Hostnames |
video-monitoring.com ip4-104-245-126-194.video-monitoring.com |
Domains | video-monitoring.com |
Country | United States |
City | Miami |
Organization | ColoHouse LLC |
ISP | Netrouting B.V. |
ASN | AS47869 |
Operating System | Windows |
Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
CVE-2010-3972 | 10.0Heap-based buffer overflow in the TELNET_STREAM_CONTEXT::OnSendData function in ftpsvc.dll in Microsoft FTP Service 7.0 and 7.5 for Internet Information Services (IIS) 7.0, and IIS 7.5, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted FTP command, aka "IIS FTP Service Heap Buffer Overrun Vulnerability." NOTE: some of these details are obtained from third party information. |
CVE-2010-2730 | 9.3Buffer overflow in Microsoft Internet Information Services (IIS) 7.5, when FastCGI is enabled, allows remote attackers to execute arbitrary code via crafted headers in a request, aka "Request Header Buffer Overflow Vulnerability." |
CVE-2010-1899 | 4.3Stack consumption vulnerability in the ASP implementation in Microsoft Internet Information Services (IIS) 5.1, 6.0, 7.0, and 7.5 allows remote attackers to cause a denial of service (daemon outage) via a crafted request, related to asp.dll, aka "IIS Repeated Parameter Request Denial of Service Vulnerability." |
1057531874 | 2024-05-15T08:59:09.43074521 / tcp
220 Microsoft FTP Service 530 Valid hostname is expected. 214-The following commands are recognized (* ==>'s unimplemented). ABOR ACCT ADAT * ALLO APPE AUTH CCC CDUP CWD DELE ENC * EPRT EPSV FEAT HELP HOST LANG LIST MDTM MIC * MKD MODE NLST NOOP OPTS PASS PASV PBSZ PORT PROT PWD QUIT REIN REST RETR RMD RNFR RNTO SITE SIZE SMNT STAT STOR STOU STRU SYST TYPE USER XCUP XCWD XMKD XPWD XRMD 214 HELP command successful. 211-Extended features supported: LANG EN* UTF8 AUTH TLS;TLS-C;SSL;TLS-P; PBSZ PROT C;P; CCC HOST SIZE MDTM REST STREAM 211 END
1489525118 | 2024-05-23T02:21:22.56037780 / tcp
HTTP/1.1 404 Not Found Content-Type: text/html; charset=us-ascii Server: Microsoft-HTTPAPI/2.0 Date: Thu, 23 May 2024 02:21:05 GMT Connection: close Content-Length: 315
1078608740 | 2024-05-19T07:25:59.144034135 / tcp
Microsoft RPC Endpoint Mapper d95afe70-a6d5-4259-822e-2c84da1ddb0d version: v1.0 protocol: [MS-RSP]: Remote Shutdown Protocol provider: wininit.exe ncacn_ip_tcp: 104.245.126.194:1025 ncalrpc: WindowsShutdown ncacn_np: \\EVS-DC1\PIPE\InitShutdown ncalrpc: WMsgKRpc0BDA90 76f226c3-ec14-4325-8a99-6a46348418af version: v1.0 provider: winlogon.exe ncalrpc: WindowsShutdown ncacn_np: \\EVS-DC1\PIPE\InitShutdown ncalrpc: WMsgKRpc0BDA90 ncalrpc: WMsgKRpc0C0C41 c9ac6db5-82b7-4e55-ae8a-e464ed7b4277 version: v1.0 annotation: Impl friendly name provider: sysntfy.dll ncalrpc: LRPC-d2563ca94f2bc96db9 ncalrpc: senssvc ncalrpc: OLE7DC557966C844418A5A559CCA583 ncalrpc: IUserProfile2 ncalrpc: OLE7DC557966C844418A5A559CCA583 ncalrpc: IUserProfile2 ncalrpc: