~] Number of requests: 5 ------- START: post.ciproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://post.ciproc.de:443 ------- START: rznet.ciproc.de:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://rznet.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: rznet-inte.ciproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://rznet-inte.ciproc.de:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: wp-info.ciproc.de:443 ______ / \ ( Woof! ) \ ____/ ) ,, ) (_ .-. - _______ ( |__| ()``; |==|_______) .)|__| / (' /|\ ( |__| ( / ) / | \ . |__| \(_)_)) / | \ |__| ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://wp-info.ciproc.de:443 [+] Generic Detection results: [*] The site https://wp-info.ciproc.de:443 seems to be behind a WAF or some sort of security solution [~] Reason: Blocking is being done at connection/packet level. [~] Number of requests: 5 ------- START: www.ciproc.com:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://www.ciproc.com:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: www.ciproc.net:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://www.ciproc.net:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: www.voiproc.de:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://www.voiproc.de:443 [+] Generic Detection results: [*] The site https://www.voiproc.de:443 seems to be behind a WAF or some sort of security solution [~] Reason: The server returns a different response code when an attack string is used. Normal response code is "200", while the response code to cross-site scripting attack is "404" [~] Number of requests: 5 ------- START: www.voiproc.com:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://www.voiproc.com:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: www.ciproc.com:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://www.ciproc.com:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: www..net:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://www..net:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7 ------- START: www..net:443 ______ / \ ( W00f! ) \ ____/ ,, __ 404 Hack Not Found |`-.__ / / __ __ /" _/ /_/ \ \ / / *===* / \ \_/ / 405 Not Allowed / )__// \ / /| / /---` 403 Forbidden \/` \ | / _ \ `\ /_\_ 502 Bad Gateway / / \ \ 500 Internal Error `_____``-` /_/ \_\ ~ WAFW00F : v2.1.0 ~ The Web Application Firewall Fingerprinting Toolkit [*] Checking https://www..net:443 [+] Generic Detection results: [-] No WAF detected by the generic detection [~] Number of requests: 7
Scans were carried out using Nessus Professional to identify security risks, exposures, and vulnerabilities. Details of the previous and current Nessus scans are summarized in the following table:
Previous scan | Current scan | |
---|---|---|
Scan started: | 2022-03-18 10:31:18 | 2022-03-26 22:00:06 |
Scan completed: | 2022-03-18 11:48:22 | 2022-03-26 23:19:31 |
IP ranges: |
|
|
Scanned from: |
|
|
Notes:
- The findings described in this report are valid for the time of testing only.
- All scans were performed from systems within the ciproc gmbh network.
- No denial of service attacks and no tests for vulnerabilities that could crash the targetted systems were undertaken, nor were any attempts made to break into the targetted systems. If you would like us to perform denial of service tests and/or tests that may crash your systems, please contact us.
One-line summary:
Changes were found since the previous port scan.
Details:
172.21.0.2 (Hosts) |
||||||||||||||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||||||||||||||
Scan completed: | N/A | 2022-03-24 01:53:34 | ||||||||||||||||||||||||||||||||
Ports detected: | N/A |
|
172.21.0.4 (Hosts) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-24 01:53:56 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.0.9 (Hosts) |
||||||||||
NMAP Findings | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||
Scan completed: | N/A | 2022-03-24 01:44:06 | ||||||||
Ports detected: | N/A |
|
172.21.0.10 (Hosts) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-24 01:47:12 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.0.15 (Hosts) |
||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||
Scan completed: | N/A | 2022-03-24 01:58:36 | ||||||||||||||||||||
Ports detected: | N/A |
|
172.21.0.16 (Hosts) |
||||||||||||||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||||||||||||||
Scan completed: | N/A | 2022-03-24 01:58:08 | ||||||||||||||||||||||||||||||||
Ports detected: | N/A |
|
172.21.0.23 (Hosts) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-24 02:08:58 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.0.24 (Hosts) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-24 01:58:08 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.0.25 (Hosts) |
||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||
Scan completed: | N/A | 2022-03-24 02:01:25 | ||||||||||||||||||||
Ports detected: | N/A |
|
172.21.0.101 (Hosts) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-24 01:44:49 | ||||||||||||
Ports detected: | N/A |
|
172.21.0.250 (Hosts) |
||||||||||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||||||||||
Scan completed: | N/A | 2022-03-24 01:42:47 | ||||||||||||||||||||||||||||
Ports detected: | N/A |
|
172.21.1.1 (Gateways) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-25 00:31:02 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.1.11 (Gateways) |
||
NMAP Findings | ||
---|---|---|
Previous scan | Current scan | |
Scan completed: | N/A | 2022-03-25 04:00:32 |
Ports detected: | N/A | None |
172.21.1.13 (Gateways) |
||
NMAP Findings | ||
---|---|---|
Previous scan | Current scan | |
Scan completed: | N/A | 2022-03-25 05:04:16 |
Ports detected: | N/A | None |
172.21.1.101 (Gateways) |
||||||||||
NMAP Findings | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||
Scan completed: | N/A | 2022-03-23 12:48:54 | ||||||||
Ports detected: | N/A |
|
172.21.12.1 (VulnLIB) |
||
NMAP Findings | ||
---|---|---|
Previous scan | Current scan | |
Scan completed: | N/A | 2022-03-23 12:59:22 |
Ports detected: | N/A | None |
172.21.12.21 (VulnLIB) |
||
NMAP Findings | ||
---|---|---|
Previous scan | Current scan | |
Scan completed: | N/A | 2022-03-23 12:59:00 |
Ports detected: | N/A | None |
172.21.17.11 (VulnLIB) |
||
NMAP Findings | ||
---|---|---|
Previous scan | Current scan | |
Scan completed: | N/A | 2022-03-23 12:26:54 |
Ports detected: | N/A | None |
172.21.17.12 (VulnLIB) |
||
NMAP Findings | ||
---|---|---|
Previous scan | Current scan | |
Scan completed: | N/A | 2022-03-23 12:45:22 |
Ports detected: | N/A | None |
172.21.17.13 (VulnLIB) |
||
NMAP Findings | ||
---|---|---|
Previous scan | Current scan | |
Scan completed: | N/A | 2022-03-23 13:08:07 |
Ports detected: | N/A | None |
172.21.17.14 (VulnLIB) |
||
NMAP Findings | ||
---|---|---|
Previous scan | Current scan | |
Scan completed: | N/A | 2022-03-23 13:09:28 |
Ports detected: | N/A | None |
172.21.17.251 (VulnLIB) |
||
NMAP Findings | ||
---|---|---|
Previous scan | Current scan | |
Scan completed: | N/A | 2022-03-23 12:28:18 |
Ports detected: | N/A | None |
172.21.17.254 (VulnLIB) |
||
NMAP Findings | ||
---|---|---|
Previous scan | Current scan | |
Scan completed: | N/A | 2022-03-23 12:59:23 |
Ports detected: | N/A | None |
172.21.18.1 (VulnLIB) |
||
NMAP Findings | ||
---|---|---|
Previous scan | Current scan | |
Scan completed: | N/A | 2022-03-23 13:06:01 |
Ports detected: | N/A | None |
172.21.18.11 (Uncategorized) |
||
NMAP Findings | ||
---|---|---|
Previous scan | Current scan | |
Scan completed: | N/A | 2022-03-23 13:03:20 |
Ports detected: | N/A | None |
172.21.18.12 (Uncategorized) |
||
NMAP Findings | ||
---|---|---|
Previous scan | Current scan | |
Scan completed: | N/A | 2022-03-23 13:08:19 |
Ports detected: | N/A | None |
172.21.18.211 (Uncategorized) |
||
NMAP Findings | ||
---|---|---|
Previous scan | Current scan | |
Scan completed: | N/A | 2022-03-23 12:42:11 |
Ports detected: | N/A | None |
172.21.21.11 (ciproc intern) |
||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||
Scan completed: | N/A | 2022-03-24 01:59:49 | ||||||||||||||||||||
Ports detected: | N/A |
|
172.21.70.11 (Hosting) |
||||||||||
NMAP Findings | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||
Scan completed: | N/A | 2022-03-24 01:58:16 | ||||||||
Ports detected: | N/A |
|
172.21.147.1 (Hosting) |
||||||||||
NMAP Findings | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||
Scan completed: | N/A | 2022-03-24 01:50:26 | ||||||||
Ports detected: | N/A |
|
172.21.172.21 (monkeySYS) |
||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||
Scan completed: | N/A | 2022-03-27 01:43:33 | ||||||||||||||||||||
Ports detected: | N/A |
|
172.21.172.22 (VulnLIB) |
||
NMAP Findings | ||
---|---|---|
Previous scan | Current scan | |
Scan completed: | N/A | 2022-03-23 12:55:21 |
Ports detected: | N/A | None |
172.21.172.23 (VulnLIB) |
||
NMAP Findings | ||
---|---|---|
Previous scan | Current scan | |
Scan completed: | N/A | 2022-03-23 13:10:23 |
Ports detected: | N/A | None |
172.21.172.24 (ciproc intern) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-24 01:56:33 | ||||||||||||
Ports detected: | N/A |
|
172.21.172.31 (VulnLIB) |
||
NMAP Findings | ||
---|---|---|
Previous scan | Current scan | |
Scan completed: | N/A | 2022-03-23 13:05:29 |
Ports detected: | N/A | None |
172.21.172.35 (Uncategorized) |
||||||||||
NMAP Findings | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||
Scan completed: | N/A | 2022-03-28 01:09:10 | ||||||||
Ports detected: | N/A |
|
172.21.172.37 (ciproc intern) |
||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||
Scan completed: | N/A | 2022-03-24 01:51:06 | ||||||||||||||||||||
Ports detected: | N/A |
|
172.21.172.38 (VulnLIB) |
||
NMAP Findings | ||
---|---|---|
Previous scan | Current scan | |
Scan completed: | N/A | 2022-03-23 13:04:23 |
Ports detected: | N/A | None |
172.21.172.42 (ciproc intern) |
||||||||||
NMAP Findings | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||
Scan completed: | N/A | 2022-03-24 01:53:28 | ||||||||
Ports detected: | N/A |
|
172.21.172.44 (ciproc intern) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-24 02:15:41 | ||||||||||||
Ports detected: | N/A |
|
172.21.172.45 (monkeySYS) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-27 05:16:41 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.172.46 (monkeySYS) |
||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||
Scan completed: | N/A | 2022-03-27 04:37:39 | ||||||||||||||||||||
Ports detected: | N/A |
|
172.21.172.47 (monkeySYS) |
||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||
Scan completed: | N/A | 2022-03-27 09:21:02 | ||||||||||||||||||||
Ports detected: | N/A |
|
172.21.172.100 (monkeySYS) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-27 06:36:30 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.172.101 (monkeySYS) |
||||||||||
NMAP Findings | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||
Scan completed: | N/A | 2022-03-27 11:13:05 | ||||||||
Ports detected: | N/A |
|
172.21.172.105 (monkeySYS) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-27 13:47:52 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.172.106 (monkeySYS) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-27 14:15:06 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.172.146 (monkeySYS) |
||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||
Scan completed: | N/A | 2022-03-27 15:17:36 | ||||||||||||||||||||
Ports detected: | N/A |
|
172.21.172.147 (monkeySYS) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-27 14:28:52 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.172.200 (monkeySYS) |
||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||
Scan completed: | N/A | 2022-03-27 14:26:17 | ||||||||||||||||||||
Ports detected: | N/A |
|
172.21.172.240 (monkeySYS) |
||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||
Scan completed: | N/A | 2022-03-27 10:24:26 | ||||||||||||||||||||
Ports detected: | N/A |
|
172.21.173.11 (darkhill) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-24 01:47:37 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.173.111 (darkhill) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-24 01:45:23 | ||||||||||||
Ports detected: | N/A |
|
172.21.173.112 (darkhill) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-24 01:48:04 | ||||||||||||
Ports detected: | N/A |
|
172.21.173.121 (ciproc intern) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-24 01:56:10 | ||||||||||||
Ports detected: | N/A |
|
172.21.173.200 (ciproc intern) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-24 01:44:08 | ||||||||||||
Ports detected: | N/A |
|
172.21.174.11 (darkhill) |
||||||||||
NMAP Findings | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||
Scan completed: | N/A | 2022-03-24 01:51:24 | ||||||||
Ports detected: | N/A |
|
172.21.174.31 (darkhill) |
||||||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||||||
Scan completed: | N/A | 2022-03-24 01:55:42 | ||||||||||||||||||||||||
Ports detected: | N/A |
|
172.21.174.32 (darkhill) |
||||||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||||||
Scan completed: | N/A | 2022-03-24 01:57:48 | ||||||||||||||||||||||||
Ports detected: | N/A |
|
172.21.174.33 (darkhill) |
||||||||||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||||||||||
Scan completed: | N/A | 2022-03-24 01:49:04 | ||||||||||||||||||||||||||||
Ports detected: | N/A |
|
172.21.174.220 (darkhill) |
||||||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||||||
Scan completed: | N/A | 2022-03-24 02:06:01 | ||||||||||||||||||||||||
Ports detected: | N/A |
|
172.21.174.230 (darkhill) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-24 01:47:47 | ||||||||||||
Ports detected: | N/A |
|
172.21.198.5 (publior) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Scan completed: | N/A | 2022-03-31 05:25:02 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: | N/A |
|
172.21.198.11 (publior) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 07:23:07 | ||||||||||||
Ports detected: | N/A |
|
172.21.198.20 (publior) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 07:22:38 | ||||||||||||
Ports detected: | N/A |
|
172.21.198.21 (publior) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 07:22:25 | ||||||||||||
Ports detected: | N/A |
|
172.21.198.22 (publior) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 07:22:06 | ||||||||||||
Ports detected: | N/A |
|
172.21.198.23 (publior) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 07:22:47 | ||||||||||||
Ports detected: | N/A |
|
172.21.198.24 (publior) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 07:21:32 | ||||||||||||
Ports detected: | N/A |
|
172.21.198.30 (publior) |
||||||||||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||||||||||
Scan completed: | N/A | 2022-03-30 07:29:20 | ||||||||||||||||||||||||||||
Ports detected: | N/A |
|
172.21.198.31 (publior) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-30 10:56:33 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.198.32 (publior) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 07:24:23 | ||||||||||||
Ports detected: | N/A |
|
172.21.198.110 (publior) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 07:26:11 | ||||||||||||
Ports detected: | N/A |
|
172.21.198.111 (publior) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 07:18:34 | ||||||||||||
Ports detected: | N/A |
|
172.21.198.112 (publior) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 07:18:32 | ||||||||||||
Ports detected: | N/A |
|
172.21.198.113 (publior) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 07:20:13 | ||||||||||||
Ports detected: | N/A |
|
172.21.198.114 (publior) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 07:23:42 | ||||||||||||
Ports detected: | N/A |
|
172.21.198.171 (publior) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 07:11:06 | ||||||||||||
Ports detected: | N/A |
|
172.21.198.181 (publior) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 07:20:26 | ||||||||||||
Ports detected: | N/A |
|
172.21.198.182 (publior) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 07:20:54 | ||||||||||||
Ports detected: | N/A |
|
172.21.198.230 (publior) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-30 07:24:13 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.198.240 (publior) |
||||||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||||||
Scan completed: | N/A | 2022-03-30 07:19:53 | ||||||||||||||||||||||||
Ports detected: | N/A |
|
172.21.198.250 (publior) |
||||||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||||||
Scan completed: | N/A | 2022-03-30 07:25:57 | ||||||||||||||||||||||||
Ports detected: | N/A |
|
172.21.198.251 (publior) |
||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||
Scan completed: | N/A | 2022-03-30 07:25:23 | ||||||||||||||||||||
Ports detected: | N/A |
|
172.21.199.19 (Hosting) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Scan completed: | N/A | 2022-03-31 03:57:10 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: | N/A |
|
172.21.199.201 (Hosting) |
||||||||||||||||||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||
Scan completed: | N/A | 2022-03-30 07:19:37 | ||||||||||||||||||||||||||||||||||||
Ports detected: | N/A |
|
172.21.199.211 (Hosting) |
||||||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||||||
Scan completed: | N/A | 2022-03-30 07:19:04 | ||||||||||||||||||||||||
Ports detected: | N/A |
|
172.21.220.11 (Telephony) |
||||||||||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||||||||||
Scan completed: | N/A | 2022-03-30 07:22:28 | ||||||||||||||||||||||||||||
Ports detected: | N/A |
|
172.21.220.12 (Telephony) |
||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||
Scan completed: | N/A | 2022-03-30 07:24:43 | ||||||||||||||||||||
Ports detected: | N/A |
|
172.21.221.4 (Telephony) |
||||||||||
NMAP Findings | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||
Scan completed: | N/A | 2022-03-31 05:21:59 | ||||||||
Ports detected: | N/A |
|
172.21.221.7 (Telephony) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 07:51:56 | ||||||||||||
Ports detected: | N/A |
|
172.21.221.9 (Telephony) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-31 05:24:18 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.221.11 (Telephony) |
||
NMAP Findings | ||
---|---|---|
Previous scan | Current scan | |
Scan completed: | N/A | 2022-03-30 08:58:49 |
Ports detected: | N/A | None |
172.21.221.24 (Telephony) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 12:11:34 | ||||||||||||
Ports detected: | N/A |
|
172.21.221.26 (Telephony) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 12:11:40 | ||||||||||||
Ports detected: | N/A |
|
172.21.221.27 (Telephony) |
||||||||||
NMAP Findings | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||
Scan completed: | N/A | 2022-03-31 05:26:19 | ||||||||
Ports detected: | N/A |
|
172.21.221.31 (Telephony) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-31 05:14:35 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.221.32 (Telephony) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-31 05:03:31 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.221.36 (Telephony) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-31 05:19:35 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.221.37 (Telephony) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-31 05:23:07 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.221.40 (Telephony) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-30 21:29:30 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.221.41 (Telephony) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-31 05:20:52 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.221.42 (Telephony) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-31 05:19:23 | ||||||||||||
Ports detected: | N/A |
|
172.21.221.43 (Telephony) |
||||||||||
NMAP Findings | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||
Scan completed: | N/A | 2022-03-30 12:16:38 | ||||||||
Ports detected: | N/A |
|
172.21.221.45 (Telephony) |
||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||
Scan completed: | N/A | 2022-03-31 05:17:33 | ||||||||||||||||||||
Ports detected: | N/A |
|
172.21.221.46 (Telephony) |
||||||||||
NMAP Findings | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||
Scan completed: | N/A | 2022-03-30 12:23:46 | ||||||||
Ports detected: | N/A |
|
172.21.221.47 (Telephony) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-31 05:23:43 | ||||||||||||
Ports detected: | N/A |
|
172.21.221.48 (Telephony) |
||||||||||
NMAP Findings | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||
Scan completed: | N/A | 2022-03-31 03:28:27 | ||||||||
Ports detected: | N/A |
|
172.21.221.50 (Telephony) |
||||||||||
NMAP Findings | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||
Scan completed: | N/A | 2022-03-31 05:18:44 | ||||||||
Ports detected: | N/A |
|
172.21.221.52 (Telephony) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 12:14:41 | ||||||||||||
Ports detected: | N/A |
|
172.21.221.53 (Telephony) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-30 12:15:15 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.221.54 (Telephony) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 12:15:50 | ||||||||||||
Ports detected: | N/A |
|
172.21.221.55 (Telephony) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 12:24:28 | ||||||||||||
Ports detected: | N/A |
|
172.21.221.56 (Telephony) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 12:15:22 | ||||||||||||
Ports detected: | N/A |
|
172.21.221.58 (Telephony) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-30 12:30:00 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.221.59 (Telephony) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 12:15:23 | ||||||||||||
Ports detected: | N/A |
|
172.21.221.61 (Telephony) |
||||||||||
NMAP Findings | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||
Scan completed: | N/A | 2022-03-30 12:15:27 | ||||||||
Ports detected: | N/A |
|
172.21.221.62 (Telephony) |
||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||
Scan completed: | N/A | 2022-03-30 12:15:25 | ||||||||||||||||||||
Ports detected: | N/A |
|
172.21.221.64 (Telephony) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-30 12:25:07 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.221.65 (Telephony) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 12:15:25 | ||||||||||||
Ports detected: | N/A |
|
172.21.221.66 (Telephony) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 12:16:05 | ||||||||||||
Ports detected: | N/A |
|
172.21.221.67 (Telephony) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 12:35:37 | ||||||||||||
Ports detected: | N/A |
|
172.21.221.68 (Telephony) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 12:12:52 | ||||||||||||
Ports detected: | N/A |
|
172.21.221.69 (Telephony) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 12:34:50 | ||||||||||||
Ports detected: | N/A |
|
172.21.221.70 (Uncategorized) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 12:14:17 | ||||||||||||
Ports detected: | N/A |
|
172.21.221.71 (Telephony) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 12:16:37 | ||||||||||||
Ports detected: | N/A |
|
172.21.221.72 (Telephony) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 12:29:55 | ||||||||||||
Ports detected: | N/A |
|
172.21.221.73 (Telephony) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 12:14:32 | ||||||||||||
Ports detected: | N/A |
|
172.21.221.74 (Telephony) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-30 12:14:22 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.221.75 (Telephony) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-31 03:37:28 | ||||||||||||
Ports detected: | N/A |
|
172.21.221.76 (Telephony) |
||||||||||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||||||||||
Scan completed: | N/A | 2022-03-30 07:24:06 | ||||||||||||||||||||||||||||
Ports detected: | N/A |
|
172.21.221.78 (Telephony) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 12:25:07 | ||||||||||||
Ports detected: | N/A |
|
172.21.221.162 (Telephony) |
||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||
Scan completed: | N/A | 2022-03-30 12:12:38 | ||||||||||||||||||||
Ports detected: | N/A |
|
172.21.221.200 (Telephony) |
||||||||||||||
NMAP Findings | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||
Scan completed: | N/A | 2022-03-30 07:19:19 | ||||||||||||
Ports detected: | N/A |
|
172.21.221.201 (Telephony) |
||||||||||
NMAP Findings | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||
Scan completed: | N/A | 2022-03-30 07:19:15 | ||||||||
Ports detected: | N/A |
|
172.21.221.211 (Telephony) |
||||||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||||||
Scan completed: | N/A | 2022-03-30 07:18:55 | ||||||||||||||||||||||||
Ports detected: | N/A |
|
172.21.221.230 (Telephony) |
||
NMAP Findings | ||
---|---|---|
Previous scan | Current scan | |
Scan completed: | N/A | 2022-03-29 15:36:55 |
Ports detected: | N/A | None |
172.21.221.231 (Telephony) |
||
NMAP Findings | ||
---|---|---|
Previous scan | Current scan | |
Scan completed: | N/A | 2022-03-29 15:48:12 |
Ports detected: | N/A | None |
172.21.221.232 (Telephony) |
||
NMAP Findings | ||
---|---|---|
Previous scan | Current scan | |
Scan completed: | N/A | 2022-03-29 15:52:54 |
Ports detected: | N/A | None |
172.21.221.233 (Telephony) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-30 07:19:33 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.221.238 (Telephony) |
||||||||||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||||||||||
Scan completed: | N/A | 2022-03-30 07:19:35 | ||||||||||||||||||||||||||||
Ports detected: | N/A |
|
172.21.221.240 (Telephony) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-30 07:27:59 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.221.241 (Telephony) |
||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||
Scan completed: | N/A | 2022-03-30 07:27:10 | ||||||||||||||||||||
Ports detected: | N/A |
|
172.21.221.242 (Telephony) |
||
NMAP Findings | ||
---|---|---|
Previous scan | Current scan | |
Scan completed: | N/A | 2022-03-29 15:43:52 |
Ports detected: | N/A | None |
172.21.221.243 (Telephony) |
||||||||||||||||||
NMAP Findings | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||
Scan completed: | N/A | 2022-03-30 07:26:20 | ||||||||||||||||
Ports detected: | N/A |
|
172.21.221.250 (Telephony) |
||||||||||||||||||||||
NMAP Findings | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Previous scan | Current scan | |||||||||||||||||||||
Scan completed: | N/A | 2022-03-30 12:20:41 | ||||||||||||||||||||
Ports detected: | N/A |
|
172.21.11.2 (ISP) |
||
Previous scan | Current scan | |
---|---|---|
NMAP Findings | ||
Scan completed: | 2022-03-21 06:29:04 | 2022-03-23 12:56:45 |
Ports detected: | None | None |
Nessus Findings | ||
Scan completed: | 2022-03-18 10:34:50 | 2022-03-26 22:03:36 |
Ports detected: | None | None |
172.21.11.3 (ISP) |
||
Previous scan | Current scan | |
---|---|---|
NMAP Findings | ||
Scan completed: | 2022-03-21 06:46:09 | 2022-03-24 04:09:56 |
Ports detected: | None | None |
Nessus Findings | ||
Scan completed: | 2022-03-18 10:34:52 | 2022-03-26 22:03:33 |
Ports detected: | None | None |
172.21.11.4 (ISP) |
||
Previous scan | Current scan | |
---|---|---|
NMAP Findings | ||
Scan completed: | 2022-03-21 06:46:09 | 2022-03-24 04:07:19 |
Ports detected: | None | None |
Nessus Findings | ||
Scan completed: | 2022-03-18 10:36:54 | 2022-03-26 22:05:54 |
Ports detected: | None | None |
172.21.11.5 (ISP) |
||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
NMAP Findings | ||||||||||||||||||||||||||||||||||||||||||
Scan completed: | 2022-03-21 06:44:34 | 2022-03-24 01:43:40 | ||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||
Nessus Findings | ||||||||||||||||||||||||||||||||||||||||||
Scan completed: | 2022-03-18 10:35:15 | 2022-03-26 22:04:03 | ||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
172.21.11.11 (ISP) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
NMAP Findings | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Scan completed: | 2022-03-21 06:30:28 | 2022-03-24 20:57:29 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Nessus Findings | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Scan completed: | 2022-03-18 10:42:21 | 2022-03-26 22:11:11 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
172.21.11.12 (ISP) |
||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
NMAP Findings | ||||||||||||||||||||||||||||||||||||||||||
Scan completed: | 2022-03-21 06:31:55 | 2022-03-24 19:47:58 | ||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||
Nessus Findings | ||||||||||||||||||||||||||||||||||||||||||
Scan completed: | 2022-03-18 10:51:36 | 2022-03-26 22:20:22 | ||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
172.21.11.14 (ISP) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
NMAP Findings | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Scan completed: | 2022-03-21 06:30:17 | 2022-03-24 22:28:56 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Nessus Findings | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Scan completed: | 2022-03-18 10:49:59 | 2022-03-26 22:20:25 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
172.21.11.15 (ISP) |
||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
NMAP Findings | ||||||||||||||||||||||||||
Scan completed: | 2022-03-21 06:30:23 | 2022-03-23 13:11:54 | ||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||
Nessus Findings | ||||||||||||||||||||||||||
Scan completed: | 2022-03-18 10:40:11 | 2022-03-26 22:09:12 | ||||||||||||||||||||||||
Ports detected: |
|
|
172.21.11.17 (ISP) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
NMAP Findings | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Scan completed: | 2022-03-21 06:30:20 | 2022-03-24 23:50:38 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Nessus Findings | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Scan completed: | 2022-03-18 10:40:32 | 2022-03-26 22:07:15 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
172.21.11.20 (ISP) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
NMAP Findings | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Scan completed: | 2022-03-21 06:30:33 | 2022-03-24 17:37:32 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Nessus Findings | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Scan completed: | 2022-03-18 10:52:13 | 2022-03-26 22:20:59 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
172.21.11.22 (ISP) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
NMAP Findings | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Scan completed: | 2022-03-21 06:44:17 | 2022-03-24 01:58:32 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Nessus Findings | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Scan completed: | 2022-03-18 10:43:56 | 2022-03-26 22:12:45 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
172.21.11.121 (ISP) |
||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
NMAP Findings | ||||||||||||||||||||||||||||||||||
Scan completed: | 2022-03-21 06:44:48 | 2022-03-24 01:54:49 | ||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||
Nessus Findings | ||||||||||||||||||||||||||||||||||
Scan completed: | 2022-03-18 10:42:03 | 2022-03-26 22:10:48 | ||||||||||||||||||||||||||||||||
Ports detected: |
|
|
172.21.11.122 (ISP) |
||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
NMAP Findings | ||||||||||||||||||||||||||
Scan completed: | 2022-03-21 06:44:42 | 2022-03-24 01:56:20 | ||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||
Nessus Findings | ||||||||||||||||||||||||||
Scan completed: | 2022-03-18 10:38:15 | 2022-03-26 22:07:04 | ||||||||||||||||||||||||
Ports detected: |
|
|
172.21.11.145 (ISP) |
||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
NMAP Findings | ||||||||||||||||||||||||||||||||||||||||||
Scan completed: | 2022-03-21 06:44:58 | 2022-03-24 01:57:00 | ||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||
Nessus Findings | ||||||||||||||||||||||||||||||||||||||||||
Scan completed: | 2022-03-18 10:52:11 | 2022-03-26 22:20:58 | ||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
172.21.11.221 (ISP) |
||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
NMAP Findings | ||||||||||||||||||||||||||||||||||
Scan completed: | 2022-03-21 06:56:34 | 2022-03-28 01:05:01 | ||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||
Nessus Findings | ||||||||||||||||||||||||||||||||||
Scan completed: | 2022-03-18 10:52:40 | 2022-03-26 22:21:06 | ||||||||||||||||||||||||||||||||
Ports detected: |
|
|
172.21.11.230 (ISP) |
||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
NMAP Findings | ||||||||||||||||||||||||||||||||||
Scan completed: | 2022-03-21 06:44:48 | 2022-03-24 01:55:30 | ||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||
Nessus Findings | ||||||||||||||||||||||||||||||||||
Scan completed: | 2022-03-18 10:44:04 | 2022-03-26 22:07:27 | ||||||||||||||||||||||||||||||||
Ports detected: |
|
|
172.21.11.250 (ISP) |
||||||||||||||||||||||||||||||||||||||||||||||||||
Previous scan | Current scan | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
NMAP Findings | ||||||||||||||||||||||||||||||||||||||||||||||||||
Scan completed: | 2022-03-21 06:44:50 | 2022-03-24 01:42:09 | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
||||||||||||||||||||||||||||||||||||||||||||||||
Nessus Findings | ||||||||||||||||||||||||||||||||||||||||||||||||||
Scan completed: | 2022-03-18 10:53:54 | 2022-03-26 22:20:33 | ||||||||||||||||||||||||||||||||||||||||||||||||
Ports detected: |
|
|
The raw output of some supplementary scans is available below.
