Hostnames |
reito-himeji.com www.reito-himeji.com xserver.jp sv1111.xserver.jp |
Domains | reito-himeji.com xserver.jp |
Country | Japan |
City | Osaka |
Organization | XSERVER Inc. |
ISP | Xserver Inc. |
ASN | AS131965 |
Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
CVE-2020-7656 | 6.1jquery prior to 1.9.0 allows Cross-site Scripting attacks via the load method. The load method fails to recognize and remove "<script>" HTML tags that contain a whitespace character, i.e: "</script >", which results in the enclosed script logic to be executed. |
CVE-2020-11023 | 6.1In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. |
CVE-2020-11022 | 6.1In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. |
CVE-2019-11358 | 6.1jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype. |
CVE-2015-9251 | 6.1jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed. |
CVE-2012-6708 | 6.1jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common. |
1420558795 | 2024-03-23T23:39:02.57418421 / tcp
220 FTP Server ready. 530 Login incorrect. 214-The following commands are recognized (* =>'s unimplemented): CWD XCWD CDUP XCUP SMNT* QUIT PORT PASV EPRT EPSV ALLO* RNFR RNTO DELE MDTM RMD XRMD MKD XMKD PWD XPWD SIZE SYST HELP NOOP FEAT OPTS AUTH CCC* CONF* ENC* MIC* PBSZ PROT TYPE STRU MODE RETR STOR STOU APPE REST ABOR USER PASS ACCT* REIN* LIST NLST STAT SITE MLSD MLST 214 Direct comments to root@localhost 211-Features: PBSZ AUTH TLS MFF modify;UNIX.group;UNIX.mode; REST STREAM MLST modify*;perm*;size*;type*;unique*;UNIX.group*;UNIX.mode*;UNIX.owner*; UTF8 EPRT EPSV LANG bg-BG;en-US*;es-ES;fr-FR;it-IT;ja-JP;ko-KR;ru-RU;zh-CN;zh-TW MDTM SSCN TVFS MFMT SIZE PROT CCC 211 End
Certificate: Data: Version: 3 (0x2) Serial Number: bf:71:c3:1d:26:71:6f:a7:b2:0b:95:8f:00:53:b3:ed Signature Algorithm: sha256WithRSAEncryption Issuer: C=JP, ST=OSAKA, L=OSAKA, O=SecureCore, CN=SecureCore RSA DV CA Validity Not Before: Mar 31 00:00:00 2023 GMT Not After : Apr 30 23:59:59 2024 GMT Subject: CN=*.xserver.jp Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:a9:d0:1d:53:aa:5b:43:5b:0c:d0:8a:80:40:4b: c5:d4:1e:05:4c:3f:00:0c:d1:a0:56:3a:b3:38:b9: 4d:f9:6d:11:5e:bb:cc:72:82:f4:da:d0:8b:bb:19: ee:96:06:02:dd:69:b8:96:4a:78:de:8e:bd:a2:25: a9:54:50:28:5c:32:ea:4b:d6:0a:27:74:d0:48:eb: de:83:56:b7:5c:c9:7b:d8:87:e3:75:2e:c7:dc:76: c4:92:03:cc:db:75:a1:c4:84:26:32:0a:4e:65:f6: 