Hostnames |
unifish.no cpanel.unifish.no cpcalendars.unifish.no cpcontacts.unifish.no mail.unifish.no ns1.unifish.no server.unifish.no www.server.unifish.no webdisk.unifish.no webmail.unifish.no www.unifish.no |
Domains | unifish.no |
Country | Norway |
City | Oslo |
Organization | Webhuset AS |
ISP | Webhuset AS |
ASN | AS39783 |
Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.
CVE-2023-51766 | Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not. |
CVE-2022-37452 | Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set. |
CVE-2022-37451 | Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc. |
CVE-2021-38371 | 5.0The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending. |
CVE-2021-27216 | 6.3Exim 4 before 4.94.2 has Execution with Unnecessary Privileges. By leveraging a delete_pid_file race condition, a local user can delete arbitrary files as root. This involves the -oP and -oPX options. |
CVE-2020-8015 | 7.2A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of exim in openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: openSUSE Factory exim versions prior to 4.93.0.4-3.1. |
CVE-2020-28026 | 9.3Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters, relevant in non-default configurations that enable Delivery Status Notification (DSN). Certain uses of ORCPT= can place a newline into a spool header file, and indirectly allow unauthenticated remote attackers to execute arbitrary commands as root. |
CVE-2020-28025 | 5.0Exim 4 before 4.94.2 allows Out-of-bounds Read because pdkim_finish_bodyhash does not validate the relationship between sig->bodyhash.len and b->bh.len; thus, a crafted DKIM-Signature header might lead to a leak of sensitive information from process memory. |
CVE-2020-28024 | 7.5Exim 4 before 4.94.2 allows Buffer Underwrite that may result in unauthenticated remote attackers executing arbitrary commands, because smtp_ungetc was only intended to push back characters, but can actually push back non-character error codes such as EOF. |
CVE-2020-28023 | 5.0Exim 4 before 4.94.2 allows Out-of-bounds Read. smtp_setup_msg may disclose sensitive information from process memory to an unauthenticated SMTP client. |
CVE-2020-28022 | 7.5Exim 4 before 4.94.2 has Improper Restriction of Write Operations within the Bounds of a Memory Buffer. This occurs when processing name=value pairs within MAIL FROM and RCPT TO commands. |
CVE-2020-28021 | 9.0Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. An authenticated remote SMTP client can insert newline characters into a spool file (which indirectly leads to remote code execution as root) via AUTH= in a MAIL FROM command. |
CVE-2020-28019 | 5.0Exim 4 before 4.94.2 has Improper Initialization that can lead to recursion-based stack consumption or other consequences. This occurs because use of certain getc functions is mishandled when a client uses BDAT instead of DATA. |
CVE-2020-28018 | 7.5Exim 4 before 4.94.2 allows Use After Free in smtp_reset in certain situations that may be common for builds with OpenSSL. |
CVE-2020-28017 | 7.5Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow in receive_add_recipient via an e-mail message with fifty million recipients. NOTE: remote exploitation may be difficult because of resource consumption. |
CVE-2020-28016 | 7.2Exim 4 before 4.94.2 allows an off-by-two Out-of-bounds Write because "-F ''" is mishandled by parse_fix_phrase. |
CVE-2020-28015 | 7.2Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. Local users can alter the behavior of root processes because a recipient address can have a newline character. |
CVE-2020-28014 | 5.6Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. The -oP option is available to the exim user, and allows a denial of service because root-owned files can be overwritten. |
CVE-2020-28013 | 7.2Exim 4 before 4.94.2 allows Heap-based Buffer Overflow because it mishandles "-F '.('" on the command line, and thus may allow privilege escalation from any user to root. This occurs because of the interpretation of negative sizes in strncpy. |
CVE-2020-28012 | 7.2Exim 4 before 4.94.2 allows Exposure of File Descriptor to Unintended Control Sphere because rda_interpret uses a privileged pipe that lacks a close-on-exec flag. |
CVE-2020-28011 | 7.2Exim 4 before 4.94.2 allows Heap-based Buffer Overflow in queue_run via two sender options: -R and -S. This may cause privilege escalation from exim to root. |
CVE-2020-28010 | 7.2Exim 4 before 4.94.2 allows Out-of-bounds Write because the main function, while setuid root, copies the current working directory pathname into a buffer that is too small (on some common platforms). |
CVE-2020-28009 | 7.2Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow because get_stdinput allows unbounded reads that are accompanied by unbounded increases in a certain size variable. NOTE: exploitation may be impractical because of the execution time needed to overflow (multiple days). |
CVE-2020-28008 | 7.2Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution. |
CVE-2020-28007 | 7.2Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem. |
CVE-2020-12783 | 5.0Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c. |
-1153302106 | 2024-04-22T02:35:57.34419453 / tcp
PowerDNS Authoritative Server 4.1.10 (built Mar 11 2020 14:40:52 by root@rpmb-64-centos-65) Resolver ID: server.unifish.no
-1153302106 | 2024-04-10T08:38:11.75899653 / udp
PowerDNS Authoritative Server 4.1.10 (built Mar 11 2020 14:40:52 by root@rpmb-64-centos-65) Resolver ID: server.unifish.no
119344311 | 2024-04-29T02:40:13.22503780 / tcp
HTTP/1.1 200 OK Date: Mon, 29 Apr 2024 02:40:07 GMT Server: Apache Transfer-Encoding: chunked Content-Type: text/html
1952082069 | 2024-04-28T22:26:42.082386110 / tcp
+OK Dovecot ready. +OK CAPA TOP UIDL RESP-CODES PIPELINING AUTH-RESP-CODE STLS USER SASL PLAIN LOGIN .