Scan subtype: | |
Origin IP: | |
Details: | |
Command: |
|
Version: | (official web site) |
Output: |
No ports detected on 109.233.144.64 No ports detected on 109.233.144.65 Discovered open port 5225/tcp on 109.233.144.66 Discovered open port 465/tcp on 109.233.144.66 Discovered open port 995/tcp on 109.233.144.66 Discovered open port 143/tcp on 109.233.144.66 Discovered open port 993/tcp on 109.233.144.66 Discovered open port 443/tcp on 109.233.144.66 Discovered open port 25/tcp on 109.233.144.66 Discovered open port 110/tcp on 109.233.144.66 Discovered open port 21/tcp on 109.233.144.66 Discovered open port 2552/tcp on 109.233.144.66 Discovered open port 587/tcp on 109.233.144.66 Discovered open port 80/tcp on 109.233.144.66 Discovered open port 143/tcp on 109.233.144.67 Discovered open port 587/tcp on 109.233.144.67 Discovered open port 25/tcp on 109.233.144.67 Discovered open port 5225/tcp on 109.233.144.67 Discovered open port 21/tcp on 109.233.144.67 Discovered open port 465/tcp on 109.233.144.67 Discovered open port 80/tcp on 109.233.144.67 Discovered open port 993/tcp on 109.233.144.67 Discovered open port 995/tcp on 109.233.144.67 Discovered open port 110/tcp on 109.233.144.67 Discovered open port 443/tcp on 109.233.144.67 Discovered open port 2552/tcp on 109.233.144.67 No ports detected on 109.233.144.68 No ports detected on 109.233.144.69 No ports detected on 109.233.144.70 No ports detected on 109.233.144.71 No ports detected on 109.233.144.72 No ports detected on 109.233.144.73 No ports detected on 109.233.144.74 No ports detected on 109.233.144.75 No ports detected on 109.233.144.76 No ports detected on 109.233.144.77 No ports detected on 109.233.144.78 No ports detected on 109.233.144.79 Discovered open port 80/tcp on 109.233.144.80 Discovered open port 443/tcp on 109.233.144.80 No ports detected on 109.233.144.81 No ports detected on 109.233.144.82 Discovered open port 80/tcp on 109.233.144.83 Discovered open port 443/tcp on 109.233.144.83 No ports detected on 109.233.144.84 No ports detected on 109.233.144.85 Discovered open port 80/tcp on 109.233.144.86 Discovered open port 443/tcp on 109.233.144.86 Discovered open port 3306/tcp on 109.233.144.87 Discovered open port 53/tcp on 109.233.144.87 No ports detected on 109.233.144.88 No ports detected on 109.233.144.89 No ports detected on 109.233.144.90 No ports detected on 109.233.144.91 No ports detected on 109.233.144.92 No ports detected on 109.233.144.93 No ports detected on 109.233.144.94 No ports detected on 109.233.144.95
No ports detected on 109.233.144.64. No ports detected on 109.233.144.65. No ports detected on 109.233.144.66. No ports detected on 109.233.144.67. No ports detected on 109.233.144.68. No ports detected on 109.233.144.69. No ports detected on 109.233.144.70. No ports detected on 109.233.144.71. No ports detected on 109.233.144.72. No ports detected on 109.233.144.73. Discovered open port 5060/udp on 109.233.144.74 No ports detected on 109.233.144.75. No ports detected on 109.233.144.76. No ports detected on 109.233.144.77. No ports detected on 109.233.144.78. No ports detected on 109.233.144.79. No ports detected on 109.233.144.80. Discovered open port 5060/udp on 109.233.144.81 No ports detected on 109.233.144.82. No ports detected on 109.233.144.83. Discovered open port 5060/udp on 109.233.144.84 No ports detected on 109.233.144.85. No ports detected on 109.233.144.86. Discovered open port 53/udp on 109.233.144.87 No ports detected on 109.233.144.88. No ports detected on 109.233.144.89. No ports detected on 109.233.144.90. Discovered open port 5060/udp on 109.233.144.91 No ports detected on 109.233.144.92. No ports detected on 109.233.144.93. No ports detected on 109.233.144.94. No ports detected on 109.233.144.95.
Port scans were carried out using Nmap. Details of the previous and current scans are summarized in the following table:
Previous scan | Current scan | |
---|---|---|
Scan started: | 2022-03-21 06:23:35 | 2022-03-22 06:23:51 |
Scan completed: | 2022-03-21 06:56:34 | 2022-03-31 05:26:26 |
Scanned IPs: | 256 | 65536 |
IPs alive | 17 | 163 |
IPs unresponsive | 239 | 65373 |
Reason for stopping | success | success |
Scanned from: |
|
|
The current scan was performed using the following command:
/usr/bin/nmap -n -p0-65353 -T4 -sS -sU -P0 -oX /opt/nmap_portscans/nmap_portscan_03220623.xml 172.21.0.0/16
Command line output of current scan:
Nmap done at Thu Mar 31 05:26:26 2022; 65536 IP addresses (163 hosts up) scanned in 770555.69 seconds
IP/Domain | WAF | Certificate | Expiration date | Days left | |
---|---|---|---|---|---|
172.21.46.30 | intern-inte.ciproc.de (ciproc GmbH) | Jul 9 23:59:59 2022 GMT | 74 | ||
server.tel.voiproc.de (172.21.46.144) | server.ciproc.de (ciproc GmbH) | Jun 11 23:59:59 2022 GMT | 46 | ||
shop.ciproc.de (172.21.46.196) | shop.ciproc.de (ciproc GmbH) | May 20 23:59:59 2022 GMT | 24 | ||
multiweb.voiproc.de (172.21.46.196) | shop.ciproc.de (ciproc GmbH) | May 20 23:59:59 2022 GMT | 24 | ||
172.21.46.196 | shop.ciproc.de (ciproc GmbH) | May 20 23:59:59 2022 GMT | 24 | ||
jobs.ciproc.de (172.21.46.193) | jobs.ciproc.de (ciproc GmbH) | Nov 28 23:59:59 2022 GMT | 216 | ||
172.21.46.193 | jobs.ciproc.de (ciproc GmbH) | Nov 28 23:59:59 2022 GMT | 216 | ||
172.21.46.183 | pandora.tel.voiproc.de (ciproc GmbH) | Apr 8 23:59:59 2023 GMT | 347 | ||
172.21.46.167 | pandora.tel.voiproc.de (ciproc GmbH) | Apr 8 23:59:59 2023 GMT | 347 | ||
server.ciproc.de (172.21.46.144) | server.ciproc.de (ciproc GmbH) | Jun 11 23:59:59 2022 GMT | 46 | ||
multiweb.ciproc.de (172.21.46.196) | shop.ciproc.de (ciproc GmbH) | May 20 23:59:59 2022 GMT | 24 | ||
172.21.46.144 | server.ciproc.de (ciproc GmbH) | Jun 11 23:59:59 2022 GMT | 46 | ||
login.ciproc.de (172.21.46.120) | login.ciproc.de (ciproc GmbH) | May 27 23:59:59 2022 GMT | 31 | ||
172.21.46.120 | login.ciproc.de (ciproc GmbH) | May 27 23:59:59 2022 GMT | 31 | ||
www.siproc.de (172.21.46.77) | www.siproc.de (ciproc GmbH) | Sep 14 23:59:59 2022 GMT | 141 | ||
172.21.46.77 | www.siproc.de (ciproc GmbH) | Sep 14 23:59:59 2022 GMT | 141 | ||
172.21.46.69 | imap-mail.ciproc.net (ciproc GmbH) | Nov 18 23:59:59 2022 GMT | 206 | ||
172.21.46.69 | imap-mail.ciproc.net (ciproc GmbH) | Nov 18 23:59:59 2022 GMT | 206 | ||
keys.ciproc.de (172.21.46.68) | imap-mail.ciproc.net (ciproc GmbH) | Nov 18 23:59:59 2022 GMT | 206 | ||
shop.tel.voiproc.de (172.21.46.196) | shop.ciproc.de (ciproc GmbH) | May 20 23:59:59 2022 GMT | 24 | ||
172.21.46.248 | smtp-mail.ciproc.de (ciproc GmbH) | Oct 14 23:59:59 2022 GMT | 171 | ||
imap-mail.ciproc.de (172.21.46.68) | imap-mail.ciproc.net (ciproc GmbH) | Nov 18 23:59:59 2022 GMT | 206 | ||
172.21.46.251 | smtp-mail.ciproc.de (ciproc GmbH) | Oct 14 23:59:59 2022 GMT | 171 | ||
172.21.47.132 | customer.ciproc.de (ciproc GmbH) | Oct 27 23:59:59 2022 GMT | 184 | ||
172.21.47.108 | exconnect.ciproc.de (ciproc GmbH) | Apr 23 23:59:59 2023 GMT | 362 | ||
mailgw04.ciproc.de (172.21.46.252) | smtp-mail.ciproc.de (ciproc GmbH) | Oct 14 23:59:59 2022 GMT | 171 | ||
172.21.46.252 | smtp-mail.ciproc.de (ciproc GmbH) | Oct 14 23:59:59 2022 GMT | 171 | ||
mailgw04.ciproc.de (172.21.46.252) | smtp-mail.ciproc.de (ciproc GmbH) | Oct 18 23:59:59 2022 GMT | 175 | ||
172.21.46.252 | smtp-mail.ciproc.de (ciproc GmbH) | Oct 18 23:59:59 2022 GMT | 175 | ||
mailgw03.ciproc.de (172.21.46.251) | smtp-mail.ciproc.de (ciproc GmbH) | Oct 14 23:59:59 2022 GMT | 171 | ||
mailgw03.ciproc.de (172.21.46.251) | smtp-mail.ciproc.de (ciproc GmbH) | Oct 18 23:59:59 2022 GMT | 175 | ||
172.21.46.249 | smtp-mail.ciproc.de (ciproc GmbH) | Oct 18 23:59:59 2022 GMT | 175 | ||
172.21.46.251 | smtp-mail.ciproc.de (ciproc GmbH) | Oct 18 23:59:59 2022 GMT | 175 | ||
mailgw02.ciproc.de (172.21.46.250) | smtp-mail.ciproc.de (ciproc GmbH) | Oct 14 23:59:59 2022 GMT | 171 | ||
172.21.46.250 | smtp-mail.ciproc.de (ciproc GmbH) | Oct 14 23:59:59 2022 GMT | 171 | ||
mailgw02.ciproc.de (172.21.46.250) | smtp-mail.ciproc.de (ciproc GmbH) | Oct 18 23:59:59 2022 GMT | 175 | ||
172.21.46.250 | smtp-mail.ciproc.de (ciproc GmbH) | Oct 18 23:59:59 2022 GMT | 175 | ||
mailgw01.ciproc.de (172.21.46.249) | smtp-mail.ciproc.de (ciproc GmbH) | Oct 14 23:59:59 2022 GMT | 171 | ||
172.21.46.249 | smtp-mail.ciproc.de (ciproc GmbH) | Oct 14 23:59:59 2022 GMT | 171 | ||
mailgw01.ciproc.de (172.21.46.249) | smtp-mail.ciproc.de (ciproc GmbH) | Oct 18 23:59:59 2022 GMT | 175 | ||
keys.ciproc.de (172.21.46.68) | imap-mail.ciproc.net (ciproc GmbH) | Nov 18 23:59:59 2022 GMT | 206 | ||
172.21.46.68 | imap-mail.ciproc.net (ciproc GmbH) | Nov 18 23:59:59 2022 GMT | 206 | ||
support-inte.ciproc.de (172.21.46.30) | intern-inte.ciproc.de (ciproc GmbH) | Jul 9 23:59:59 2022 GMT | 74 | ||
www.proxy.ciproc.de (172.21.46.37) | www.logs.ciproc.de (ciproc GmbH) | Feb 27 23:59:59 2023 GMT | 307 | ||
wiki.ciproc.de (172.21.46.39) | wiki.ciproc.de (ciproc GmbH) | Aug 13 23:59:59 2022 GMT | 109 | ||
172.21.46.39 | wiki.ciproc.de (ciproc GmbH) | Aug 13 23:59:59 2022 GMT | 109 | ||
docs.ciproc.de (172.21.46.38) | docs.ciproc.de (ciproc GmbH) | Feb 24 23:59:59 2023 GMT | 304 | ||
172.21.46.38 | docs.ciproc.de (ciproc GmbH) | Feb 24 23:59:59 2023 GMT | 304 | ||
www.ids.ciproc.com (172.21.46.37) | www.logs.ciproc.de (ciproc GmbH) | Feb 27 23:59:59 2023 GMT | 307 | ||
www.ids.ciproc.de (172.21.46.37) | www.logs.ciproc.de (ciproc GmbH) | Feb 27 23:59:59 2023 GMT | 307 | ||
www.logs.ciproc.de (172.21.46.37) | www.logs.ciproc.de (ciproc GmbH) | Feb 27 23:59:59 2023 GMT | 307 | ||
172.21.46.37 | www.logs.ciproc.de (ciproc GmbH) | Feb 27 23:59:59 2023 GMT | 307 | ||
wiki.ciproc.com (172.21.46.40) | wiki.ciproc.com (ciproc GmbH) | Sep 13 23:59:59 2022 GMT | 140 | ||
www.ciproc.net.de (172.21.46.36) | www.ciproc.net.de (ciproc GmbH) | Jan 17 23:59:59 2023 GMT | 266 | ||
172.21.46.36 | www.ciproc.net.de (ciproc GmbH) | Jan 17 23:59:59 2023 GMT | 266 | ||
www.ciproc.de (172.21.46.32) | www.ciproc.de (ciproc GmbH) | Jan 30 23:59:59 2023 GMT | 279 | ||
172.21.46.32 | www.ciproc.de (ciproc GmbH) | Jan 30 23:59:59 2023 GMT | 279 | ||
support-prod.ciproc.de (172.21.46.31) | intern.ciproc.de (ciproc GmbH) | Jul 11 23:59:59 2022 GMT | 76 | ||
intern.ciproc.de (172.21.46.31) | intern.ciproc.de (ciproc GmbH) | Jul 11 23:59:59 2022 GMT | 76 | ||
172.21.46.31 | intern.ciproc.de (ciproc GmbH) | Jul 11 23:59:59 2022 GMT | 76 | ||
intern-inte.ciproc.de (172.21.46.30) | intern-inte.ciproc.de (ciproc GmbH) | Jul 9 23:59:59 2022 GMT | 74 | ||
172.21.46.40 | wiki.ciproc.com (ciproc GmbH) | Sep 13 23:59:59 2022 GMT | 140 | ||
172.21.46.42 | www.voiproc.com.de (ciproc GmbH) | Feb 27 23:59:59 2023 GMT | 307 | ||
imap-mail.ciproc.de (172.21.46.68) | imap-mail.ciproc.net (ciproc GmbH) | Nov 18 23:59:59 2022 GMT | 206 | ||
172.21.46.58 | services.ciproc.de (ciproc GmbH) | Feb 23 23:59:59 2022 GMT | -62 | ||
keys.ciproc.de (172.21.46.68) | imap-mail.ciproc.net (ciproc GmbH) | Nov 18 23:59:59 2022 GMT | 206 | ||
keys.ciproc.de (172.21.46.68) | imap-mail.ciproc.net (ciproc GmbH) | Nov 18 23:59:59 2022 GMT | 206 | ||
172.21.46.68 | imap-mail.ciproc.net (ciproc GmbH) | Nov 18 23:59:59 2022 GMT | 206 | ||
lu.ciproc.de (172.21.46.60) | lu.tel.voiproc.de (ciproc GmbH) | May 21 23:59:59 2022 GMT | 25 | ||
lu.tel.voiproc.de (172.21.46.60) | lu.tel.voiproc.de (ciproc GmbH) | May 21 23:59:59 2022 GMT | 25 | ||
172.21.46.60 | lu.tel.voiproc.de (ciproc GmbH) | May 21 23:59:59 2022 GMT | 25 | ||
wp-info.ciproc.de (172.21.46.59) | www.ciproc.com (ciproc GmbH) | Apr 25 23:59:59 2023 GMT | 364 | ||
172.21.46.59 | www.ciproc.com (ciproc GmbH) | Apr 25 23:59:59 2023 GMT | 364 | ||
post.ciproc.de (172.21.46.57) | post.ciproc.de (ciproc GmbH) | Sep 22 23:59:59 2022 GMT | 149 | ||
demo.ciproc.de (172.21.46.42) | www.voiproc.com.de (ciproc GmbH) | Feb 27 23:59:59 2023 GMT | 307 | ||
services.ciproc.de (172.21.46.57) | post.ciproc.de (ciproc GmbH) | Sep 22 23:59:59 2022 GMT | 149 | ||
172.21.46.57 | post.ciproc.de (ciproc GmbH) | Sep 22 23:59:59 2022 GMT | 149 | ||
webportal.ciproc.de (172.21.46.54) | webportal.ciproc.de (ciproc GmbH) | Apr 18 23:59:59 2023 GMT | 357 | ||
172.21.46.54 | webportal.ciproc.de (ciproc GmbH) | Apr 18 23:59:59 2023 GMT | 357 | ||
research.ciproc.de (172.21.46.51) | research.ciproc.de (ciproc GmbH) | May 21 23:59:59 2022 GMT | 25 | ||
172.21.46.51 | research.ciproc.de (ciproc GmbH) | May 21 23:59:59 2022 GMT | 25 | ||
172.21.46.48 | www.ciproc.com (ciproc GmbH) | Apr 25 23:59:59 2023 GMT | 364 | ||
172.21.46.45 | shop.ciproc.de (ciproc GmbH) | May 20 23:59:59 2022 GMT | 24 | ||
172.21.47.133 | customer.ciproc.de (ciproc GmbH) | Oct 27 23:59:59 2022 GMT | 184 |
IP/Domain | Port | Service | Protocol Check | Nonconforming Protocols | Cipher Check | Nonconforming Ciphers |
---|---|---|---|---|---|---|
172.21.46.30 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256 | |||
172.21.46.31 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256 | |||
172.21.46.32 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256 | |||
172.21.46.36 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256, AES256-GCM-SHA384, AES128-GCM-SHA256 | |||
172.21.46.37 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256 | |||
172.21.46.38 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256 | |||
172.21.46.39 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256 | |||
172.21.46.40 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256 | |||
172.21.46.42 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256 | |||
172.21.46.45 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES256-SHA256, AES256-GCM-SHA384, AES256-SHA256, AES256-SHA, AES128-GCM-SHA256, AES128-SHA256, AES128-SHA | |||
172.21.46.48 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256 | |||
172.21.46.51 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256 | |||
172.21.46.54 | 443 | HTTP | ECDHE-RSA-AES256-SHA, AES256-GCM-SHA384, AES256-SHA256, AES256-SHA, ECDHE-RSA-AES128-SHA, AES128-GCM-SHA256, AES128-SHA256 | |||
172.21.46.57 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256 | |||
172.21.46.58 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256 | |||
172.21.46.59 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256 | |||
172.21.46.60 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256 | |||
172.21.46.68 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256 | |||
172.21.46.68 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256 | |||
172.21.46.69 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256 | |||
172.21.46.69 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256 | |||
172.21.46.77 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256 | |||
172.21.46.120 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256 | |||
172.21.46.144 | 443 | HTTP | AES256-GCM-SHA384, AES256-SHA256, AES128-SHA256 | |||
172.21.46.167 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES256-SHA256, DHE-RSA-AES256-SHA, AES256-GCM-SHA384, AES256-SHA256, AES256-SHA, DHE-RSA-AES128-GCM-SHA256, DHE-RSA-AES128-SHA256, DHE, RSA-AES128-SHA, AES128-GCM-SHA256, AES128-SHA256, AES128-SHA | |||
172.21.46.170 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES256-SHA256, DHE-RSA-AES256-SHA, AES256-GCM-SHA384, AES256-SHA256, AES256-SHA, DHE-RSA-AES128-GCM-SHA256, DHE-RSA-AES128-SHA256, DHE-RSA-AES128-SHA, AES128-GCM-SHA256, AES128-SHA256, AES128-SHA | |||
172.21.46.183 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES256-SHA256, DHE-RSA-AES256-SHA, AES256-GCM-SHA384, AES256-SHA256, AES256-SHA, DHE-RSA-AES128-GCM-SHA256, DHE-RSA-AES128-SHA256, DHE-RSA-AES128-SHA, AES128-GCM-SHA256, AES128-SHA256, AES128-SHA | |||
172.21.46.193 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256 | |||
172.21.46.196 | 443 | HTTP | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES256-SHA256, AES256-GCM-SHA384, AES256-SHA256, AES256-SHA, AES128-GCM-SHA256, AES128-SHA256, AES128-SHA | |||
172.21.46.247 | 25 | SMTP | ECDHE-RSA-AES256-SHA, AES256-GCM-SHA384, AES256-SHA256, AES256-SHA, ECDHE-RSA-AES128-SHA, AES128-GCM-SHA256, AES128-SHA256, AES128-SHA, RC4-SHA, DES-CBC3-SHA | |||
172.21.46.249 | 25 | SMTP | TLS 1, TLS 1.1 | ECDHE-RSA-AES256-SHA, AES256-GCM-SHA384, AES256-SHA256, AES256-SHA, ECDHE-RSA-AES128-SHA, AES128-GCM-SHA256, AES128-SHA256, AES128-SHA, RC4-SHA, DES-CBC3-SHA | ||
172.21.46.250 | 25 | SMTP | TLS 1, TLS 1.1 | ECDHE-RSA-AES256-SHA, AES256-GCM-SHA384, AES256-SHA256, AES256-SHA, ECDHE-RSA-AES128-SHA, AES128-GCM-SHA256, AES128-SHA256, AES128-SHA, RC4-SHA, DES-CBC3-SHA | ||
172.21.46.251 | 25 | SMTP | TLS 1, TLS 1.1 | ECDHE-RSA-AES256-SHA, AES256-GCM-SHA384, AES256-SHA256, AES256-SHA, ECDHE-RSA-AES128-SHA, AES128-GCM-SHA256, AES128-SHA256, AES128-SHA, RC4-SHA, DES-CBC3-SHA | ||
172.21.46.252 | 25 | SMTP | TLS 1, TLS 1.1 | ECDHE-RSA-AES256-SHA, AES256-GCM-SHA384, AES256-SHA256, AES256-SHA, ECDHE-RSA-AES128-SHA, AES128-GCM-SHA256, AES128-SHA256, AES128-SHA, RC4-SHA, DES-CBC3-SHA | ||
172.21.47.108 | 443 | HTTP | AES256-GCM-SHA384, AES128-GCM-SHA256, AES256-SHA256, AES128-SHA256 | |||
172.21.47.132 | 8443 | HTTP | NPN/SPDY, ALPN/HTTP2 | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES256-SHA256, AES256-GCM-SHA384, AES256-SHA256, DHE-RSA-AES128-GCM-SHA256, DHE-RSA-AES128-SHA256, AES128-GCM-SHA256, AES128-SHA256 | ||
172.21.47.133 | 8443 | HTTP | NPN/SPDY, ALPN/HTTP2 | DHE-RSA-AES256-GCM-SHA384, DHE-RSA-AES256-SHA256, AES256-GCM-SHA384, AES256-SHA256, DHE-RSA-AES128-GCM-SHA256, DHE-RSA-AES128-SHA256, AES128-GCM-SHA256, AES128-SHA256 |
The raw output of some supplementary scans is available below.