86:22:7c:24:e2:e4:40:13:19:c0:e0:e9:6c:2d:a7: 75:80:93:25:d2:b4:d0:78:a7:69:3e:49:d1:23:2c: 21:7f:83:a2:bc:a8:b3:3f:c2:aa:e2:e5:df:7a:66: 1f:38:73:bd:7e:25:5b:fc:76:e5:12:23:92:8d:9d: 57:7c:3f:6a:1a:d5:f6:24:a4:2c:dc:aa:ba:55:b8: 2e:d0:6d:d1:42:94:15:5a:5e:6e:99:19:70:a5:32: 94:86:c5:39:a7:ed:b8:e5:71:8a:ab:43:92:d1:b8: ec:21:38:4c:c4:e4:d7:a0:5e:3f:ab:fd:77:c0:d6: d0:cb:79:ff:d5:24:3b:68:fa:82:72:c5:7d:d6:57: 0f:af:83:d0:22:c8:7c:16:2b:65:0a:89:95:75:8a: 87:6b Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Authority Key Identifier: 87:B2:E6:D0:DF:DF:0C:E3:2D:97:D2:24:08:A9:50:8F:27:0B:90:69 X509v3 Subject Key Identifier: 91:7E:F0:6F:A2:62:FA:E9:D0:85:52:EE:61:7D:07:D3:83:85:51:89 X509v3 Key Usage: critical Digital Signature, Key Encipherment X509v3 Basic Constraints: critical CA:FALSE X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication X509v3 Certificate Policies: Policy: 1.3.6.1.4.1.6449.1.2.2.50 CPS: https://cps.securecore-ca.com Policy: 2.23.140.1.2.1 X509v3 CRL Distribution Points: Full Name: URI:http://crl.securecore-ca.com/SecureCoreRSADVCA.crl Authority Information Access: CA Issuers - URI:http://crt.securecore-ca.com/SecureCoreRSADVCA.crt OCSP - URI:http://ocsp.securecore-ca.com X509v3 Subject Alternative Name: DNS:*.xserver.jp, DNS:xserver.jp CT Precertificate SCTs: Signed Certificate Timestamp: Version : v1 (0x0) Log ID : 76:FF:88:3F:0A:B6:FB:95:51:C2:61:CC:F5:87:BA:34: B4:A4:CD:BB:29:DC:68:42:0A:9F:E6:67:4C:5A:3A:74 Timestamp : Mar 31 07:28:19.045 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:44:02:20:00:82:81:3A:F5:D9:F9:38:D3:4F:C0:5B: C7:2C:2C:3F:DA:5F:9D:5C:19:21:46:2E:F3:10:51:8F: D6:03:98:77:02:20:47:31:71:B4:C1:01:85:64:1C:20: 8A:C1:8A:00:87:1A:87:51:D2:55:48:58:9C:5C:DF:F9: 9F:E9:B3:E3:DE:3E Signed Certificate Timestamp: Version : v1 (0x0) Log ID : DA:B6:BF:6B:3F:B5:B6:22:9F:9B:C2:BB:5C:6B:E8:70: 91:71:6C:BB:51:84:85:34:BD:A4:3D:30:48:D7:FB:AB Timestamp : Mar 31 07:28:19.141 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:44:02:20:03:9C:54:2D:A8:B3:41:6E:36:1C:21:C6: CB:4B:1F:7D:A0:B9:DF:2E:E8:0A:78:A6:57:6B:64:1B: 6A:6A:27:C3:02:20:00:FB:8D:0E:9F:29:0A:AE:5A:14: 1D:2E:59:89:97:2C:EF:BE:7D:BA:CA:A6:B4:FB:53:2B: B0:85:6D:27:EB:49 Signed Certificate Timestamp: Version : v1 (0x0) Log ID : EE:CD:D0:64:D5:DB:1A:CE:C5:5C:B7:9D:B4:CD:13:A2: 32:87:46:7C:BC:EC:DE:C3:51:48:59:46:71:1F:B5:9B Timestamp : Mar 31 07:28:19.091 