IUserProfile2 12e65dd8-887f-41ef-91bf-8d816c42c2e7 version: v1.0 annotation: Secure Desktop LRPC interface provider: winlogon.exe ncalrpc: WMsgKRpc0C0C41 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5 version: v1.0 annotation: DHCP Client LRPC Endpoint provider: dhcpcsvc.dll ncalrpc: dhcpcsvc ncalrpc: dhcpcsvc6 ncacn_ip_tcp: 104.245.126.194:1026 ncacn_np: \\EVS-DC1\pipe\eventlog ncalrpc: eventlog 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d6 version: v1.0 annotation: DHCPv6 Client LRPC Endpoint provider: dhcpcsvc6.dll ncalrpc: dhcpcsvc6 ncacn_ip_tcp: 104.245.126.194:1026 ncacn_np: \\EVS-DC1\pipe\eventlog ncalrpc: eventlog 30adc50c-5cbc-46ce-9a0e-91914789e23c version: v1.0 annotation: NRP server endpoint provider: nrpsrv.dll ncacn_ip_tcp: 104.245.126.194:1026 ncacn_np: \\EVS-DC1\pipe\eventlog ncalrpc: eventlog f6beaff7-1e19-4fbb-9f8f-b89e2018337c version: v1.0 annotation: Event log TCPIP protocol: [MS-EVEN6]: EventLog Remoting Protocol provider: wevtsvc.dll ncacn_ip_tcp: 104.245.126.194:1026 ncacn_np: \\EVS-DC1\pipe\eventlog ncalrpc: eventlog 8c7daf44-b6dc-11d1-9a4c-0020af6e7c57 version: v1.0 provider: appmgmts.dll ncacn_np: \\EVS-DC1\PIPE\srvsvc ncacn_ip_tcp: 104.245.126.194:1027 ncacn_np: \\EVS-DC1\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLE7DC557966C844418A5A559CCA583 ncalrpc: IUserProfile2 98716d03-89ac-44c7-bb8c-285824e51c4a version: v1.0 annotation: XactSrv service provider: srvsvc.dll ncacn_ip_tcp: 104.245.126.194:1027 ncacn_np: \\EVS-DC1\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLE7DC557966C844418A5A559CCA583 ncalrpc: IUserProfile2 552d076a-cb29-4e44-8b6a-d15e59e2c0af version: v1.0 annotation: IP Transition Configuration endpoint provider: iphlpsvc.dll ncacn_ip_tcp: 104.245.126.194:1027 ncacn_np: \\EVS-DC1\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLE7DC557966C844418A5A559CCA583 ncalrpc: IUserProfile2 a398e520-d59a-4bdd-aa7a-3c1e0303a511 version: v1.0 annotation: IKE/Authip API provider: IKEEXT.DLL ncacn_ip_tcp: 104.245.126.194:1027 ncacn_np: \\EVS-DC1\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLE7DC557966C844418A5A559CCA583 ncalrpc: IUserProfile2 86d35949-83c9-4044-b424-db363231fd0c version: v1.0 protocol: [MS-TSCH]: Task Scheduler Service Remoting Protocol provider: schedsvc.dll ncacn_ip_tcp: 104.245.126.194:1027 ncacn_np: \\EVS-DC1\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLE7DC557966C844418A5A559CCA583 ncalrpc: IUserProfile2 378e52b0-c0a9-11cf-822d-00aa0051e40f version: v1.0 protocol: [MS-TSCH]: Task Scheduler Service Remoting Protocol provider: taskcomp.dll ncacn_np: \\EVS-DC1\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLE7DC557966C844418A5A559CCA583 ncalrpc: IUserProfile2 1ff70682-0a51-30e8-076d-740be8cee98b version: v1.0 protocol: [MS-TSCH]: Task Scheduler Service Remoting Protocol provider: taskcomp.dll ncacn_np: \\EVS-DC1\PIPE\atsvc ncalrpc: senssvc ncalrpc: OLE7DC557966C844418A5A559CCA583 ncalrpc: IUserProfile2 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53 version: v1.0 provider: schedsvc.dll ncalrpc: senssvc ncalrpc: OLE7DC557966C844418A5A559CCA583 ncalrpc: IUserProfile2 2eb08e3e-639f-4fba-97b1-14f878961076 version: v1.0 provider: gpsvc.dll ncalrpc: OLE7DC557966C844418A5A559CCA583 ncalrpc: IUserProfile2 3473dd4d-2e88-4006-9cba-22570909dd10 version: v5.256 annotation: WinHttp Auto-Proxy Service ncacn_np: \\EVS-DC1\PIPE\W32TIME_ALT ncalrpc: W32TIME_ALT ncalrpc: LRPC-4251383312a36a77a8 ncalrpc: OLE8B23B78618074788BC445C844D94 7ea70bcf-48af-4f6a-8968-6a440754d5fa version: v1.0 annotation: NSI server endpoint provider: nsisvc.dll ncalrpc: LRPC-4251383312a36a77a8 ncalrpc: OLE8B23B78618074788BC445C844D94 2fb92682-6599-42dc-ae13-bd2ca89bd11c version: v1.0 annotation: Fw APIs provider: MPSSVC.dll ncalrpc: LRPC-f9b24ec3a2c821632a 7f9d11bf-7fb9-436b-a812-b2d50c5d4c03 version: v1.0 annotation: Fw APIs provider: MPSSVC.dll ncalrpc: LRPC-f9b24ec3a2c821632a dd490425-5325-4565-b774-7e27d6c09c24 version: v1.0 annotation: Base Firewall Engine API provider: BFE.DLL ncalrpc: LRPC-f9b24ec3a2c821632a 7f1343fe-50a9-4927-a778-0c5859517bac version: v1.0 annotation: DfsDs service ncacn_np: \\EVS-DC1\PIPE\wkssvc ncalrpc: DNSResolver b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86 version: v1.0 annotation: KeyIso provider: keyiso.dll ncacn_ip_tcp: 104.245.126.194:1028 ncalrpc: samss lpc ncalrpc: dsrole ncacn_np: \\EVS-DC1\PIPE\protected_storage ncalrpc: protected_storage ncalrpc: lsasspirpc ncalrpc: lsapolicylookup ncalrpc: LSARPC_ENDPOINT ncalrpc: securityevent ncalrpc: audit ncalrpc: LRPC-5af632121e933e5eb9 ncacn_np: \\EVS-DC1\pipe\lsass 12345778-1234-abcd-ef00-0123456789ac version: v1.0 protocol: [MS-SAMR]: Security Account Manager (SAM) Remote Protocol provider: samsrv.dll ncacn_ip_tcp: 104.245.126.194:1028 ncalrpc: samss lpc ncalrpc: dsrole ncacn_np: \\EVS-DC1\PIPE\protected_storage ncalrpc: protected_storage ncalrpc: lsasspirpc ncalrpc: lsapolicylookup ncalrpc: LSARPC_ENDPOINT ncalrpc: securityevent ncalrpc: audit ncalrpc: LRPC-5af632121e933e5eb9 ncacn_np: \\EVS-DC1\pipe\lsass 4b112204-0e19-11d3-b42b-0000f81feb9f version: v1.0 provider: ssdpsrv.dll ncalrpc: LRPC-379cac8af90190e342 eb107bd0-c461-11cf-9522-00805fd4a309 version: v2.0 annotation: CpqRcmc3 ncacn_np: \\EVS-DC1\pipe\cpqrcmc ncalrpc: OLE443EC3102E8C44E2B577EA383AE1 367abb81-9844-35f1-ad32-98f038001003 version: v2.0 protocol: [MS-SCMR]: Service Control Manager Remote Protocol provider: services.exe ncacn_ip_tcp: 104.245.126.194:1484 6b5bdd1e-528c-422c-af8c-a4079be4fe48 version: v1.0 annotation: Remote Fw APIs protocol: [MS-FASP]: Firewall and Advanced Security Protocol provider: FwRemoteSvr.dll ncacn_ip_tcp: 104.245.126.194:1490 ncalrpc: LRPC-b134a5308a85f62e91 12345678-1234-abcd-ef00-0123456789ab version: v1.0 annotation: IPSec Policy agent endpoint protocol: [MS-RPRN]: Print System Remote Protocol provider: spoolsv.exe ncalrpc: LRPC-b134a5308a85f62e91 906b0ce0-c70b-1067-b317-00dd010662da version: v1.0 protocol: [MS-CMPO]: MSDTC Connection Manager: provider: msdtcprx.dll ncalrpc: LRPC-c2020e6ae880893186 ncalrpc: LRPC-c2020e6ae880893186 ncalrpc: LRPC-c2020e6ae880893186 ncalrpc: LRPC-c2020e6ae880893186 ncalrpc: LRPC-1437e7677aa3884238 ncalrpc: OLE18B43367D64345819A9E47DEC6A3 4a452661-8290-4b36-8fbe-7f4093a94978 version: v1.0 annotation: Spooler function endpoint provider: spoolsv.exe ncalrpc: spoolss ae33069b-a2a8-46ee-a235-ddfd339be281 version: v1.0 annotation: Spooler base remote object endpoint protocol: [MS-PAN]: Print System Asynchronous Notification Protocol provider: spoolsv.exe ncalrpc: spoolss 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1 version: v1.0 annotation: Spooler function endpoint protocol: [MS-PAN]: Print System Asynchronous Notification Protocol provider: spoolsv.exe ncalrpc: spoolss 24019106-a203-4642-b88d-82dae9158929 version: v1.0 provider: authui.dll ncalrpc: LRPC-86d884115d9298e7e9
2209915 | 2024-05-04T16:04:02.773351137 / udp
NetBIOS Response: MAC Address: 78:AC:C0:FE:F9:F0
78:AC:C0:FE:F9:F0 OUI: 78:AC:C0 Organization: Hewlett Packard Assignment: MA-L Registration Date: 2010-10-19
200941460 | 2024-05-17T05:28:32.706756443 / tcp
HTTP/1.1 200 OK Content-Type: text/html; charset=UTF-8 Server: Microsoft-IIS/7.5 Date: Fri, 17 May 2024 05:27:45 GMT Content-Length: 35798
Certificate: Data: Version: 3 (0x2) Serial Number: c8:1f:c0:db:0f:70:3f:08:41:e4:fd:c6:db:6a:cf:f7 Signature Algorithm: sha256WithRSAEncryption Issuer: C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA Validity Not Before: Apr 28 00:00:00 2024 GMT Not After : May 29 23:59:59 2025 GMT Subject: CN=*.video-monitoring.com Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:e5:67:78:9d:53:40:b5:31:5e:ca:a6:dd:fa:a2: a8:03:28:15:b4:d9:e4:55:de:3e:78:41:06:db:7f: b6:65:e1:98:75:6c:95:d2:05:59:bd:11:34:a1:80: 5c:1e:ba:97:eb:e9:b5:8a:ad:cb:40:57:a6:b4:93: 5d:5f:81:39:8c:e6:e3:ba:40:08:c9:22:ff:8f:36: 9e:54:ea:bc:3f:e3:83:dd:c9:2d:e1:ce:aa:b4:84: 14:c3:81:3a:3b:2b:24:42:41:b5:87:fe:5f:f4:77: 55:ff:db:f0:36:53:f4:20:57:59:83:a1:e7:ee:55: 55:0a:8a:a1:1e:b0:5f:94:d0:dd:65:48:27:fc:9b: 85:5f:a3:3e:79:ba:79:31:49:2f:c5:91:17:2c:97: 18:d3:73:56:a3:ba:ea:94:14:f2:3f:1d:f6:97:89: 24:7b:71:5d:50:66:4f:9d:c9:72:3a:12:c5:c2:7f: 9d:38:4b:29:fc:20:aa:c4:3b:54:5e:63:61:90:c8: 48:31:8e:c8:5b:b3:10:88:29:de:7a:3c:44:4f:07: 28:48:6a:ed:57:40:c0:20:9b:bd:3e:b9:22:03:ca: 0d:5f:c7:d4:84:01:e5:a3:1d:85:4e:04:89:18:5f: cd:b3:01:02:df:13:af:ff:8a:88:f7:30:e0:c3:88: 09:e9 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Authority Key Identifier: 8D:8C:5E:C4:54:AD:8A:E1:77:E9:9B:F9:9B:05:E1:B8:01:8D:61:E1 X509v3 Subject Key Identifier: 31:56:56:3F:CE:DC:1E:EB:3A:C3:61:E1:1B:43:05:27:6A:5B:A0:F6 X509v3 Key Usage: critical Digital Signature, Key