-768514069 | 2024-04-23T15:18:21.360733
21 /
tcp
220 DreamHost FTP Server
530 Login incorrect.
214-The following commands are recognized (* =>'s unimplemented):
CWD XCWD CDUP XCUP SMNT* QUIT PORT PASV
EPRT EPSV ALLO* RNFR RNTO DELE MDTM RMD
XRMD MKD XMKD PWD XPWD SIZE SYST HELP
NOOP FEAT OPTS HOST CLNT AUTH* CCC* CONF*
ENC* MIC* PBSZ* PROT* TYPE STRU MODE RETR
STOR STOU APPE REST ABOR USER PASS ACCT*
REIN* LIST NLST STAT SITE MLSD MLST
214 Direct comments to root@173.236.254.180
211-Features:
CLNT
EPRT
EPSV
HOST
LANG es-ES;it-IT;ru-RU;zh-CN;ja-JP;en-US;ko-KR;bg-BG;zh-TW;fr-FR
MDTM
MFF modify;UNIX.group;UNIX.mode;
MFMT
MLST modify*;perm*;size*;type*;unique*;UNIX.group*;UNIX.groupname*;UNIX.mode*;UNIX.owner*;UNIX.ownername*;
REST STREAM
SIZE
TVFS
UTF8
211 End
-1295994133 | 2024-04-09T10:36:28.049924
22 /
tcp
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.11
Key type: ssh-rsa
Key: AAAAB3NzaC1yc2EAAAADAQABAAABgQCk+rmRWQCsqACvHramFqtlQpTJETnj/ilzNiAo6k/8qUlv
8XbO9DjgeUIr9NhFA0qamtzcoB5ldkxP/7kIyUtui5oHR2tMnuzcC8PJIqHbdxpdQyz81aW9vyVc
Y2iJaMskKCbK3xypc3F9+B8xmRjKfWFN31IRPKstuDZOt6jZwkGuGxdZ2aVg+fOquGH1/ipmiHBs
pSCk7NzMyTLIwFJI4+F0NR3c4pD+nMyJPDMWI+vs8BZH2oFmS+EX3gtsATDzME5g/FqTX7a2PU/j
F9xvXZh2YehJ3oVY1X71V2CgdEhjKSTTsyQ5nbcIfvr5DnPgs7u+5nORvDiQA2+BWEoI53/xOLDy
9Yzfv0EcudOMopQhp4FYam2V2ZDvsQV4NbhmNPknokEv96QhegFbK5rMKbf8xNxiXp0OnrQk50mb
QOElwArQlRbEhZDpsEybBwdFiQFWr0qBeFCjAr08ZjBMMbnXVQDctnCUT3fs6sz+kjBa+uOFvI7V
wZ9JmJsEuSE=
Fingerprint: ff:fc:69:43:5c:b0:c4:2b:f4:c0:1f:1c:f7:75:f4:a4
Kex Algorithms:
curve25519-sha256@libssh.org
ecdh-sha2-nistp256
ecdh-sha2-nistp384
ecdh-sha2-nistp521
diffie-hellman-group-exchange-sha256
kex-strict-s-v00@openssh.com
Server Host Key Algorithms:
rsa-sha2-512
rsa-sha2-256
ssh-rsa
ecdsa-sha2-nistp256
ssh-ed25519
Encryption Algorithms:
aes128-ctr
aes192-ctr
aes256-ctr
aes128-gcm@openssh.com
aes256-gcm@openssh.com
chacha20-poly1305@openssh.com
MAC Algorithms:
hmac-sha2-256
hmac-sha2-512
hmac-sha2-256-etm@openssh.com
hmac-sha2-512-etm@openssh.com
Compression Algorithms:
none
zlib@openssh.com
-880855631 | 2024-04-19T06:43:16.083447
123 /
udp
NTP
protocolversion: 3
stratum: 3
leap: 0
precision: -24
rootdelay: 0.0361938476562
rootdisp: 0.0407104492188
refid: 1755836869
reftime: 3922496452.29
poll: 3
-1545777613 | 2024-04-16T10:41:13.273824
6379 /
tcp
-DENIED Redis is running in protected mode because protected mode is enabled and no password is set for the default user. In this mode connections are only accepted from the loopback interface. If you want to connect from external computers to Redis you may adopt one of the following solutions: 1) Just disable protected mode sending the command 'CONFIG SET protected-mode no' from the loopback interface by connecting to Redis from the same host the server is running, however MAKE SURE Redis is not publicly accessible from internet if you do so. Use CONFIG REWRITE to make this change permanent. 2) Alternatively you can just disable the protected mode by editing the Redis configuration file, and setting the protected mode option to 'no', and then restarting the server. 3) If you started the server manually just for testing, restart it with the '--protected-mode no' option. 4) Set up an authentication password for the default user. NOTE: You only need to do one of the above things in order for the server to start accepting connections from the outside.