501955749 | 2024-06-13T17:22:19.562465
80 /
tcp
HTTP/1.1 404
Server: nginx/1.21.6
Date: Thu, 13 Jun 2024 17:22:18 GMT
Content-Type: text/html;charset=utf-8
Content-Length: 641
Connection: keep-alive
Content-Language: zh-CN
-167670381 | 2024-06-13T00:20:31.375510
3306 /
tcp
MySQL:
Protocol Version: 10
Version: 5.5.28
Capabilities: 63487
Server Language: 8
Server Status: 2
Extended Server Capabilities: 32783
Authentication Plugin: mysql_native_password
-896898401 | 2024-06-07T09:55:25.773607
3389 /
tcp
Remote Desktop Protocol
\x03\x00\x00\x13\x0e\xd0\x00\x00\x124\x00\x03\x00\x08\x00\x02\x00\x00\x00
administrator
GBR
Fo
4 Windows Server-2008rz
Standard
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5c:7f:5c:72:54:6a:b5:b0:4a:21:15:ad:8f:12:e4:a6
Signature Algorithm: sha1WithRSAEncryption
Issuer: CN=iZ94mfvhvfsZ
Validity
Not Before: Mar 29 08:42:16 2024 GMT
Not After : Sep 28 08:42:16 2024 GMT
Subject: CN=iZ94mfvhvfsZ
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:ae:f6:6d:be:57:f1:fc:37:69:12:84:27:2d:df:
6a:16:67:5a:2a:f8:e4:dd:a4:5d:e0:aa:81:3b:0f:
a1:dd:78:9f:6d:5c:ee:1d:aa:9e:62:99:48:c6:dc:
39:16:29:96:a0:73:5b:a8:2f:a7:d2:51:fc:08:f4:
1c:8e:ee:f3:10:d8:db:4a:cd:b1:58:95:33:dd:5d:
c9:19:59:de:7b:9e:63:54:66:98:57:31:09:cd:69:
7a:be:a1:c0:1b:18:68:62:70:33:e2:e4:b5:fc:d6:
5b:ac:8a:2f:70:0f:ab:36:bc:f8:1a:bb:a3:86:85:
25:fc:02:0a:63:e6:9d:13:8e:e8:c3:dd:c7:5a:84:
15:3f:e2:0d:99:91:85:d3:3d:75:0e:a5:de:04:8f:
14:f2:5c:92:4c:db:23:e3:ec:8b:ba:92:08:99:4c:
d6:e8:0a:8e:ff:32:4d:49:bc:06:a1:ea:4f:e6:19:
9d:49:a7:f0:45:8d:97:bd:09:ca:df:7d:22:5c:0a:
f1:cc:32:09:53:8e:a7:34:63:17:23:d3:5a:a6:c1:
82:4d:b4:f9:09:48:13:35:2c:7e:40:c9:e9:a9:3d:
7b:e5:e5:79:19:d3:a5:4e:11:d4:b5:be:7b:3a:a1:
f0:b2:af:3c:44:63:92:be:01:61:7b:e5:88:bc:cf:
e3:05
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Extended Key Usage:
TLS Web Server Authentication
X509v3 Key Usage:
Key Encipherment, Data Encipherment
Signature Algorithm: sha1WithRSAEncryption
Signature Value:
94:c4:0c:b1:e5:6b:73:1e:b5:15:6c:66:af:e9:e1:5a:f7:ad:
d2:60:97:0c:09:59:a4:13:86:ba:f3:f0:77:56:02:cf:08:e4:
21:2b:41:7d:58:8a:34:79:a4:62:ce:5a:c3:0c:c6:1f:81:21:
91:b2:fd:87:9f:22:08:7e:12:0e:c5:8e:79:e3:d9:cf:e7:12:
d5:02:a6:1e:b8:30:48:88:48:6b:9d:7b:f5:22:b5:a1:64:f5:
3c:1e:6d:77:ab:6a:b3:b6:ec:89:da:9c:10:c1:09:10:f0:87:
0c:4c:ab:f8:28:d6:4b:d5:79:22:ce:77:e5:87:4d:65:b2:b2:
df:c3:79:f0:a1:d5:e3:b7:5c:54:11:01:8b:24:13:79:35:a5:
77:ef:b2:67:3e:dd:1d:d6:57:e6:50:9d:c7:31:b1:cd:55:29:
ae:fd:7f:aa:57:12:fd:b4:7e:90:7e:2e:80:3b:c3:ce:1f:36:
26:4d:d5:f0:1a:04:1f:13:e8:21:9e:a1:ac:ce:63:d6:ef:98:
f6:45:56:3c:27:63:06:9f:69:38:7c:c2:0f:65:d2:44:b2:34:
f3:4b:5d:6f:50:65:18:67:aa:a3:6f:30:d6:fb:07:3d:14:52:
6b:e8:8e:3b:3f:07:12:e8:98:aa:b4:c4:97:b3:c6:38:2d:75:
52:f9:86:2b
-77649157 | 2024-06-12T10:22:34.415931
6379 /
tcp
-DENIED Redis is running in protected mode because protected mode is enabled, no bind address was specified, no authentication password is requested to clients. In this mode connections are only accepted from the loopback interface. If you want to connect from external computers to Redis you may adopt one of the following solutions: 1) Just disable protected mode sending the command 'CONFIG SET protected-mode no' from the loopback interface by connecting to Redis from the same host the server is running, however MAKE SURE Redis is not publicly accessible from internet if you do so. Use CONFIG REWRITE to make this change permanent. 2) Alternatively you can just disable the protected mode by editing the Redis configuration file, and setting the protected mode option to 'no', and then restarting the server. 3) If you started the server manually just for testing, restart it with the '--protected-mode no' option. 4) Setup a bind address or an authentication password. NOTE: You only need to do one of the above things in order for the server to start accepting connections from the outside.