Encipherment X509v3 Basic Constraints: critical CA:FALSE X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication X509v3 Certificate Policies: Policy: 1.3.6.1.4.1.6449.1.2.2.7 CPS: https://sectigo.com/CPS Policy: 2.23.140.1.2.1 Authority Information Access: CA Issuers - URI:http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt OCSP - URI:http://ocsp.sectigo.com X509v3 Subject Alternative Name: DNS:*.video-monitoring.com, DNS:video-monitoring.com CT Precertificate SCTs: Signed Certificate Timestamp: Version : v1 (0x0) Log ID : CF:11:56:EE:D5:2E:7C:AF:F3:87:5B:D9:69:2E:9B:E9: 1A:71:67:4A:B0:17:EC:AC:01:D2:5B:77:CE:CC:3B:08 Timestamp : Apr 28 22:59:42.027 2024 GMT Extensions: none Signature : ecdsa-with-SHA256 30:44:02:20:06:AD:DE:C6:33:F1:23:C4:B5:90:6C:B4: 1A:19:D2:08:2B:25:77:BD:E4:C0:52:A3:2F:D2:A0:F6: 92:CF:94:92:02:20:4D:FC:B4:D2:83:A6:71:11:6C:25: 8F:E9:DA:28:AE:A9:89:83:CC:44:38:C0:F6:F3:53:B5: 36:19:39:51:40:C9 Signed Certificate Timestamp: Version : v1 (0x0) Log ID : A2:E3:0A:E4:45:EF:BD:AD:9B:7E:38:ED:47:67:77:53: D7:82:5B:84:94:D7:2B:5E:1B:2C:C4:B9:50:A4:47:E7 Timestamp : Apr 28 22:59:41.964 2024 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:21:00:F8:0D:27:72:80:F7:83:81:6B:54:0E: 83:50:12:28:E9:0C:34:7D:8A:03:53:57:E9:6C:06:65: 58:16:38:DE:B0:02:20:23:6A:A7:26:E3:22:4C:22:18: 9D:DB:31:7B:03:9A:74:0B:D8:49:0C:64:A5:B1:48:7E: 8C:94:B8:BE:C2:A0:33 Signed Certificate Timestamp: Version : v1 (0x0) Log ID : 4E:75:A3:27:5C:9A:10:C3:38:5B:6C:D4:DF:3F:52:EB: 1D:F0:E0:8E:1B:8D:69:C0:B1:FA:64:B1:62:9A:39:DF Timestamp : Apr 28 22:59:41.918 2024 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:21:00:8C:21:7E:9C:FC:B9:63:46:DA:BE:D4: BC:8A:BB:40:9B:77:63:ED:DC:DA:C7:61:3C:AD:73:D2: 5B:86:43:31:8B:02:20:13:B5:D1:CC:77:8E:38:04:A3: 67:0C:3F:73:6C:28:4B:56:89:B7:B8:07:78:03:A1:99: C8:1B:9D:C5:F2:2E:D9 Signature Algorithm: sha256WithRSAEncryption Signature Value: 9f:c7:00:3b:c6:46:b6:d8:dd:0c:33:71:c2:04:77:00:63:3a: ac:b3:99:ee:ca:7e:01:88:b7:f7:c2:80:15:ce:6e:81:4a:f7: f3:d8:ff:ad:cd:96:4b:da:ca:27:76:53:a9:00:df:f7:d6:4f: 53:c7:6d:23:65:6d:ee:c4:fb:54:26:27:86:ea:77:23:f1:aa: 87:28:77:6b:9c:82:bb:fb:37:82:32:82:23:3f:34:ff:37:bd: 26:6f:d0:14:09:d3:cb:05:55:81:71:c3:92:e5:59:dc:23:db: 58:72:e4:5b:31:1a:e9:9f:91:0a:6e:56:96:7c:eb:ad:42:31: 52:6a:e2:3d:2b:6f:e0:ea:3b:2d:8d:a4:b4:83:de:80:7b:db: 4e:54:c5:1a:64:48:cc:1d:13:62:f3:94:4d:a9:c8:7f:d7:3b: d5:e2:72:c1:8c:43:4b:77:1d:bf:ef:da:4b:a2:84:0a:1f:27: 6c:46:d6:33:d9:f5:c8:cc:6a:b2:4e:41:f4:83:5b:39:75:8e: 6b:85:35:1b:f7:a6:2a:0c:97:87:db:8b:4c:40:ce:18:a2:75: bc:e3:b7:46:24:4d:dd:f7:aa:c4:66:bc:27:8d:c2:cb:1a:bf: 8d:25:b9:14:c1:f7:c5:79:a6:12:17:33:1f:55:87:f8:9c:27: 80:06:73:36
2131906928 | 2024-05-15T13:21:59.8015963306 / tcp
MySQL: Error Message: Host '224.55.148.192' is not allowed to connect to this MySQL server Error Code: 1130
-71177449 | 2024-05-18T06:02:07.4160994899 / tcp