Scan subtype: | |
Origin IP: | |
Details: | |
Command: |
|
Version: | (official web site) |
Output: |
------- START: 109.233.144.64 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.64 Host is up. All 1034 scanned ports on 109.233.144.64 are filtered Nmap done: 1 IP address (1 host up) scanned in 211.83 seconds ------- START: 109.233.144.65 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.65 Host is up (0.0010s latency). All 1034 scanned ports on 109.233.144.65 are closed Nmap done: 1 IP address (1 host up) scanned in 79.18 seconds ------- START: 109.233.144.66 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for mail01.ciproc.de (109.233.144.66) Host is up (0.0013s latency). Not shown: 1023 filtered ports PORT STATE SERVICE 20/tcp closed ftp-data 21/tcp open ftp | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | warnings: | Weak certificate signature: SHA1 | TLSv1.1: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | warnings: | Weak certificate signature: SHA1 | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | warnings: | Weak certificate signature: SHA1 |_ least strength: A 25/tcp open smtp | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client |_ least strength: A 80/tcp open http 110/tcp open pop3 | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key |_ least strength: A 143/tcp open imap | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key |_ least strength: A 443/tcp open https | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | TLSv1.1: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server |_ least strength: A 465/tcp open smtps | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | compressors: | NULL | cipher preference: client |_ least strength: A 587/tcp open submission | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client |_ least strength: A 993/tcp open imaps | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key |_ least strength: A 995/tcp open pop3s | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key |_ least strength: A Nmap done: 1 IP address (1 host up) scanned in 31.83 seconds ------- START: 109.233.144.67 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for mail01.add2web.de (109.233.144.67) Host is up (0.0012s latency). Not shown: 1023 filtered ports PORT STATE SERVICE 20/tcp closed ftp-data 21/tcp open ftp | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | warnings: | Weak certificate signature: SHA1 | TLSv1.1: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | warnings: | Weak certificate signature: SHA1 | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | warnings: | Weak certificate signature: SHA1 |_ least strength: A 25/tcp open smtp | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client |_ least strength: A 80/tcp open http 110/tcp open pop3 | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key |_ least strength: A 143/tcp open imap | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key |_ least strength: A 443/tcp open https | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | TLSv1.1: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server |_ least strength: A 465/tcp open smtps | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | compressors: | NULL | cipher preference: client |_ least strength: A 587/tcp open submission | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client |_ least strength: A 993/tcp open imaps | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key |_ least strength: A 995/tcp open pop3s | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key |_ least strength: A Nmap done: 1 IP address (1 host up) scanned in 41.17 seconds ------- START: 109.233.144.68 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for mail01.alevi.de (109.233.144.68) Host is up. All 1034 scanned ports on mail01.alevi.de (109.233.144.68) are filtered Nmap done: 1 IP address (1 host up) scanned in 212.71 seconds ------- START: 109.233.144.69 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.69 Host is up. All 1034 scanned ports on 109.233.144.69 are filtered Nmap done: 1 IP address (1 host up) scanned in 212.63 seconds ------- START: 109.233.144.70 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.70 Host is up. All 1034 scanned ports on 109.233.144.70 are filtered Nmap done: 1 IP address (1 host up) scanned in 212.58 seconds ------- START: 109.233.144.71 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.71 Host is up. All 1034 scanned ports on 109.233.144.71 are filtered Nmap done: 1 IP address (1 host up) scanned in 212.47 seconds ------- START: 109.233.144.72 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for mail02.alevi.de (109.233.144.72) Host is up. All 1034 scanned ports on mail02.alevi.de (109.233.144.72) are filtered Nmap done: 1 IP address (1 host up) scanned in 212.42 seconds ------- START: 109.233.144.73 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.73 Host is up. All 1034 scanned ports on 109.233.144.73 are filtered Nmap done: 1 IP address (1 host up) scanned in 212.33 seconds ------- START: 109.233.144.74 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.74 Host is up. All 1034 scanned ports on 109.233.144.74 are filtered Nmap done: 1 IP address (1 host up) scanned in 212.29 seconds ------- START: 109.233.144.75 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.75 Host is up. All 1034 scanned ports on 109.233.144.75 are filtered Nmap done: 1 IP address (1 host up) scanned in 212.20 seconds ------- START: 109.233.144.76 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.76 Host is up. All 1034 scanned ports on 109.233.144.76 are filtered Nmap done: 1 IP address (1 host up) scanned in 213.10 seconds ------- START: 109.233.144.77 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.77 Host is up. All 1034 scanned ports on 109.233.144.77 are filtered Nmap done: 1 IP address (1 host up) scanned in 213.03 seconds ------- START: 109.233.144.78 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.78 Host is up. All 1034 scanned ports on 109.233.144.78 are filtered Nmap done: 1 IP address (1 host up) scanned in 212.97 seconds ------- START: 109.233.144.79 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.79 Host is up. All 1034 scanned ports on 109.233.144.79 are filtered Nmap done: 1 IP address (1 host up) scanned in 212.86 seconds ------- START: 109.233.144.80 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.80 Host is up (0.0014s latency). Not shown: 1032 filtered ports PORT STATE SERVICE 80/tcp open http 443/tcp open https | ssl-enum-ciphers: | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server |_ least strength: A Nmap done: 1 IP address (1 host up) scanned in 13.20 seconds ------- START: 109.233.144.81 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.81 Host is up. All 1034 scanned ports on 109.233.144.81 are filtered Nmap done: 1 IP address (1 host up) scanned in 212.67 seconds ------- START: 109.233.144.82 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.82 Host is up. All 1034 scanned ports on 109.233.144.82 are filtered Nmap done: 1 IP address (1 host up) scanned in 212.60 seconds ------- START: 109.233.144.83 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.83 Host is up (0.0011s latency). Not shown: 1032 filtered ports PORT STATE SERVICE 80/tcp open http 443/tcp open https | ssl-enum-ciphers: | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server |_ least strength: A Nmap done: 1 IP address (1 host up) scanned in 14.87 seconds ------- START: 109.233.144.84 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for mx.e-zee.eu (109.233.144.84) Host is up. All 1034 scanned ports on mx.e-zee.eu (109.233.144.84) are filtered Nmap done: 1 IP address (1 host up) scanned in 212.38 seconds ------- START: 109.233.144.85 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.85 Host is up (0.00099s latency). Not shown: 1032 filtered ports PORT STATE SERVICE 80/tcp closed http 443/tcp closed https Nmap done: 1 IP address (1 host up) scanned in 9.66 seconds ------- START: 109.233.144.86 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.86 Host is up (0.0011s latency). Not shown: 1032 filtered ports PORT STATE SERVICE 80/tcp open http 443/tcp open https | ssl-enum-ciphers: | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server |_ least strength: A Nmap done: 1 IP address (1 host up) scanned in 11.97 seconds ------- START: 109.233.144.87 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.87 Host is up (0.00097s latency). Not shown: 1033 closed ports PORT STATE SERVICE 53/tcp open domain Nmap done: 1 IP address (1 host up) scanned in 18.10 seconds ------- START: 109.233.144.88 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.88 Host is up. All 1034 scanned ports on 109.233.144.88 are filtered Nmap done: 1 IP address (1 host up) scanned in 212.01 seconds ------- START: 109.233.144.89 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.89 Host is up. All 1034 scanned ports on 109.233.144.89 are filtered Nmap done: 1 IP address (1 host up) scanned in 211.87 seconds ------- START: 109.233.144.90 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.90 Host is up. All 1034 scanned ports on 109.233.144.90 are filtered Nmap done: 1 IP address (1 host up) scanned in 211.79 seconds ------- START: 109.233.144.91 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.91 Host is up. All 1034 scanned ports on 109.233.144.91 are filtered Nmap done: 1 IP address (1 host up) scanned in 211.72 seconds ------- START: 109.233.144.92 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.92 Host is up. All 1034 scanned ports on 109.233.144.92 are filtered Nmap done: 1 IP address (1 host up) scanned in 211.56 seconds ------- START: 109.233.144.93 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.93 Host is up. All 1034 scanned ports on 109.233.144.93 are filtered Nmap done: 1 IP address (1 host up) scanned in 212.54 seconds ------- START: 109.233.144.94 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.94 Host is up. All 1034 scanned ports on 109.233.144.94 are filtered Nmap done: 1 IP address (1 host up) scanned in 212.41 seconds ------- START: 109.233.144.95 Starting Nmap 7.70 ( https://nmap.org ) at 2022-02-08 06:49 CET Nmap scan report for 109.233.144.95 Host is up. All 1034 scanned ports on 109.233.144.95 are filtered Nmap done: 1 IP address (1 host up) scanned in 212.29 seconds
------- START: 109.233.144.66 Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 09:30 CEST Nmap scan report for mail01.ciproc.de (109.233.144.66) Host is up (0.0012s latency). Not shown: 816 filtered ports, 173 closed ports PORT STATE SERVICE VERSION 21/tcp open ftp Pure-FTPd 25/tcp open smtp Postfix smtpd 80/tcp open http Apache httpd 2.4.25 | http-headers: | Date: Mon, 04 Apr 2022 07:33:44 GMT | Server: Apache/2.4.25 (Debian) | Last-Modified: Fri, 05 Mar 2021 00:02:02 GMT | ETag: "745-5bcbecb2cd341" | Accept-Ranges: bytes | Content-Length: 1861 | Vary: Accept-Encoding | Connection: close | Content-Type: text/html | |_ (Request type: HEAD) |_http-server-header: Apache/2.4.25 (Debian) 110/tcp open pop3 Dovecot pop3d 143/tcp open imap Dovecot imapd 443/tcp open ssl/http Apache httpd 2.4.25 ((Debian)) | http-headers: | Date: Mon, 04 Apr 2022 07:33:44 GMT | Server: Apache/2.4.25 (Debian) | Last-Modified: Fri, 05 Mar 2021 00:02:02 GMT | ETag: "745-5bcbecb2cd341" | Accept-Ranges: bytes | Content-Length: 1861 | Vary: Accept-Encoding | Connection: close | Content-Type: text/html | |_ (Request type: HEAD) |_http-server-header: Apache/2.4.25 (Debian) 465/tcp open ssl/smtp Postfix smtpd 587/tcp open smtp Postfix smtpd 993/tcp open ssl/imaps? 995/tcp open ssl/pop3s? 5225/tcp open smtp Postfix smtpd Service Info: Host: 00.ciproc.de Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 188.04 seconds ------- START: 109.233.144.67 Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 09:39 CEST Nmap scan report for mail01.add2web.de (109.233.144.67) Host is up (0.0012s latency). Not shown: 988 filtered ports PORT STATE SERVICE VERSION 20/tcp closed ftp-data 21/tcp open ftp Pure-FTPd 25/tcp open smtp Postfix smtpd 80/tcp open http Apache httpd 2.4.25 | http-headers: | Date: Mon, 04 Apr 2022 07:40:24 GMT | Server: Apache/2.4.25 | Last-Modified: Wed, 23 Mar 2016 13:53:12 GMT | ETag: "0-52eb7a6918200" | Accept-Ranges: bytes | Connection: close | Content-Type: text/html | |_ (Request type: HEAD) |_http-server-header: Apache/2.4.25 110/tcp open pop3 Dovecot pop3d 143/tcp open imap Dovecot imapd 443/tcp open ssl/http Apache httpd 2.4.25 (PHP/5.6.33-0+deb8u1) | http-headers: | Date: Mon, 04 Apr 2022 07:40:26 GMT | Server: Apache/2.4.25 | X-Powered-By: PHP/5.6.33-0+deb8u1 | Vary: Accept-Encoding,Cookie | X-Redirect-By: WordPress | Location: https://ahornapotheke-ma.de/ | Content-Length: 0 | Connection: close | Content-Type: text/html; charset=UTF-8 | |_ (Request type: GET) |_http-server-header: Apache/2.4.25 465/tcp open ssl/smtp Postfix smtpd 587/tcp open smtp Postfix smtpd 993/tcp open ssl/imaps? 995/tcp open ssl/pop3s? 5225/tcp open smtp Postfix smtpd Service Info: Host: mail01.add2web.de Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 45.59 seconds ------- START: 109.233.144.80 Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 09:41 CEST Nmap scan report for 109.233.144.80 Host is up (0.0012s latency). Not shown: 998 filtered ports PORT STATE SERVICE VERSION 80/tcp open http | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, RPCCheck, X11Probe: | HTTP/1.1 400 Bad request | content-length: 90 | cache-control: no-cache | content-type: text/html | connection: close | <html><body><h1>400 Bad request</h1> | Your browser sent an invalid request. | </body></html> | FourOhFourRequest: | HTTP/1.1 302 Found | content-length: 0 | location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak | cache-control: no-cache | connection: close | GetRequest, HTTPOptions, RTSPRequest: | HTTP/1.1 302 Found | content-length: 0 | location: https:/// | cache-control: no-cache |_ connection: close | http-headers: | content-length: 0 | location: https://109.233.144.80/ | cache-control: no-cache | connection: close | |_ (Request type: GET) 443/tcp open ssl/https | fingerprint-strings: | DNSVersionBindReqTCP, RPCCheck, tor-versions: | HTTP/1.1 400 Bad request | content-length: 90 | cache-control: no-cache | content-type: text/html | connection: close | <html><body><h1>400 Bad request</h1> | Your browser sent an invalid request. | </body></html> | FourOhFourRequest, GetRequest, HTTPOptions, RTSPRequest: | HTTP/1.1 503 Service Unavailable | content-length: 107 | cache-control: no-cache | content-type: text/html | connection: close | <html><body><h1>503 Service Unavailable</h1> | server is available to handle this request. |_ </body></html> | http-headers: | content-length: 107 | cache-control: no-cache | content-type: text/html | connection: close | |_ (Request type: GET) 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.70%I=7%D=4/4%Time=624AA15B%P=x86_64-pc-linux-gnu%r(GetRe SF:quest,6A,"HTTP/1\.1\x20302\x20Found content-length:\x200 location SF::\x20https:/// cache-control:\x20no-cache connection:\x20close \ SF:n ")%r(HTTPOptions,6A,"HTTP/1\.1\x20302\x20Found content-length:\ SF:x200 location:\x20https:/// cache-control:\x20no-cache connect SF:ion:\x20close ")%r(RTSPRequest,6A,"HTTP/1\.1\x20302\x20Found SF:content-length:\x200 location:\x20https:/// cache-control:\x20no- SF:cache connection:\x20close ")%r(X11Probe,CF,"HTTP/1\.1\x20400 SF:\x20Bad\x20request content-length:\x2090 cache-control:\x20no-cac SF:he content-type:\x20text/html connection:\x20close <html>< SF:body><h1>400\x20Bad\x20request</h1> Your\x20browser\x20sent\x20an\x20i SF:nvalid\x20request\. </body></html> ")%r(FourOhFourRequest,8D,"HTTP/1\ SF:.1\x20302\x20Found content-length:\x200 location:\x20https:///nic SF:e%20ports%2C/Tri%6Eity\.txt%2ebak cache-control:\x20no-cache conn SF:ection:\x20close ")%r(RPCCheck,CF,"HTTP/1\.1\x20400\x20Bad\x20re SF:quest content-length:\x2090 cache-control:\x20no-cache content SF:-type:\x20text/html connection:\x20close <html><body><h1>400\ SF:x20Bad\x20request</h1> Your\x20browser\x20sent\x20an\x20invalid\x20req SF:uest\. </body></html> ")%r(DNSVersionBindReqTCP,CF,"HTTP/1\.1\x20400\ SF:x20Bad\x20request content-length:\x2090 cache-control:\x20no-cach SF:e content-type:\x20text/html connection:\x20close <html><b SF:ody><h1>400\x20Bad\x20request</h1> Your\x20browser\x20sent\x20an\x20in SF:valid\x20request\. </body></html> ")%r(DNSStatusRequestTCP,CF,"HTTP/1 SF:\.1\x20400\x20Bad\x20request content-length:\x2090 cache-control: SF:\x20no-cache content-type:\x20text/html connection:\x20close \ SF:r <html><body><h1>400\x20Bad\x20request</h1> Your\x20browser\x20sent\ SF:x20an\x20invalid\x20request\. </body></html> ")%r(Help,CF,"HTTP/1\.1\ SF:x20400\x20Bad\x20request content-length:\x2090 cache-control:\x20 SF:no-cache content-type:\x20text/html connection:\x20close < SF:html><body><h1>400\x20Bad\x20request</h1> Your\x20browser\x20sent\x20a SF:n\x20invalid\x20request\. </body></html> "); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.70%T=SSL%I=7%D=4/4%Time=624AA161%P=x86_64-pc-linux-gnu% SF:r(GetRequest,E9,"HTTP/1\.1\x20503\x20Service\x20Unavailable content- SF:length:\x20107 cache-control:\x20no-cache content-type:\x20text/h SF:tml connection:\x20close <html><body><h1>503\x20Service\x20Un SF:available</h1> No\x20server\x20is\x20available\x20to\x20handle\x20this SF:\x20request\. </body></html> ")%r(HTTPOptions,E9,"HTTP/1\.1\x20503\x2 SF:0Service\x20Unavailable content-length:\x20107 cache-control:\x20 SF:no-cache content-type:\x20text/html connection:\x20close < SF:html><body><h1>503\x20Service\x20Unavailable</h1> No\x20server\x20is\x SF:20available\x20to\x20handle\x20this\x20request\. </body></html> ")%r( SF:FourOhFourRequest,E9,"HTTP/1\.1\x20503\x20Service\x20Unavailable con SF:tent-length:\x20107 cache-control:\x20no-cache content-type:\x20t SF:ext/html connection:\x20close <html><body><h1>503\x20Service\ SF:x20Unavailable</h1> No\x20server\x20is\x20available\x20to\x20handle\x2 SF:0this\x20request\. </body></html> ")%r(tor-versions,CF,"HTTP/1\.1\x20 SF:400\x20Bad\x20request content-length:\x2090 cache-control:\x20no- SF:cache content-type:\x20text/html connection:\x20close <htm SF:l><body><h1>400\x20Bad\x20request</h1> Your\x20browser\x20sent\x20an\x SF:20invalid\x20request\. </body></html> ")%r(RTSPRequest,E9,"HTTP/1\.1\ SF:x20503\x20Service\x20Unavailable content-length:\x20107 cache-con SF:trol:\x20no-cache content-type:\x20text/html connection:\x20close SF: <html><body><h1>503\x20Service\x20Unavailable</h1> No\x20serve SF:r\x20is\x20available\x20to\x20handle\x20this\x20request\. </body></htm SF:l> ")%r(RPCCheck,CF,"HTTP/1\.1\x20400\x20Bad\x20request content-len SF:gth:\x2090 cache-control:\x20no-cache content-type:\x20text/html\ SF:r connection:\x20close <html><body><h1>400\x20Bad\x20request</h SF:1> Your\x20browser\x20sent\x20an\x20invalid\x20request\. </body></htm SF:l> ")%r(DNSVersionBindReqTCP,CF,"HTTP/1\.1\x20400\x20Bad\x20request \ SF:ncontent-length:\x2090 cache-control:\x20no-cache content-type:\x SF:20text/html connection:\x20close <html><body><h1>400\x20Bad\x SF:20request</h1> Your\x20browser\x20sent\x20an\x20invalid\x20request\. SF:</body></html> "); Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 39.16 seconds ------- START: 109.233.144.83 Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 09:42 CEST Nmap scan report for 109.233.144.83 Host is up (0.0011s latency). Not shown: 998 filtered ports PORT STATE SERVICE VERSION 80/tcp open http | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, Help, RPCCheck, X11Probe: | HTTP/1.1 400 Bad request | content-length: 90 | cache-control: no-cache | content-type: text/html | connection: close | <html><body><h1>400 Bad request</h1> | Your browser sent an invalid request. | </body></html> | FourOhFourRequest: | HTTP/1.1 302 Found | content-length: 0 | location: https:///nice%20ports%2C/Tri%6Eity.txt%2ebak | cache-control: no-cache | connection: close | GetRequest, HTTPOptions, RTSPRequest: | HTTP/1.1 302 Found | content-length: 0 | location: https:/// | cache-control: no-cache |_ connection: close | http-headers: | content-length: 0 | location: https://109.233.144.83/ | cache-control: no-cache | connection: close | |_ (Request type: GET) 443/tcp open ssl/https | fingerprint-strings: | DNSVersionBindReqTCP, RPCCheck, tor-versions: | HTTP/1.1 400 Bad request | content-length: 90 | cache-control: no-cache | content-type: text/html | connection: close | <html><body><h1>400 Bad request</h1> | Your browser sent an invalid request. | </body></html> | FourOhFourRequest, GetRequest, HTTPOptions, RTSPRequest: | HTTP/1.1 503 Service Unavailable | content-length: 107 | cache-control: no-cache | content-type: text/html | connection: close | <html><body><h1>503 Service Unavailable</h1> | server is available to handle this request. |_ </body></html> | http-headers: | content-length: 107 | cache-control: no-cache | content-type: text/html | connection: close | |_ (Request type: GET) 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.70%I=7%D=4/4%Time=624AA184%P=x86_64-pc-linux-gnu%r(GetRe SF:quest,6A,"HTTP/1\.1\x20302\x20Found content-length:\x200 location SF::\x20https:/// cache-control:\x20no-cache connection:\x20close \ SF:n ")%r(HTTPOptions,6A,"HTTP/1\.1\x20302\x20Found content-length:\ SF:x200 location:\x20https:/// cache-control:\x20no-cache connect SF:ion:\x20close ")%r(RTSPRequest,6A,"HTTP/1\.1\x20302\x20Found SF:content-length:\x200 location:\x20https:/// cache-control:\x20no- SF:cache connection:\x20close ")%r(X11Probe,CF,"HTTP/1\.1\x20400 SF:\x20Bad\x20request content-length:\x2090 cache-control:\x20no-cac SF:he content-type:\x20text/html connection:\x20close <html>< SF:body><h1>400\x20Bad\x20request</h1> Your\x20browser\x20sent\x20an\x20i SF:nvalid\x20request\. </body></html> ")%r(FourOhFourRequest,8D,"HTTP/1\ SF:.1\x20302\x20Found content-length:\x200 location:\x20https:///nic SF:e%20ports%2C/Tri%6Eity\.txt%2ebak cache-control:\x20no-cache conn SF:ection:\x20close ")%r(RPCCheck,CF,"HTTP/1\.1\x20400\x20Bad\x20re SF:quest content-length:\x2090 cache-control:\x20no-cache content SF:-type:\x20text/html connection:\x20close <html><body><h1>400\ SF:x20Bad\x20request</h1> Your\x20browser\x20sent\x20an\x20invalid\x20req SF:uest\. </body></html> ")%r(DNSVersionBindReqTCP,CF,"HTTP/1\.1\x20400\ SF:x20Bad\x20request content-length:\x2090 cache-control:\x20no-cach SF:e content-type:\x20text/html connection:\x20close <html><b SF:ody><h1>400\x20Bad\x20request</h1> Your\x20browser\x20sent\x20an\x20in SF:valid\x20request\. </body></html> ")%r(DNSStatusRequestTCP,CF,"HTTP/1 SF:\.1\x20400\x20Bad\x20request content-length:\x2090 cache-control: SF:\x20no-cache content-type:\x20text/html connection:\x20close \ SF:r <html><body><h1>400\x20Bad\x20request</h1> Your\x20browser\x20sent\ SF:x20an\x20invalid\x20request\. </body></html> ")%r(Help,CF,"HTTP/1\.1\ SF:x20400\x20Bad\x20request content-length:\x2090 cache-control:\x20 SF:no-cache content-type:\x20text/html connection:\x20close < SF:html><body><h1>400\x20Bad\x20request</h1> Your\x20browser\x20sent\x20a SF:n\x20invalid\x20request\. </body></html> "); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.70%T=SSL%I=7%D=4/4%Time=624AA18A%P=x86_64-pc-linux-gnu% SF:r(GetRequest,E9,"HTTP/1\.1\x20503\x20Service\x20Unavailable content- SF:length:\x20107 cache-control:\x20no-cache content-type:\x20text/h SF:tml connection:\x20close <html><body><h1>503\x20Service\x20Un SF:available</h1> No\x20server\x20is\x20available\x20to\x20handle\x20this SF:\x20request\. </body></html> ")%r(HTTPOptions,E9,"HTTP/1\.1\x20503\x2 SF:0Service\x20Unavailable content-length:\x20107 cache-control:\x20 SF:no-cache content-type:\x20text/html connection:\x20close < SF:html><body><h1>503\x20Service\x20Unavailable</h1> No\x20server\x20is\x SF:20available\x20to\x20handle\x20this\x20request\. </body></html> ")%r( SF:FourOhFourRequest,E9,"HTTP/1\.1\x20503\x20Service\x20Unavailable con SF:tent-length:\x20107 cache-control:\x20no-cache content-type:\x20t SF:ext/html connection:\x20close <html><body><h1>503\x20Service\ SF:x20Unavailable</h1> No\x20server\x20is\x20available\x20to\x20handle\x2 SF:0this\x20request\. </body></html> ")%r(tor-versions,CF,"HTTP/1\.1\x20 SF:400\x20Bad\x20request content-length:\x2090 cache-control:\x20no- SF:cache content-type:\x20text/html connection:\x20close <htm SF:l><body><h1>400\x20Bad\x20request</h1> Your\x20browser\x20sent\x20an\x SF:20invalid\x20request\. </body></html> ")%r(RTSPRequest,E9,"HTTP/1\.1\ SF:x20503\x20Service\x20Unavailable content-length:\x20107 cache-con SF:trol:\x20no-cache content-type:\x20text/html connection:\x20close SF: <html><body><h1>503\x20Service\x20Unavailable</h1> No\x20serve SF:r\x20is\x20available\x20to\x20handle\x20this\x20request\. </body></htm SF:l> ")%r(RPCCheck,CF,"HTTP/1\.1\x20400\x20Bad\x20request content-len SF:gth:\x2090 cache-control:\x20no-cache content-type:\x20text/html\ SF:r connection:\x20close <html><body><h1>400\x20Bad\x20request</h SF:1> Your\x20browser\x20sent\x20an\x20invalid\x20request\. </body></htm SF:l> ")%r(DNSVersionBindReqTCP,CF,"HTTP/1\.1\x20400\x20Bad\x20request \ SF:ncontent-length:\x2090 cache-control:\x20no-cache content-type:\x SF:20text/html connection:\x20close <html><body><h1>400\x20Bad\x SF:20request</h1> Your\x20browser\x20sent\x20an\x20invalid\x20request\. SF:</body></html> "); Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 36.69 seconds ------- START: 109.233.144.86 Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 09:43 CEST Nmap scan report for 109.233.144.86 Host is up (0.0012s latency). Not shown: 998 