Certificate: Data: Version: 3 (0x2) Serial Number: 2a:cc:a7:eb:51:8d:92:d2:69:6b:04:26:ac:ab:ab:6f Signature Algorithm: sha256WithRSAEncryption Issuer: C=US, ST=TX, L=Houston, O=cPanel, Inc., CN=cPanel, Inc. Certification Authority Validity Not Before: Nov 9 00:00:00 2023 GMT Not After : Nov 8 23:59:59 2024 GMT Subject: CN=server.unifish.no Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:ce:b8:f9:b4:db:88:58:29:d5:2b:a7:9c:57:42: 44:6f:c8:b1:81:cf:05:f7:6e:be:ea:ee:20:3f:20: 0a:82:48:91:d2:de:6f:9b:4c:2b:e8:83:b0:e1:89: ae:ae:0c:b9:3e:a9:a0:5b:f9:b8:3d:69:fa:93:a0: 6a:ea:59:a8:57:c2:a8:3f:e1:da:8f:92:39:36:ad: 69:b9:28:e2:96:c6:55:d8:a8:05:f3:1e:82:bb:02: 1c:74:56:20:42:b8:80:88:24:84:24:cf:b3:a2:da: 20:7a:19:cd:ad:15:a5:7a:ff:60:03:3e:ea:41:71: 35:1d:9a:1c:6f:ae:da:70:46:f7:d2:40:02:c9:9a: 96:07:89:3a:ce:00:db:26:41:49:6f:47:aa:4b:8d: 18:97:c5:dc:9e:4e:b7:69:12:92:8e:b4:e0:25:02: bf:5a:e8:da:26:d6:30:b3:a1:c3:e3:69:65:23:a4: de:74:2f:fd:59:35:c1:26:4b:7a:b3:b0:86:d6:c9: 4e:4b:2c:07:89:ea:6e:79:40:c2:99:71:07:92:9b: 11:87:06:13:c8:4d:bd:58:77:14:9b:3b:53:b5:3a: fe:d9:67:6c:3f:42:fa:73:0a:1b:24:9e:b3:ee:40: 54:fd:15:7a:8e:0e:0d:c6:57:52:ab:07:a4:7b:5b: 56:e5 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Authority Key Identifier: 7E:03:5A:65:41:6B:A7:7E:0A:E1:B8:9D:08:EA:1D:8E:1D:6A:C7:65 X509v3 Subject Key Identifier: 7E:F7:23:15:EB:41:27:73:6D:C4:D1:0D:10:42:98:9C:C6:D7:6A:BE X509v3 Key Usage: critical Digital Signature, Key Encipherment X509v3 Basic Constraints: critical CA:FALSE X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication X509v3 Certificate Policies: Policy: 1.3.6.1.4.1.6449.1.2.2.52 CPS: https://sectigo.com/CPS Policy: 2.23.140.1.2.1 X509v3 CRL Distribution Points: Full Name: URI:http://crl.comodoca.com/cPanelIncCertificationAuthority.crl Authority Information Access: CA Issuers - URI:http://crt.comodoca.com/cPanelIncCertificationAuthority.crt OCSP - URI:http://ocsp.comodoca.com X509v3 Subject Alternative Name: DNS:server.unifish.no, DNS:www.server.unifish.no CT Precertificate SCTs: Signed Certificate Timestamp: Version : v1 (0x0) Log ID : 76:FF:88:3F:0A:B6:FB:95:51:C2:61:CC:F5:87:BA:34: B4:A4:CD:BB:29:DC:68:42:0A:9F:E6:67:4C:5A:3A:74 Timestamp : Nov 9 04:15:38.975 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:20:53:77:18:65:90:62:3D:D6:82:09:29:32: 84:5A:A6:B9:A5:7C:28:E6:54:14:CE:6B:36:CF:84:DD: 32:78:36:80:02:21:00:9E:4C:42:74:5A:97:84:55:93: C5:D0:3F:15:0A:CD:F0:5E:9B:EE:76:B9:FB:2E:7A:D7: 4D:0C:2B:BD:9A:12:9A Signed Certificate Timestamp: Version : v1 (0x0) Log ID : 3F:17:4B:4F:D7:22:47:58:94:1D:65:1C:84:BE:0D:12: ED:90:37:7F:1F:85:6A:EB:C1:BF:28:85:EC:F8:64:6E Timestamp : Nov 9 04:15:39.104 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:21:00:D9:1D:41:8A:2B:2C:8D:D9:E4:0F:F0: 15:FE:B6:A3:25:8F:93:4F:28:C0:15:9D:05:27:B6:62: A3:6F:1E:67:D1:02:20:75:91:6F:B4:EF:FA:8F:EC:87: 8D:BE:6B:D3:DA:8F:92:A3:BD:DE:10:87:44:40:9C:78: B2:D1:56:08:9D:93:6A Signed Certificate Timestamp: Version : v1 (0x0) Log ID : EE:CD:D0:64:D5:DB:1A:CE:C5:5C:B7:9D:B4:CD:13:A2: 32:87:46:7C:BC:EC:DE:C3:51:48:59:46:71:1F:B5:9B Timestamp : Nov 9 04:15:39.072 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:46:02:21:00:F8:D2:BC:37:50:6F:9C:DF:00:21:64: DC:FF:95:08:67:93:19:69:FB:B9:1E:1D:DC:2D:96:04: 23:C8:B7:9F:0C:02:21:00:E5:81:51:C1:4B:0F:F6:73: 62:2E:FA:7B:A2:F9:D3:D5:92:F4:7A:87:6B:2B:04:9A: 5B:9C:3F:77:51:D5:8C:AE Signature Algorithm: sha256WithRSAEncryption Signature Value: 7f:93:cd:97:91:1f:dd:87:64:d1:19:5b:03:68:54:bb:50:e7: ce:cd:67:a6:cb:28:da:9b:cb:b6:75:f1:02:72:c3:d5:9b:99: e6:9a:43:d1:65:90:49:10:3e:6c:71:50:09:6f:b1:08:03:9c: ee:23:0c:c8:95:6b:5c:be:c5:76:27:83:42:66:9d:44:79:92: e0:fd:1e:6d:95:a1:a9:09:5a:5b:83:f1:21:7e:dc:88:90:dd: e9:48:fe:5a:8b:ad:60:d3:8c:6b:0c:d4:55:d8:50:d3:3f:66: e6:79:ab:86:d7:4a:f6:a8:14:01:6e:f0:fb:ee:b1:03:3c:fe: a0:e4:64:62:b4:3e:4b:d4:2d:22:6b:a2:b3:02:52:44:a7:b2: d4:1d:20:8b:3b:66:4c:fe:d3:93:41:a9:90:a3:c7:bb:c6:9d: 3d:da:83:f1:e0:02:df:f2:6a:d8:b8:22:78:17:a4:dd:a7:b1: 52:3f:08:f6:23:d8:d6:fd:09:92:d0:b9:c4:17:c6:bd:81:88: 34:ed:41:cb:0b:1a:14:79:d9:15:d4:36:b6:54:6d:4f:ea:11: 5d:65:34:ef:3d:cb:a7:a2:74:b8:14:b6:2b:72:a5:21:c3:67: ed:e3:03:09:fe:33:a3:0e:a1:ca:de:bd:48:9f:39:54:1b:4f: 7a:c2:78:5b
1559185454 | 2024-04-17T12:55:27.017773143 / tcp
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE NAMESPACE LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot ready. * CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE NAMESPACE LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN A001 OK Pre-login capabilities listed, post-login capabilities have more. * ID ("name" "Dovecot") A002 OK ID completed. A003 BAD Error in IMAP command received by server. * BYE Logging out A004 OK Logout completed.