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:20:4E:DB:F7:03:97:F9:3E:F0:5C:9A:97:CB: F0:48:5C:19:34:76:96:39:6E:AF:2F:1E:6B:44:44:FD: 80:40:B2:4E:02:21:00:F2:9D:5F:82:40:BA:7E:CE:BD: D2:5E:65:D0:64:8B:32:49:4F:39:30:0C:4A:7A:C3:25: 2D:5B:0D:9C:59:B7:6C Signature Algorithm: sha256WithRSAEncryption Signature Value: 62:9b:55:d2:98:1c:d7:0d:f1:58:56:89:f7:9e:4c:cc:2c:2e: 45:23:fc:0a:fc:f0:91:3c:d5:c5:85:ce:90:b7:1b:01:dc:1a: 79:e2:8d:ee:99:e0:6a:29:80:41:62:45:04:05:af:b8:c2:f9: ba:d4:a9:77:30:a9:a9:e4:a5:8e:ef:85:8d:76:b4:9c:96:81: 9a:08:20:00:97:c0:3e:be:2a:0e:89:e8:00:e4:a9:80:5e:c7: 0a:16:08:06:4d:70:f2:2b:50:a1:30:81:1e:54:c6:23:96:fc: 99:f4:a4:a0:3e:cd:80:cd:22:c5:3c:70:07:18:13:e6:8c:57: 23:56:e4:98:da:ae:90:67:11:09:bd:59:4e:ae:7e:9f:a5:b7: bd:5e:9f:b5:c6:a7:fe:96:f7:93:eb:91:fe:ca:cb:ae:f6:4e: 80:f6:e7:bc:97:88:f4:8d:31:a8:ce:83:7b:6d:e2:7c:97:59: 62:1c:e3:93:cf:04:ad:37:17:7b:94:a5:be:c0:f5:d4:3a:51: 6b:fa:84:27:ab:e6:4f:76:a2:b3:1c:b8:1a:86:b4:b6:52:02: c6:99:15:5b:a3:c3:a0:9e:c3:f3:15:31:f6:f8:cc:90:b9:f3: 5c:ea:23:14:38:57:8a:cb:05:4b:43:c1:b6:d8:e6:fa:34:f3: d3:0f:d5:ae
-2072143786 | 2024-04-05T09:12:53.27026425 / tcp
220 sv1111.xserver.jp ESMTP Postfix 250-sv1111.xserver.jp 250-PIPELINING 250-SIZE 102400000 250-ETRN 250-STARTTLS 250-AUTH PLAIN LOGIN 250-AUTH=PLAIN LOGIN 250-ENHANCEDSTATUSCODES 250-8BITMIME 250 DSN
Certificate: Data: Version: 3 (0x2) Serial Number: bf:71:c3:1d:26:71:6f:a7:b2:0b:95:8f:00:53:b3:ed Signature Algorithm: sha256WithRSAEncryption Issuer: C=JP, ST=OSAKA, L=OSAKA, O=SecureCore, CN=SecureCore RSA DV CA Validity Not Before: Mar 31 00:00:00 2023 GMT Not After : Apr 30 23:59:59 2024 GMT Subject: CN=*.xserver.jp Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:a9:d0:1d:53:aa:5b:43:5b:0c:d0:8a:80:40:4b: c5:d4:1e:05:4c:3f:00:0c:d1:a0:56:3a:b3:38:b9: 4d:f9:6d:11:5e:bb:cc:72:82:f4:da:d0:8b:bb:19: ee:96:06:02:dd:69:b8:96:4a:78:de:8e:bd:a2:25: a9:54:50:28:5c:32:ea:4b:d6:0a:27:74:d0:48:eb: de:83:56:b7:5c:c9:7b:d8:87:e3:75:2e:c7:dc:76: c4:92:03:cc:db:75:a1:c4:84:26:32:0a:4e:65:f6: 86:22:7c:24:e2:e4:40:13:19:c0:e0:e9:6c:2d:a7: 75:80:93:25:d2:b4:d0:78:a7:69:3e:49:d1:23:2c: 21:7f:83:a2:bc:a8:b3:3f:c2:aa:e2:e5:df:7a:66: 1f:38:73:bd:7e:25:5b:fc:76:e5:12:23:92:8d:9d: 57:7c:3f:6a:1a:d5:f6:24:a4:2c:dc:aa:ba:55:b8: 2e:d0:6d:d1:42:94:15:5a:5e:6e:99:19:70:a5:32: 94:86:c5:39:a7:ed:b8:e5:71:8a:ab:43:92:d1:b8: ec:21:38:4c:c4:e4:d7:a0:5e:3f:ab:fd:77:c0:d6: d0:cb:79:ff:d5:24:3b:68:fa:82:72:c5:7d:d6:57: 0f:af:83:d0:22:c8:7c:16:2b:65:0a:89:95:75:8a: 87:6b Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Authority Key Identifier: 87:B2:E6:D0:DF:DF:0C:E3:2D:97:D2:24:08:A9:50:8F:27:0B:90:69 X509v3 Subject Key Identifier: 91:7E:F0:6F:A2:62:FA:E9:D0:85:52:EE:61:7D:07:D3:83:85:51:89 X509v3 Key Usage: critical Digital Signature, Key Encipherment X509v3 Basic Constraints: critical CA:FALSE X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication X509v3 Certificate Policies: Policy: 1.3.6.1.4.1.6449.1.2.2.50 CPS: https://cps.securecore-ca.com Policy: 2.23.140.1.2.1 X509v3 CRL Distribution Points: Full Name: URI:http://crl.securecore-ca.com/SecureCoreRSADVCA.crl Authority Information Access: CA Issuers - URI:http://crt.securecore-ca.com/SecureCoreRSADVCA.crt OCSP - URI:http://ocsp.securecore-ca.com X509v3 Subject Alternative Name: DNS:*.xserver.jp, DNS:xserver.jp CT Precertificate SCTs: Signed Certificate Timestamp: Version : v1 (0x0) Log ID : 76:FF:88:3F:0A:B6:FB:95:51:C2:61:CC:F5:87:BA:34: B4:A4:CD:BB:29:DC:68:42:0A:9F:E6:67:4C:5A:3A:74 Timestamp : Mar 31 07:28:19.045 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:44:02:20:00:82:81:3A:F5:D9:F9:38:D3:4F:C0:5B: C7:2C:2C:3F:DA:5F:9D:5C:19:21:46:2E:F3:10:51:8F: D6:03:98:77:02:20:47:31:71:B4:C1:01:85:64:1C:20: 8A:C1:8A:00:87:1A:87:51:D2:55:48:58:9C:5C:DF:F9: 9F:E9:B3:E3:DE:3E Signed Certificate Timestamp: Version : v1 (0x0) Log ID : DA:B6:BF:6B:3F:B5:B6:22:9F:9B:C2:BB:5C:6B:E8:70: 91:71:6C:BB:51:84:85:34:BD:A4:3D:30:48:D7:FB:AB Timestamp : Mar 31 07:28:19.141 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:44:02:20:03:9C:54:2D:A8:B3:41:6E:36:1C:21:C6: CB:4B:1F:7D:A0:B9:DF:2E:E8:0A:78:A6:57:6B:64:1B: 6A:6A:27:C3:02:20:00:FB:8D:0E:9F:29:0A:AE:5A:14: 1D:2E:59:89:97:2C:EF:BE:7D:BA:CA:A6:B4:FB:53:2B: B0:85:6D:27:EB:49 Signed Certificate Timestamp: Version : v1 (0x0) Log ID : EE:CD:D0:64:D5:DB:1A:CE:C5:5C:B7:9D:B4:CD:13:A2: 32:87:46:7C:BC:EC:DE:C3:51:48:59:46:71:1F:B5:9B Timestamp : Mar 31 07:28:19.091 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:20:4E:DB:F7:03:97:F9:3E:F0:5C:9A:97:CB: F0:48:5C:19:34:76:96:39:6E:AF:2F:1E:6B:44:44:FD: 80:40:B2:4E:02:21:00:F2:9D:5F:82:40:BA:7E:CE:BD: D2:5E:65:D0:64:8B:32:49:4F:39:30:0C:4A:7A:C3:25: 2D:5B:0D:9C:59:B7:6C Signature Algorithm: sha256WithRSAEncryption Signature Value: 