filtered ports PORT STATE SERVICE VERSION 80/tcp open http Apache/2.2.22 (Debian) | fingerprint-strings: | GetRequest: | HTTP/1.1 200 OK | date: Mon, 04 Apr 2022 07:43:41 GMT | server: Apache/2.2.22 (Debian) | x-powered-by: PHP/5.4.45-0+deb7u7 | set-cookie: vulnlib=e129f4m5g1bl67kg31a3ct7ij7; path=/ | expires: Thu, 19 Nov 1981 08:52:00 GMT | cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 | pragma: no-cache | vary: Accept-Encoding | content-type: text/html | connection: close | <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" | "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> | <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> | <head> | <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> | <title> | VulnLIB - Eine umfassende Bibliothek f | IT-Schwachstellen und L | sungen</title> | <link rel="stylesheet" type="text/css" href="app/skins/base_skin/master.css" /> | <link rel="stylesheet" type="text/css" href="app/skins/base_skin/s | HTTPOptions: | HTTP/1.1 200 OK | date: Mon, 04 Apr 2022 07:43:41 GMT | server: Apache/2.2.22 (Debian) | x-powered-by: PHP/5.4.45-0+deb7u4 | set-cookie: vulnlib=nsbdbuqkdp9fjpdrbjsvrp53p0; path=/ | expires: Thu, 19 Nov 1981 08:52:00 GMT | cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 | pragma: no-cache | vary: Accept-Encoding | content-type: text/html | connection: close | <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" | "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> | <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> | <head> | <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> | <title> | VulnLIB - Eine umfassende Bibliothek f | IT-Schwachstellen und L | sungen</title> | <link rel="stylesheet" type="text/css" href="app/skins/base_skin/master.css" /> |_ <link rel="stylesheet" type="text/css" href="app/skins/base_skin/s | http-headers: | date: Mon, 04 Apr 2022 07:43:53 GMT | server: Apache/2.2.22 (Debian) | x-powered-by: PHP/5.4.45-0+deb7u7 | set-cookie: vulnlib=a4945acgjmkvb6eodk8c3d2j20; path=/ | expires: Thu, 19 Nov 1981 08:52:00 GMT | cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 | pragma: no-cache | vary: Accept-Encoding | content-type: text/html | connection: close | |_ (Request type: HEAD) |_http-server-header: Apache/2.2.22 (Debian) 443/tcp open ssl/https Apache/2.2.22 (Debian) | fingerprint-strings: | GetRequest: | HTTP/1.1 200 OK | date: Mon, 04 Apr 2022 07:43:47 GMT | server: Apache/2.2.22 (Debian) | x-powered-by: PHP/5.4.45-0+deb7u7 | set-cookie: vulnlib=j8tknt7mna04h3s85qfbmvq4j7; path=/ | expires: Thu, 19 Nov 1981 08:52:00 GMT | cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 | pragma: no-cache | vary: Accept-Encoding | content-type: text/html | connection: close | <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" | "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> | <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> | <head> | <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> | <title> | VulnLIB - Eine umfassende Bibliothek f | IT-Schwachstellen und L | sungen</title> | <link rel="stylesheet" type="text/css" href="app/skins/base_skin/master.css" /> | <link rel="stylesheet" type="text/css" href="app/skins/base_skin/s | HTTPOptions: | HTTP/1.1 200 OK | date: Mon, 04 Apr 2022 07:43:48 GMT | server: Apache/2.2.22 (Debian) | x-powered-by: PHP/5.4.45-0+deb7u4 | set-cookie: vulnlib=uju15v3ajq9dnjqbc08h7g9lh3; path=/ | expires: Thu, 19 Nov 1981 08:52:00 GMT | cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 | pragma: no-cache | vary: Accept-Encoding | content-type: text/html | connection: close | <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" | "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> | <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> | <head> | <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> | <title> | VulnLIB - Eine umfassende Bibliothek f | IT-Schwachstellen und L | sungen</title> | <link rel="stylesheet" type="text/css" href="app/skins/base_skin/master.css" /> |_ <link rel="stylesheet" type="text/css" href="app/skins/base_skin/s | http-headers: | date: Mon, 04 Apr 2022 07:43:53 GMT | server: Apache/2.2.22 (Debian) | x-powered-by: PHP/5.4.45-0+deb7u4 | set-cookie: vulnlib=kkmi3hmcvgb1m6thhnh09gibk2; path=/ | expires: Thu, 19 Nov 1981 08:52:00 GMT | cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 | pragma: no-cache | vary: Accept-Encoding | content-type: text/html | connection: close | |_ (Request type: HEAD) |_http-server-header: Apache/2.2.22 (Debian) 2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service : ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port80-TCP:V=7.70%I=7%D=4/4%Time=624AA1AE%P=x86_64-pc-linux-gnu%r(GetRe SF:quest,24C2,"HTTP/1\.1\x20200\x20OK date:\x20Mon,\x2004\x20Apr\x20202 SF:2\x2007:43:41\x20GMT server:\x20Apache/2\.2\.22\x20\(Debian\) x-p SF:owered-by:\x20PHP/5\.4\.45-0\+deb7u7 set-cookie:\x20vulnlib=e129f4m5 SF:g1bl67kg31a3ct7ij7;\x20path=/ expires:\x20Thu,\x2019\x20Nov\x201981\ SF:x2008:52:00\x20GMT cache-control:\x20no-store,\x20no-cache,\x20must- SF:revalidate,\x20post-check=0,\x20pre-check=0 pragma:\x20no-cache v SF:ary:\x20Accept-Encoding content-type:\x20text/html connection:\x2 SF:0close <!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20XHTML\x20 SF:1\.0\x20Transitional//EN\" \"http://www\.w3\.org/TR/xhtml1/DTD/xhtml SF:1-transitional\.dtd\"> <html\x20xmlns=\"http://www\.w3\.org/1999/xhtml SF:\"\x20xml:lang=\"en\"\x20lang=\"en\"> <head> \x20\x20<meta\x20http-eq SF:uiv=\"Content-Type\"\x20content=\"text/html;\x20charset=UTF-8\"\x20/> SF:\x20\x20<title> \x20\x20VulnLIB\x20-\x20Eine\x20umfassende\x20Biblioth SF:ek\x20f\xc3\xbcr\x20IT-Schwachstellen\x20und\x20L\xc3\xb6sungen</title> SF: \x20\x20 \x20\x20<link\x20rel=\"stylesheet\"\x20type=\"text/css\"\x2 SF:0href=\"app/skins/base_skin/master\.css\"\x20/> \x20\x20<link\x20rel=\ SF:"stylesheet\"\x20type=\"text/css\"\x20href=\"app/skins/base_skin/s")%r( SF:HTTPOptions,24C2,"HTTP/1\.1\x20200\x20OK date:\x20Mon,\x2004\x20Apr\ SF:x202022\x2007:43:41\x20GMT server:\x20Apache/2\.2\.22\x20\(Debian\)\ SF:r x-powered-by:\x20PHP/5\.4\.45-0\+deb7u4 set-cookie:\x20vulnlib=ns SF:bdbuqkdp9fjpdrbjsvrp53p0;\x20path=/ expires:\x20Thu,\x2019\x20Nov\x2 SF:01981\x2008:52:00\x20GMT cache-control:\x20no-store,\x20no-cache,\x2 SF:0must-revalidate,\x20post-check=0,\x20pre-check=0 pragma:\x20no-cach SF:e vary:\x20Accept-Encoding content-type:\x20text/html connecti SF:on:\x20close <!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20XHT SF:ML\x201\.0\x20Transitional//EN\" \"http://www\.w3\.org/TR/xhtml1/DTD SF:/xhtml1-transitional\.dtd\"> <html\x20xmlns=\"http://www\.w3\.org/1999 SF:/xhtml\"\x20xml:lang=\"en\"\x20lang=\"en\"> <head> \x20\x20<meta\x20h SF:ttp-equiv=\"Content-Type\"\x20content=\"text/html;\x20charset=UTF-8\"\x SF:20/> \x20\x20<title> \x20\x20VulnLIB\x20-\x20Eine\x20umfassende\x20Bi SF:bliothek\x20f\xc3\xbcr\x20IT-Schwachstellen\x20und\x20L\xc3\xb6sungen</ SF:title> \x20\x20 \x20\x20<link\x20rel=\"stylesheet\"\x20type=\"text/cs SF:s\"\x20href=\"app/skins/base_skin/master\.css\"\x20/> \x20\x20<link\x2 SF:0rel=\"stylesheet\"\x20type=\"text/css\"\x20href=\"app/skins/base_skin/ SF:s"); ==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== SF-Port443-TCP:V=7.70%T=SSL%I=7%D=4/4%Time=624AA1B4%P=x86_64-pc-linux-gnu% SF:r(GetRequest,24C2,"HTTP/1\.1\x20200\x20OK date:\x20Mon,\x2004\x20Apr SF:\x202022\x2007:43:47\x20GMT server:\x20Apache/2\.2\.22\x20\(Debian\) SF: x-powered-by:\x20PHP/5\.4\.45-0\+deb7u7 set-cookie:\x20vulnlib=j SF:8tknt7mna04h3s85qfbmvq4j7;\x20path=/ expires:\x20Thu,\x2019\x20Nov\x SF:201981\x2008:52:00\x20GMT cache-control:\x20no-store,\x20no-cache,\x SF:20must-revalidate,\x20post-check=0,\x20pre-check=0 pragma:\x20no-cac SF:he vary:\x20Accept-Encoding content-type:\x20text/html connect SF:ion:\x20close <!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20XH SF:TML\x201\.0\x20Transitional//EN\" \"http://www\.w3\.org/TR/xhtml1/DT SF:D/xhtml1-transitional\.dtd\"> <html\x20xmlns=\"http://www\.w3\.org/199 SF:9/xhtml\"\x20xml:lang=\"en\"\x20lang=\"en\"> <head> \x20\x20<meta\x20 SF:http-equiv=\"Content-Type\"\x20content=\"text/html;\x20charset=UTF-8\"\ SF:x20/> \x20\x20<title> \x20\x20VulnLIB\x20-\x20Eine\x20umfassende\x20B SF:ibliothek\x20f\xc3\xbcr\x20IT-Schwachstellen\x20und\x20L\xc3\xb6sungen< SF:/title> \x20\x20 \x20\x20<link\x20rel=\"stylesheet\"\x20type=\"text/c SF:ss\"\x20href=\"app/skins/base_skin/master\.css\"\x20/> \x20\x20<link\x SF:20rel=\"stylesheet\"\x20type=\"text/css\"\x20href=\"app/skins/base_skin SF:/s")%r(HTTPOptions,24C2,"HTTP/1\.1\x20200\x20OK date:\x20Mon,\x2004\ SF:x20Apr\x202022\x2007:43:48\x20GMT server:\x20Apache/2\.2\.22\x20\(De SF:bian\) x-powered-by:\x20PHP/5\.4\.45-0\+deb7u4 set-cookie:\x20vul SF:nlib=uju15v3ajq9dnjqbc08h7g9lh3;\x20path=/ expires:\x20Thu,\x2019\x2 SF:0Nov\x201981\x2008:52:00\x20GMT cache-control:\x20no-store,\x20no-ca SF:che,\x20must-revalidate,\x20post-check=0,\x20pre-check=0 pragma:\x20 SF:no-cache vary:\x20Accept-Encoding content-type:\x20text/html c SF:onnection:\x20close <!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD SF:\x20XHTML\x201\.0\x20Transitional//EN\" \"http://www\.w3\.org/TR/xht SF:ml1/DTD/xhtml1-transitional\.dtd\"> <html\x20xmlns=\"http://www\.w3\.o SF:rg/1999/xhtml\"\x20xml:lang=\"en\"\x20lang=\"en\"> <head> \x20\x20<me SF:ta\x20http-equiv=\"Content-Type\"\x20content=\"text/html;\x20charset=UT SF:F-8\"\x20/> \x20\x20<title> \x20\x20VulnLIB\x20-\x20Eine\x20umfassend SF:e\x20Bibliothek\x20f\xc3\xbcr\x20IT-Schwachstellen\x20und\x20L\xc3\xb6s SF:ungen</title> \x20\x20 \x20\x20<link\x20rel=\"stylesheet\"\x20type=\" SF:text/css\"\x20href=\"app/skins/base_skin/master\.css\"\x20/> \x20\x20< SF:link\x20rel=\"stylesheet\"\x20type=\"text/css\"\x20href=\"app/skins/bas SF:e_skin/s"); Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 38.16 seconds ------- START: mail01.add2web.de Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 09:39 CEST Nmap scan report for mail01.add2web.de (109.233.144.67) Host is up (0.0012s latency). Not shown: 988 filtered ports PORT STATE SERVICE VERSION 20/tcp closed ftp-data 21/tcp open ftp Pure-FTPd 25/tcp open smtp Postfix smtpd 80/tcp open http Apache httpd 2.4.25 | http-headers: | Date: Mon, 04 Apr 2022 07:40:20 GMT | Server: Apache/2.4.25 | Last-Modified: Wed, 23 Mar 2016 13:53:12 GMT | ETag: "0-52eb7a6918200" | Accept-Ranges: bytes | Connection: close | Content-Type: text/html | |_ (Request type: HEAD) |_http-server-header: Apache/2.4.25 110/tcp open pop3 Dovecot pop3d 143/tcp open imap Dovecot imapd 443/tcp open ssl/http Apache httpd 2.4.25 | http-headers: | Date: Mon, 04 Apr 2022 07:40:23 GMT | Server: Apache/2.4.25 | X-Powered-By: PHP/5.6.33-0+deb8u1 | Vary: Accept-Encoding,Cookie | X-Redirect-By: WordPress | Location: https://ahornapotheke-ma.de/ | Content-Length: 0 | Connection: close | Content-Type: text/html; charset=UTF-8 | |_ (Request type: GET) |_http-server-header: Apache/2.4.25 465/tcp open ssl/smtp Postfix smtpd 587/tcp open smtp Postfix smtpd 993/tcp open ssl/imaps? 995/tcp open ssl/pop3s? 5225/tcp open smtp Postfix smtpd Service Info: Host: mail01.add2web.de Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 42.78 seconds ------- START: mail01.ciproc.de Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 09:30 CEST Nmap scan report for mail01.ciproc.de (172.21.11.11) Host is up (0.00066s latency). Not shown: 824 filtered ports, 173 closed ports PORT STATE SERVICE VERSION 21/tcp open ftp Pure-FTPd 25/tcp open smtp Postfix smtpd 110/tcp open pop3 Dovecot pop3d MAC Address: 00:16:C1:A1:A0:01 (Eleksen) Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 247.99 seconds
------- START: 109.233.144.66_ssl Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 07:51 CEST Nmap scan report for mail01.ciproc.de (109.233.144.66) Host is up (0.0013s latency). Not shown: 1023 filtered ports PORT STATE SERVICE 20/tcp closed ftp-data 21/tcp open ftp | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | warnings: | Weak certificate signature: SHA1 | TLSv1.1: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | warnings: | Weak certificate signature: SHA1 | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | warnings: | Weak certificate signature: SHA1 |_ least strength: A 25/tcp open smtp | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client |_ least strength: A 80/tcp open http 110/tcp open pop3 | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key |_ least strength: A 143/tcp open imap | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key |_ least strength: A 443/tcp open https | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | TLSv1.1: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server |_ least strength: A 465/tcp open smtps | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | compressors: | NULL | cipher preference: client |_ least strength: A 587/tcp open submission | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client |_ least strength: A 993/tcp open imaps | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key |_ least strength: A 995/tcp open pop3s | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key |_ least strength: A Nmap done: 1 IP address (1 host up) scanned in 32.37 seconds ------- START: 109.233.144.67_ssl Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 08:00 CEST Nmap scan report for mail01.add2web.de (109.233.144.67) Host is up (0.0013s latency). Not shown: 1023 filtered ports PORT STATE SERVICE 20/tcp closed ftp-data 21/tcp open ftp | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | warnings: | Weak certificate signature: SHA1 | TLSv1.1: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | warnings: | Weak certificate signature: SHA1 | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | warnings: | Weak certificate signature: SHA1 |_ least strength: A 25/tcp open smtp | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client |_ least strength: A 80/tcp open http 110/tcp open pop3 | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key |_ least strength: A 143/tcp open imap | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key |_ least strength: A 443/tcp open https | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | TLSv1.1: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server |_ least strength: A 465/tcp open smtps | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | compressors: | NULL | cipher preference: client |_ least strength: A 587/tcp open submission | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client |_ least strength: A 993/tcp open imaps | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key |_ least strength: A 995/tcp open pop3s | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key |_ least strength: A Nmap done: 1 IP address (1 host up) scanned in 35.27 seconds ------- START: 109.233.144.80_ssl Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 08:02 CEST Nmap scan report for 109.233.144.80 Host is up (0.0013s latency). Not shown: 1032 filtered ports PORT STATE SERVICE 80/tcp open http 443/tcp open https | ssl-enum-ciphers: | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server |_ least strength: A Nmap done: 1 IP address (1 host up) scanned in 13.54 seconds ------- START: 109.233.144.83_ssl Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 08:03 CEST Nmap scan report for 109.233.144.83 Host is up (0.0013s latency). Not shown: 1032 filtered ports PORT STATE SERVICE 80/tcp open http 443/tcp open https | ssl-enum-ciphers: | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server |_ least strength: A Nmap done: 1 IP address (1 host up) scanned in 15.12 seconds ------- START: 109.233.144.86_ssl Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 08:03 CEST Nmap scan report for 109.233.144.86 Host is up (0.0013s latency). Not shown: 1032 filtered ports PORT STATE SERVICE 80/tcp open http 443/tcp open https | ssl-enum-ciphers: | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server |_ least strength: A Nmap done: 1 IP address (1 host up) scanned in 14.84 seconds ------- START: mail01.add2web.de_ssl Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 08:00 CEST Nmap scan report for mail01.add2web.de (109.233.144.67) Host is up (0.0013s latency). Not shown: 1023 filtered ports PORT STATE SERVICE 20/tcp closed ftp-data 21/tcp open ftp | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | warnings: | Weak certificate signature: SHA1 | TLSv1.1: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | warnings: | Weak certificate signature: SHA1 | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | warnings: | Weak certificate signature: SHA1 |_ least strength: A 25/tcp open smtp | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client |_ least strength: A 80/tcp open http 110/tcp open pop3 | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key |_ least strength: A 143/tcp open imap | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key |_ least strength: A 443/tcp open https | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | TLSv1.1: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server |_ least strength: A 465/tcp open smtps | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | compressors: | NULL | cipher preference: client |_ least strength: A 587/tcp open submission | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client |_ least strength: A 993/tcp open imaps | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key |_ least strength: A 995/tcp open pop3s | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key |_ least strength: A Nmap done: 1 IP address (1 host up) scanned in 30.45 seconds ------- START: mail01.ciproc.de_ssl Starting Nmap 7.70 ( https://nmap.org ) at 2022-04-04 07:51 CEST Nmap scan report for mail01.ciproc.de (109.233.144.66) Host is up (0.0012s latency). Not shown: 1023 filtered ports PORT STATE SERVICE 20/tcp closed ftp-data 21/tcp open ftp | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | warnings: | Weak certificate signature: SHA1 | TLSv1.1: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | warnings: | Weak certificate signature: SHA1 | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | warnings: | Weak certificate signature: SHA1 |_ least strength: A 25/tcp open smtp | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client |_ least strength: A 80/tcp open http 110/tcp open pop3 | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key |_ least strength: A 143/tcp open imap | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key |_ least strength: A 443/tcp open https | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | TLSv1.1: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: server |_ least strength: A 465/tcp open smtps | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | compressors: | NULL | cipher preference: client |_ least strength: A 587/tcp open submission | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 2048) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client |_ least strength: A 993/tcp open imaps | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key |_ least strength: A 995/tcp open pop3s | ssl-enum-ciphers: | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 1024) - A | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A | TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 1024) - A | TLS_DHE_RSA_WITH_SEED_CBC_SHA (dh 1024) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp384r1) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A | TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_SEED_CBC_SHA (rsa 2048) - A | compressors: | NULL | cipher preference: client | warnings: | Key exchange (dh 1024) of lower strength than certificate key |_ least strength: A Nmap done: 1 IP address (1 host up) scanned in 23.58 seconds
Scan subtype: | |
Origin IP: | |
Details: | |
Command: |
|
Version: | (official web site) |
Output: |
unable to load certificate 140096431465856:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 140424623244672:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 140254868620672:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 140409987429760:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 140472452547968:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 140224113870208:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 140562270815616:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 139683323512192:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 140175975970176:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 139843384882560:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE ------- START: 109.233.144.66:443 subject=CN = 00.ciproc.de notBefore=Jan 14 02:06:25 2022 GMT notAfter=Apr 14 02:06:24 2022 GMT -----BEGIN CERTIFICATE----- MIIFHzCCBAegAwIBAgISBHRTgvxqKyXPbcx1jt808FOzMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMjAxMTQwMjA2MjVaFw0yMjA0MTQwMjA2MjRaMBcxFTATBgNVBAMT DDAwLmNpcHJvYy5kZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPzb T5zh38PLCDZMLKMWKeSjtjpU7sLNJ0O83ijGbNfbVCk+fJzzUFHwgKZ0thaLJOSo QywTtJep0GhNS6jU3pMzbIc0cFRQ5h0isg1Z7mXEVR/ddZ0Jng5oAL6DcSoqSmKd f9eV6r0xwizfWR1q/YvJdtudt5k2Lvles/2SRzDWs8gdAlAdFCSrE8AgV4W+LJw3 4YyJ2/uuPO6Xx58rnsv5CGojUiGZYzdtn3+oh61/Rw8MSlr7utqIa5C0tKyOCQI/ LmdepoRjO5wQZYr1tKHTCCvIeUhLStI3JVVIxHW3uZ4bTi0Q6FfKAmFD/XJeLxmg NrpfaAcvv7en5qR3Oh0CAwEAAaOCAkgwggJEMA4GA1UdDwEB/wQEAwIFoDAdBgNV HSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4E FgQU26mLaiBY+/pmPoAO1OmoaLp1eWAwHwYDVR0jBBgwFoAUFC6zF7dYVsuuUAlA 5h+vnYsUwsYwVQYIKwYBBQUHAQEESTBHMCEGCCsGAQUFBzABhhVodHRwOi8vcjMu by5sZW5jci5vcmcwIgYIKwYBBQUHMAKGFmh0dHA6Ly9yMy5pLmxlbmNyLm9yZy8w FwYDVR0RBBAwDoIMMDAuY2lwcm9jLmRlMEwGA1UdIARFMEMwCAYGZ4EMAQIBMDcG CysGAQQBgt8TAQEBMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly9jcHMubGV0c2VuY3J5 cHQub3JnMIIBBQYKKwYBBAHWeQIEAgSB9gSB8wDxAHcA36Veq2iCTx9sre64X04+ WurNohKkal6OOxLAIERcKnMAAAF+Voz3hwAABAMASDBGAiEA2We3SYo07Yy4TD0+ OC/6XzhzhaxZJfgzxPvCCNtIDhMCIQDiySt51eNqM5PYZuh9f4IBNIC7G+Cl4Wya zeTznLF/XQB2ACl5vvCeOTkh8FZzn2Old+W+V32cYAr4+U1dJlwlXceEAAABflaM 93cAAAQDAEcwRQIhAMHHhFscQYlRAnakNZ2pLom1KNLJ/xcHHdtWr6+6dJqiAiBz 4meq13NVVC6hTFCrjTmcO82WDhrFpQgF5btFuBlvGDANBgkqhkiG9w0BAQsFAAOC AQEAT7w0pM7rSZwIRe1EQvOXnSYBxtg+UCVnOm8EgKMbXVRGIhmUsl/3U2SYVDVk jR11rYEL6lQRR0tNffvgST22g6cEvAfjQJYY5C19yI2uMKWxA6lkKJZE8lke8AaJ dM8CEr0XVFoFnaK7odHvc/t3TTYqutA3RGYqFU0XN+tGDviWq6HXOzQfAkcQ68yY IkWfn7wMWiccAoEVEyqWjn4nXZzfJT4HVXNHL0wopbbrr9d0vOoI3/o5Fqj2/onO nxLB+UKsM8illTEcCh63du9RIvfLjzcBpFdYrYH89IWTAXZJqcuoTQhSgDRmdpYm CL87+M0/ftJ0rkh3Q6ZxrZuN6A== -----END CERTIFICATE----- ------- START: 109.233.144.66:465 subject=CN = mail01.ciproc.de notBefore=Jan 30 12:49:21 2022 GMT notAfter=Apr 30 12:49:20 2022 GMT -----BEGIN CERTIFICATE----- MIIFJTCCBA2gAwIBAgISBBi/vDMMW+Ksw+GeRlJ+79UPMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMjAxMzAxMjQ5MjFaFw0yMjA0MzAxMjQ5MjBaMBsxGTAXBgNVBAMT EG1haWwwMS5laXByb2MuZGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB AQC4mbWLQtQaNOuMixPRBIJ7Np6d6LlnfBgMV/S+v2x7MLgZd+s1orfvwhQeynYm s50wrsClNchJNONValGVYTwTAZIA8vNZq60qkDD7hjS/MaYdh6kvJ1OFD4O1hMFT Fg7qUYHjpSbchZbvhpc0DK/BNbEmOrHQePiF5H65HHkdyDhmCvb+vXXsqjNf/B7o gTen5XfU3RtypJkZBmMkSs54DXaLT8Lk+J8k33oTvxyOIaEpht/ecPiRsIyUjfEC nLAWUSEj2qt3NOgqbpHz91sGhbpukF0mba5S2JrqNtfSPFrcqYPnv9ks1ilF4wx6 hVlHNciFn05wIDPma4mFovcJAgMBAAGjggJKMIICRjAOBgNVHQ8BAf8EBAMCBaAw HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYD VR0OBBYEFINpMZ13eMIQhwgNwyCxcVbaljuZMB8GA1UdIwQYMBaAFBQusxe3WFbL rlAJQOYfr52LFMLGMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDov L3IzLm8ubGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vcjMuaS5sZW5jci5v cmcvMBsGA1UdEQQUMBKCEG1haWwwMS5laXByb2MuZGUwTAYDVR0gBEUwQzAIBgZn gQwBAgEwNwYLKwYBBAGC3xMBAQEwKDAmBggrBgEFBQcCARYaaHR0cDovL2Nwcy5s ZXRzZW5jcnlwdC5vcmcwggEDBgorBgEEAdZ5AgQCBIH0BIHxAO8AdQApeb7wnjk5 IfBWc59jpXflvld9nGAK+PlNXSZcJV3HhAAAAX6rP1UaAAAEAwBGMEQCIBPXvjvq 9e5VFnYChcvbl0EeZnbcIUQZxj3QEW3vAHm9AiBZSQDQcOXtF4mop7MCxJMqOswp BBwLFDEk1xPy17jmvgB2AG9Tdqwx8DEZ2JkApFEV/3cVHBHZAsEAKQaNsgiaN9kT AAABfqs/Vs8AAAQDAEcwRQIhANmLWXZ+GgQZQsIqp9A/YwgH806uA/kiaTTLFjh7 6CXaAiBuaw2Aq0S+WfhDFZeNiRYARy8O5qkNE7D+H0unJp4AeDANBgkqhkiG9w0B AQsFAAOCAQEAs+xp2sF80DWZ0Rv2RGI74iXXWVqk723u/fLZPEPlDAszfxrdLRB0 tPvhYqvEtgBpiPU9t3qlOFK0tY69xVjCUaE36cT3B6xKTDv4FEPToebo9sYoehoG jcKdbfdTafkjO+mXcguKHovALG1K/SOYWQCk6YV5mvpd1RwzRBcU7AdP7QjjlTPv fM3TEWP/ATybPUoW6Aa5WUm54lMRrMYu7qZX50LB2AEAUCDg6J83xZHSUNn+ttvM LbQGL5+UmlnE2Qr9SRB1Fgfiw+8PqImhAMRHDiSaYSxQOayHIY85hkcyLNiUC9m3 EEkH5FL55HG5aLHrlCz2+khujhLtuhuQZA== -----END CERTIFICATE----- ------- START: 109.233.144.66:993 subject=CN = mail01.ciproc.de notBefore=Dec 1 06:54:35 2021 GMT notAfter=Mar 1 06:54:34 2022 GMT -----BEGIN CERTIFICATE----- MIIFJzCCBA+gAwIBAgISAxItdx0/wLY0GSn5NL6zFms/MA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMTEyMDEwNjU0MzVaFw0yMjAzMDEwNjU0MzRaMBsxGTAXBgNVBAMT EG1haWwwMS5laXByb2MuZGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB AQDA05xc1x0drRRBO8D5aa+MEBE8ku3sU3JzSDL2Rdg5hwIoY37xxvZe06f14oad ETI5qpxbhDm/+KDWjPUeDO0PIx1i7erXfknJkdlsl/g7uiKNCwkLADNxCgcdi8bA YNNps/TdwUdgaHdmQiklpUhUKJPy30kxXfIvxjzLnCvNtl9PecEbqUkpArd6c97i A7kGk3bBv/WTPrAkaA18vCiku8Svx4pJLU/IN5bheMtotBOO+wSTanQ4OtGxMqAe vrSkieUAwwOLI+Z5b4zoSiNzfAK9Hx8Zqpo8Eor1PwTORHIxZL2TyK0RF+LcVxUA ZmVk6pbz888EFRrl7C/jkzuVAgMBAAGjggJMMIICSDAOBgNVHQ8BAf8EBAMCBaAw HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYD VR0OBBYEFEwEPylOu6Uv5Vd0yJmZflz3jL4hMB8GA1UdIwQYMBaAFBQusxe3WFbL rlAJQOYfr52LFMLGMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDov L3IzLm8ubGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vcjMuaS5sZW5jci5v cmcvMBsGA1UdEQQUMBKCEG1haWwwMS5laXByb2MuZGUwTAYDVR0gBEUwQzAIBgZn