Certificate: Data: Version: 3 (0x2) Serial Number: 2a:cc:a7:eb:51:8d:92:d2:69:6b:04:26:ac:ab:ab:6f Signature Algorithm: sha256WithRSAEncryption Issuer: C=US, ST=TX, L=Houston, O=cPanel, Inc., CN=cPanel, Inc. Certification Authority Validity Not Before: Nov 9 00:00:00 2023 GMT Not After : Nov 8 23:59:59 2024 GMT Subject: CN=server.unifish.no Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:ce:b8:f9:b4:db:88:58:29:d5:2b:a7:9c:57:42: 44:6f:c8:b1:81:cf:05:f7:6e:be:ea:ee:20:3f:20: 0a:82:48:91:d2:de:6f:9b:4c:2b:e8:83:b0:e1:89: ae:ae:0c:b9:3e:a9:a0:5b:f9:b8:3d:69:fa:93:a0: 6a:ea:59:a8:57:c2:a8:3f:e1:da:8f:92:39:36:ad: 69:b9:28:e2:96:c6:55:d8:a8:05:f3:1e:82:bb:02: 1c:74:56:20:42:b8:80:88:24:84:24:cf:b3:a2:da: 20:7a:19:cd:ad:15:a5:7a:ff:60:03:3e:ea:41:71: 35:1d:9a:1c:6f:ae:da:70:46:f7:d2:40:02:c9:9a: 96:07:89:3a:ce:00:db:26:41:49:6f:47:aa:4b:8d: 18:97:c5:dc:9e:4e:b7:69:12:92:8e:b4:e0:25:02: bf:5a:e8:da:26:d6:30:b3:a1:c3:e3:69:65:23:a4: de:74:2f:fd:59:35:c1:26:4b:7a:b3:b0:86:d6:c9: 4e:4b:2c:07:89:ea:6e:79:40:c2:99:71:07:92:9b: 11:87:06:13:c8:4d:bd:58:77:14:9b:3b:53:b5:3a: fe:d9:67:6c:3f:42:fa:73:0a:1b:24:9e:b3:ee:40: 54:fd:15:7a:8e:0e:0d:c6:57:52:ab:07:a4:7b:5b: 56:e5 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Authority Key Identifier: 7E:03:5A:65:41:6B:A7:7E:0A:E1:B8:9D:08:EA:1D:8E:1D:6A:C7:65 X509v3 Subject Key Identifier: 7E:F7:23:15:EB:41:27:73:6D:C4:D1:0D:10:42:98:9C:C6:D7:6A:BE X509v3 Key Usage: critical Digital Signature, Key Encipherment X509v3 Basic Constraints: critical CA:FALSE X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication X509v3 Certificate Policies: Policy: 1.3.6.1.4.1.6449.1.2.2.52 CPS: https://sectigo.com/CPS Policy: 2.23.140.1.2.1 X509v3 CRL Distribution Points: Full Name: URI:http://crl.comodoca.com/cPanelIncCertificationAuthority.crl Authority Information Access: CA Issuers - URI:http://crt.comodoca.com/cPanelIncCertificationAuthority.crt OCSP - URI:http://ocsp.comodoca.com X509v3 Subject Alternative Name: DNS:server.unifish.no, DNS:www.server.unifish.no CT Precertificate SCTs: Signed Certificate Timestamp: Version : v1 (0x0) Log ID : 76:FF:88:3F:0A:B6:FB:95:51:C2:61:CC:F5:87:BA:34: B4:A4:CD:BB:29:DC:68:42:0A:9F:E6:67:4C:5A:3A:74 Timestamp : Nov 9 04:15:38.975 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:20:53:77:18:65:90:62:3D:D6:82:09:29:32: 84:5A:A6:B9:A5:7C:28:E6:54:14:CE:6B:36:CF:84:DD: 32:78:36:80:02:21:00:9E:4C:42:74:5A:97:84:55:93: C5:D0:3F:15:0A:CD:F0:5E:9B:EE:76:B9:FB:2E:7A:D7: 4D:0C:2B:BD:9A:12:9A Signed Certificate Timestamp: Version : v1 (0x0) Log ID : 3F:17:4B:4F:D7:22:47:58:94:1D:65:1C:84:BE:0D:12: ED:90:37:7F:1F:85:6A:EB:C1:BF:28:85:EC:F8:64:6E Timestamp : Nov 9 04:15:39.104 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:21:00:D9:1D:41:8A:2B:2C:8D:D9:E4:0F:F0: 15:FE:B6:A3:25:8F:93:4F:28:C0:15:9D:05:27:B6:62: A3:6F:1E:67:D1:02:20:75:91:6F:B4:EF:FA:8F:EC:87: 8D:BE:6B:D3:DA:8F:92:A3:BD:DE:10:87:44:40:9C:78: B2:D1:56:08:9D:93:6A Signed Certificate Timestamp: Version : v1 (0x0) Log ID : EE:CD:D0:64:D5:DB:1A:CE:C5:5C:B7:9D:B4:CD:13:A2: 32:87:46:7C:BC:EC:DE:C3:51:48:59:46:71:1F:B5:9B Timestamp : Nov 9 04:15:39.072 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:46:02:21:00:F8:D2:BC:37:50:6F:9C:DF:00:21:64: DC:FF:95:08:67:93:19:69:FB:B9:1E:1D:DC:2D:96:04: 23:C8:B7:9F:0C:02:21:00:E5:81:51:C1:4B:0F:F6:73: 62:2E:FA:7B:A2:F9:D3:D5:92:F4:7A:87:6B:2B:04:9A: 5B:9C:3F:77:51:D5:8C:AE Signature Algorithm: sha256WithRSAEncryption Signature Value: 7f:93:cd:97:91:1f:dd:87:64:d1:19:5b:03:68:54:bb:50:e7: ce:cd:67:a6:cb:28:da:9b:cb:b6:75:f1:02:72:c3:d5:9b:99: e6:9a:43:d1:65:90:49:10:3e:6c:71:50:09:6f:b1:08:03:9c: ee:23:0c:c8:95:6b:5c:be:c5:76:27:83:42:66:9d:44:79:92: e0:fd:1e:6d:95:a1:a9:09:5a:5b:83:f1:21:7e:dc:88:90:dd: e9:48:fe:5a:8b:ad:60:d3:8c:6b:0c:d4:55:d8:50:d3:3f:66: e6:79:ab:86:d7:4a:f6:a8:14:01:6e:f0:fb:ee:b1:03:3c:fe: a0:e4:64:62:b4:3e:4b:d4:2d:22:6b:a2:b3:02:52:44:a7:b2: d4:1d:20:8b:3b:66:4c:fe:d3:93:41:a9:90:a3:c7:bb:c6:9d: 3d:da:83:f1:e0:02:df:f2:6a:d8:b8:22:78:17:a4:dd:a7:b1: 52:3f:08:f6:23:d8:d6:fd:09:92:d0:b9:c4:17:c6:bd:81:88: 34:ed:41:cb:0b:1a:14:79:d9:15:d4:36:b6:54:6d:4f:ea:11: 5d:65:34:ef:3d:cb:a7:a2:74:b8:14:b6:2b:72:a5:21:c3:67: ed:e3:03:09:fe:33:a3:0e:a1:ca:de:bd:48:9f:39:54:1b:4f: 7a:c2:78:5b
-794075736 | 2024-04-26T01:52:00.967044443 / tcp
HTTP/1.1 403 Forbidden Date: Fri, 26 Apr 2024 01:51:56 GMT Server: Apache Content-Length: 318 Content-Type: text/html; charset=iso-8859-1