62:9b:55:d2:98:1c:d7:0d:f1:58:56:89:f7:9e:4c:cc:2c:2e: 45:23:fc:0a:fc:f0:91:3c:d5:c5:85:ce:90:b7:1b:01:dc:1a: 79:e2:8d:ee:99:e0:6a:29:80:41:62:45:04:05:af:b8:c2:f9: ba:d4:a9:77:30:a9:a9:e4:a5:8e:ef:85:8d:76:b4:9c:96:81: 9a:08:20:00:97:c0:3e:be:2a:0e:89:e8:00:e4:a9:80:5e:c7: 0a:16:08:06:4d:70:f2:2b:50:a1:30:81:1e:54:c6:23:96:fc: 99:f4:a4:a0:3e:cd:80:cd:22:c5:3c:70:07:18:13:e6:8c:57: 23:56:e4:98:da:ae:90:67:11:09:bd:59:4e:ae:7e:9f:a5:b7: bd:5e:9f:b5:c6:a7:fe:96:f7:93:eb:91:fe:ca:cb:ae:f6:4e: 80:f6:e7:bc:97:88:f4:8d:31:a8:ce:83:7b:6d:e2:7c:97:59: 62:1c:e3:93:cf:04:ad:37:17:7b:94:a5:be:c0:f5:d4:3a:51: 6b:fa:84:27:ab:e6:4f:76:a2:b3:1c:b8:1a:86:b4:b6:52:02: c6:99:15:5b:a3:c3:a0:9e:c3:f3:15:31:f6:f8:cc:90:b9:f3: 5c:ea:23:14:38:57:8a:cb:05:4b:43:c1:b6:d8:e6:fa:34:f3: d3:0f:d5:ae
-488023649 | 2024-04-17T01:07:36.61342580 / tcp
HTTP/1.1 200 OK Server: nginx Date: Wed, 17 Apr 2024 01:07:36 GMT Content-Type: text/html; charset=UTF-8 Transfer-Encoding: chunked Connection: keep-alive Vary: Accept-Encoding
-1737655227 | 2024-04-19T05:06:25.289805443 / tcp
HTTP/1.1 200 OK Server: nginx Date: Fri, 19 Apr 2024 05:01:41 GMT Content-Type: text/html; charset=UTF-8 Transfer-Encoding: chunked Connection: keep-alive Vary: Accept-Encoding
Certificate: Data: Version: 3 (0x2) Serial Number: 03:bf:bd:cf:7d:79:10:d8:08:0d:fd:55:89:22:16:b6:fa:38 Signature Algorithm: sha256WithRSAEncryption Issuer: C=US, O=Let's Encrypt, CN=R3 Validity Not Before: Apr 6 08:11:38 2024 GMT Not After : Jul 5 08:11:37 2024 GMT Subject: CN=www.reito-himeji.com Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:c4:52:4f:e0:e4:98:db:b1:6b:f9:61:89:de:bb: 0f:9f:3a:27:5e:c6:02:c6:63:82:02:ef:32:ac:bc: c3:d6:11:e7:ea:1f:15:c7:73:e9:29:9b:40:06:a1: c4:03:53:f0:24:79:28:61:c4:63:db:f9:bf:93:58: bc:0b:d1:c8:e2:37:4f:65:d5:a6:18:5a:7e:6e:29: db:6f:6a:ac:6c:49:b7:22:79:06:7a:7d:46:f0:31: 3f:6c:95:eb:20:bd:91:84:91:fb:f3:29:cb:63:a5: 23:7c:1c:e3:b0:ea:71:f0:6e:8b:0d:dd:d4:c5:f0: 11:94:86:55:04:6a:29:cb:63:f3:ad:61:b1:07:4c: f3:42:21:78:d2:d9:d4:23:af:19:d1:75:7e:8f:d7: 3c:06:23:85:fb:64:2d:37:f9:4a:4b:bd:e2:d3:28: 3c:1c:07:d0:3e:b6:aa:61:94:e8:a1:97:51:eb:04: 7d:18:c3:de:11:79:ee:16:da:c1:ed:cb:6c:14:c1: b3:4f:79:b5:33:1a:9d:77:a7:ae:c1:18:a5:11:ff: 51:84:be:71:40:71:ee:bd:29:51:9e:5b:19:80:58: 33:9d:09:03:37:31:d1:a8:08:b4:21:f0:a3:f9:d9: 46:cb:94:82:6b:ad:2c:dc:68:71:ae:33:46:c3:d7: cb:5b Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Key Usage: critical Digital Signature, Key Encipherment X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication X509v3 Basic Constraints: critical CA:FALSE X509v3 Subject Key Identifier: C2:A3:11:8B:1A:F5:AB:95:A8:99:E4:92:2D:B8:34:59:72:6F:FD:C0 X509v3 Authority Key Identifier: 14:2E:B3:17:B7:58:56:CB:AE:50:09:40:E6:1F:AF:9D:8B:14:C2:C6 Authority Information Access: OCSP - URI:http://r3.o.lencr.org CA Issuers - URI:http://r3.i.lencr.org/ X509v3 Subject Alternative Name: DNS:reito-himeji.com, DNS:www.reito-himeji.com X509v3 Certificate Policies: Policy: 2.23.140.1.2.1 CT Precertificate SCTs: Signed Certificate Timestamp: Version : v1 (0x0) Log ID : 3F:17:4B:4F:D7:22:47:58:94:1D:65:1C:84:BE:0D:12: ED:90:37:7F:1F:85:6A:EB:C1:BF:28:85:EC:F8:64:6E Timestamp : Apr 6 09:11:38.975 2024 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:21:00:90:0D:99:88:E1:95:45:9E:C7:20:1E: 42:8D:F2:10:A8:45:E0:68:EB:20:D1:54:FB:99:AB:C0: 59:E9:B7:7E:BB:02:20:46:CC:D0:25:B2:2C:0A:B3:CC: 93:C0:A3:3F:E9:23:B3:07:59:31:F3:91:63:6F:1C:FB: 2A:D4:F2:27:E4:E1:2C Signed Certificate Timestamp: Version : v1 (0x0) Log ID : 19:98:10:71:09:F0:D6:52:2E:30:80:D2:9E:3F:64:BB: 83:6E:28:CC:F9:0F:52:8E:EE:DF:CE:4A:3F:16:B4:CA Timestamp : Apr 6 09:11:38.976 2024 GMT Extensions: none Signature : ecdsa-with-SHA256 30:46:02:21:00:97:3E:1C:C8:F5:53:7C:DD:EE:83:4B: 2F:A7:73:41:24:25:FB:4F:E5:83:F3:2A:23:2C:D7:04: 55:7E:A9:33:73:02:21:00:A6:C5:E0:59:02:2D:95:10: 44:57:2B:23:CD:40:99:5E:50:E6:00:03:13:E3:E6:F4: 53:92:D2:5E:38:C0:CD:B7 Signature Algorithm: sha256WithRSAEncryption Signature Value: 86:30:60:85:48:61:84:e3:79:a2:43:8e:80:1f:c3:36:8f:f2: 97:0e:2c:d2:d8:d0:d1:54:18:34:2e:1d:96:89:7f:74:e8:4c: 6c:ea:62:b7:9c:da:65:bd:16:61:e5:c4:65:2f:12:75:3e:e0: cc:c0:3a:08:d5:73:f5:bb:a6:00:fb:0f:cc:b4:36:e0:10:40: 08:2b:a7:fc:62:b3:11:12:c8:46:47:73:72:7e:28:38:b3:5e: a4:90:13:e8:ff:31:af:8a:ee:bd:6d:a9:53:ed:1b:ae:b9:a9: 2b:45:b2:bf:99:53:f2:84:8a:57:ab:2f:cb:07:bb:fc:5d:18: 89:cb:f6:e0:2b:9a:d1:f7:45:25:7c:82:fa:30:33:5a:92:fb: 5e:e1:b4:2c:1e:ff:7a:a4:2e:05:f8:a4:e3:91:2f:bb:e2:e2: 00:87:90:34:2b:26:2e:f0:a0:58:c3:db:65:c9:e2:4e:ec:a2: 1b:a3:9a:e5:bb:f1:b0:07:7c:2d:54:0a:b0:8b:5f:88:bd:7e: 02:f3:e9:75:20:e3:60:68:0a:be:7a:ad:d0:93:c8:48:0c:52: 20:b7:55:2a:9f:4f:ea:03:3e:60:9f:5d:d8:86:a5:11:1d:9a: 55:e8:50:57:03:33:49:89:15:43:3f:a2:85:fa:e0:94:c8:b0: 07:e9:ce:f2