gQwBAgEwNwYLKwYBBAGC3xMBAQEwKDAmBggrBgEFBQcCARYaaHR0cDovL2Nwcy5s ZXRzZW5jcnlwdC5vcmcwggEFBgorBgEEAdZ5AgQCBIH2BIHzAPEAdgApeb7wnjk5 IfBWc59jpXflvld9nGAK+PlNXSZcJV3HhAAAAX10/PrxAAAEAwBHMEUCIGJvLqGu jUXJQNuMTk22jTb+lH4/eoFcCef5Az8rwJwpAiEA0zznYrL2xc2zFC+cs7neGp7U hwLCxRKaZanDn54OeRAAdwBvU3asMfAxGdiZAKRRFf93FRwR2QLBACkGjbIImjfZ EwAAAX10/PyvAAAEAwBIMEYCIQCrEefTH+8E6CY68N91LU7uunzAlUSV1COz4suf /EQONQIhAM7yXUZsQQFvGAQMeJteFfGij7+NBLEz1cZTGvYgjBC7MA0GCSqGSIb3 DQEBCwUAA4IBAQBTZc3StNxxYChUfqM5U2Bpn/A1kELU+DpA2vZqYGRH5M/crzLZ Phhfj0fVpwgxd6vdIxNZCcw0QEiSS+F1SpNi3z00YALvNoIT9VntFFySRfK/Qt0n DYFVtqhtSJm1I6xq9MKh5lbize5QN3rLGKUQCxAoHyW4F7t8FdM6Smh7uUlxMThr peg5bkegsyla9BCXSwtCmcSxdchpc2kem3NNU2W40HcB6T/iOfTw7ru4THxjDgMf ACv5ilDGw6JPzlFYCHDZhJlZhi2DLOrvCcT+0h0cZL0HAqI1XWivqGhXHanQPK26 8ZvP6dQYW1yyKbPYf6DCsnhrguz4hGPP56PC -----END CERTIFICATE----- ------- START: 109.233.144.66:995 subject=CN = mail01.ciproc.de notBefore=Dec 1 06:54:35 2021 GMT notAfter=Mar 1 06:54:34 2022 GMT -----BEGIN CERTIFICATE----- MIIFJzCCBA+gAwIBAgISAxItdx0/wLY0GSn5NL6zFms/MA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMTEyMDEwNjU0MzVaFw0yMjAzMDEwNjU0MzRaMBsxGTAXBgNVBAMT EG1haWwwMS5laXByb2MuZGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB AQDA05xc1x0drRRBO8D5aa+MEBE8ku3sU3JzSDL2Rdg5hwIoY37xxvZe06f14oad ETI5qpxbhDm/+KDWjPUeDO0PIx1i7erXfknJkdlsl/g7uiKNCwkLADNxCgcdi8bA YNNps/TdwUdgaHdmQiklpUhUKJPy30kxXfIvxjzLnCvNtl9PecEbqUkpArd6c97i A7kGk3bBv/WTPrAkaA18vCiku8Svx4pJLU/IN5bheMtotBOO+wSTanQ4OtGxMqAe vrSkieUAwwOLI+Z5b4zoSiNzfAK9Hx8Zqpo8Eor1PwTORHIxZL2TyK0RF+LcVxUA ZmVk6pbz888EFRrl7C/jkzuVAgMBAAGjggJMMIICSDAOBgNVHQ8BAf8EBAMCBaAw HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYD VR0OBBYEFEwEPylOu6Uv5Vd0yJmZflz3jL4hMB8GA1UdIwQYMBaAFBQusxe3WFbL rlAJQOYfr52LFMLGMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDov L3IzLm8ubGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vcjMuaS5sZW5jci5v cmcvMBsGA1UdEQQUMBKCEG1haWwwMS5laXByb2MuZGUwTAYDVR0gBEUwQzAIBgZn gQwBAgEwNwYLKwYBBAGC3xMBAQEwKDAmBggrBgEFBQcCARYaaHR0cDovL2Nwcy5s ZXRzZW5jcnlwdC5vcmcwggEFBgorBgEEAdZ5AgQCBIH2BIHzAPEAdgApeb7wnjk5 IfBWc59jpXflvld9nGAK+PlNXSZcJV3HhAAAAX10/PrxAAAEAwBHMEUCIGJvLqGu jUXJQNuMTk22jTb+lH4/eoFcCef5Az8rwJwpAiEA0zznYrL2xc2zFC+cs7neGp7U hwLCxRKaZanDn54OeRAAdwBvU3asMfAxGdiZAKRRFf93FRwR2QLBACkGjbIImjfZ EwAAAX10/PyvAAAEAwBIMEYCIQCrEefTH+8E6CY68N91LU7uunzAlUSV1COz4suf /EQONQIhAM7yXUZsQQFvGAQMeJteFfGij7+NBLEz1cZTGvYgjBC7MA0GCSqGSIb3 DQEBCwUAA4IBAQBTZc3StNxxYChUfqM5U2Bpn/A1kELU+DpA2vZqYGRH5M/crzLZ Phhfj0fVpwgxd6vdIxNZCcw0QEiSS+F1SpNi3z00YALvNoIT9VntFFySRfK/Qt0n DYFVtqhtSJm1I6xq9MKh5lbize5QN3rLGKUQCxAoHyW4F7t8FdM6Smh7uUlxMThr peg5bkegsyla9BCXSwtCmcSxdchpc2kem3NNU2W40HcB6T/iOfTw7ru4THxjDgMf ACv5ilDGw6JPzlFYCHDZhJlZhi2DLOrvCcT+0h0cZL0HAqI1XWivqGhXHanQPK26 8ZvP6dQYW1yyKbPYf6DCsnhrguz4hGPP56PC -----END CERTIFICATE----- ------- START: 109.233.144.67:443 subject=CN = ahornapotheke-ma.de notBefore=Jan 3 02:01:18 2022 GMT notAfter=Apr 3 02:01:17 2022 GMT -----BEGIN CERTIFICATE----- MIIFRDCCBCygAwIBAgISBHf9CMAtn7vHVve6j69qZu2FMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMjAxMDMwMjAxMThaFw0yMjA0MDMwMjAxMTdaMB4xHDAaBgNVBAMT E2Fob3JuYXBvdGhla2UtbWEuZGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK AoIBAQDRJFUE7IzZr0vY4a/SuulwcjxRFGc4QpMTxEA8whlnwNylpLhwbj+rZsqj Rrvh0cP/vM0MZbvGbbUptVwXzmLQ3oh6zSQOlfFlKOfGkQ+bqLtX04btHrCNtbVH QZdW29w7hHymnA35o69txFUSHNP9BEy/SKHY3IsrQsx5tj8XRR+0kDT2yvkfvysj kS8ImwDHnTAfJ4NjMb3/WVv0XVK7ZXxM8hNdx42xmdUiFVSKZAfbZ0juiwA8D1sN Q0hUeHna9g92iKLZe3I9HFue9sB8pDulDsIDJre0W6Vi3cqznG7sVrCYiua2S9fs HhS2LnwLorY6zwEEZbNmw5pgmgprAgMBAAGjggJmMIICYjAOBgNVHQ8BAf8EBAMC BaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAw HQYDVR0OBBYEFD2ypLzqhCHc5yp6gObC9rGO6rbwMB8GA1UdIwQYMBaAFBQusxe3 WFbLrlAJQOYfr52LFMLGMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0 cDovL3IzLm8ubGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vcjMuaS5sZW5j ci5vcmcvMDcGA1UdEQQwMC6CE2Fob3JuYXBvdGhla2UtbWEuZGWCF3d3dy5haG9y bmFwb3RoZWtlLW1hLmRlMEwGA1UdIARFMEMwCAYGZ4EMAQIBMDcGCysGAQQBgt8T AQEBMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly9jcHMubGV0c2VuY3J5cHQub3JnMIIB AwYKKwYBBAHWeQIEAgSB9ASB8QDvAHYAQcjKsd8iRkoQxqE6CUKHXk4xixsD6+tL x2jwkGKWBvYAAAF+HeJTlAAABAMARzBFAiEA44zLrsaXELwBYTyh6KP/aOdr2wGc eGNpz422PDVLksACIHP7xwupiQKpPNqQS757hSA3fv9FE3fauTAYNBAPsuPeAHUA RqVV63X6kSAwtaKJafTzfREsQXS+/Um4havy/HD+bUcAAAF+HeJTrAAABAMARjBE AiA2DZiJ8Rt0KVaaouMdgx1qPjYNi2wH1XB+J/Hv0yY/JAIgDsQS5vR8PG/HB4AP l7UmfU69sWGfJVdVi60uM+qyRcIwDQYJKoZIhvcNAQELBQADggEBAAg3JT+eFibn Zehthw7tMNKh2L2MGj9dnR6PePF9eWBjxBIFlhv8HDzctLcCjEv8ue9M/QnAZBI2 bn70QDKItRfIsgh9ZQweiyyc16g1OAu1jqIE4MKR3Rkagd9rpgiAGHIQd0TZsKLp xBIYk/1PbtEhSkzAEcZvI2b0E/zM7y05ubcfgQCMghgni+Tzg4bu0fe8HKPXZGID X9P6sBiiGFkFQEfwbSkQY+CR67qd4DMhm/sBSPRil5RPB6tOuvxiFKoesY92dZMH q30zDJv6QaCt6IUaUw2E3IkWjiDS3MV3sRbglzoZKcvT90V4PxazI4CAN2PizKBW 07f5yCpxoko= -----END CERTIFICATE----- ------- START: 109.233.144.67:465 subject=CN = mail01.add2web.de notBefore=Jan 29 16:03:48 2022 GMT notAfter=Apr 29 16:03:47 2022 GMT -----BEGIN CERTIFICATE----- MIIFKTCCBBGgAwIBAgISBCp/NboAC1ylJXwwTDoLK8DUMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMjAxMjkxNjAzNDhaFw0yMjA0MjkxNjAzNDdaMBwxGjAYBgNVBAMT EW1haWwwMS5hZGQyd2ViLmRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC AQEAnt+TAdgUDjoqtIPSKUnwHwz1ctDGMq/pcvHw9RGCWlPQWiK/TtiahOPz7NFu Fvvbwhi1nlWjCoLVTPdKPrG5IGP1FPfiW09/il23NyP66aofKaKsjNHRkm4t9H3R r8DVEQBcIaNkZ090JSRvv7GI0O4zy/qYf81cVZXj5rSqfAZK92CRLvyUMZQ17h/Q 3rCDBABeu5qCC3T0ovjxKti8Wabw0TtrsfVTfnrpG2qUjS/MxHz8dS3hpGdpMPo4 mXp/bPjwIwrnBVXiQ9JjeQZG5yNFJRkxph045jrcRnDefpfjoDivmAfQd29ldsQr G/vxtrCrqKjDx7TBbjNnm0WPkQIDAQABo4ICTTCCAkkwDgYDVR0PAQH/BAQDAgWg MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0G A1UdDgQWBBQVrOTuTNzmcpcdKgRNGPzOa7qLfTAfBgNVHSMEGDAWgBQULrMXt1hW y65QCUDmH6+dixTCxjBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6 Ly9yMy5vLmxlbmNyLm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL3IzLmkubGVuY3Iu b3JnLzAcBgNVHREEFTATghFtYWlsMDEuYWRkMndlYi5kZTBMBgNVHSAERTBDMAgG BmeBDAECATA3BgsrBgEEAYLfEwEBATAoMCYGCCsGAQUFBwIBFhpodHRwOi8vY3Bz LmxldHNlbmNyeXB0Lm9yZzCCAQUGCisGAQQB1nkCBAIEgfYEgfMA8QB2ACl5vvCe OTkh8FZzn2Old+W+V32cYAr4+U1dJlwlXceEAAABfqbK/2wAAAQDAEcwRQIhAKOX XRlKH/wGhQ+OQU7qfSWM6Ukj/LVEpnf0WqsVy38PAiBQ1IaOSby0gzGxwcwH6q58 lQ/zkJ5Booh2fqVNr/kuegB3AN+lXqtogk8fbK3uuF9OPlrqzaISpGpejjsSwCBE XCpzAAABfqbLAW8AAAQDAEgwRgIhAOv0MuFbqlOJjICsUmOMI1Icfx7EYcba8Hod 3ub7JVdrAiEAipWGPdYinWU6/T2jQTw1yPfGSAp2Bp/34SQP14FvG8QwDQYJKoZI hvcNAQELBQADggEBABOlhHaQa6A9F56oK5Bw2H8hWxAzxk40LbgtPuq84essgBUz FQ3489fPORri8bfJTKO6z49sThHG/XPH/1QEu9pheTD5VKd/CZkdfhj6ijMlqk0M 1xmczp7gpqwGtWIWS+uwDogkFWIaKxhiGhr/Bdhslc2XhcBWXwi1VBHIfVhOsKe8 iLT/d7lqgSsgPAHx39sfjftgAKbkpGfuAzvJqPpP0qVCUxxmzIUe+HVxuIRLQfJ4 ucE0mZaa1hKrfhZ3OVMA5Hp/bwlBsCAjzrU3dmyvF5Mm4/EXXfJFlrARctomVyxs rflSPchvapV/N6NvIm2aUPpxXZ7jGVpR39UbrAA= -----END CERTIFICATE----- ------- START: 109.233.144.67:993 subject=CN = mail01.add2web.de notBefore=Nov 30 13:31:29 2021 GMT notAfter=Feb 28 13:31:28 2022 GMT -----BEGIN CERTIFICATE----- MIIFKDCCBBCgAwIBAgISA2MeZSzTKhHQBb/ry8emQz8FMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMTExMzAxMzMxMjlaFw0yMjAyMjgxMzMxMjhaMBwxGjAYBgNVBAMT EW1haWwwMS5hZGQyd2ViLmRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC AQEAsgSMOIGe+ehDl1irJ6LvxHbuI9redSJ11zT3R27D4VkINCuVTM7qp6UsrkNd ciGZo/XyPamuNb2swxxyVjEPi8bXIGQqkwK/ysiL0Fwe0HQ3PT28KcAk0hKqGIUq wNwM212eiHfIlynX86HDhQjl9Ho5YWeelqfLw1+kPrku9NcEqV0kojphQbcJO5iZ SiimRdC4Zhws6pHkNaMfxrk93JFy/e9vd9mORgc/cgIl66MuDQgfl1AqRyRD7JZH xlfTbx5VkPgMU0WewQFuyeQAzuMas+jcDwSQ49xEIz3ZzmSQ53zYnNA6ehiDWf+V qNATR51J7VS2hj3o9DkcesWKCQIDAQABo4ICTDCCAkgwDgYDVR0PAQH/BAQDAgWg MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0G A1UdDgQWBBRZvMzwDchj9q2cNKEajJcqS8co5TAfBgNVHSMEGDAWgBQULrMXt1hW y65QCUDmH6+dixTCxjBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6 Ly9yMy5vLmxlbmNyLm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL3IzLmkubGVuY3Iu b3JnLzAcBgNVHREEFTATghFtYWlsMDEuYWRkMndlYi5kZTBMBgNVHSAERTBDMAgG BmeBDAECATA3BgsrBgEEAYLfEwEBATAoMCYGCCsGAQUFBwIBFhpodHRwOi8vY3Bz LmxldHNlbmNyeXB0Lm9yZzCCAQQGCisGAQQB1nkCBAIEgfUEgfIA8AB3AEHIyrHf IkZKEMahOglCh15OMYsbA+vrS8do8JBilgb2AAABfXFB+10AAAQDAEgwRgIhAJgD 86T2ztsOIJDlROE+zj2gKhSF2R4mDRfh2z7RbrUVAiEAyhBg7GtmpD8vL+TZ4ZAB iSP6Tosm+qPejL4YUjtt+aMAdQApeb7wnjk5IfBWc59jpXflvld9nGAK+PlNXSZc JV3HhAAAAX1xQftcAAAEAwBGMEQCIEAw4hVnU5yf7szEGZiA/QJcnDM7LitEszRU G9Y5Pyx2AiBn/7lsCy7i4VZcoY/EiZtoXLg6FMZQ2dTGDSSNZ/rSWTANBgkqhkiG 9w0BAQsFAAOCAQEAO+Cu97pVJy3KvZlDefgEuhhwLed/bhR/iC5Dr2WnWP6b6Xyk NZmqWAopTyW5YHig360IJiXu/qLbLMOVeadEqTLEak18IrGtEm1iR9OpRkwTYU87 QvyhabyQdqMEf/gLegFVObeehL8/R2kwJd9zWTW0BMI9LrQmB3EUwbwuCxOmvIBF YzO56wXbowtxYf45KTq6dhNucL417S/PP/2HbNxMbGMwvG4rY/YvwrdgXf725+4W BdJ4r75VbT0OWF+C2ClqZEmQZfZoOHqrynk59+HTPslvAT8ljfpmNA5EcugOzPCM WJu2rEiQUJml/jqoYH0zyZZTKXNgKTBoVidUfg== -----END CERTIFICATE----- ------- START: 109.233.144.67:995 subject=CN = mail01.add2web.de notBefore=Nov 30 13:31:29 2021 GMT notAfter=Feb 28 13:31:28 2022 GMT -----BEGIN CERTIFICATE----- MIIFKDCCBBCgAwIBAgISA2MeZSzTKhHQBb/ry8emQz8FMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMTExMzAxMzMxMjlaFw0yMjAyMjgxMzMxMjhaMBwxGjAYBgNVBAMT EW1haWwwMS5hZGQyd2ViLmRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC AQEAsgSMOIGe+ehDl1irJ6LvxHbuI9redSJ11zT3R27D4VkINCuVTM7qp6UsrkNd ciGZo/XyPamuNb2swxxyVjEPi8bXIGQqkwK/ysiL0Fwe0HQ3PT28KcAk0hKqGIUq wNwM212eiHfIlynX86HDhQjl9Ho5YWeelqfLw1+kPrku9NcEqV0kojphQbcJO5iZ SiimRdC4Zhws6pHkNaMfxrk93JFy/e9vd9mORgc/cgIl66MuDQgfl1AqRyRD7JZH xlfTbx5VkPgMU0WewQFuyeQAzuMas+jcDwSQ49xEIz3ZzmSQ53zYnNA6ehiDWf+V qNATR51J7VS2hj3o9DkcesWKCQIDAQABo4ICTDCCAkgwDgYDVR0PAQH/BAQDAgWg MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0G A1UdDgQWBBRZvMzwDchj9q2cNKEajJcqS8co5TAfBgNVHSMEGDAWgBQULrMXt1hW y65QCUDmH6+dixTCxjBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6 Ly9yMy5vLmxlbmNyLm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL3IzLmkubGVuY3Iu b3JnLzAcBgNVHREEFTATghFtYWlsMDEuYWRkMndlYi5kZTBMBgNVHSAERTBDMAgG BmeBDAECATA3BgsrBgEEAYLfEwEBATAoMCYGCCsGAQUFBwIBFhpodHRwOi8vY3Bz LmxldHNlbmNyeXB0Lm9yZzCCAQQGCisGAQQB1nkCBAIEgfUEgfIA8AB3AEHIyrHf IkZKEMahOglCh15OMYsbA+vrS8do8JBilgb2AAABfXFB+10AAAQDAEgwRgIhAJgD 86T2ztsOIJDlROE+zj2gKhSF2R4mDRfh2z7RbrUVAiEAyhBg7GtmpD8vL+TZ4ZAB iSP6Tosm+qPejL4YUjtt+aMAdQApeb7wnjk5IfBWc59jpXflvld9nGAK+PlNXSZc JV3HhAAAAX1xQftcAAAEAwBGMEQCIEAw4hVnU5yf7szEGZiA/QJcnDM7LitEszRU G9Y5Pyx2AiBn/7lsCy7i4VZcoY/EiZtoXLg6FMZQ2dTGDSSNZ/rSWTANBgkqhkiG 9w0BAQsFAAOCAQEAO+Cu97pVJy3KvZlDefgEuhhwLed/bhR/iC5Dr2WnWP6b6Xyk NZmqWAopTyW5YHig360IJiXu/qLbLMOVeadEqTLEak18IrGtEm1iR9OpRkwTYU87 QvyhabyQdqMEf/gLegFVObeehL8/R2kwJd9zWTW0BMI9LrQmB3EUwbwuCxOmvIBF YzO56wXbowtxYf45KTq6dhNucL417S/PP/2HbNxMbGMwvG4rY/YvwrdgXf725+4W BdJ4r75VbT0OWF+C2ClqZEmQZfZoOHqrynk59+HTPslvAT8ljfpmNA5EcugOzPCM WJu2rEiQUJml/jqoYH0zyZZTKXNgKTBoVidUfg== -----END CERTIFICATE----- ------- START: 109.233.144.80:443 subject=C = DE, ST = Baden-W\C3\C2\BCrttemberg, L = Leingarten, O = Push Corporation, OU = IT, CN = abnehm-challenge-2017.de, emailAddress = webmaster@abnehm-challenge-2017.de notBefore=Oct 23 15:57:01 2016 GMT notAfter=Oct 21 15:57:01 2026 GMT -----BEGIN CERTIFICATE----- MIID+DCCAuACCQDVGTWe3FMMozANBgkqhkiG9w0BAQsFADCBvTELMAkGA1UEBhMC REUxGzAZBgNVBAgUEkJhZGVuLVfDvHJ0dGVtYmVyZzETMBEGA1UEBxMKTGVpbmdh cnRlbjEZMBcGA1UEChMQUHVzaCBDb3Jwb3JhdGlvbjELMAkGA1UECxMCSVQxITAf BgNVBAMTGGFibmVobS1jaGFsbGVuZ2UtMjAxNy5kZTExMC8GCSqGSIb3DQEJARYi d2VibWFzdGVyQGFibmVobS1jaGFsbGVuZ2UtMjAxNy5kZTAeFw0xNjEwMjMxNTU3 MDFaFw0yNjEwMjExNTU3MDFaMIG9MQswCQYDVQQGEwJERTEbMBkGA1UECBQSQmFk ZW4tV8O8cnR0ZW1iZXJnMRMwEQYDVQQHEwpMZWluZ2FydGVuMRkwFwYDVQQKExBQ dXNoIENvcnBvcmF0aW9uMQswCQYDVQQLEwJJVDEhMB8GA1UEAxMYYWJuZWhtLWNo YWxsZW5nZS0yMDE3LmRlMTEwLwYJKoZIhvcNAQkBFiJ3ZWJtYXN0ZXJAYWJuZWht LWNoYWxsZW5nZS0yMDE3LmRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC AQEA0lygrhHc9h8knsbmVUnJzp4kKBwC3kgDdPpjqKrr6g0xUwsjdhoofwEH2OaP 33SVTsZjXw7ov2KJQuqNpdYmIQaDi89w5EPJGXhhOg9VevAFBQmlnXNE0gNX1j4m AXUEtHSCjN9WpfuPMuKdzDnvuMQVjV1WGcQ5MCVSCHmgpC1IhQPjvYgre0kHTOYs pmJ+mBPghhc5DZJx9WIkhRBXjszzoe8nn0q1K8MO/DWHA3GlIdt8kLpXovRHGeU/ 4rfITwrBfsIzeD7Yc4Qsf4iBNYoe+d7BkRGRsV5GsaNsC57IXk/JW/+34FxSV4lF jxXJwDdg022GR5ia4+vEaD1vdwIDAQABMA0GCSqGSIb3DQEBCwUAA4IBAQBkLVfB FM/AgGsmPCEooMzSGaHH2xD9zuRlxIyCAJedyCkeqsiVmy3X0d9JVgUVheaXfDrd Y4oB6NvXLYjNfJdnag4HSI6khgQC9REsuDj+M7M50ZQG+W5NJIpt59ETjYJCNHOB H3LzvI2O3/MKebKnknvlLtZfa54L47jHw3mkLvMq5fCtB7iapAGP5hMqBHjFQJ4l jZ6H85pYCHrxH2TjFa5F70vAPQIMkir6sk/9K7nLtg4CookrYltgiRY0GWdcMyYh ukRVaxNWcTkr1a0o3n61km0Kq/NU/ZZsui6Mj53cg92/acnLCeApsBgoKsvX8ttg ZMZS00YFY6Kp9GOD -----END CERTIFICATE----- ------- START: 109.233.144.83:443 subject=C = DE, ST = Baden-W\C3\C2\BCrttemberg, L = Leingarten, O = Push Corporation, OU = IT, CN = abnehm-challenge-2017.de, emailAddress = webmaster@abnehm-challenge-2017.de notBefore=Oct 23 15:57:01 2016 GMT notAfter=Oct 21 15:57:01 2026 GMT -----BEGIN CERTIFICATE----- MIID+DCCAuACCQDVGTWe3FMMozANBgkqhkiG9w0BAQsFADCBvTELMAkGA1UEBhMC REUxGzAZBgNVBAgUEkJhZGVuLVfDvHJ0dGVtYmVyZzETMBEGA1UEBxMKTGVpbmdh cnRlbjEZMBcGA1UEChMQUHVzaCBDb3Jwb3JhdGlvbjELMAkGA1UECxMCSVQxITAf BgNVBAMTGGFibmVobS1jaGFsbGVuZ2UtMjAxNy5kZTExMC8GCSqGSIb3DQEJARYi d2VibWFzdGVyQGFibmVobS1jaGFsbGVuZ2UtMjAxNy5kZTAeFw0xNjEwMjMxNTU3 MDFaFw0yNjEwMjExNTU3MDFaMIG9MQswCQYDVQQGEwJERTEbMBkGA1UECBQSQmFk ZW4tV8O8cnR0ZW1iZXJnMRMwEQYDVQQHEwpMZWluZ2FydGVuMRkwFwYDVQQKExBQ dXNoIENvcnBvcmF0aW9uMQswCQYDVQQLEwJJVDEhMB8GA1UEAxMYYWJuZWhtLWNo YWxsZW5nZS0yMDE3LmRlMTEwLwYJKoZIhvcNAQkBFiJ3ZWJtYXN0ZXJAYWJuZWht LWNoYWxsZW5nZS0yMDE3LmRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC AQEA0lygrhHc9h8knsbmVUnJzp4kKBwC3kgDdPpjqKrr6g0xUwsjdhoofwEH2OaP 33SVTsZjXw7ov2KJQuqNpdYmIQaDi89w5EPJGXhhOg9VevAFBQmlnXNE0gNX1j4m AXUEtHSCjN9WpfuPMuKdzDnvuMQVjV1WGcQ5MCVSCHmgpC1IhQPjvYgre0kHTOYs pmJ+mBPghhc5DZJx9WIkhRBXjszzoe8nn0q1K8MO/DWHA3GlIdt8kLpXovRHGeU/ 4rfITwrBfsIzeD7Yc4Qsf4iBNYoe+d7BkRGRsV5GsaNsC57IXk/JW/+34FxSV4lF jxXJwDdg022GR5ia4+vEaD1vdwIDAQABMA0GCSqGSIb3DQEBCwUAA4IBAQBkLVfB FM/AgGsmPCEooMzSGaHH2xD9zuRlxIyCAJedyCkeqsiVmy3X0d9JVgUVheaXfDrd Y4oB6NvXLYjNfJdnag4HSI6khgQC9REsuDj+M7M50ZQG+W5NJIpt59ETjYJCNHOB H3LzvI2O3/MKebKnknvlLtZfa54L47jHw3mkLvMq5fCtB7iapAGP5hMqBHjFQJ4l jZ6H85pYCHrxH2TjFa5F70vAPQIMkir6sk/9K7nLtg4CookrYltgiRY0GWdcMyYh ukRVaxNWcTkr1a0o3n61km0Kq/NU/ZZsui6Mj53cg92/acnLCeApsBgoKsvX8ttg ZMZS00YFY6Kp9GOD -----END CERTIFICATE----- ------- START: 109.233.144.86:443 subject=C = DE, ST = Baden-W\C3\C2\BCrttemberg, L = Leingarten, O = Push Corporation, OU = IT, CN = abnehm-challenge-2017.de, emailAddress = webmaster@abnehm-challenge-2017.de notBefore=Oct 23 15:57:01 2016 GMT notAfter=Oct 21 15:57:01 2026 GMT -----BEGIN CERTIFICATE----- MIID+DCCAuACCQDVGTWe3FMMozANBgkqhkiG9w0BAQsFADCBvTELMAkGA1UEBhMC REUxGzAZBgNVBAgUEkJhZGVuLVfDvHJ0dGVtYmVyZzETMBEGA1UEBxMKTGVpbmdh cnRlbjEZMBcGA1UEChMQUHVzaCBDb3Jwb3JhdGlvbjELMAkGA1UECxMCSVQxITAf BgNVBAMTGGFibmVobS1jaGFsbGVuZ2UtMjAxNy5kZTExMC8GCSqGSIb3DQEJARYi d2VibWFzdGVyQGFibmVobS1jaGFsbGVuZ2UtMjAxNy5kZTAeFw0xNjEwMjMxNTU3 MDFaFw0yNjEwMjExNTU3MDFaMIG9MQswCQYDVQQGEwJERTEbMBkGA1UECBQSQmFk ZW4tV8O8cnR0ZW1iZXJnMRMwEQYDVQQHEwpMZWluZ2FydGVuMRkwFwYDVQQKExBQ dXNoIENvcnBvcmF0aW9uMQswCQYDVQQLEwJJVDEhMB8GA1UEAxMYYWJuZWhtLWNo YWxsZW5nZS0yMDE3LmRlMTEwLwYJKoZIhvcNAQkBFiJ3ZWJtYXN0ZXJAYWJuZWht LWNoYWxsZW5nZS0yMDE3LmRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC AQEA0lygrhHc9h8knsbmVUnJzp4kKBwC3kgDdPpjqKrr6g0xUwsjdhoofwEH2OaP 33SVTsZjXw7ov2KJQuqNpdYmIQaDi89w5EPJGXhhOg9VevAFBQmlnXNE0gNX1j4m AXUEtHSCjN9WpfuPMuKdzDnvuMQVjV1WGcQ5MCVSCHmgpC1IhQPjvYgre0kHTOYs pmJ+mBPghhc5DZJx9WIkhRBXjszzoe8nn0q1K8MO/DWHA3GlIdt8kLpXovRHGeU/ 4rfITwrBfsIzeD7Yc4Qsf4iBNYoe+d7BkRGRsV5GsaNsC57IXk/JW/+34FxSV4lF jxXJwDdg022GR5ia4+vEaD1vdwIDAQABMA0GCSqGSIb3DQEBCwUAA4IBAQBkLVfB FM/AgGsmPCEooMzSGaHH2xD9zuRlxIyCAJedyCkeqsiVmy3X0d9JVgUVheaXfDrd Y4oB6NvXLYjNfJdnag4HSI6khgQC9REsuDj+M7M50ZQG+W5NJIpt59ETjYJCNHOB H3LzvI2O3/MKebKnknvlLtZfa54L47jHw3mkLvMq5fCtB7iapAGP5hMqBHjFQJ4l jZ6H85pYCHrxH2TjFa5F70vAPQIMkir6sk/9K7nLtg4CookrYltgiRY0GWdcMyYh ukRVaxNWcTkr1a0o3n61km0Kq/NU/ZZsui6Mj53cg92/acnLCeApsBgoKsvX8ttg ZMZS00YFY6Kp9GOD -----END CERTIFICATE-----
unable to load certificate 140134108157312:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 140164034307456:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 139621473469824:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 140011323794816:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 139828785882496:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 140401488729472:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 139939707667840:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 140028051215744:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 139964078327168:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 140019789034880:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 139956359808384:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 139947696715136:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 140187465807232:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 140518249780608:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 139702932227456:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 139835147654528:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 140061896353152:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 140338255959424:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 140379133822336:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE unable to load certificate 140457703781760:error:0909006C:PEM routines:get_name:no start line:../crypto/pem/pem_lib.c:745:Expecting: TRUSTED CERTIFICATE ------- START: 109.233.144.66:443 subject=CN = 00.ciproc.de notBefore=Apr 4 02:03:27 2022 GMT notAfter=Jul 3 02:03:26 2022 GMT -----BEGIN CERTIFICATE----- MIIFHjCCBAagAwIBAgISBB+8/TSsLxUAjhadDJOtLXhiMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMjA0MDQwMjAzMjdaFw0yMjA3MDMwMjAzMjZaMBcxFTATBgNVBAMT DDAwLmNpcHJvYy5kZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL2r EuRyCkZLqexxJmjlJAgLoLs6T3N6LI1wjMBeJQGmtdgQw4Os7LwDDoywH5sitamM ay84fQPWXd2c1YlqMu6CCyxxwebHiL7xGjKgNavQFFdSeYwxxzNMXKdjvhpWSYbU KHfQ77/B0184dE/hlQzR0zLDrU8lJFfzQcojLx6qlhwTESABHaXvN60pZ7RZ4eEm RO/pX4RP17qqrcsc6J4Ei+Lpeo2Mrd0oPn+6O0o3lzwmGgXGg/WMVO9YpzwWyIFH QP+2AlzfkAs1y9PTF5aZ4XGCy5Gcp5MhyAFU6epYd2V1Scr3BorjILxPKr/fKTYf nX/95i5VMwXBlKXbOsUCAwEAAaOCAkcwggJDMA4GA1UdDwEB/wQEAwIFoDAdBgNV HSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4E FgQUWKZsP98TYBqkC0Oz9hL0UD7ISNowHwYDVR0jBBgwFoAUFC6zF7dYVsuuUAlA 5h+vnYsUwsYwVQYIKwYBBQUHAQEESTBHMCEGCCsGAQUFBzABhhVodHRwOi8vcjMu by5sZW5jci5vcmcwIgYIKwYBBQUHMAKGFmh0dHA6Ly9yMy5pLmxlbmNyLm9yZy8w FwYDVR0RBBAwDoIMMDAuY2lwcm9jLmRlMEwGA1UdIARFMEMwCAYGZ4EMAQIBMDcG CysGAQQBgt8TAQEBMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly9jcHMubGV0c2VuY3J5 cHQub3JnMIIBBAYKKwYBBAHWeQIEAgSB9QSB8gDwAHYAKXm+8J45OSHwVnOfY6V3 5b5XfZxgCvj5TV0mXCVdx4QAAAF/8ob/rwAABAMARzBFAiBzp7Kv4clRvA/QEAtR EHmd0FyjHm54oP7FTdBuarORlAIhAMry2e3Had2RMWaFaF7RbB6PPKn2qJcOpOP/ 1nVcxBwGAHYAQcjKsd8iRkoQxqE6CUKHXk4xixsD6+tLx2jwkGKWBvYAAAF/8ocB wwAABAMARzBFAiEA50ilhLI0Ccl1VB30lqFLtvslfu38UyUSlN4gBYKOnF8CICeV rNbO0iJdNSQSQzYahrxjqC4AHz5qlxD+KmZsX4pZMA0GCSqGSIb3DQEBCwUAA4IB AQC5wqDmXgllPpGq3QpED4kXcElVb1x1ACNqykkij7IuB6BvoBTtw1eX8uJAxwVz iLLu2zEGdmy8Qi4jcKLn2z589MnURw4Xard0msyF7V4Rx8FR0HJjH0qt/oE7yAtk DVcFVScj+MfUKQa/jygFWBpoQT5prUlI4XpTt+9Yvd9jlXGTRags0Cpk5IpoFUW/ xL5SNM4bOwPXjEUzBMmXbV/HyNtRNhucn5DGKTPLMhFcM9A3ccKiSBKDzCzD/2Q/ AjfKPVmBou2s/eLYgSLlyoRoQc64Bv4YMJPBVELk81QgX0Fo4iHj58eDiZDMFmrJ 44rAgKXMme0M6/9PPFKq8ADw -----END CERTIFICATE----- ------- START: 109.233.144.66:465 subject=CN = mail01.ciproc.de notBefore=Mar 1 09:15:08 2022 GMT notAfter=May 30 09:15:07 2022 GMT -----BEGIN CERTIFICATE----- MIIFJjCCBA6gAwIBAgISA2OGA5XXQ1B3pDiAnp1worHFMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMjAzMDEwOTE1MDhaFw0yMjA1MzAwOTE1MDdaMBsxGTAXBgNVBAMT EG1haWwwMS5laXByb2MuZGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB AQDeKS9oSZ+/vqVuwatbrP+C0Bplno9IcaFr6ZxQ8UQPgWRKyRfSCbXu99akvsy2 80zH6/1+pHuWwzrkP6tgljzagPR4TN3NcUY8ZrxiYUIpmpBdUm3Z8myza9jirZiS Pke+CGZe3NROdSTuFfNlmgxUu29cfYqKIRdPyqUhazca9psBwlEQtnJ1wQpvtgsr BtmOLTyms4dppWqEfiAKs+a8x3rzaxblzwwTQU5RfTp4pXlsHhKkz++JnewM6TG7 cIWrRdfSCGHiZZ3pr6En+ls4//hOuF1WO01G6/k6U9HhP5HU2QGQaQy3/2tB3EQK CSYr2PpFgP8/U9b2agKqRCOhAgMBAAGjggJLMIICRzAOBgNVHQ8BAf8EBAMCBaAw HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYD VR0OBBYEFHApnikjXSEeS7bT7VWtMQcje2LKMB8GA1UdIwQYMBaAFBQusxe3WFbL rlAJQOYfr52LFMLGMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDov L3IzLm8ubGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vcjMuaS5sZW5jci5v cmcvMBsGA1UdEQQUMBKCEG1haWwwMS5laXByb2MuZGUwTAYDVR0gBEUwQzAIBgZn gQwBAgEwNwYLKwYBBAGC3xMBAQEwKDAmBggrBgEFBQcCARYaaHR0cDovL2Nwcy5s ZXRzZW5jcnlwdC5vcmcwggEEBgorBgEEAdZ5AgQCBIH1BIHyAPAAdgDfpV6raIJP H2yt7rhfTj5a6s2iEqRqXo47EsAgRFwqcwAAAX9E+f2SAAAEAwBHMEUCIQD7GCH7 +SxSmlJH3KJTL5MAHHae/0jQ5JgjOjO2pKbnegIgNYv2U7BQkO7WGgtFFe1BG5RZ zUjWO46SDmPGhCNFPZIAdgBGpVXrdfqRIDC1oolp9PN9ESxBdL79SbiFq/L8cP5t RwAAAX9E+f20AAAEAwBHMEUCIQCJL7uj8BhCL2rEbdn8Ke9GCaxGHM4R00dAaBoe f/hinAIgQ87CI4CYY6bzIq4i0HPzJEqp6rvkX5iUSyQJqkOaJn8wDQYJKoZIhvcN AQELBQADggEBAAZ0qkY8yd1Jq8UUiIIza1cMXloa3xxcPGz4kfvBOQEqyC4Eaipv eHjP3RuOI5lnQJSFb2SYFg5Toj90qJY4vCt6p2zMsXfvgqBD5XGpTQ+LRNOCO3Bh gj/IVswfQDiAOADdmqhUmwsGJNEKaG++9uql+K0j/dGm1qWgbSp4/DTVmbpQQAMM VfbrkUR666H0NJuGK5HhiUcGFJup3JNqMCv2yRcYie3nqredmxE+B0me4QOY+ku1 UhUwAUpVCm13DhedNqsqj81jzVlqNwT+N0DHz3Emv/FqoxdbARLzfdCM6ycmhxe8 ByWpqnGeigWzemSnkkKADG1cqSsclGlKkUI= -----END CERTIFICATE----- ------- START: 109.233.144.66:993 subject=CN = mail01.ciproc.de notBefore=Mar 1 09:15:08 2022 GMT notAfter=May 30 09:15:07 2022 GMT -----BEGIN CERTIFICATE----- MIIFJjCCBA6gAwIBAgISA2OGA5XXQ1B3pDiAnp1worHFMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMjAzMDEwOTE1MDhaFw0yMjA1MzAwOTE1MDdaMBsxGTAXBgNVBAMT EG1haWwwMS5laXByb2MuZGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB AQDeKS9oSZ+/vqVuwatbrP+C0Bplno9IcaFr6ZxQ8UQPgWRKyRfSCbXu99akvsy2 80zH6/1+pHuWwzrkP6tgljzagPR4TN3NcUY8ZrxiYUIpmpBdUm3Z8myza9jirZiS Pke+CGZe3NROdSTuFfNlmgxUu29cfYqKIRdPyqUhazca9psBwlEQtnJ1wQpvtgsr BtmOLTyms4dppWqEfiAKs+a8x3rzaxblzwwTQU5RfTp4pXlsHhKkz++JnewM6TG7 cIWrRdfSCGHiZZ3pr6En+ls4//hOuF1WO01G6/k6U9HhP5HU2QGQaQy3/2tB3EQK CSYr2PpFgP8/U9b2agKqRCOhAgMBAAGjggJLMIICRzAOBgNVHQ8BAf8EBAMCBaAw HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYD VR0OBBYEFHApnikjXSEeS7bT7VWtMQcje2LKMB8GA1UdIwQYMBaAFBQusxe3WFbL rlAJQOYfr52LFMLGMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDov L3IzLm8ubGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vcjMuaS5sZW5jci5v cmcvMBsGA1UdEQQUMBKCEG1haWwwMS5laXByb2MuZGUwTAYDVR0gBEUwQzAIBgZn gQwBAgEwNwYLKwYBBAGC3xMBAQEwKDAmBggrBgEFBQcCARYaaHR0cDovL2Nwcy5s ZXRzZW5jcnlwdC5vcmcwggEEBgorBgEEAdZ5AgQCBIH1BIHyAPAAdgDfpV6raIJP H2yt7rhfTj5a6s2iEqRqXo47EsAgRFwqcwAAAX9E+f2SAAAEAwBHMEUCIQD7GCH7 +SxSmlJH3KJTL5MAHHae/0jQ5JgjOjO2pKbnegIgNYv2U7BQkO7WGgtFFe1BG5RZ zUjWO46SDmPGhCNFPZIAdgBGpVXrdfqRIDC1oolp9PN9ESxBdL79SbiFq/L8cP5t RwAAAX9E+f20AAAEAwBHMEUCIQCJL7uj8BhCL2rEbdn8Ke9GCaxGHM4R00dAaBoe f/hinAIgQ87CI4CYY6bzIq4i0HPzJEqp6rvkX5iUSyQJqkOaJn8wDQYJKoZIhvcN AQELBQADggEBAAZ0qkY8yd1Jq8UUiIIza1cMXloa3xxcPGz4kfvBOQEqyC4Eaipv eHjP3RuOI5lnQJSFb2SYFg5Toj90qJY4vCt6p2zMsXfvgqBD5XGpTQ+LRNOCO3Bh gj/IVswfQDiAOADdmqhUmwsGJNEKaG++9uql+K0j/dGm1qWgbSp4/DTVmbpQQAMM VfbrkUR666H0NJuGK5HhiUcGFJup3JNqMCv2yRcYie3nqredmxE+B0me4QOY+ku1 UhUwAUpVCm13DhedNqsqj81jzVlqNwT+N0DHz3Emv/FqoxdbARLzfdCM6ycmhxe8 ByWpqnGeigWzemSnkkKADG1cqSsclGlKkUI= -----END CERTIFICATE----- ------- START: 109.233.144.66:995 subject=CN = mail01.ciproc.de notBefore=Mar 1 09:15:08 2022 GMT notAfter=May 30 09:15:07 2022 GMT -----BEGIN CERTIFICATE----- MIIFJjCCBA6gAwIBAgISA2OGA5XXQ1B3pDiAnp1worHFMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMjAzMDEwOTE1MDhaFw0yMjA1MzAwOTE1MDdaMBsxGTAXBgNVBAMT EG1haWwwMS5laXByb2MuZGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB AQDeKS9oSZ+/vqVuwatbrP+C0Bplno9IcaFr6ZxQ8UQPgWRKyRfSCbXu99akvsy2 80zH6/1+pHuWwzrkP6tgljzagPR4TN3NcUY8ZrxiYUIpmpBdUm3Z8myza9jirZiS Pke+CGZe3NROdSTuFfNlmgxUu29cfYqKIRdPyqUhazca9psBwlEQtnJ1wQpvtgsr BtmOLTyms4dppWqEfiAKs+a8x3rzaxblzwwTQU5RfTp4pXlsHhKkz++JnewM6TG7 cIWrRdfSCGHiZZ3pr6En+ls4//hOuF1WO01G6/k6U9HhP5HU2QGQaQy3/2tB3EQK CSYr2PpFgP8/U9b2agKqRCOhAgMBAAGjggJLMIICRzAOBgNVHQ8BAf8EBAMCBaAw HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYD VR0OBBYEFHApnikjXSEeS7bT7VWtMQcje2LKMB8GA1UdIwQYMBaAFBQusxe3WFbL rlAJQOYfr52LFMLGMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDov L3IzLm8ubGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vcjMuaS5sZW5jci5v cmcvMBsGA1UdEQQUMBKCEG1haWwwMS5laXByb2MuZGUwTAYDVR0gBEUwQzAIBgZn gQwBAgEwNwYLKwYBBAGC3xMBAQEwKDAmBggrBgEFBQcCARYaaHR0cDovL2Nwcy5s ZXRzZW5jcnlwdC5vcmcwggEEBgorBgEEAdZ5AgQCBIH1BIHyAPAAdgDfpV6raIJP H2yt7rhfTj5a6s2iEqRqXo47EsAgRFwqcwAAAX9E+f2SAAAEAwBHMEUCIQD7GCH7 +SxSmlJH3KJTL5MAHHae/0jQ5JgjOjO2pKbnegIgNYv2U7BQkO7WGgtFFe1BG5RZ zUjWO46SDmPGhCNFPZIAdgBGpVXrdfqRIDC1oolp9PN9ESxBdL79SbiFq/L8cP5t RwAAAX9E+f20AAAEAwBHMEUCIQCJL7uj8BhCL2rEbdn8Ke9GCaxGHM4R00dAaBoe f/hinAIgQ87CI4CYY6bzIq4i0HPzJEqp6rvkX5iUSyQJqkOaJn8wDQYJKoZIhvcN AQELBQADggEBAAZ0qkY8yd1Jq8UUiIIza1cMXloa3xxcPGz4kfvBOQEqyC4Eaipv eHjP3RuOI5lnQJSFb2SYFg5Toj90qJY4vCt6p2zMsXfvgqBD5XGpTQ+LRNOCO3Bh gj/IVswfQDiAOADdmqhUmwsGJNEKaG++9uql+K0j/dGm1qWgbSp4/DTVmbpQQAMM VfbrkUR666H0NJuGK5HhiUcGFJup3JNqMCv2yRcYie3nqredmxE+B0me4QOY+ku1 UhUwAUpVCm13DhedNqsqj81jzVlqNwT+N0DHz3Emv/FqoxdbARLzfdCM6ycmhxe8 ByWpqnGeigWzemSnkkKADG1cqSsclGlKkUI= -----END CERTIFICATE----- ------- START: 109.233.144.67:443 subject=CN = ahornapotheke-ma.de notBefore=Mar 4 02:07:51 2022 GMT notAfter=Jun 2 02:07:50 2022 GMT -----BEGIN CERTIFICATE----- MIIFRTCCBC2gAwIBAgISBM5ypWQzHqv85qH3p+Y7fOk9MA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMjAzMDQwMjA3NTFaFw0yMjA2MDIwMjA3NTBaMB4xHDAaBgNVBAMT E2Fob3JuYXBvdGhla2UtbWEuZGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK AoIBAQCtSE+aHsLIXUGQQmxtMMn0CxDZVnMCxFJoNpQPcwkEwcsqWVMq2IXDMvAd 