Certificate: Data: Version: 3 (0x2) Serial Number: 3c:63:5c:ab:08:85:9d:4e:40:38:73:5d:31:9b:7f:21 Signature Algorithm: sha256WithRSAEncryption Issuer: C=US, ST=TX, L=Houston, O=cPanel, Inc., CN=cPanel, Inc. Certification Authority Validity Not Before: Mar 10 00:00:00 2024 GMT Not After : Jun 8 23:59:59 2024 GMT Subject: CN=unifish.no Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:c0:77:51:66:7c:3d:2c:01:8b:af:8d:35:5e:af: 4e:f7:54:b0:47:2e:48:3c:78:0a:1b:a6:c1:74:fc: 39:b0:3f:24:1b:df:08:83:da:53:39:5e:5b:85:49: 36:52:f3:c6:1c:83:49:38:8c:4f:47:c7:7c:58:df: ec:aa:5c:6f:b3:6d:e7:8a:b6:38:2e:c9:46:40:ea: 1f:1b:7e:b8:88:da:88:62:e9:cd:6f:fc:55:0f:56: 39:d8:5e:fa:65:cb:3e:be:19:e1:5f:b9:59:9e:dc: 4d:c4:1c:5d:65:8d:69:42:8a:5d:c6:11:9f:56:75: a9:cf:3c:1e:8c:5e:c9:48:68:70:b9:c6:b5:56:a5: f8:dc:5a:05:31:da:0a:17:bc:b3:e8:1d:46:8d:04: 74:07:ec:79:98:9d:0e:69:2c:2a:e8:c2:e7:ed:1d: eb:fa:b4:a1:80:cc:60:b6:37:af:5d:27:8a:ca:c2: 8f:f0:f3:3a:30:79:20:09:22:ec:5b:cb:18:9e:82: 50:7c:a9:72:bc:cb:90:59:93:c5:c8:a9:5c:8a:5f: a5:13:83:e7:37:15:13:7e:8d:b5:fd:7a:eb:1f:be: 96:e0:ae:5c:a9:1d:d2:33:2e:2c:2b:86:52:e0:13: d3:ee:f7:fc:a3:3a:8d:22:06:ae:98:cb:3c:8d:30: 0a:dd Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Authority Key Identifier: 7E:03:5A:65:41:6B:A7:7E:0A:E1:B8:9D:08:EA:1D:8E:1D:6A:C7:65 X509v3 Subject Key Identifier: 6D:EF:B5:B2:F6:11:8A:1D:B4:42:82:D6:CF:EE:9A:13:C0:5F:0A:E9 X509v3 Key Usage: critical Digital Signature, Key Encipherment X509v3 Basic Constraints: critical CA:FALSE X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication X509v3 Certificate Policies: Policy: 1.3.6.1.4.1.6449.1.2.2.52 CPS: https://sectigo.com/CPS Policy: 2.23.140.1.2.1 X509v3 CRL Distribution Points: Full Name: URI:http://crl.comodoca.com/cPanelIncCertificationAuthority.crl Authority Information Access: CA Issuers - URI:http://crt.comodoca.com/cPanelIncCertificationAuthority.crt OCSP - URI:http://ocsp.comodoca.com CT Precertificate SCTs: Signed Certificate Timestamp: Version : v1 (0x0) Log ID : 76:FF:88:3F:0A:B6:FB:95:51:C2:61:CC:F5:87:BA:34: B4:A4:CD:BB:29:DC:68:42:0A:9F:E6:67:4C:5A:3A:74 Timestamp : Mar 10 03:33:05.706 2024 GMT Extensions: none Signature : ecdsa-with-SHA256 30:44:02:20:77:C1:45:5A:95:CB:08:29:CA:37:23:25: CD:13:63:C1:3F:CB:D1:0D:65:97:DF:1D:96:2E:CF:19: EA:0C:72:36:02:20:1D:E2:C5:F4:7E:4C:E6:FD:96:B7: 6F:FD:06:C2:3F:76:1C:6C:64:2F:64:46:C0:11:E6:0D: 04:F5:86:FA:C1:01 Signed Certificate Timestamp: Version : v1 (0x0) Log ID : 3B:53:77:75:3E:2D:B9:80:4E:8B:30:5B:06:FE:40:3B: 67:D8:4F:C3:F4:C7:BD:00:0D:2D:72:6F:E1:FA:D4:17 Timestamp : Mar 10 03:33:05.624 2024 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:20:5B:D0:9D:DB:69:B5:11:5C:E8:4A:EE:70: 5B:67:C0:AA:B8:2C:47:53:60:D0:6B:60:99:DA:B0:F1: 8B:D5:3A:B2:02:21:00:F3:55:84:74:D2:5C:5E:88:9D: 4E:EC:DB:F1:A7:A8:AF:76:D1:E7:89:06:7D:5A:07:D8: 2A:F8:1B:18:25:E3:76 X509v3 Subject Alternative Name: DNS:unifish.no, DNS:cpanel.unifish.no, DNS:cpcalendars.unifish.no, DNS:cpcontacts.unifish.no, DNS:mail.unifish.no, DNS:webdisk.unifish.no, DNS:webmail.unifish.no, DNS:www.unifish.no Signature Algorithm: sha256WithRSAEncryption Signature Value: 84:30:dd:85:4c:d1:ab:01:d1:62:c0:b7:f4:b3:a1:de:d3:44: 49:5e:a8:a5:54:fe:fd:9b:0a:74:86:54:9d:9e:9d:b9:d7:b8: 47:28:c1:a6:cd:c4:14:2c:3f:31:dd:7e:44:98:06:8a:d8:7f: 85:b9:fb:1c:19:6e:51:72:77:3a:77:92:81:66:b4:87:7e:54: 61:7f:d8:2d:75:5f:09:e8:7c:2b:74:b6:c2:75:b7:a3:a5:85: 96:cb:f0:67:14:05:e2:81:55:7a:ea:d9:33:52:3e:e3:21:26: 32:52:71:1d:ff:30:8a:c5:81:5d:44:83:f9:a2:5a:ff:e5:36: 8e:1c:0c:3a:f5:d3:c0:20:9e:89:0b:2e:fd:b3:1b:52:cb:e1: 90:6b:31:a6:df:5c:68:17:7b:3c:04:ef:03:fa:e3:cc:b5:6c: b3:5f:f2:b8:c6:e4:6c:4f:52:85:32:95:5a:4c:94:0f:d8:7c: de:7c:a2:1f:88:a7:9d:53:2e:4f:74:b0:06:2f:96:ad:97:b6: 73:28:14:91:05:c8:c7:53:cf:c6:79:7b:3c:8c:54:5a:b0:a9: af:68:bf:0f:e2:9f:71:e2:5b:8c:9f:5a:1c:70:e4:07:6d:e3: ea:7c:70:70:39:46:23:5d:fa:7d:35:54:19:69:6f:c4:06:40: 57:df:0e:28
18948712 | 2024-04-20T03:53:19.937086465 / tcp
220-server.unifish.no ESMTP Exim 4.93 #2 Sat, 20 Apr 2024 05:53:01 +0200 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail. 250-server.unifish.no Hello 4fhc1ompjn7d0.net [224.65.54.187] 250-SIZE 52428800 250-8BITMIME 250-PIPELINING 250-AUTH PLAIN LOGIN 250 HELP
Certificate: Data: Version: 3 (0x2) Serial Number: 2a:cc:a7:eb:51:8d:92:d2:69:6b:04:26:ac:ab:ab:6f Signature Algorithm: sha256WithRSAEncryption Issuer: C=US, ST=TX, L=Houston, O=cPanel, Inc., CN=cPanel, Inc. Certification Authority Validity Not Before: Nov 9 00:00:00 2023 GMT Not After : Nov 8 23:59:59 2024 GMT Subject: CN=server.unifish.no Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:ce:b8:f9:b4:db:88:58:29:d5:2b:a7:9c:57:42: 44:6f:c8:b1:81:cf:05:f7:6e:be:ea:ee:20:3f:20: 0a:82:48:91:d2:de:6f:9b:4c:2b:e8:83:b0:e1:89: ae:ae:0c:b9:3e:a9:a0:5b:f9:b8:3d:69:fa:93:a0: 6a:ea:59:a8:57:c2:a8:3f:e1:da:8f:92:39:36:ad: 69:b9:28:e2:96:c6:55:d8:a8:05:f3:1e:82:bb:02: 1c:74:56:20:42:b8:80:88:24:84:24:cf:b3:a2:da: 20:7a:19:cd:ad:15:a5:7a:ff:60:03:3e:ea:41:71: 35:1d:9a:1c:6f:ae:da:70:46:f7:d2:40:02:c9:9a: 96:07:89:3a:ce:00:db:26:41:49:6f:47:aa:4b:8d: 18:97:c5:dc:9e:4e:b7:69:12:92:8e:b4:e0:25:02: bf:5a:e8:da:26:d6:30:b3:a1:c3:e3:69:65:23:a4: de:74:2f:fd:59:35:c1:26:4b:7a:b3:b0:86:d6:c9: 4e:4b:2c:07:89:ea:6e:79:40:c2:99:71:07:92:9b: 11:87:06:13:c8:4d:bd:58:77:14:9b:3b:53:b5:3a: fe:d9:67:6c:3f:42:fa:73:0a:1b:24:9e:b3:ee:40: 54:fd:15:7a:8e:0e:0d:c6:57:52:ab:07:a4:7b:5b: 56:e5 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Authority Key Identifier: 7E:03:5A:65:41:6B:A7:7E:0A:E1:B8:9D:08:EA:1D:8E:1D:6A:C7:65 X509v3 Subject Key Identifier: 7E:F7:23:15:EB:41:27:73:6D:C4:D1:0D:10:42:98:9C:C6:D7:6A:BE X509v3 Key Usage: critical Digital Signature, Key Encipherment X509v3 Basic Constraints: critical CA:FALSE X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication X509v3 Certificate Policies: Policy: 1.3.6.1.4.1.6449.1.2.2.52 CPS: https://sectigo.com/CPS Policy: 2.23.140.1.2.1 X509v3 CRL Distribution Points: Full Name: URI:http://crl.comodoca.com/cPanelIncCertificationAuthority.crl Authority Information Access: CA Issuers - URI:http://crt.comodoca.com/cPanelIncCertificationAuthority.crt OCSP - URI:http://ocsp.comodoca.com X509v3 Subject Alternative Name: DNS:server.unifish.no, DNS:www.server.unifish.no CT Precertificate SCTs: Signed Certificate Timestamp: Version : v1 (0x0) Log ID : 76:FF:88:3F:0A:B6:FB:95:51:C2:61:CC:F5:87:BA:34: B4:A4:CD:BB:29:DC:68:42:0A:9F:E6:67:4C:5A:3A:74 Timestamp : Nov 9 04:15:38.975 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:20:53:77:18:65:90:62:3D:D6:82:09:29:32: 84:5A:A6:B9:A5:7C:28:E6:54:14:CE:6B:36:CF:84:DD: 32:78:36:80:02:21:00:9E:4C:42:74:5A:97:84:55:93: C5:D0:3F:15:0A:CD:F0:5E:9B:EE:76:B9:FB:2E:7A:D7: 4D:0C:2B:BD:9A:12:9A Signed Certificate Timestamp: Version : v1 (0x0) Log ID : 3F:17:4B:4F:D7:22:47:58:94:1D:65:1C:84:BE:0D:12: ED:90:37:7F:1F:85:6A:EB:C1:BF:28:85:EC:F8:64:6E Timestamp : Nov 9 04:15:39.104 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:21:00:D9:1D:41:8A:2B:2C:8D:D9:E4:0F:F0: 15:FE:B6:A3:25:8F:93:4F:28:C0:15:9D:05:27:B6:62: A3:6F:1E:67:D1:02:20:75:91:6F:B4:EF:FA:8F:EC:87: 8D:BE:6B:D3:DA:8F:92:A3:BD:DE:10:87:44:40:9C:78: B2:D1:56:08:9D:93:6A Signed Certificate Timestamp: Version : v1 (0x0) Log ID : EE:CD:D0:64:D5:DB:1A:CE:C5:5C:B7:9D:B4:CD:13:A2: 32:87:46:7C:BC:EC:DE:C3:51:48:59:46:71:1F:B5:9B Timestamp : Nov 9 04:15:39.072 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:46:02:21:00:F8:D2:BC:37:50:6F:9C:DF:00:21:64: DC:FF:95:08:67:93:19:69:FB:B9:1E:1D:DC:2D:96:04: 23:C8:B7:9F:0C:02:21:00:E5:81:51:C1:4B:0F:F6:73: 62:2E:FA:7B:A2:F9:D3:D5:92:F4:7A:87:6B:2B:04:9A: 5B:9C:3F:77:51:D5:8C:AE Signature Algorithm: sha256WithRSAEncryption Signature Value: 7f:93:cd:97:91:1f:dd:87:64:d1:19:5b:03:68:54:bb:50:e7: ce:cd:67:a6:cb:28:da:9b:cb:b6:75:f1:02:72:c3:d5:9b:99: e6:9a:43:d1:65:90:49:10:3e:6c:71:50:09:6f:b1:08:03:9c: ee:23:0c:c8:95:6b:5c:be:c5:76:27:83:42:66:9d:44:79:92: e0:fd:1e:6d:95:a1:a9:09:5a:5b:83:f1:21:7e:dc:88:90:dd: e9:48:fe:5a:8b:ad:60:d3:8c:6b:0c:d4:55:d8:50:d3:3f:66: e6:79:ab:86:d7:4a:f6:a8:14:01:6e:f0:fb:ee:b1:03:3c:fe: a0:e4:64:62:b4:3e:4b:d4:2d:22:6b:a2:b3:02:52:44:a7:b2: d4:1d:20:8b:3b:66:4c:fe:d3:93:41:a9:90:a3:c7:bb:c6:9d: 3d:da:83:f1:e0:02:df:f2:6a:d8:b8:22:78:17:a4:dd:a7:b1: 52:3f:08:f6:23:d8:d6:fd:09:92:d0:b9:c4:17:c6:bd:81:88: 34:ed:41:cb:0b:1a:14:79:d9:15:d4:36:b6:54:6d:4f:ea:11: 5d:65:34:ef:3d:cb:a7:a2:74:b8:14:b6:2b:72:a5:21:c3:67: ed:e3:03:09:fe:33:a3:0e:a1:ca:de:bd:48:9f:39:54:1b:4f: 7a:c2:78:5b
-1301440600 | 2024-04-27T09:21:14.558293587 / tcp
220-server.unifish.no ESMTP Exim 4.93 #2 Sat, 27 Apr 2024 11:20:14 +0200 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail. 250-server.unifish.no Hello jqmit9omnw93w5.org [224.236.50.74] 250-SIZE 52428800 250-8BITMIME 250-PIPELINING 250-STARTTLS 250 HELP