3dBIorh6ZAY9JaVw0S7bbvgTATbtQUABxqqej58Lglvq/PO4rE7FLPCU8WThXnO3 6G3Zi9XRozOaxHEI03OVoxr0wXGIYgqx9SBNmQrGbRD/ft0qIPjByratQsBKys2v aH1HnZ+f3K3IEB5wKYrcFxYWMZjANSVOnd5jQoyklKxI4KVeKZIPyZ7VVK4ZQvTk CGobHEZPPn291eAhvWR+ak7cnU6QiMcYa1c1uCmiiiJ+zElG5LgZskQ2/hsej0io u4M0K/VzcowFVnIWzKTxIKjbuDB7AgMBAAGjggJnMIICYzAOBgNVHQ8BAf8EBAMC BaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAw HQYDVR0OBBYEFHvoXzJgVdHUbwt6W0s1Wjfcn+zeMB8GA1UdIwQYMBaAFBQusxe3 WFbLrlAJQOYfr52LFMLGMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0 cDovL3IzLm8ubGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vcjMuaS5sZW5j ci5vcmcvMDcGA1UdEQQwMC6CE2Fob3JuYXBvdGhla2UtbWEuZGWCF3d3dy5haG9y bmFwb3RoZWtlLW1hLmRlMEwGA1UdIARFMEMwCAYGZ4EMAQIBMDcGCysGAQQBgt8T AQEBMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly9jcHMubGV0c2VuY3J5cHQub3JnMIIB BAYKKwYBBAHWeQIEAgSB9QSB8gDwAHYA36Veq2iCTx9sre64X04+WurNohKkal6O OxLAIERcKnMAAAF/UuXgowAABAMARzBFAiEAxI6gX8E7+e397UE5b/s0rGsvkUrG qDljlzqoXKeHrhMCIDf0r0iqP+zZYgLPG31RTuGeaqCKTz0JEgB4MxsJb9klAHYA KXm+8J45OSHwVnOfY6V35b5XfZxgCvj5TV0mXCVdx4QAAAF/UuXglAAABAMARzBF AiEAtAlwjZ5ks2f1EIQn1hdLabMaYuwWTQ0QaYLV9qtT0hACICR67X89drtJWcFa 9DGSSg7sSg3+e6Ak4AbJd6AEw/lpMA0GCSqGSIb3DQEBCwUAA4IBAQA/ia01ZLDp WjwCXUsEMAvdzJEnB0GEaNAd5++aI0EMzoKg24MtY2/VQsOn1V7RvngnUcw9KvGM RJJvsUn89AS98ebIoMbWXIuc5UFFNHp1KEEBc34vHYPvdv5PDX3hxaf9sXX4OFFc YJgjyDbP20No+/8IoPNynlkY5WUHznkmgOxO4WyS+S9KVOqotELahAhd55aPKyvu stq0i5ODJ9I2DnSjwzLj/poi+sXpcqzZaHUZ9jvJY4AFFALYKghIkskz3VELbRUx 7D7l1INhbM4NdMudfMWpi+b9nF18CydSPNssqKsFBjEhuLwdYi53S8xE98eUSRse i/MnH2q8rsx5 -----END CERTIFICATE----- ------- START: 109.233.144.67:465 subject=CN = mail01.add2web.de notBefore=Mar 30 18:17:10 2022 GMT notAfter=Jun 28 18:17:09 2022 GMT -----BEGIN CERTIFICATE----- MIIFKDCCBBCgAwIBAgISAz3ziDIEP42NxgR4K+tVUtBoMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMjAzMzAxODE3MTBaFw0yMjA2MjgxODE3MDlaMBwxGjAYBgNVBAMT EW1haWwwMS5hZGQyd2ViLmRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC AQEAyHAJh99L/225DKMqzwZNXlY4u18jluGfZKXw/b/Q8hDkEs5Jtq7NgYGLX0dv ofqM+GeCtDfJx3BHSHNf3WfsraZhjvl7qhO1PVe+0qnTh1yvxc/Zyb9ref8IcwDQ 8t0CEFW6aDOrG4vGoZDB/hMQ3owFEzlpNS2d8itu9L1c1XJ8TbTM6WAUMAIWh5h6 u4ble55HMzhI+RWnhiG573FlOCTJ/ySjeIuNMT6xW7MN57pfe/5UXra0uCmenKDy AtI1QS9DSrffxija3P0CwgkoxSBWM82/9N8h6qZxsVyMeloNkGCFKO12ktCj0JAl 1ShG73ZMIfB4wdEDYMpQga51YQIDAQABo4ICTDCCAkgwDgYDVR0PAQH/BAQDAgWg MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0G A1UdDgQWBBS/LttdJ8mpbRSBzblssK2eT90YJjAfBgNVHSMEGDAWgBQULrMXt1hW y65QCUDmH6+dixTCxjBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6 Ly9yMy5vLmxlbmNyLm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL3IzLmkubGVuY3Iu b3JnLzAcBgNVHREEFTATghFtYWlsMDEuYWRkMndlYi5kZTBMBgNVHSAERTBDMAgG BmeBDAECATA3BgsrBgEEAYLfEwEBATAoMCYGCCsGAQUFBwIBFhpodHRwOi8vY3Bz LmxldHNlbmNyeXB0Lm9yZzCCAQQGCisGAQQB1nkCBAIEgfUEgfIA8AB1AEalVet1 +pEgMLWiiWn0830RLEF0vv1JuIWr8vxw/m1HAAABf9xCp58AAAQDAEYwRAIgel2r G2j9NhXUtQTdKtJIa/q0pYrTfm9RSNCwXLNSuCgCIFMuLaGxbE1pnaMVF0+pQirf s5iq+7DKNx2LZFYrT/XOAHcAQcjKsd8iRkoQxqE6CUKHXk4xixsD6+tLx2jwkGKW BvYAAAF/3EKn2AAABAMASDBGAiEAvFkVgEd201KfqTojhpkx4Jg5SlR7RxGD/lmk M4xfwToCIQCW7m0EEmLs/Y1FjZI+n6P0JQuJXlyJdE0GXG8mStXaRzANBgkqhkiG 9w0BAQsFAAOCAQEAdfGxr4pHizFjEyciZ7Mp7pKGaYdJifLS2f+JKrPnrdG6zNHl 1lybpWpaT6GMIt9QqvlSNbEbQZw/lFzoUBgDHAmUs2N9UwTUXNM9DZsKMsT1haib 9njqLmROmDoDxuaPWWajEcJJGtfPv0a0oSRoIsOEzWlmzFtvx4tDTBJkp3b7dXsh zCqAOzpLBwwfgzLkwye3YEkevO8GTgLbEykZkQUraOCvEEymFoDXJfCStBtzh7T4 7ENhlYUnj4HlZ21A2DcKajZOqK855y7PuQOrnuq//XpgcX1Rhv3AzaYX2O6jHo7E ePNcuy8UEK4IoCeF04eFk5AAFnLNqwgkKHGAcA== -----END CERTIFICATE----- ------- START: 109.233.144.67:993 subject=CN = mail01.add2web.de notBefore=Jan 29 16:03:48 2022 GMT notAfter=Apr 29 16:03:47 2022 GMT -----BEGIN CERTIFICATE----- MIIFKTCCBBGgAwIBAgISBCp/NboAC1ylJXwwTDoLK8DUMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMjAxMjkxNjAzNDhaFw0yMjA0MjkxNjAzNDdaMBwxGjAYBgNVBAMT EW1haWwwMS5hZGQyd2ViLmRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC AQEAnt+TAdgUDjoqtIPSKUnwHwz1ctDGMq/pcvHw9RGCWlPQWiK/TtiahOPz7NFu Fvvbwhi1nlWjCoLVTPdKPrG5IGP1FPfiW09/il23NyP66aofKaKsjNHRkm4t9H3R r8DVEQBcIaNkZ090JSRvv7GI0O4zy/qYf81cVZXj5rSqfAZK92CRLvyUMZQ17h/Q 3rCDBABeu5qCC3T0ovjxKti8Wabw0TtrsfVTfnrpG2qUjS/MxHz8dS3hpGdpMPo4 mXp/bPjwIwrnBVXiQ9JjeQZG5yNFJRkxph045jrcRnDefpfjoDivmAfQd29ldsQr G/vxtrCrqKjDx7TBbjNnm0WPkQIDAQABo4ICTTCCAkkwDgYDVR0PAQH/BAQDAgWg MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0G A1UdDgQWBBQVrOTuTNzmcpcdKgRNGPzOa7qLfTAfBgNVHSMEGDAWgBQULrMXt1hW y65QCUDmH6+dixTCxjBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6 Ly9yMy5vLmxlbmNyLm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL3IzLmkubGVuY3Iu b3JnLzAcBgNVHREEFTATghFtYWlsMDEuYWRkMndlYi5kZTBMBgNVHSAERTBDMAgG BmeBDAECATA3BgsrBgEEAYLfEwEBATAoMCYGCCsGAQUFBwIBFhpodHRwOi8vY3Bz LmxldHNlbmNyeXB0Lm9yZzCCAQUGCisGAQQB1nkCBAIEgfYEgfMA8QB2ACl5vvCe OTkh8FZzn2Old+W+V32cYAr4+U1dJlwlXceEAAABfqbK/2wAAAQDAEcwRQIhAKOX XRlKH/wGhQ+OQU7qfSWM6Ukj/LVEpnf0WqsVy38PAiBQ1IaOSby0gzGxwcwH6q58 lQ/zkJ5Booh2fqVNr/kuegB3AN+lXqtogk8fbK3uuF9OPlrqzaISpGpejjsSwCBE XCpzAAABfqbLAW8AAAQDAEgwRgIhAOv0MuFbqlOJjICsUmOMI1Icfx7EYcba8Hod 3ub7JVdrAiEAipWGPdYinWU6/T2jQTw1yPfGSAp2Bp/34SQP14FvG8QwDQYJKoZI hvcNAQELBQADggEBABOlhHaQa6A9F56oK5Bw2H8hWxAzxk40LbgtPuq84essgBUz FQ3489fPORri8bfJTKO6z49sThHG/XPH/1QEu9pheTD5VKd/CZkdfhj6ijMlqk0M 1xmczp7gpqwGtWIWS+uwDogkFWIaKxhiGhr/Bdhslc2XhcBWXwi1VBHIfVhOsKe8 iLT/d7lqgSsgPAHx39sfjftgAKbkpGfuAzvJqPpP0qVCUxxmzIUe+HVxuIRLQfJ4 ucE0mZaa1hKrfhZ3OVMA5Hp/bwlBsCAjzrU3dmyvF5Mm4/EXXfJFlrARctomVyxs rflSPchvapV/N6NvIm2aUPpxXZ7jGVpR39UbrAA= -----END CERTIFICATE----- ------- START: 109.233.144.67:995 subject=CN = mail01.add2web.de notBefore=Jan 29 16:03:48 2022 GMT notAfter=Apr 29 16:03:47 2022 GMT -----BEGIN CERTIFICATE----- MIIFKTCCBBGgAwIBAgISBCp/NboAC1ylJXwwTDoLK8DUMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMjAxMjkxNjAzNDhaFw0yMjA0MjkxNjAzNDdaMBwxGjAYBgNVBAMT EW1haWwwMS5hZGQyd2ViLmRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC AQEAnt+TAdgUDjoqtIPSKUnwHwz1ctDGMq/pcvHw9RGCWlPQWiK/TtiahOPz7NFu Fvvbwhi1nlWjCoLVTPdKPrG5IGP1FPfiW09/il23NyP66aofKaKsjNHRkm4t9H3R r8DVEQBcIaNkZ090JSRvv7GI0O4zy/qYf81cVZXj5rSqfAZK92CRLvyUMZQ17h/Q 3rCDBABeu5qCC3T0ovjxKti8Wabw0TtrsfVTfnrpG2qUjS/MxHz8dS3hpGdpMPo4 mXp/bPjwIwrnBVXiQ9JjeQZG5yNFJRkxph045jrcRnDefpfjoDivmAfQd29ldsQr G/vxtrCrqKjDx7TBbjNnm0WPkQIDAQABo4ICTTCCAkkwDgYDVR0PAQH/BAQDAgWg MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0G A1UdDgQWBBQVrOTuTNzmcpcdKgRNGPzOa7qLfTAfBgNVHSMEGDAWgBQULrMXt1hW y65QCUDmH6+dixTCxjBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6 Ly9yMy5vLmxlbmNyLm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL3IzLmkubGVuY3Iu b3JnLzAcBgNVHREEFTATghFtYWlsMDEuYWRkMndlYi5kZTBMBgNVHSAERTBDMAgG BmeBDAECATA3BgsrBgEEAYLfEwEBATAoMCYGCCsGAQUFBwIBFhpodHRwOi8vY3Bz LmxldHNlbmNyeXB0Lm9yZzCCAQUGCisGAQQB1nkCBAIEgfYEgfMA8QB2ACl5vvCe OTkh8FZzn2Old+W+V32cYAr4+U1dJlwlXceEAAABfqbK/2wAAAQDAEcwRQIhAKOX XRlKH/wGhQ+OQU7qfSWM6Ukj/LVEpnf0WqsVy38PAiBQ1IaOSby0gzGxwcwH6q58 lQ/zkJ5Booh2fqVNr/kuegB3AN+lXqtogk8fbK3uuF9OPlrqzaISpGpejjsSwCBE XCpzAAABfqbLAW8AAAQDAEgwRgIhAOv0MuFbqlOJjICsUmOMI1Icfx7EYcba8Hod 3ub7JVdrAiEAipWGPdYinWU6/T2jQTw1yPfGSAp2Bp/34SQP14FvG8QwDQYJKoZI hvcNAQELBQADggEBABOlhHaQa6A9F56oK5Bw2H8hWxAzxk40LbgtPuq84essgBUz FQ3489fPORri8bfJTKO6z49sThHG/XPH/1QEu9pheTD5VKd/CZkdfhj6ijMlqk0M 1xmczp7gpqwGtWIWS+uwDogkFWIaKxhiGhr/Bdhslc2XhcBWXwi1VBHIfVhOsKe8 iLT/d7lqgSsgPAHx39sfjftgAKbkpGfuAzvJqPpP0qVCUxxmzIUe+HVxuIRLQfJ4 ucE0mZaa1hKrfhZ3OVMA5Hp/bwlBsCAjzrU3dmyvF5Mm4/EXXfJFlrARctomVyxs rflSPchvapV/N6NvIm2aUPpxXZ7jGVpR39UbrAA= -----END CERTIFICATE----- ------- START: 109.233.144.80:443 subject=C = DE, ST = Baden-W\C3\C2\BCrttemberg, L = Leingarten, O = Push Corporation, OU = IT, CN = abnehm-challenge-2017.de, emailAddress = webmaster@abnehm-challenge-2017.de notBefore=Oct 23 15:57:01 2016 GMT notAfter=Oct 21 15:57:01 2026 GMT -----BEGIN CERTIFICATE----- MIID+DCCAuACCQDVGTWe3FMMozANBgkqhkiG9w0BAQsFADCBvTELMAkGA1UEBhMC REUxGzAZBgNVBAgUEkJhZGVuLVfDvHJ0dGVtYmVyZzETMBEGA1UEBxMKTGVpbmdh cnRlbjEZMBcGA1UEChMQUHVzaCBDb3Jwb3JhdGlvbjELMAkGA1UECxMCSVQxITAf BgNVBAMTGGFibmVobS1jaGFsbGVuZ2UtMjAxNy5kZTExMC8GCSqGSIb3DQEJARYi d2VibWFzdGVyQGFibmVobS1jaGFsbGVuZ2UtMjAxNy5kZTAeFw0xNjEwMjMxNTU3 MDFaFw0yNjEwMjExNTU3MDFaMIG9MQswCQYDVQQGEwJERTEbMBkGA1UECBQSQmFk ZW4tV8O8cnR0ZW1iZXJnMRMwEQYDVQQHEwpMZWluZ2FydGVuMRkwFwYDVQQKExBQ dXNoIENvcnBvcmF0aW9uMQswCQYDVQQLEwJJVDEhMB8GA1UEAxMYYWJuZWhtLWNo YWxsZW5nZS0yMDE3LmRlMTEwLwYJKoZIhvcNAQkBFiJ3ZWJtYXN0ZXJAYWJuZWht LWNoYWxsZW5nZS0yMDE3LmRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC AQEA0lygrhHc9h8knsbmVUnJzp4kKBwC3kgDdPpjqKrr6g0xUwsjdhoofwEH2OaP 33SVTsZjXw7ov2KJQuqNpdYmIQaDi89w5EPJGXhhOg9VevAFBQmlnXNE0gNX1j4m AXUEtHSCjN9WpfuPMuKdzDnvuMQVjV1WGcQ5MCVSCHmgpC1IhQPjvYgre0kHTOYs pmJ+mBPghhc5DZJx9WIkhRBXjszzoe8nn0q1K8MO/DWHA3GlIdt8kLpXovRHGeU/ 4rfITwrBfsIzeD7Yc4Qsf4iBNYoe+d7BkRGRsV5GsaNsC57IXk/JW/+34FxSV4lF jxXJwDdg022GR5ia4+vEaD1vdwIDAQABMA0GCSqGSIb3DQEBCwUAA4IBAQBkLVfB FM/AgGsmPCEooMzSGaHH2xD9zuRlxIyCAJedyCkeqsiVmy3X0d9JVgUVheaXfDrd Y4oB6NvXLYjNfJdnag4HSI6khgQC9REsuDj+M7M50ZQG+W5NJIpt59ETjYJCNHOB H3LzvI2O3/MKebKnknvlLtZfa54L47jHw3mkLvMq5fCtB7iapAGP5hMqBHjFQJ4l jZ6H85pYCHrxH2TjFa5F70vAPQIMkir6sk/9K7nLtg4CookrYltgiRY0GWdcMyYh ukRVaxNWcTkr1a0o3n61km0Kq/NU/ZZsui6Mj53cg92/acnLCeApsBgoKsvX8ttg ZMZS00YFY6Kp9GOD -----END CERTIFICATE----- ------- START: 109.233.144.83:443 subject=C = DE, ST = Baden-W\C3\C2\BCrttemberg, L = Leingarten, O = Push Corporation, OU = IT, CN = abnehm-challenge-2017.de, emailAddress = webmaster@abnehm-challenge-2017.de notBefore=Oct 23 15:57:01 2016 GMT notAfter=Oct 21 15:57:01 2026 GMT -----BEGIN CERTIFICATE----- MIID+DCCAuACCQDVGTWe3FMMozANBgkqhkiG9w0BAQsFADCBvTELMAkGA1UEBhMC REUxGzAZBgNVBAgUEkJhZGVuLVfDvHJ0dGVtYmVyZzETMBEGA1UEBxMKTGVpbmdh cnRlbjEZMBcGA1UEChMQUHVzaCBDb3Jwb3JhdGlvbjELMAkGA1UECxMCSVQxITAf BgNVBAMTGGFibmVobS1jaGFsbGVuZ2UtMjAxNy5kZTExMC8GCSqGSIb3DQEJARYi d2VibWFzdGVyQGFibmVobS1jaGFsbGVuZ2UtMjAxNy5kZTAeFw0xNjEwMjMxNTU3 MDFaFw0yNjEwMjExNTU3MDFaMIG9MQswCQYDVQQGEwJERTEbMBkGA1UECBQSQmFk ZW4tV8O8cnR0ZW1iZXJnMRMwEQYDVQQHEwpMZWluZ2FydGVuMRkwFwYDVQQKExBQ dXNoIENvcnBvcmF0aW9uMQswCQYDVQQLEwJJVDEhMB8GA1UEAxMYYWJuZWhtLWNo YWxsZW5nZS0yMDE3LmRlMTEwLwYJKoZIhvcNAQkBFiJ3ZWJtYXN0ZXJAYWJuZWht LWNoYWxsZW5nZS0yMDE3LmRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC AQEA0lygrhHc9h8knsbmVUnJzp4kKBwC3kgDdPpjqKrr6g0xUwsjdhoofwEH2OaP 33SVTsZjXw7ov2KJQuqNpdYmIQaDi89w5EPJGXhhOg9VevAFBQmlnXNE0gNX1j4m AXUEtHSCjN9WpfuPMuKdzDnvuMQVjV1WGcQ5MCVSCHmgpC1IhQPjvYgre0kHTOYs pmJ+mBPghhc5DZJx9WIkhRBXjszzoe8nn0q1K8MO/DWHA3GlIdt8kLpXovRHGeU/ 4rfITwrBfsIzeD7Yc4Qsf4iBNYoe+d7BkRGRsV5GsaNsC57IXk/JW/+34FxSV4lF jxXJwDdg022GR5ia4+vEaD1vdwIDAQABMA0GCSqGSIb3DQEBCwUAA4IBAQBkLVfB FM/AgGsmPCEooMzSGaHH2xD9zuRlxIyCAJedyCkeqsiVmy3X0d9JVgUVheaXfDrd Y4oB6NvXLYjNfJdnag4HSI6khgQC9REsuDj+M7M50ZQG+W5NJIpt59ETjYJCNHOB H3LzvI2O3/MKebKnknvlLtZfa54L47jHw3mkLvMq5fCtB7iapAGP5hMqBHjFQJ4l jZ6H85pYCHrxH2TjFa5F70vAPQIMkir6sk/9K7nLtg4CookrYltgiRY0GWdcMyYh ukRVaxNWcTkr1a0o3n61km0Kq/NU/ZZsui6Mj53cg92/acnLCeApsBgoKsvX8ttg ZMZS00YFY6Kp9GOD -----END CERTIFICATE----- ------- START: 109.233.144.86:443 subject=C = DE, ST = Baden-W\C3\C2\BCrttemberg, L = Leingarten, O = Push Corporation, OU = IT, CN = abnehm-challenge-2017.de, emailAddress = webmaster@abnehm-challenge-2017.de notBefore=Oct 23 15:57:01 2016 GMT notAfter=Oct 21 15:57:01 2026 GMT -----BEGIN CERTIFICATE----- MIID+DCCAuACCQDVGTWe3FMMozANBgkqhkiG9w0BAQsFADCBvTELMAkGA1UEBhMC REUxGzAZBgNVBAgUEkJhZGVuLVfDvHJ0dGVtYmVyZzETMBEGA1UEBxMKTGVpbmdh cnRlbjEZMBcGA1UEChMQUHVzaCBDb3Jwb3JhdGlvbjELMAkGA1UECxMCSVQxITAf BgNVBAMTGGFibmVobS1jaGFsbGVuZ2UtMjAxNy5kZTExMC8GCSqGSIb3DQEJARYi d2VibWFzdGVyQGFibmVobS1jaGFsbGVuZ2UtMjAxNy5kZTAeFw0xNjEwMjMxNTU3 MDFaFw0yNjEwMjExNTU3MDFaMIG9MQswCQYDVQQGEwJERTEbMBkGA1UECBQSQmFk ZW4tV8O8cnR0ZW1iZXJnMRMwEQYDVQQHEwpMZWluZ2FydGVuMRkwFwYDVQQKExBQ dXNoIENvcnBvcmF0aW9uMQswCQYDVQQLEwJJVDEhMB8GA1UEAxMYYWJuZWhtLWNo YWxsZW5nZS0yMDE3LmRlMTEwLwYJKoZIhvcNAQkBFiJ3ZWJtYXN0ZXJAYWJuZWht LWNoYWxsZW5nZS0yMDE3LmRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC AQEA0lygrhHc9h8knsbmVUnJzp4kKBwC3kgDdPpjqKrr6g0xUwsjdhoofwEH2OaP 33SVTsZjXw7ov2KJQuqNpdYmIQaDi89w5EPJGXhhOg9VevAFBQmlnXNE0gNX1j4m AXUEtHSCjN9WpfuPMuKdzDnvuMQVjV1WGcQ5MCVSCHmgpC1IhQPjvYgre0kHTOYs pmJ+mBPghhc5DZJx9WIkhRBXjszzoe8nn0q1K8MO/DWHA3GlIdt8kLpXovRHGeU/ 4rfITwrBfsIzeD7Yc4Qsf4iBNYoe+d7BkRGRsV5GsaNsC57IXk/JW/+34FxSV4lF jxXJwDdg022GR5ia4+vEaD1vdwIDAQABMA0GCSqGSIb3DQEBCwUAA4IBAQBkLVfB FM/AgGsmPCEooMzSGaHH2xD9zuRlxIyCAJedyCkeqsiVmy3X0d9JVgUVheaXfDrd Y4oB6NvXLYjNfJdnag4HSI6khgQC9REsuDj+M7M50ZQG+W5NJIpt59ETjYJCNHOB H3LzvI2O3/MKebKnknvlLtZfa54L47jHw3mkLvMq5fCtB7iapAGP5hMqBHjFQJ4l jZ6H85pYCHrxH2TjFa5F70vAPQIMkir6sk/9K7nLtg4CookrYltgiRY0GWdcMyYh ukRVaxNWcTkr1a0o3n61km0Kq/NU/ZZsui6Mj53cg92/acnLCeApsBgoKsvX8ttg ZMZS00YFY6Kp9GOD -----END CERTIFICATE----- ------- START: mail01.add2web.de:443 subject=CN = ahornapotheke-ma.de notBefore=Mar 4 02:07:51 2022 GMT notAfter=Jun 2 02:07:50 2022 GMT -----BEGIN CERTIFICATE----- MIIFRTCCBC2gAwIBAgISBM5ypWQzHqv85qH3p+Y7fOk9MA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMjAzMDQwMjA3NTFaFw0yMjA2MDIwMjA3NTBaMB4xHDAaBgNVBAMT E2Fob3JuYXBvdGhla2UtbWEuZGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK AoIBAQCtSE+aHsLIXUGQQmxtMMn0CxDZVnMCxFJoNpQPcwkEwcsqWVMq2IXDMvAd 3dBIorh6ZAY9JaVw0S7bbvgTATbtQUABxqqej58Lglvq/PO4rE7FLPCU8WThXnO3 6G3Zi9XRozOaxHEI03OVoxr0wXGIYgqx9SBNmQrGbRD/ft0qIPjByratQsBKys2v aH1HnZ+f3K3IEB5wKYrcFxYWMZjANSVOnd5jQoyklKxI4KVeKZIPyZ7VVK4ZQvTk CGobHEZPPn291eAhvWR+ak7cnU6QiMcYa1c1uCmiiiJ+zElG5LgZskQ2/hsej0io u4M0K/VzcowFVnIWzKTxIKjbuDB7AgMBAAGjggJnMIICYzAOBgNVHQ8BAf8EBAMC BaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAw HQYDVR0OBBYEFHvoXzJgVdHUbwt6W0s1Wjfcn+zeMB8GA1UdIwQYMBaAFBQusxe3 WFbLrlAJQOYfr52LFMLGMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0 cDovL3IzLm8ubGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vcjMuaS5sZW5j ci5vcmcvMDcGA1UdEQQwMC6CE2Fob3JuYXBvdGhla2UtbWEuZGWCF3d3dy5haG9y bmFwb3RoZWtlLW1hLmRlMEwGA1UdIARFMEMwCAYGZ4EMAQIBMDcGCysGAQQBgt8T AQEBMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly9jcHMubGV0c2VuY3J5cHQub3JnMIIB BAYKKwYBBAHWeQIEAgSB9QSB8gDwAHYA36Veq2iCTx9sre64X04+WurNohKkal6O OxLAIERcKnMAAAF/UuXgowAABAMARzBFAiEAxI6gX8E7+e397UE5b/s0rGsvkUrG qDljlzqoXKeHrhMCIDf0r0iqP+zZYgLPG31RTuGeaqCKTz0JEgB4MxsJb9klAHYA KXm+8J45OSHwVnOfY6V35b5XfZxgCvj5TV0mXCVdx4QAAAF/UuXglAAABAMARzBF AiEAtAlwjZ5ks2f1EIQn1hdLabMaYuwWTQ0QaYLV9qtT0hACICR67X89drtJWcFa 9DGSSg7sSg3+e6Ak4AbJd6AEw/lpMA0GCSqGSIb3DQEBCwUAA4IBAQA/ia01ZLDp WjwCXUsEMAvdzJEnB0GEaNAd5++aI0EMzoKg24MtY2/VQsOn1V7RvngnUcw9KvGM RJJvsUn89AS98ebIoMbWXIuc5UFFNHp1KEEBc34vHYPvdv5PDX3hxaf9sXX4OFFc YJgjyDbP20No+/8IoPNynlkY5WUHznkmgOxO4WyS+S9KVOqotELahAhd55aPKyvu stq0i5ODJ9I2DnSjwzLj/poi+sXpcqzZaHUZ9jvJY4AFFALYKghIkskz3VELbRUx 7D7l1INhbM4NdMudfMWpi+b9nF18CydSPNssqKsFBjEhuLwdYi53S8xE98eUSRse i/MnH2q8rsx5 -----END CERTIFICATE----- ------- START: mail01.add2web.de:465 subject=CN = mail01.add2web.de notBefore=Mar 30 18:17:10 2022 GMT notAfter=Jun 28 18:17:09 2022 GMT -----BEGIN CERTIFICATE----- MIIFKDCCBBCgAwIBAgISAz3ziDIEP42NxgR4K+tVUtBoMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMjAzMzAxODE3MTBaFw0yMjA2MjgxODE3MDlaMBwxGjAYBgNVBAMT EW1haWwwMS5hZGQyd2ViLmRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC AQEAyHAJh99L/225DKMqzwZNXlY4u18jluGfZKXw/b/Q8hDkEs5Jtq7NgYGLX0dv ofqM+GeCtDfJx3BHSHNf3WfsraZhjvl7qhO1PVe+0qnTh1yvxc/Zyb9ref8IcwDQ 8t0CEFW6aDOrG4vGoZDB/hMQ3owFEzlpNS2d8itu9L1c1XJ8TbTM6WAUMAIWh5h6 u4ble55HMzhI+RWnhiG573FlOCTJ/ySjeIuNMT6xW7MN57pfe/5UXra0uCmenKDy AtI1QS9DSrffxija3P0CwgkoxSBWM82/9N8h6qZxsVyMeloNkGCFKO12ktCj0JAl 1ShG73ZMIfB4wdEDYMpQga51YQIDAQABo4ICTDCCAkgwDgYDVR0PAQH/BAQDAgWg MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0G A1UdDgQWBBS/LttdJ8mpbRSBzblssK2eT90YJjAfBgNVHSMEGDAWgBQULrMXt1hW y65QCUDmH6+dixTCxjBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6 Ly9yMy5vLmxlbmNyLm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL3IzLmkubGVuY3Iu b3JnLzAcBgNVHREEFTATghFtYWlsMDEuYWRkMndlYi5kZTBMBgNVHSAERTBDMAgG BmeBDAECATA3BgsrBgEEAYLfEwEBATAoMCYGCCsGAQUFBwIBFhpodHRwOi8vY3Bz LmxldHNlbmNyeXB0Lm9yZzCCAQQGCisGAQQB1nkCBAIEgfUEgfIA8AB1AEalVet1 +pEgMLWiiWn0830RLEF0vv1JuIWr8vxw/m1HAAABf9xCp58AAAQDAEYwRAIgel2r G2j9NhXUtQTdKtJIa/q0pYrTfm9RSNCwXLNSuCgCIFMuLaGxbE1pnaMVF0+pQirf s5iq+7DKNx2LZFYrT/XOAHcAQcjKsd8iRkoQxqE6CUKHXk4xixsD6+tLx2jwkGKW BvYAAAF/3EKn2AAABAMASDBGAiEAvFkVgEd201KfqTojhpkx4Jg5SlR7RxGD/lmk M4xfwToCIQCW7m0EEmLs/Y1FjZI+n6P0JQuJXlyJdE0GXG8mStXaRzANBgkqhkiG 9w0BAQsFAAOCAQEAdfGxr4pHizFjEyciZ7Mp7pKGaYdJifLS2f+JKrPnrdG6zNHl 1lybpWpaT6GMIt9QqvlSNbEbQZw/lFzoUBgDHAmUs2N9UwTUXNM9DZsKMsT1haib 9njqLmROmDoDxuaPWWajEcJJGtfPv0a0oSRoIsOEzWlmzFtvx4tDTBJkp3b7dXsh zCqAOzpLBwwfgzLkwye3YEkevO8GTgLbEykZkQUraOCvEEymFoDXJfCStBtzh7T4 7ENhlYUnj4HlZ21A2DcKajZOqK855y7PuQOrnuq//XpgcX1Rhv3AzaYX2O6jHo7E ePNcuy8UEK4IoCeF04eFk5AAFnLNqwgkKHGAcA== -----END CERTIFICATE----- ------- START: mail01.add2web.de:993 subject=CN = mail01.add2web.de notBefore=Jan 29 16:03:48 2022 GMT notAfter=Apr 29 16:03:47 2022 GMT -----BEGIN CERTIFICATE----- MIIFKTCCBBGgAwIBAgISBCp/NboAC1ylJXwwTDoLK8DUMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMjAxMjkxNjAzNDhaFw0yMjA0MjkxNjAzNDdaMBwxGjAYBgNVBAMT EW1haWwwMS5hZGQyd2ViLmRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC AQEAnt+TAdgUDjoqtIPSKUnwHwz1ctDGMq/pcvHw9RGCWlPQWiK/TtiahOPz7NFu Fvvbwhi1nlWjCoLVTPdKPrG5IGP1FPfiW09/il23NyP66aofKaKsjNHRkm4t9H3R r8DVEQBcIaNkZ090JSRvv7GI0O4zy/qYf81cVZXj5rSqfAZK92CRLvyUMZQ17h/Q 3rCDBABeu5qCC3T0ovjxKti8Wabw0TtrsfVTfnrpG2qUjS/MxHz8dS3hpGdpMPo4 mXp/bPjwIwrnBVXiQ9JjeQZG5yNFJRkxph045jrcRnDefpfjoDivmAfQd29ldsQr G/vxtrCrqKjDx7TBbjNnm0WPkQIDAQABo4ICTTCCAkkwDgYDVR0PAQH/BAQDAgWg MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0G A1UdDgQWBBQVrOTuTNzmcpcdKgRNGPzOa7qLfTAfBgNVHSMEGDAWgBQULrMXt1hW y65QCUDmH6+dixTCxjBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6 Ly9yMy5vLmxlbmNyLm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL3IzLmkubGVuY3Iu b3JnLzAcBgNVHREEFTATghFtYWlsMDEuYWRkMndlYi5kZTBMBgNVHSAERTBDMAgG BmeBDAECATA3BgsrBgEEAYLfEwEBATAoMCYGCCsGAQUFBwIBFhpodHRwOi8vY3Bz LmxldHNlbmNyeXB0Lm9yZzCCAQUGCisGAQQB1nkCBAIEgfYEgfMA8QB2ACl5vvCe OTkh8FZzn2Old+W+V32cYAr4+U1dJlwlXceEAAABfqbK/2wAAAQDAEcwRQIhAKOX XRlKH/wGhQ+OQU7qfSWM6Ukj/LVEpnf0WqsVy38PAiBQ1IaOSby0gzGxwcwH6q58 lQ/zkJ5Booh2fqVNr/kuegB3AN+lXqtogk8fbK3uuF9OPlrqzaISpGpejjsSwCBE XCpzAAABfqbLAW8AAAQDAEgwRgIhAOv0MuFbqlOJjICsUmOMI1Icfx7EYcba8Hod 3ub7JVdrAiEAipWGPdYinWU6/T2jQTw1yPfGSAp2Bp/34SQP14FvG8QwDQYJKoZI hvcNAQELBQADggEBABOlhHaQa6A9F56oK5Bw2H8hWxAzxk40LbgtPuq84essgBUz FQ3489fPORri8bfJTKO6z49sThHG/XPH/1QEu9pheTD5VKd/CZkdfhj6ijMlqk0M 1xmczp7gpqwGtWIWS+uwDogkFWIaKxhiGhr/Bdhslc2XhcBWXwi1VBHIfVhOsKe8 iLT/d7lqgSsgPAHx39sfjftgAKbkpGfuAzvJqPpP0qVCUxxmzIUe+HVxuIRLQfJ4 ucE0mZaa1hKrfhZ3OVMA5Hp/bwlBsCAjzrU3dmyvF5Mm4/EXXfJFlrARctomVyxs rflSPchvapV/N6NvIm2aUPpxXZ7jGVpR39UbrAA= -----END CERTIFICATE----- ------- START: mail01.add2web.de:995 subject=CN = mail01.add2web.de notBefore=Jan 29 16:03:48 2022 GMT notAfter=Apr 29 16:03:47 2022 GMT -----BEGIN CERTIFICATE----- MIIFKTCCBBGgAwIBAgISBCp/NboAC1ylJXwwTDoLK8DUMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMjAxMjkxNjAzNDhaFw0yMjA0MjkxNjAzNDdaMBwxGjAYBgNVBAMT EW1haWwwMS5hZGQyd2ViLmRlMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC AQEAnt+TAdgUDjoqtIPSKUnwHwz1ctDGMq/pcvHw9RGCWlPQWiK/TtiahOPz7NFu Fvvbwhi1nlWjCoLVTPdKPrG5IGP1FPfiW09/il23NyP66aofKaKsjNHRkm4t9H3R r8DVEQBcIaNkZ090JSRvv7GI0O4zy/qYf81cVZXj5rSqfAZK92CRLvyUMZQ17h/Q 3rCDBABeu5qCC3T0ovjxKti8Wabw0TtrsfVTfnrpG2qUjS/MxHz8dS3hpGdpMPo4 mXp/bPjwIwrnBVXiQ9JjeQZG5yNFJRkxph045jrcRnDefpfjoDivmAfQd29ldsQr G/vxtrCrqKjDx7TBbjNnm0WPkQIDAQABo4ICTTCCAkkwDgYDVR0PAQH/BAQDAgWg MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0G A1UdDgQWBBQVrOTuTNzmcpcdKgRNGPzOa7qLfTAfBgNVHSMEGDAWgBQULrMXt1hW y65QCUDmH6+dixTCxjBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6 Ly9yMy5vLmxlbmNyLm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL3IzLmkubGVuY3Iu b3JnLzAcBgNVHREEFTATghFtYWlsMDEuYWRkMndlYi5kZTBMBgNVHSAERTBDMAgG BmeBDAECATA3BgsrBgEEAYLfEwEBATAoMCYGCCsGAQUFBwIBFhpodHRwOi8vY3Bz LmxldHNlbmNyeXB0Lm9yZzCCAQUGCisGAQQB1nkCBAIEgfYEgfMA8QB2ACl5vvCe OTkh8FZzn2Old+W+V32cYAr4+U1dJlwlXceEAAABfqbK/2wAAAQDAEcwRQIhAKOX XRlKH/wGhQ+OQU7qfSWM6Ukj/LVEpnf0WqsVy38PAiBQ1IaOSby0gzGxwcwH6q58 lQ/zkJ5Booh2fqVNr/kuegB3AN+lXqtogk8fbK3uuF9OPlrqzaISpGpejjsSwCBE XCpzAAABfqbLAW8AAAQDAEgwRgIhAOv0MuFbqlOJjICsUmOMI1Icfx7EYcba8Hod 3ub7JVdrAiEAipWGPdYinWU6/T2jQTw1yPfGSAp2Bp/34SQP14FvG8QwDQYJKoZI hvcNAQELBQADggEBABOlhHaQa6A9F56oK5Bw2H8hWxAzxk40LbgtPuq84essgBUz FQ3489fPORri8bfJTKO6z49sThHG/XPH/1QEu9pheTD5VKd/CZkdfhj6ijMlqk0M 1xmczp7gpqwGtWIWS+uwDogkFWIaKxhiGhr/Bdhslc2XhcBWXwi1VBHIfVhOsKe8 iLT/d7lqgSsgPAHx39sfjftgAKbkpGfuAzvJqPpP0qVCUxxmzIUe+HVxuIRLQfJ4 ucE0mZaa1hKrfhZ3OVMA5Hp/bwlBsCAjzrU3dmyvF5Mm4/EXXfJFlrARctomVyxs rflSPchvapV/N6NvIm2aUPpxXZ7jGVpR39UbrAA= -----END CERTIFICATE----- ------- START: mail01.ciproc.de:443 subject=CN = mail01.ciproc.de notBefore=Mar 1 09:15:08 2022 GMT notAfter=May 30 09:15:07 2022 GMT -----BEGIN CERTIFICATE----- MIIFJjCCBA6gAwIBAgISA2OGA5XXQ1B3pDiAnp1worHFMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMjAzMDEwOTE1MDhaFw0yMjA1MzAwOTE1MDdaMBsxGTAXBgNVBAMT EG1haWwwMS5laXByb2MuZGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB AQDeKS9oSZ+/vqVuwatbrP+C0Bplno9IcaFr6ZxQ8UQPgWRKyRfSCbXu99akvsy2 80zH6/1+pHuWwzrkP6tgljzagPR4TN3NcUY8ZrxiYUIpmpBdUm3Z8myza9jirZiS Pke+CGZe3NROdSTuFfNlmgxUu29cfYqKIRdPyqUhazca9psBwlEQtnJ1wQpvtgsr BtmOLTyms4dppWqEfiAKs+a8x3rzaxblzwwTQU5RfTp4pXlsHhKkz++JnewM6TG7 cIWrRdfSCGHiZZ3pr6En+ls4//hOuF1WO01G6/k6U9HhP5HU2QGQaQy3/2tB3EQK CSYr2PpFgP8/U9b2agKqRCOhAgMBAAGjggJLMIICRzAOBgNVHQ8BAf8EBAMCBaAw HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYD VR0OBBYEFHApnikjXSEeS7bT7VWtMQcje2LKMB8GA1UdIwQYMBaAFBQusxe3WFbL rlAJQOYfr52LFMLGMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDov L3IzLm8ubGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vcjMuaS5sZW5jci5v cmcvMBsGA1UdEQQUMBKCEG1haWwwMS5laXByb2MuZGUwTAYDVR0gBEUwQzAIBgZn gQwBAgEwNwYLKwYBBAGC3xMBAQEwKDAmBggrBgEFBQcCARYaaHR0cDovL2Nwcy5s ZXRzZW5jcnlwdC5vcmcwggEEBgorBgEEAdZ5AgQCBIH1BIHyAPAAdgDfpV6raIJP H2yt7rhfTj5a6s2iEqRqXo47EsAgRFwqcwAAAX9E+f2SAAAEAwBHMEUCIQD7GCH7 +SxSmlJH3KJTL5MAHHae/0jQ5JgjOjO2pKbnegIgNYv2U7BQkO7WGgtFFe1BG5RZ zUjWO46SDmPGhCNFPZIAdgBGpVXrdfqRIDC1oolp9PN9ESxBdL79SbiFq/L8cP5t RwAAAX9E+f20AAAEAwBHMEUCIQCJL7uj8BhCL2rEbdn8Ke9GCaxGHM4R00dAaBoe f/hinAIgQ87CI4CYY6bzIq4i0HPzJEqp6rvkX5iUSyQJqkOaJn8wDQYJKoZIhvcN AQELBQADggEBAAZ0qkY8yd1Jq8UUiIIza1cMXloa3xxcPGz4kfvBOQEqyC4Eaipv eHjP3RuOI5lnQJSFb2SYFg5Toj90qJY4vCt6p2zMsXfvgqBD5XGpTQ+LRNOCO3Bh gj/IVswfQDiAOADdmqhUmwsGJNEKaG++9uql+K0j/dGm1qWgbSp4/DTVmbpQQAMM VfbrkUR666H0NJuGK5HhiUcGFJup3JNqMCv2yRcYie3nqredmxE+B0me4QOY+ku1 UhUwAUpVCm13DhedNqsqj81jzVlqNwT+N0DHz3Emv/FqoxdbARLzfdCM6ycmhxe8 ByWpqnGeigWzemSnkkKADG1cqSsclGlKkUI= -----END CERTIFICATE----- ------- START: mail01.ciproc.de:465 subject=CN = mail01.ciproc.de notBefore=Mar 1 09:15:08 2022 GMT notAfter=May 30 09:15:07 2022 GMT -----BEGIN CERTIFICATE----- MIIFJjCCBA6gAwIBAgISA2OGA5XXQ1B3pDiAnp1worHFMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMjAzMDEwOTE1MDhaFw0yMjA1MzAwOTE1MDdaMBsxGTAXBgNVBAMT EG1haWwwMS5laXByb2MuZGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB AQDeKS9oSZ+/vqVuwatbrP+C0Bplno9IcaFr6ZxQ8UQPgWRKyRfSCbXu99akvsy2 80zH6/1+pHuWwzrkP6tgljzagPR4TN3NcUY8ZrxiYUIpmpBdUm3Z8myza9jirZiS Pke+CGZe3NROdSTuFfNlmgxUu29cfYqKIRdPyqUhazca9psBwlEQtnJ1wQpvtgsr BtmOLTyms4dppWqEfiAKs+a8x3rzaxblzwwTQU5RfTp4pXlsHhKkz++JnewM6TG7 cIWrRdfSCGHiZZ3pr6En+ls4//hOuF1WO01G6/k6U9HhP5HU2QGQaQy3/2tB3EQK CSYr2PpFgP8/U9b2agKqRCOhAgMBAAGjggJLMIICRzAOBgNVHQ8BAf8EBAMCBaAw HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYD VR0OBBYEFHApnikjXSEeS7bT7VWtMQcje2LKMB8GA1UdIwQYMBaAFBQusxe3WFbL rlAJQOYfr52LFMLGMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDov L3IzLm8ubGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vcjMuaS5sZW5jci5v cmcvMBsGA1UdEQQUMBKCEG1haWwwMS5laXByb2MuZGUwTAYDVR0gBEUwQzAIBgZn gQwBAgEwNwYLKwYBBAGC3xMBAQEwKDAmBggrBgEFBQcCARYaaHR0cDovL2Nwcy5s ZXRzZW5jcnlwdC5vcmcwggEEBgorBgEEAdZ5AgQCBIH1BIHyAPAAdgDfpV6raIJP H2yt7rhfTj5a6s2iEqRqXo47EsAgRFwqcwAAAX9E+f2SAAAEAwBHMEUCIQD7GCH7 +SxSmlJH3KJTL5MAHHae/0jQ5JgjOjO2pKbnegIgNYv2U7BQkO7WGgtFFe1BG5RZ zUjWO46SDmPGhCNFPZIAdgBGpVXrdfqRIDC1oolp9PN9ESxBdL79SbiFq/L8cP5t RwAAAX9E+f20AAAEAwBHMEUCIQCJL7uj8BhCL2rEbdn8Ke9GCaxGHM4R00dAaBoe f/hinAIgQ87CI4CYY6bzIq4i0HPzJEqp6rvkX5iUSyQJqkOaJn8wDQYJKoZIhvcN AQELBQADggEBAAZ0qkY8yd1Jq8UUiIIza1cMXloa3xxcPGz4kfvBOQEqyC4Eaipv eHjP3RuOI5lnQJSFb2SYFg5Toj90qJY4vCt6p2zMsXfvgqBD5XGpTQ+LRNOCO3Bh gj/IVswfQDiAOADdmqhUmwsGJNEKaG++9uql+K0j/dGm1qWgbSp4/DTVmbpQQAMM VfbrkUR666H0NJuGK5HhiUcGFJup3JNqMCv2yRcYie3nqredmxE+B0me4QOY+ku1 UhUwAUpVCm13DhedNqsqj81jzVlqNwT+N0DHz3Emv/FqoxdbARLzfdCM6ycmhxe8 ByWpqnGeigWzemSnkkKADG1cqSsclGlKkUI= -----END CERTIFICATE----- ------- START: mail01.ciproc.de:993 subject=CN = mail01.ciproc.de notBefore=Mar 1 09:15:08 2022 GMT notAfter=May 30 09:15:07 2022 GMT -----BEGIN CERTIFICATE----- MIIFJjCCBA6gAwIBAgISA2OGA5XXQ1B3pDiAnp1worHFMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMjAzMDEwOTE1MDhaFw0yMjA1MzAwOTE1MDdaMBsxGTAXBgNVBAMT EG1haWwwMS5laXByb2MuZGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB AQDeKS9oSZ+/vqVuwatbrP+C0Bplno9IcaFr6ZxQ8UQPgWRKyRfSCbXu99akvsy2 80zH6/1+pHuWwzrkP6tgljzagPR4TN3NcUY8ZrxiYUIpmpBdUm3Z8myza9jirZiS Pke+CGZe3NROdSTuFfNlmgxUu29cfYqKIRdPyqUhazca9psBwlEQtnJ1wQpvtgsr BtmOLTyms4dppWqEfiAKs+a8x3rzaxblzwwTQU5RfTp4pXlsHhKkz++JnewM6TG7 cIWrRdfSCGHiZZ3pr6En+ls4//hOuF1WO01G6/k6U9HhP5HU2QGQaQy3/2tB3EQK CSYr2PpFgP8/U9b2agKqRCOhAgMBAAGjggJLMIICRzAOBgNVHQ8BAf8EBAMCBaAw HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYD VR0OBBYEFHApnikjXSEeS7bT7VWtMQcje2LKMB8GA1UdIwQYMBaAFBQusxe3WFbL rlAJQOYfr52LFMLGMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDov L3IzLm8ubGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vcjMuaS5sZW5jci5v cmcvMBsGA1UdEQQUMBKCEG1haWwwMS5laXByb2MuZGUwTAYDVR0gBEUwQzAIBgZn gQwBAgEwNwYLKwYBBAGC3xMBAQEwKDAmBggrBgEFBQcCARYaaHR0cDovL2Nwcy5s ZXRzZW5jcnlwdC5vcmcwggEEBgorBgEEAdZ5AgQCBIH1BIHyAPAAdgDfpV6raIJP H2yt7rhfTj5a6s2iEqRqXo47EsAgRFwqcwAAAX9E+f2SAAAEAwBHMEUCIQD7GCH7 +SxSmlJH3KJTL5MAHHae/0jQ5JgjOjO2pKbnegIgNYv2U7BQkO7WGgtFFe1BG5RZ zUjWO46SDmPGhCNFPZIAdgBGpVXrdfqRIDC1oolp9PN9ESxBdL79SbiFq/L8cP5t RwAAAX9E+f20AAAEAwBHMEUCIQCJL7uj8BhCL2rEbdn8Ke9GCaxGHM4R00dAaBoe f/hinAIgQ87CI4CYY6bzIq4i0HPzJEqp6rvkX5iUSyQJqkOaJn8wDQYJKoZIhvcN AQELBQADggEBAAZ0qkY8yd1Jq8UUiIIza1cMXloa3xxcPGz4kfvBOQEqyC4Eaipv eHjP3RuOI5lnQJSFb2SYFg5Toj90qJY4vCt6p2zMsXfvgqBD5XGpTQ+LRNOCO3Bh gj/IVswfQDiAOADdmqhUmwsGJNEKaG++9uql+K0j/dGm1qWgbSp4/DTVmbpQQAMM VfbrkUR666H0NJuGK5HhiUcGFJup3JNqMCv2yRcYie3nqredmxE+B0me4QOY+ku1 UhUwAUpVCm13DhedNqsqj81jzVlqNwT+N0DHz3Emv/FqoxdbARLzfdCM6ycmhxe8 ByWpqnGeigWzemSnkkKADG1cqSsclGlKkUI= -----END CERTIFICATE----- ------- START: mail01.ciproc.de:995 subject=CN = mail01.ciproc.de notBefore=Mar 1 09:15:08 2022 GMT notAfter=May 30 09:15:07 2022 GMT -----BEGIN CERTIFICATE----- MIIFJjCCBA6gAwIBAgISA2OGA5XXQ1B3pDiAnp1worHFMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMjAzMDEwOTE1MDhaFw0yMjA1MzAwOTE1MDdaMBsxGTAXBgNVBAMT EG1haWwwMS5laXByb2MuZGUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB AQDeKS9oSZ+/vqVuwatbrP+C0Bplno9IcaFr6ZxQ8UQPgWRKyRfSCbXu99akvsy2 80zH6/1+pHuWwzrkP6tgljzagPR4TN3NcUY8ZrxiYUIpmpBdUm3Z8myza9jirZiS Pke+CGZe3NROdSTuFfNlmgxUu29cfYqKIRdPyqUhazca9psBwlEQtnJ1wQpvtgsr BtmOLTyms4dppWqEfiAKs+a8x3rzaxblzwwTQU5RfTp4pXlsHhKkz++JnewM6TG7 cIWrRdfSCGHiZZ3pr6En+ls4//hOuF1WO01G6/k6U9HhP5HU2QGQaQy3/2tB3EQK CSYr2PpFgP8/U9b2agKqRCOhAgMBAAGjggJLMIICRzAOBgNVHQ8BAf8EBAMCBaAw HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYD VR0OBBYEFHApnikjXSEeS7bT7VWtMQcje2LKMB8GA1UdIwQYMBaAFBQusxe3WFbL rlAJQOYfr52LFMLGMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDov L3IzLm8ubGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vcjMuaS5sZW5jci5v cmcvMBsGA1UdEQQUMBKCEG1haWwwMS5laXByb2MuZGUwTAYDVR0gBEUwQzAIBgZn gQwBAgEwNwYLKwYBBAGC3xMBAQEwKDAmBggrBgEFBQcCARYaaHR0cDovL2Nwcy5s ZXRzZW5jcnlwdC5vcmcwggEEBgorBgEEAdZ5AgQCBIH1BIHyAPAAdgDfpV6raIJP H2yt7rhfTj5a6s2iEqRqXo47EsAgRFwqcwAAAX9E+f2SAAAEAwBHMEUCIQD7GCH7 +SxSmlJH3KJTL5MAHHae/0jQ5JgjOjO2pKbnegIgNYv2U7BQkO7WGgtFFe1BG5RZ zUjWO46SDmPGhCNFPZIAdgBGpVXrdfqRIDC1oolp9PN9ESxBdL79SbiFq/L8cP5t RwAAAX9E+f20AAAEAwBHMEUCIQCJL7uj8BhCL2rEbdn8Ke9GCaxGHM4R00dAaBoe f/hinAIgQ87CI4CYY6bzIq4i0HPzJEqp6rvkX5iUSyQJqkOaJn8wDQYJKoZIhvcN AQELBQADggEBAAZ0qkY8yd1Jq8UUiIIza1cMXloa3xxcPGz4kfvBOQEqyC4Eaipv eHjP3RuOI5lnQJSFb2SYFg5Toj90qJY4vCt6p2zMsXfvgqBD5XGpTQ+LRNOCO3Bh gj/IVswfQDiAOADdmqhUmwsGJNEKaG++9uql+K0j/dGm1qWgbSp4/DTVmbpQQAMM VfbrkUR666H0NJuGK5HhiUcGFJup3JNqMCv2yRcYie3nqredmxE+B0me4QOY+ku1 UhUwAUpVCm13DhedNqsqj81jzVlqNwT+N0DHz3Emv/FqoxdbARLzfdCM6ycmhxe8 ByWpqnGeigWzemSnkkKADG1cqSsclGlKkUI= -----END CERTIFICATE-----