Certificate: Data: Version: 3 (0x2) Serial Number: 2a:cc:a7:eb:51:8d:92:d2:69:6b:04:26:ac:ab:ab:6f Signature Algorithm: sha256WithRSAEncryption Issuer: C=US, ST=TX, L=Houston, O=cPanel, Inc., CN=cPanel, Inc. Certification Authority Validity Not Before: Nov 9 00:00:00 2023 GMT Not After : Nov 8 23:59:59 2024 GMT Subject: CN=server.unifish.no Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:ce:b8:f9:b4:db:88:58:29:d5:2b:a7:9c:57:42: 44:6f:c8:b1:81:cf:05:f7:6e:be:ea:ee:20:3f:20: 0a:82:48:91:d2:de:6f:9b:4c:2b:e8:83:b0:e1:89: ae:ae:0c:b9:3e:a9:a0:5b:f9:b8:3d:69:fa:93:a0: 6a:ea:59:a8:57:c2:a8:3f:e1:da:8f:92:39:36:ad: 69:b9:28:e2:96:c6:55:d8:a8:05:f3:1e:82:bb:02: 1c:74:56:20:42:b8:80:88:24:84:24:cf:b3:a2:da: 20:7a:19:cd:ad:15:a5:7a:ff:60:03:3e:ea:41:71: 35:1d:9a:1c:6f:ae:da:70:46:f7:d2:40:02:c9:9a: 96:07:89:3a:ce:00:db:26:41:49:6f:47:aa:4b:8d: 18:97:c5:dc:9e:4e:b7:69:12:92:8e:b4:e0:25:02: bf:5a:e8:da:26:d6:30:b3:a1:c3:e3:69:65:23:a4: de:74:2f:fd:59:35:c1:26:4b:7a:b3:b0:86:d6:c9: 4e:4b:2c:07:89:ea:6e:79:40:c2:99:71:07:92:9b: 11:87:06:13:c8:4d:bd:58:77:14:9b:3b:53:b5:3a: fe:d9:67:6c:3f:42:fa:73:0a:1b:24:9e:b3:ee:40: 54:fd:15:7a:8e:0e:0d:c6:57:52:ab:07:a4:7b:5b: 56:e5 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Authority Key Identifier: 7E:03:5A:65:41:6B:A7:7E:0A:E1:B8:9D:08:EA:1D:8E:1D:6A:C7:65 X509v3 Subject Key Identifier: 7E:F7:23:15:EB:41:27:73:6D:C4:D1:0D:10:42:98:9C:C6:D7:6A:BE X509v3 Key Usage: critical Digital Signature, Key Encipherment X509v3 Basic Constraints: critical CA:FALSE X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication X509v3 Certificate Policies: Policy: 1.3.6.1.4.1.6449.1.2.2.52 CPS: https://sectigo.com/CPS Policy: 2.23.140.1.2.1 X509v3 CRL Distribution Points: Full Name: URI:http://crl.comodoca.com/cPanelIncCertificationAuthority.crl Authority Information Access: CA Issuers - URI:http://crt.comodoca.com/cPanelIncCertificationAuthority.crt OCSP - URI:http://ocsp.comodoca.com X509v3 Subject Alternative Name: DNS:server.unifish.no, DNS:www.server.unifish.no CT Precertificate SCTs: Signed Certificate Timestamp: Version : v1 (0x0) Log ID : 76:FF:88:3F:0A:B6:FB:95:51:C2:61:CC:F5:87:BA:34: B4:A4:CD:BB:29:DC:68:42:0A:9F:E6:67:4C:5A:3A:74 Timestamp : Nov 9 04:15:38.975 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:20:53:77:18:65:90:62:3D:D6:82:09:29:32: 84:5A:A6:B9:A5:7C:28:E6:54:14:CE:6B:36:CF:84:DD: 32:78:36:80:02:21:00:9E:4C:42:74:5A:97:84:55:93: C5:D0:3F:15:0A:CD:F0:5E:9B:EE:76:B9:FB:2E:7A:D7: 4D:0C:2B:BD:9A:12:9A Signed Certificate Timestamp: Version : v1 (0x0) Log ID : 3F:17:4B:4F:D7:22:47:58:94:1D:65:1C:84:BE:0D:12: ED:90:37:7F:1F:85:6A:EB:C1:BF:28:85:EC:F8:64:6E Timestamp : Nov 9 04:15:39.104 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:21:00:D9:1D:41:8A:2B:2C:8D:D9:E4:0F:F0: 15:FE:B6:A3:25:8F:93:4F:28:C0:15:9D:05:27:B6:62: A3:6F:1E:67:D1:02:20:75:91:6F:B4:EF:FA:8F:EC:87: 8D:BE:6B:D3:DA:8F:92:A3:BD:DE:10:87:44:40:9C:78: B2:D1:56:08:9D:93:6A Signed Certificate Timestamp: Version : v1 (0x0) Log ID : EE:CD:D0:64:D5:DB:1A:CE:C5:5C:B7:9D:B4:CD:13:A2: 32:87:46:7C:BC:EC:DE:C3:51:48:59:46:71:1F:B5:9B Timestamp : Nov 9 04:15:39.072 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:46:02:21:00:F8:D2:BC:37:50:6F:9C:DF:00:21:64: DC:FF:95:08:67:93:19:69:FB:B9:1E:1D:DC:2D:96:04: 23:C8:B7:9F:0C:02:21:00:E5:81:51:C1:4B:0F:F6:73: 62:2E:FA:7B:A2:F9:D3:D5:92:F4:7A:87:6B:2B:04:9A: 5B:9C:3F:77:51:D5:8C:AE Signature Algorithm: sha256WithRSAEncryption Signature Value: 7f:93:cd:97:91:1f:dd:87:64:d1:19:5b:03:68:54:bb:50:e7: ce:cd:67:a6:cb:28:da:9b:cb:b6:75:f1:02:72:c3:d5:9b:99: e6:9a:43:d1:65:90:49:10:3e:6c:71:50:09:6f:b1:08:03:9c: ee:23:0c:c8:95:6b:5c:be:c5:76:27:83:42:66:9d:44:79:92: e0:fd:1e:6d:95:a1:a9:09:5a:5b:83:f1:21:7e:dc:88:90:dd: e9:48:fe:5a:8b:ad:60:d3:8c:6b:0c:d4:55:d8:50:d3:3f:66: e6:79:ab:86:d7:4a:f6:a8:14:01:6e:f0:fb:ee:b1:03:3c:fe: a0:e4:64:62:b4:3e:4b:d4:2d:22:6b:a2:b3:02:52:44:a7:b2: d4:1d:20:8b:3b:66:4c:fe:d3:93:41:a9:90:a3:c7:bb:c6:9d: 3d:da:83:f1:e0:02:df:f2:6a:d8:b8:22:78:17:a4:dd:a7:b1: 52:3f:08:f6:23:d8:d6:fd:09:92:d0:b9:c4:17:c6:bd:81:88: 34:ed:41:cb:0b:1a:14:79:d9:15:d4:36:b6:54:6d:4f:ea:11: 5d:65:34:ef:3d:cb:a7:a2:74:b8:14:b6:2b:72:a5:21:c3:67: ed:e3:03:09:fe:33:a3:0e:a1:ca:de:bd:48:9f:39:54:1b:4f: 7a:c2:78:5b
-1132241830 | 2024-04-10T23:13:18.466195993 / tcp
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE NAMESPACE LITERAL+ AUTH=PLAIN AUTH=LOGIN] Dovecot ready. * CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE NAMESPACE LITERAL+ AUTH=PLAIN AUTH=LOGIN A001 OK Pre-login capabilities listed, post-login capabilities have more. * ID ("name" "Dovecot") A002 OK ID completed. A003 BAD Error in IMAP command received by server. * BYE Logging out A004 OK Logout completed.