Scan subtype: | |
Origin IP: | |
Details: | |
Command: |
|
Version: | (official web site) |
Output: |
/usr/bin/testssl: connect: Connection timed out /usr/bin/testssl: line 10454: /dev/tcp/172.21.11.11/143: Connection timed out [1;35mFatal error: Can't connect to "172.21.11.11:143" Make sure a firewall is not between you and your scanning target![m /usr/bin/testssl: connect: Connection timed out /usr/bin/testssl: line 10454: /dev/tcp/172.21.11.11/443: Connection timed out [1;35mFatal error: Can't connect to "172.21.11.11:443" Make sure a firewall is not between you and your scanning target![m /usr/bin/testssl: connect: Connection timed out /usr/bin/testssl: line 10454: /dev/tcp/172.21.11.11/465: Connection timed out [1;35mFatal error: Can't connect to "172.21.11.11:465" Make sure a firewall is not between you and your scanning target![m /usr/bin/testssl: connect: Connection timed out /usr/bin/testssl: line 10454: /dev/tcp/172.21.11.11/993: Connection timed out [1;35mFatal error: Can't connect to "172.21.11.11:993" Make sure a firewall is not between you and your scanning target![m /usr/bin/testssl: connect: Connection timed out /usr/bin/testssl: line 10454: /dev/tcp/172.21.11.11/995: Connection timed out [1;35mFatal error: Can't connect to "172.21.11.11:995" Make sure a firewall is not between you and your scanning target![m ------- START: 109.233.144.66:p110 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t pop3 109.233.144.66:110" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:19:38 -->> 109.233.144.66:110 (109.233.144.66) <<-- rDNS (109.233.144.66): mail01.ciproc.de. Service set: STARTTLS via POP3 Testing protocols via sockets SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 384 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 1024 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 384 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 1024 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 1024 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 1024 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 384 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 384 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 1024 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 1024 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 1024 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 384 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:21:43 [ 146s] -->> 109.233.144.66:110 (109.233.144.66) <<-- ------- START: 109.233.144.66:p143 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t imap 109.233.144.66:143" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:20:58 -->> 109.233.144.66:143 (109.233.144.66) <<-- rDNS (109.233.144.66): mail01.ciproc.de. Service set: STARTTLS via IMAP Testing protocols via sockets SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 384 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 1024 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 384 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 1024 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 1024 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 1024 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 384 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 384 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 1024 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 1024 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 1024 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 384 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:22:57 [ 140s] -->> 109.233.144.66:143 (109.233.144.66) <<-- ------- START: 109.233.144.66:p21 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t ftp 109.233.144.66:21" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:16:55 -->> 109.233.144.66:21 (109.233.144.66) <<-- rDNS (109.233.144.66): mail01.ciproc.de. Service set: STARTTLS via FTP Testing protocols via sockets SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 2048 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 256 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 2048 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 2048 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 2048 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 256 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 2048 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 2048 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 2048 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 256 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:18:56 [ 140s] -->> 109.233.144.66:21 (109.233.144.66) <<-- ------- START: 109.233.144.66:p25 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t smtp 109.233.144.66:25" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:18:17 -->> 109.233.144.66:25 (109.233.144.66) <<-- rDNS (109.233.144.66): mail01.ciproc.de. Service set: STARTTLS via SMTP Testing protocols via sockets SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 2048 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 2048 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 2048 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 256 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 2048 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 2048 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 2048 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 256 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 2048 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 2048 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 2048 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 256 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x9a DHE-RSA-SEED-SHA DH 2048 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:20:28 [ 152s] -->> 109.233.144.66:25 (109.233.144.66) <<-- ------- START: 109.233.144.66:p443 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ 109.233.144.66:443" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:22:17 -->> 109.233.144.66:443 (109.233.144.66) <<-- rDNS (109.233.144.66): mail01.ciproc.de. Service detected: HTTP Testing protocols via sockets except NPN+ALPN SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol NPN/SPDY not offered ALPN/HTTP2 http/1.1 (offered) Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 2048 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 x6b DHE-RSA-AES256-SHA256 DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 2048 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 x67 DHE-RSA-AES128-SHA256 DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:23:37 [ 100s] -->> 109.233.144.66:443 (109.233.144.66) <<-- ------- START: 109.233.144.66:p465 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ 109.233.144.66:465" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:23:37 -->> 109.233.144.66:465 (109.233.144.66) <<-- rDNS (109.233.144.66): mail01.ciproc.de. Service detected: Couldn't determine what's running on port 465, assuming no HTTP service => skipping all HTTP checks Testing protocols via sockets except NPN+ALPN SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol NPN/SPDY not offered ALPN/HTTP2 not offered Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 2048 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 256 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 2048 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 2048 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 2048 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 256 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 2048 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 2048 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 2048 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 256 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:25:25 [ 128s] -->> 109.233.144.66:465 (109.233.144.66) <<-- ------- START: 109.233.144.66:p993 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ 109.233.144.66:993" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:24:57 -->> 109.233.144.66:993 (109.233.144.66) <<-- rDNS (109.233.144.66): mail01.ciproc.de. Service detected: IMAP, thus skipping HTTP specific checks Testing protocols via sockets except NPN+ALPN SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol NPN/SPDY not offered ALPN/HTTP2 not offered Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 384 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 1024 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 384 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 1024 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 1024 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 1024 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 384 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 384 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 1024 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 1024 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 1024 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 384 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:26:54 [ 136s] -->> 109.233.144.66:993 (109.233.144.66) <<-- ------- START: 109.233.144.66:p995 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ 109.233.144.66:995" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:26:18 -->> 109.233.144.66:995 (109.233.144.66) <<-- rDNS (109.233.144.66): mail01.ciproc.de. Service detected: POP, thus skipping HTTP specific checks Testing protocols via sockets except NPN+ALPN SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol NPN/SPDY not offered ALPN/HTTP2 not offered Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 384 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 1024 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 384 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 1024 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 1024 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 1024 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 384 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 384 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 1024 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 1024 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 1024 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 384 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:28:16 [ 138s] -->> 109.233.144.66:995 (109.233.144.66) <<-- ------- START: 109.233.144.67:p110 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t pop3 109.233.144.67:110" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:30:23 -->> 109.233.144.67:110 (109.233.144.67) <<-- rDNS (109.233.144.67): mail01.add2web.de. Service set: STARTTLS via POP3 Testing protocols via sockets SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 384 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 1024 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 384 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 1024 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 1024 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 1024 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 384 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 384 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 1024 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 1024 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 1024 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 384 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:32:34 [ 152s] -->> 109.233.144.67:110 (109.233.144.67) <<-- ------- START: 109.233.144.67:p143 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t imap 109.233.144.67:143" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:31:44 -->> 109.233.144.67:143 (109.233.144.67) <<-- rDNS (109.233.144.67): mail01.add2web.de. Service set: STARTTLS via IMAP Testing protocols via sockets SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 384 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 1024 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 384 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 1024 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 1024 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 1024 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 384 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 384 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 1024 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 1024 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 1024 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 384 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:33:54 [ 151s] -->> 109.233.144.67:143 (109.233.144.67) <<-- ------- START: 109.233.144.67:p21 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t ftp 109.233.144.67:21" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:27:41 -->> 109.233.144.67:21 (109.233.144.67) <<-- rDNS (109.233.144.67): mail01.add2web.de. Service set: STARTTLS via FTP Testing protocols via sockets SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 2048 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 256 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 2048 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 2048 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 2048 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 256 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 2048 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 2048 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 2048 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 256 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:29:47 [ 145s] -->> 109.233.144.67:21 (109.233.144.67) <<-- ------- START: 109.233.144.67:p25 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t smtp 109.233.144.67:25" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:29:03 -->> 109.233.144.67:25 (109.233.144.67) <<-- rDNS (109.233.144.67): mail01.add2web.de. Service set: STARTTLS via SMTP Testing protocols via sockets SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 2048 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 2048 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 2048 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 256 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 2048 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 2048 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 2048 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 256 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 2048 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 2048 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 2048 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 256 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x9a DHE-RSA-SEED-SHA DH 2048 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:31:16 [ 154s] -->> 109.233.144.67:25 (109.233.144.67) <<-- ------- START: 109.233.144.67:p443 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ 109.233.144.67:443" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:33:04 -->> 109.233.144.67:443 (109.233.144.67) <<-- rDNS (109.233.144.67): mail01.add2web.de. Service detected: HTTP Testing protocols via sockets except NPN+ALPN SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol NPN/SPDY not offered ALPN/HTTP2 http/1.1 (offered) Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 2048 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 x6b DHE-RSA-AES256-SHA256 DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 2048 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 x67 DHE-RSA-AES128-SHA256 DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:34:35 [ 112s] -->> 109.233.144.67:443 (109.233.144.67) <<-- ------- START: 109.233.144.67:p465 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ 109.233.144.67:465" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:34:24 -->> 109.233.144.67:465 (109.233.144.67) <<-- rDNS (109.233.144.67): mail01.add2web.de. Service detected: Couldn't determine what's running on port 465, assuming no HTTP service => skipping all HTTP checks Testing protocols via sockets except NPN+ALPN SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol NPN/SPDY not offered ALPN/HTTP2 not offered Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 2048 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 256 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 2048 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 2048 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 2048 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 256 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 2048 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 2048 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 2048 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 256 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:36:22 [ 139s] -->> 109.233.144.67:465 (109.233.144.67) <<-- ------- START: 109.233.144.67:p993 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ 109.233.144.67:993" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:35:44 -->> 109.233.144.67:993 (109.233.144.67) <<-- rDNS (109.233.144.67): mail01.add2web.de. Service detected: IMAP, thus skipping HTTP specific checks Testing protocols via sockets except NPN+ALPN SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol NPN/SPDY not offered ALPN/HTTP2 not offered Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 384 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 1024 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 384 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 1024 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 1024 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 1024 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 384 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 384 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 1024 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 1024 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 1024 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 384 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:37:54 [ 151s] -->> 109.233.144.67:993 (109.233.144.67) <<-- ------- START: 109.233.144.67:p995 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ 109.233.144.67:995" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:37:05 -->> 109.233.144.67:995 (109.233.144.67) <<-- rDNS (109.233.144.67): mail01.add2web.de. Service detected: POP, thus skipping HTTP specific checks Testing protocols via sockets except NPN+ALPN SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol NPN/SPDY not offered ALPN/HTTP2 not offered Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 384 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 1024 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 384 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 1024 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 1024 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 1024 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 384 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 384 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 1024 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 1024 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 1024 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 384 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:39:08 [ 144s] -->> 109.233.144.67:995 (109.233.144.67) <<-- ------- START: 109.233.144.80:p443 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ 109.233.144.80:443" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:39:52 -->> 109.233.144.80:443 (109.233.144.80) <<-- rDNS (109.233.144.80): -- Service detected: HTTP Testing protocols via sockets except NPN+ALPN SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 not offered TLS 1.1 not offered TLS 1.2 offered (OK) TLS 1.3 offered (OK): final NPN/SPDY not offered ALPN/HTTP2 not offered Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 TLS 1.1 TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 253 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 253 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 253 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 2048 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 253 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 2048 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 2048 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 2048 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 253 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc051 ARIA256-GCM-SHA384 RSA ARIAGCM 256 TLS_RSA_WITH_ARIA_256_GCM_SHA384 xc053 DHE-RSA-ARIA256-GCM-SHA384 DH 2048 ARIAGCM 256 TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 xc061 ECDHE-ARIA256-GCM-SHA384 ECDH 253 ARIAGCM 256 TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 253 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 253 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 253 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 2048 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 2048 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 2048 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 253 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA xc050 ARIA128-GCM-SHA256 RSA ARIAGCM 128 TLS_RSA_WITH_ARIA_128_GCM_SHA256 xc052 DHE-RSA-ARIA128-GCM-SHA256 DH 2048 ARIAGCM 128 TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 xc060 ECDHE-ARIA128-GCM-SHA256 ECDH 253 ARIAGCM 128 TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 TLS 1.3 x1302 TLS_AES_256_GCM_SHA384 ECDH 253 AESGCM 256 TLS_AES_256_GCM_SHA384 x1303 TLS_CHACHA20_POLY1305_SHA256 ECDH 253 ChaCha20 256 TLS_CHACHA20_POLY1305_SHA256 x1301 TLS_AES_128_GCM_SHA256 ECDH 253 AESGCM 128 TLS_AES_128_GCM_SHA256 Done 2022-04-04 09:41:14 [ 100s] -->> 109.233.144.80:443 (109.233.144.80) <<-- ------- START: 109.233.144.83:p443 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ 109.233.144.83:443" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:41:00 -->> 109.233.144.83:443 (109.233.144.83) <<-- rDNS (109.233.144.83): -- Service detected: HTTP Testing protocols via sockets except NPN+ALPN SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 not offered TLS 1.1 not offered TLS 1.2 offered (OK) TLS 1.3 offered (OK): final NPN/SPDY not offered ALPN/HTTP2 not offered Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 TLS 1.1 TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 253 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 253 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 253 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 2048 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 253 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 2048 