Certificate: Data: Version: 3 (0x2) Serial Number: 2a:cc:a7:eb:51:8d:92:d2:69:6b:04:26:ac:ab:ab:6f Signature Algorithm: sha256WithRSAEncryption Issuer: C=US, ST=TX, L=Houston, O=cPanel, Inc., CN=cPanel, Inc. Certification Authority Validity Not Before: Nov 9 00:00:00 2023 GMT Not After : Nov 8 23:59:59 2024 GMT Subject: CN=server.unifish.no Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:ce:b8:f9:b4:db:88:58:29:d5:2b:a7:9c:57:42: 44:6f:c8:b1:81:cf:05:f7:6e:be:ea:ee:20:3f:20: 0a:82:48:91:d2:de:6f:9b:4c:2b:e8:83:b0:e1:89: ae:ae:0c:b9:3e:a9:a0:5b:f9:b8:3d:69:fa:93:a0: 6a:ea:59:a8:57:c2:a8:3f:e1:da:8f:92:39:36:ad: 69:b9:28:e2:96:c6:55:d8:a8:05:f3:1e:82:bb:02: 1c:74:56:20:42:b8:80:88:24:84:24:cf:b3:a2:da: 20:7a:19:cd:ad:15:a5:7a:ff:60:03:3e:ea:41:71: 35:1d:9a:1c:6f:ae:da:70:46:f7:d2:40:02:c9:9a: 96:07:89:3a:ce:00:db:26:41:49:6f:47:aa:4b:8d: 18:97:c5:dc:9e:4e:b7:69:12:92:8e:b4:e0:25:02: bf:5a:e8:da:26:d6:30:b3:a1:c3:e3:69:65:23:a4: de:74:2f:fd:59:35:c1:26:4b:7a:b3:b0:86:d6:c9: 4e:4b:2c:07:89:ea:6e:79:40:c2:99:71:07:92:9b: 11:87:06:13:c8:4d:bd:58:77:14:9b:3b:53:b5:3a: fe:d9:67:6c:3f:42:fa:73:0a:1b:24:9e:b3:ee:40: 54:fd:15:7a:8e:0e:0d:c6:57:52:ab:07:a4:7b:5b: 56:e5 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Authority Key Identifier: 7E:03:5A:65:41:6B:A7:7E:0A:E1:B8:9D:08:EA:1D:8E:1D:6A:C7:65 X509v3 Subject Key Identifier: 7E:F7:23:15:EB:41:27:73:6D:C4:D1:0D:10:42:98:9C:C6:D7:6A:BE X509v3 Key Usage: critical Digital Signature, Key Encipherment X509v3 Basic Constraints: critical CA:FALSE X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication X509v3 Certificate Policies: Policy: 1.3.6.1.4.1.6449.1.2.2.52 CPS: https://sectigo.com/CPS Policy: 2.23.140.1.2.1 X509v3 CRL Distribution Points: Full Name: URI:http://crl.comodoca.com/cPanelIncCertificationAuthority.crl Authority Information Access: CA Issuers - URI:http://crt.comodoca.com/cPanelIncCertificationAuthority.crt OCSP - URI:http://ocsp.comodoca.com X509v3 Subject Alternative Name: DNS:server.unifish.no, DNS:www.server.unifish.no CT Precertificate SCTs: Signed Certificate Timestamp: Version : v1 (0x0) Log ID : 76:FF:88:3F:0A:B6:FB:95:51:C2:61:CC:F5:87:BA:34: B4:A4:CD:BB:29:DC:68:42:0A:9F:E6:67:4C:5A:3A:74 Timestamp : Nov 9 04:15:38.975 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:20:53:77:18:65:90:62:3D:D6:82:09:29:32: 84:5A:A6:B9:A5:7C:28:E6:54:14:CE:6B:36:CF:84:DD: 32:78:36:80:02:21:00:9E:4C:42:74:5A:97:84:55:93: C5:D0:3F:15:0A:CD:F0:5E:9B:EE:76:B9:FB:2E:7A:D7: 4D:0C:2B:BD:9A:12:9A Signed Certificate Timestamp: Version : v1 (0x0) Log ID : 3F:17:4B:4F:D7:22:47:58:94:1D:65:1C:84:BE:0D:12: ED:90:37:7F:1F:85:6A:EB:C1:BF:28:85:EC:F8:64:6E Timestamp : Nov 9 04:15:39.104 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:21:00:D9:1D:41:8A:2B:2C:8D:D9:E4:0F:F0: 15:FE:B6:A3:25:8F:93:4F:28:C0:15:9D:05:27:B6:62: A3:6F:1E:67:D1:02:20:75:91:6F:B4:EF:FA:8F:EC:87: 8D:BE:6B:D3:DA:8F:92:A3:BD:DE:10:87:44:40:9C:78: B2:D1:56:08:9D:93:6A Signed Certificate Timestamp: Version : v1 (0x0) Log ID : EE:CD:D0:64:D5:DB:1A:CE:C5:5C:B7:9D:B4:CD:13:A2: 32:87:46:7C:BC:EC:DE:C3:51:48:59:46:71:1F:B5:9B Timestamp : Nov 9 04:15:39.072 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:46:02:21:00:F8:D2:BC:37:50:6F:9C:DF:00:21:64: DC:FF:95:08:67:93:19:69:FB:B9:1E:1D:DC:2D:96:04: 23:C8:B7:9F:0C:02:21:00:E5:81:51:C1:4B:0F:F6:73: 62:2E:FA:7B:A2:F9:D3:D5:92:F4:7A:87:6B:2B:04:9A: 5B:9C:3F:77:51:D5:8C:AE Signature Algorithm: sha256WithRSAEncryption Signature Value: 7f:93:cd:97:91:1f:dd:87:64:d1:19:5b:03:68:54:bb:50:e7: ce:cd:67:a6:cb:28:da:9b:cb:b6:75:f1:02:72:c3:d5:9b:99: e6:9a:43:d1:65:90:49:10:3e:6c:71:50:09:6f:b1:08:03:9c: ee:23:0c:c8:95:6b:5c:be:c5:76:27:83:42:66:9d:44:79:92: e0:fd:1e:6d:95:a1:a9:09:5a:5b:83:f1:21:7e:dc:88:90:dd: e9:48:fe:5a:8b:ad:60:d3:8c:6b:0c:d4:55:d8:50:d3:3f:66: e6:79:ab:86:d7:4a:f6:a8:14:01:6e:f0:fb:ee:b1:03:3c:fe: a0:e4:64:62:b4:3e:4b:d4:2d:22:6b:a2:b3:02:52:44:a7:b2: d4:1d:20:8b:3b:66:4c:fe:d3:93:41:a9:90:a3:c7:bb:c6:9d: 3d:da:83:f1:e0:02:df:f2:6a:d8:b8:22:78:17:a4:dd:a7:b1: 52:3f:08:f6:23:d8:d6:fd:09:92:d0:b9:c4:17:c6:bd:81:88: 34:ed:41:cb:0b:1a:14:79:d9:15:d4:36:b6:54:6d:4f:ea:11: 5d:65:34:ef:3d:cb:a7:a2:74:b8:14:b6:2b:72:a5:21:c3:67: ed:e3:03:09:fe:33:a3:0e:a1:ca:de:bd:48:9f:39:54:1b:4f: 7a:c2:78:5b
-1001764030 | 2024-04-12T21:29:15.369733995 / tcp
+OK Dovecot ready. +OK CAPA TOP UIDL RESP-CODES PIPELINING AUTH-RESP-CODE USER SASL PLAIN LOGIN .