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 2048 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 2048 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 253 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc051 ARIA256-GCM-SHA384 RSA ARIAGCM 256 TLS_RSA_WITH_ARIA_256_GCM_SHA384 xc053 DHE-RSA-ARIA256-GCM-SHA384 DH 2048 ARIAGCM 256 TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 xc061 ECDHE-ARIA256-GCM-SHA384 ECDH 253 ARIAGCM 256 TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 253 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 253 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 253 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 2048 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 2048 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 2048 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 253 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA xc050 ARIA128-GCM-SHA256 RSA ARIAGCM 128 TLS_RSA_WITH_ARIA_128_GCM_SHA256 xc052 DHE-RSA-ARIA128-GCM-SHA256 DH 2048 ARIAGCM 128 TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 xc060 ECDHE-ARIA128-GCM-SHA256 ECDH 253 ARIAGCM 128 TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 TLS 1.3 x1302 TLS_AES_256_GCM_SHA384 ECDH 253 AESGCM 256 TLS_AES_256_GCM_SHA384 x1303 TLS_CHACHA20_POLY1305_SHA256 ECDH 253 ChaCha20 256 TLS_CHACHA20_POLY1305_SHA256 x1301 TLS_AES_128_GCM_SHA256 ECDH 253 AESGCM 128 TLS_AES_128_GCM_SHA256 Done 2022-04-04 09:42:25 [ 103s] -->> 109.233.144.83:443 (109.233.144.83) <<-- ------- START: 109.233.144.86:p443 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ 109.233.144.86:443" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:42:03 -->> 109.233.144.86:443 (109.233.144.86) <<-- rDNS (109.233.144.86): -- Service detected: HTTP Testing protocols via sockets except NPN+ALPN SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 not offered TLS 1.1 not offered TLS 1.2 offered (OK) TLS 1.3 offered (OK): final NPN/SPDY not offered ALPN/HTTP2 not offered Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 TLS 1.1 TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 253 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 253 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 253 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 2048 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 253 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 2048 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 2048 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 2048 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 253 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc051 ARIA256-GCM-SHA384 RSA ARIAGCM 256 TLS_RSA_WITH_ARIA_256_GCM_SHA384 xc053 DHE-RSA-ARIA256-GCM-SHA384 DH 2048 ARIAGCM 256 TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 xc061 ECDHE-ARIA256-GCM-SHA384 ECDH 253 ARIAGCM 256 TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 253 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 253 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 253 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 2048 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 2048 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 2048 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 253 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA xc050 ARIA128-GCM-SHA256 RSA ARIAGCM 128 TLS_RSA_WITH_ARIA_128_GCM_SHA256 xc052 DHE-RSA-ARIA128-GCM-SHA256 DH 2048 ARIAGCM 128 TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 xc060 ECDHE-ARIA128-GCM-SHA256 ECDH 253 ARIAGCM 128 TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 TLS 1.3 x1302 TLS_AES_256_GCM_SHA384 ECDH 253 AESGCM 256 TLS_AES_256_GCM_SHA384 x1303 TLS_CHACHA20_POLY1305_SHA256 ECDH 253 ChaCha20 256 TLS_CHACHA20_POLY1305_SHA256 x1301 TLS_AES_128_GCM_SHA256 ECDH 253 AESGCM 128 TLS_AES_128_GCM_SHA256 Done 2022-04-04 09:43:27 [ 103s] -->> 109.233.144.86:443 (109.233.144.86) <<-- ------- START: 109.233.144.87:p3306 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t mysql 109.233.144.87:3306" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:42:55 -->> 109.233.144.87:3306 (109.233.144.87) <<-- rDNS (109.233.144.87): -- 109.233.144.87:3306 doesn't seem to be a TLS/SSL enabled server The results might look ok but they could be nonsense. Really proceed ? ("yes" to continue) --> ------- START: mail01.add2web.de:p110 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t pop3 mail01.add2web.de:110" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:30:25 -->> 109.233.144.67:110 (mail01.add2web.de) <<-- rDNS (109.233.144.67): mail01.add2web.de. Service set: STARTTLS via POP3 Testing protocols via sockets SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 384 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 1024 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 384 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 1024 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 1024 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 1024 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 384 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 384 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 1024 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 1024 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 1024 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 384 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:32:36 [ 153s] -->> 109.233.144.67:110 (mail01.add2web.de) <<-- ------- START: mail01.add2web.de:p143 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t imap mail01.add2web.de:143" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:31:45 -->> 109.233.144.67:143 (mail01.add2web.de) <<-- rDNS (109.233.144.67): mail01.add2web.de. Service set: STARTTLS via IMAP Testing protocols via sockets SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 384 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 1024 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 384 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 1024 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 1024 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 1024 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 384 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 384 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 1024 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 1024 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 1024 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 384 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:33:57 [ 154s] -->> 109.233.144.67:143 (mail01.add2web.de) <<-- ------- START: mail01.add2web.de:p21 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t ftp mail01.add2web.de:21" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:27:43 -->> 109.233.144.67:21 (mail01.add2web.de) <<-- rDNS (109.233.144.67): mail01.add2web.de. Service set: STARTTLS via FTP Testing protocols via sockets SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 2048 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 256 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 2048 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 2048 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 2048 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 256 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 2048 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 2048 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 2048 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 256 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:29:51 [ 148s] -->> 109.233.144.67:21 (mail01.add2web.de) <<-- ------- START: mail01.add2web.de:p25 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t smtp mail01.add2web.de:25" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:29:05 -->> 109.233.144.67:25 (mail01.add2web.de) <<-- rDNS (109.233.144.67): mail01.add2web.de. Service set: STARTTLS via SMTP Testing protocols via sockets SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 2048 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 2048 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 2048 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 256 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 2048 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 2048 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 2048 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 256 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 2048 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 2048 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 2048 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 256 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x9a DHE-RSA-SEED-SHA DH 2048 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:31:19 [ 157s] -->> 109.233.144.67:25 (mail01.add2web.de) <<-- ------- START: mail01.add2web.de:p443 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ mail01.add2web.de:443" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:33:05 -->> 109.233.144.67:443 (mail01.add2web.de) <<-- rDNS (109.233.144.67): mail01.add2web.de. Service detected: HTTP Testing protocols via sockets except NPN+ALPN SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol NPN/SPDY not offered ALPN/HTTP2 http/1.1 (offered) Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 2048 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 x6b DHE-RSA-AES256-SHA256 DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 2048 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 x67 DHE-RSA-AES128-SHA256 DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:34:41 [ 118s] -->> 109.233.144.67:443 (mail01.add2web.de) <<-- ------- START: mail01.add2web.de:p465 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ mail01.add2web.de:465" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:34:25 -->> 109.233.144.67:465 (mail01.add2web.de) <<-- rDNS (109.233.144.67): mail01.add2web.de. Service detected: Couldn't determine what's running on port 465, assuming no HTTP service => skipping all HTTP checks Testing protocols via sockets except NPN+ALPN SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol NPN/SPDY not offered ALPN/HTTP2 not offered Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 2048 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 256 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 2048 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 2048 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 2048 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 256 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 2048 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 2048 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 2048 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 256 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:36:25 [ 141s] -->> 109.233.144.67:465 (mail01.add2web.de) <<-- ------- START: mail01.add2web.de:p993 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ mail01.add2web.de:993" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:35:45 -->> 109.233.144.67:993 (mail01.add2web.de) <<-- rDNS (109.233.144.67): mail01.add2web.de. Service detected: IMAP, thus skipping HTTP specific checks Testing protocols via sockets except NPN+ALPN SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol NPN/SPDY not offered ALPN/HTTP2 not offered Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 384 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 1024 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 384 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 1024 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 1024 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 1024 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 384 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 384 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 1024 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 1024 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 1024 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 384 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:37:57 [ 154s] -->> 109.233.144.67:993 (mail01.add2web.de) <<-- ------- START: mail01.add2web.de:p995 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ mail01.add2web.de:995" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:37:06 -->> 109.233.144.67:995 (mail01.add2web.de) <<-- rDNS (109.233.144.67): mail01.add2web.de. Service detected: POP, thus skipping HTTP specific checks Testing protocols via sockets except NPN+ALPN SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol NPN/SPDY not offered ALPN/HTTP2 not offered Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 384 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 1024 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 384 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 1024 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 1024 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 1024 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 384 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 384 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 1024 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 1024 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 1024 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 384 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:39:10 [ 146s] -->> 109.233.144.67:995 (mail01.add2web.de) <<-- ------- START: mail01.ciproc.de:p110 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t pop3 mail01.ciproc.de:110" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:19:39 -->> 172.21.11.11:110 (mail01.ciproc.de) <<-- A record via: /etc/hosts rDNS (172.21.11.11): -- Service set: STARTTLS via POP3 Testing protocols via sockets SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 384 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 1024 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 384 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 1024 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 1024 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 1024 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 384 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 1024 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 384 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 384 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 1024 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 1024 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 1024 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 1024 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 384 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x9a DHE-RSA-SEED-SHA DH 1024 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 1024 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:21:44 [ 147s] -->> 172.21.11.11:110 (mail01.ciproc.de) <<-- ------- START: mail01.ciproc.de:p143 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t imap mail01.ciproc.de:143" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:20:59 -->> 172.21.11.11:143 (mail01.ciproc.de) <<-- A record via: /etc/hosts rDNS (172.21.11.11): -- Oops: TCP connect problem Unable to open a socket to 172.21.11.11:143. Fatal error: Can't connect to "172.21.11.11:143" Make sure a firewall is not between you and your scanning target! ------- START: mail01.ciproc.de:p21 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t ftp mail01.ciproc.de:21" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:16:56 -->> 172.21.11.11:21 (mail01.ciproc.de) <<-- A record via: /etc/hosts rDNS (172.21.11.11): -- Service set: STARTTLS via FTP Testing protocols via sockets SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 2048 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 256 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 2048 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 2048 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 2048 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 256 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 2048 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 2048 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 2048 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 256 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:18:59 [ 143s] -->> 172.21.11.11:21 (mail01.ciproc.de) <<-- ------- START: mail01.ciproc.de:p25 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ -t smtp mail01.ciproc.de:25" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:18:18 -->> 172.21.11.11:25 (mail01.ciproc.de) <<-- A record via: /etc/hosts rDNS (172.21.11.11): -- Service set: STARTTLS via SMTP Testing protocols via sockets SSLv2 not offered (OK) SSLv3 not offered (OK) TLS 1 offered (deprecated) TLS 1.1 offered (deprecated) TLS 1.2 offered (OK) TLS 1.3 not offered and downgraded to a weaker protocol Testing ciphers per protocol via OpenSSL plus sockets against the server, ordered by encryption strength Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (IANA/RFC) ----------------------------------------------------------------------------------------------------------------------------- SSLv2 SSLv3 TLS 1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 2048 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.1 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA x9a DHE-RSA-SEED-SHA DH 2048 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.2 xc030 ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 xc028 ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 xc014 ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA x9f DHE-RSA-AES256-GCM-SHA384 DH 2048 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 xcca8 ECDHE-RSA-CHACHA20-POLY1305 ECDH 256 ChaCha20 256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xccaa DHE-RSA-CHACHA20-POLY1305 DH 2048 ChaCha20 256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 xc0a3 DHE-RSA-AES256-CCM8 DH 2048 AESCCM8 256 TLS_DHE_RSA_WITH_AES_256_CCM_8 xc09f DHE-RSA-AES256-CCM DH 2048 AESCCM 256 TLS_DHE_RSA_WITH_AES_256_CCM x6b DHE-RSA-AES256-SHA256 DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 x39 DHE-RSA-AES256-SHA DH 2048 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA xc077 ECDHE-RSA-CAMELLIA256-SHA384 ECDH 256 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 xc4 DHE-RSA-CAMELLIA256-SHA256 DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 x88 DHE-RSA-CAMELLIA256-SHA DH 2048 Camellia 256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384 xc0a1 AES256-CCM8 RSA AESCCM8 256 TLS_RSA_WITH_AES_256_CCM_8 xc09d AES256-CCM RSA AESCCM 256 TLS_RSA_WITH_AES_256_CCM x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256 x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA xc0 CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 x84 CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA xc02f ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 xc027 ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 xc013 ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA x9e DHE-RSA-AES128-GCM-SHA256 DH 2048 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 xc0a2 DHE-RSA-AES128-CCM8 DH 2048 AESCCM8 128 TLS_DHE_RSA_WITH_AES_128_CCM_8 xc09e DHE-RSA-AES128-CCM DH 2048 AESCCM 128 TLS_DHE_RSA_WITH_AES_128_CCM xc0a0 AES128-CCM8 RSA AESCCM8 128 TLS_RSA_WITH_AES_128_CCM_8 xc09c AES128-CCM RSA AESCCM 128 TLS_RSA_WITH_AES_128_CCM x67 DHE-RSA-AES128-SHA256 DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 x33 DHE-RSA-AES128-SHA DH 2048 AES 128 TLS_DHE_RSA_WITH_AES_128_CBC_SHA xc076 ECDHE-RSA-CAMELLIA128-SHA256 ECDH 256 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 xbe DHE-RSA-CAMELLIA128-SHA256 DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 x9a DHE-RSA-SEED-SHA DH 2048 SEED 128 TLS_DHE_RSA_WITH_SEED_CBC_SHA x45 DHE-RSA-CAMELLIA128-SHA DH 2048 Camellia 128 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256 x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256 x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA xba CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 x96 SEED-SHA RSA SEED 128 TLS_RSA_WITH_SEED_CBC_SHA x41 CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS 1.3 Done 2022-04-04 09:20:30 [ 153s] -->> 172.21.11.11:25 (mail01.ciproc.de) <<-- ------- START: mail01.ciproc.de:p443 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ mail01.ciproc.de:443" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:22:18 -->> 172.21.11.11:443 (mail01.ciproc.de) <<-- A record via: /etc/hosts rDNS (172.21.11.11): -- Oops: TCP connect problem Unable to open a socket to 172.21.11.11:443. Fatal error: Can't connect to "172.21.11.11:443" Make sure a firewall is not between you and your scanning target! ------- START: mail01.ciproc.de:p465 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ mail01.ciproc.de:465" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:23:38 -->> 172.21.11.11:465 (mail01.ciproc.de) <<-- A record via: /etc/hosts rDNS (172.21.11.11): -- Oops: TCP connect problem Unable to open a socket to 172.21.11.11:465. Fatal error: Can't connect to "172.21.11.11:465" Make sure a firewall is not between you and your scanning target! ------- START: mail01.ciproc.de:p993 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ mail01.ciproc.de:993" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:24:58 -->> 172.21.11.11:993 (mail01.ciproc.de) <<-- A record via: /etc/hosts rDNS (172.21.11.11): -- Oops: TCP connect problem Unable to open a socket to 172.21.11.11:993. Fatal error: Can't connect to "172.21.11.11:993" Make sure a firewall is not between you and your scanning target! ------- START: mail01.ciproc.de:p995 ## Scan started as: "testssl -q -p -E -oL /opt/monkeysys/tmp/ciproc/testssl/20220404-0916/ mail01.ciproc.de:995" ## at pent01:/usr/bin/openssl ## version testssl: 3.0.7 from ## version openssl: "1.1.1m" from "Dec 24 12:15:37 2021") Start 2022-04-04 09:26:19 -->> 172.21.11.11:995 (mail01.ciproc.de) <<-- A record via: /etc/hosts rDNS (172.21.11.11): -- Oops: TCP connect problem Unable to open a socket to 172.21.11.11:995. Fatal error: Can't connect to "172.21.11.11:995" Make sure a firewall is not between you and your scanning target!
The status of each available reporting module for ciproc gmbh:
Module | Status |
---|---|
Vulnerability Scan This performs a thorough scan of the targetted systems to detect known vulnerabilities. The report provides both management-level summaries and in-depth technical information about each finding, tracks changes relative to the previous status report, and recommends solutions to resolve any remaining threats. | Enabled |
Port Scan This performs a thorough scan to detect open TCP and UDP ports on the targetted systems. The report tracks changes relative to the previous status report and provides details of the services that are likely running on each of the detected ports. | Enabled |
Certificate Check This checks the expiry date of all SSL certificates associated with the targetted systems, and checks for cipher conformity. The report alerts administrators about certificates that are almost due to expire so they can be renewed in time to avoid any costly or embarrassing service disruptions. | Enabled |
It may interest you to know that we also offer a report that provides longer term tracking of security vulnerabilities that is especially suitable for auditing purposes.
For more information about any of our other services, please visit us at ciproc.de, or contact your ciproc representative directly.
Please verify that the following information is accurate and up-to-date. If there are any changes, please notify your ciproc gmbh contact (see below).
ciproc gmbh
Contact address
- Schillerstrasse 1a
69115 Heidelberg
Germany
General contacts
- Ali Elci
tel. +49-621-39691 15
elci@ciproc.de - Huck Turner
tel. +49-621-39691 3030
turner@ciproc.de
Persons allowed to request incident handling
- Ali Elci
tel. +49-621-39691 15
elci@ciproc.de - Huck Turner
tel. +49-621-39691 3030
turner@ciproc.de
Recipients of reports
- Ali Elci
tel. +49-621-39691 15
elci@ciproc.de - Huck Turner
tel. +49-621-39691 3030
turner@ciproc.de
ciproc gmbh
General contact information
- ciproc gmbh
Schillerstrasse 1a
69115 Heidelberg
Germany
+49.621.3969100
ciproc@ciproc.de
GPG key:0FED44FB
Fingerprint:9F5E 48D3 BCD7 B58A CA81 F5D7 8A57 CC41 0FED 44FB
Report contact
- Elci, Ali
tel. +49-621-39691 15
fax +49-621-39691 01
mobile +49-176-31341530
elci@ciproc.de
GPG key:0208112227F98925
Fingerprint:2540 2344 3CEC 5B35 F598 02A8 0208 1122 27F9 8925
Mr. Elci was responsible for generating this report, and for performing each of the security checks on which it is based.
Disclaimer
ciproc gmbh understands and agrees that the vulnerability testing performed by ciproc gmbh has been performed in a professional manner, reflecting the level of knowledge and expertise possessed by those individuals performing the vulnerability testing at the time such testing has been performed.
The information in this document is provided as a service to customers of ciproc gmbh. ciproc gmbh makes no warranty, expressed or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process contained herein, or represents that its use would not infringe any privately owned rights. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation or favouring by ciproc gmbh. The views and opinions of authors expressed herein do not necessarily state or reflect those of ciproc gmbh, and may not be used for advertising or product endorsement purposes.