Certificate: Data: Version: 3 (0x2) Serial Number: 2a:cc:a7:eb:51:8d:92:d2:69:6b:04:26:ac:ab:ab:6f Signature Algorithm: sha256WithRSAEncryption Issuer: C=US, ST=TX, L=Houston, O=cPanel, Inc., CN=cPanel, Inc. Certification Authority Validity Not Before: Nov 9 00:00:00 2023 GMT Not After : Nov 8 23:59:59 2024 GMT Subject: CN=server.unifish.no Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:ce:b8:f9:b4:db:88:58:29:d5:2b:a7:9c:57:42: 44:6f:c8:b1:81:cf:05:f7:6e:be:ea:ee:20:3f:20: 0a:82:48:91:d2:de:6f:9b:4c:2b:e8:83:b0:e1:89: ae:ae:0c:b9:3e:a9:a0:5b:f9:b8:3d:69:fa:93:a0: 6a:ea:59:a8:57:c2:a8:3f:e1:da:8f:92:39:36:ad: 69:b9:28:e2:96:c6:55:d8:a8:05:f3:1e:82:bb:02: 1c:74:56:20:42:b8:80:88:24:84:24:cf:b3:a2:da: 20:7a:19:cd:ad:15:a5:7a:ff:60:03:3e:ea:41:71: 35:1d:9a:1c:6f:ae:da:70:46:f7:d2:40:02:c9:9a: 96:07:89:3a:ce:00:db:26:41:49:6f:47:aa:4b:8d: 18:97:c5:dc:9e:4e:b7:69:12:92:8e:b4:e0:25:02: bf:5a:e8:da:26:d6:30:b3:a1:c3:e3:69:65:23:a4: de:74:2f:fd:59:35:c1:26:4b:7a:b3:b0:86:d6:c9: 4e:4b:2c:07:89:ea:6e:79:40:c2:99:71:07:92:9b: 11:87:06:13:c8:4d:bd:58:77:14:9b:3b:53:b5:3a: fe:d9:67:6c:3f:42:fa:73:0a:1b:24:9e:b3:ee:40: 54:fd:15:7a:8e:0e:0d:c6:57:52:ab:07:a4:7b:5b: 56:e5 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Authority Key Identifier: 7E:03:5A:65:41:6B:A7:7E:0A:E1:B8:9D:08:EA:1D:8E:1D:6A:C7:65 X509v3 Subject Key Identifier: 7E:F7:23:15:EB:41:27:73:6D:C4:D1:0D:10:42:98:9C:C6:D7:6A:BE X509v3 Key Usage: critical Digital Signature, Key Encipherment X509v3 Basic Constraints: critical CA:FALSE X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication X509v3 Certificate Policies: Policy: 1.3.6.1.4.1.6449.1.2.2.52 CPS: https://sectigo.com/CPS Policy: 2.23.140.1.2.1 X509v3 CRL Distribution Points: Full Name: URI:http://crl.comodoca.com/cPanelIncCertificationAuthority.crl Authority Information Access: CA Issuers - URI:http://crt.comodoca.com/cPanelIncCertificationAuthority.crt OCSP - URI:http://ocsp.comodoca.com X509v3 Subject Alternative Name: DNS:server.unifish.no, DNS:www.server.unifish.no CT Precertificate SCTs: Signed Certificate Timestamp: Version : v1 (0x0) Log ID : 76:FF:88:3F:0A:B6:FB:95:51:C2:61:CC:F5:87:BA:34: B4:A4:CD:BB:29:DC:68:42:0A:9F:E6:67:4C:5A:3A:74 Timestamp : Nov 9 04:15:38.975 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:20:53:77:18:65:90:62:3D:D6:82:09:29:32: 84:5A:A6:B9:A5:7C:28:E6:54:14:CE:6B:36:CF:84:DD: 32:78:36:80:02:21:00:9E:4C:42:74:5A:97:84:55:93: C5:D0:3F:15:0A:CD:F0:5E:9B:EE:76:B9:FB:2E:7A:D7: 4D:0C:2B:BD:9A:12:9A Signed Certificate Timestamp: Version : v1 (0x0) Log ID : 3F:17:4B:4F:D7:22:47:58:94:1D:65:1C:84:BE:0D:12: ED:90:37:7F:1F:85:6A:EB:C1:BF:28:85:EC:F8:64:6E Timestamp : Nov 9 04:15:39.104 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:21:00:D9:1D:41:8A:2B:2C:8D:D9:E4:0F:F0: 15:FE:B6:A3:25:8F:93:4F:28:C0:15:9D:05:27:B6:62: A3:6F:1E:67:D1:02:20:75:91:6F:B4:EF:FA:8F:EC:87: 8D:BE:6B:D3:DA:8F:92:A3:BD:DE:10:87:44:40:9C:78: B2:D1:56:08:9D:93:6A Signed Certificate Timestamp: Version : v1 (0x0) Log ID : EE:CD:D0:64:D5:DB:1A:CE:C5:5C:B7:9D:B4:CD:13:A2: 32:87:46:7C:BC:EC:DE:C3:51:48:59:46:71:1F:B5:9B Timestamp : Nov 9 04:15:39.072 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:46:02:21:00:F8:D2:BC:37:50:6F:9C:DF:00:21:64: DC:FF:95:08:67:93:19:69:FB:B9:1E:1D:DC:2D:96:04: 23:C8:B7:9F:0C:02:21:00:E5:81:51:C1:4B:0F:F6:73: 62:2E:FA:7B:A2:F9:D3:D5:92:F4:7A:87:6B:2B:04:9A: 5B:9C:3F:77:51:D5:8C:AE Signature Algorithm: sha256WithRSAEncryption Signature Value: 7f:93:cd:97:91:1f:dd:87:64:d1:19:5b:03:68:54:bb:50:e7: ce:cd:67:a6:cb:28:da:9b:cb:b6:75:f1:02:72:c3:d5:9b:99: e6:9a:43:d1:65:90:49:10:3e:6c:71:50:09:6f:b1:08:03:9c: ee:23:0c:c8:95:6b:5c:be:c5:76:27:83:42:66:9d:44:79:92: e0:fd:1e:6d:95:a1:a9:09:5a:5b:83:f1:21:7e:dc:88:90:dd: e9:48:fe:5a:8b:ad:60:d3:8c:6b:0c:d4:55:d8:50:d3:3f:66: e6:79:ab:86:d7:4a:f6:a8:14:01:6e:f0:fb:ee:b1:03:3c:fe: a0:e4:64:62:b4:3e:4b:d4:2d:22:6b:a2:b3:02:52:44:a7:b2: d4:1d:20:8b:3b:66:4c:fe:d3:93:41:a9:90:a3:c7:bb:c6:9d: 3d:da:83:f1:e0:02:df:f2:6a:d8:b8:22:78:17:a4:dd:a7:b1: 52:3f:08:f6:23:d8:d6:fd:09:92:d0:b9:c4:17:c6:bd:81:88: 34:ed:41:cb:0b:1a:14:79:d9:15:d4:36:b6:54:6d:4f:ea:11: 5d:65:34:ef:3d:cb:a7:a2:74:b8:14:b6:2b:72:a5:21:c3:67: ed:e3:03:09:fe:33:a3:0e:a1:ca:de:bd:48:9f:39:54:1b:4f: 7a:c2:78:5b
111641390 | 2024-04-26T10:58:40.1145982082 / tcp
HTTP/1.1 301 Moved Content-length: 112 Location: https://185.35.186.219:2083/ Content-type: text/html; charset="utf-8" Cache-Control: no-cache, no-store, must-revalidate, private
1662376898 | 2024-04-26T10:58:43.3029452083 / tcp
HTTP/1.1 301 Moved Content-length: 114 Location: https://server.unifish.no:2083 Content-type: text/html; charset="utf-8" Cache-Control: no-cache, no-store, must-revalidate, private Pragma: no-cache
-684191488 | 2024-04-21T13:37:10.7396232086 / tcp
HTTP/1.0 401 Access Denied Connection: close Content-Type: text/html; charset="utf-8" Date: Sun, 21 Apr 2024 13:37:06 GMT Cache-Control: no-cache, no-store, must-revalidate, private Pragma: no-cache X-Error-Message: Access Denied Content-Length: 5121
-684191488 | 2024-04-24T21:25:25.7601922087 / tcp
HTTP/1.0 401 Access Denied Connection: close Content-Type: text/html; charset="utf-8" Date: Wed, 24 Apr 2024 21:25:21 GMT Cache-Control: no-cache, no-store, must-revalidate, private Pragma: no-cache X-Error-Message: Access Denied Content-Length: 5121
Certificate: Data: Version: 3 (0x2) Serial Number: 2a:cc:a7:eb:51:8d:92:d2:69:6b:04:26:ac:ab:ab:6f Signature Algorithm: sha256WithRSAEncryption Issuer: C=US, ST=TX, L=Houston, O=cPanel, Inc., CN=cPanel, Inc. Certification Authority Validity Not Before: Nov 9 00:00:00 2023 GMT Not After : Nov 8 23:59:59 2024 GMT Subject: CN=server.unifish.no Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:ce:b8:f9:b4:db:88:58:29:d5:2b:a7:9c:57:42: 44:6f:c8:b1:81:cf:05:f7:6e:be:ea:ee:20:3f:20: 0a:82:48:91:d2:de:6f:9b:4c:2b:e8:83:b0:e1:89: ae:ae:0c:b9:3e:a9:a0:5b:f9:b8:3d:69:fa:93:a0: 6a:ea:59:a8:57:c2:a8:3f:e1:da:8f:92:39:36:ad: 69:b9:28:e2:96:c6:55:d8:a8:05:f3:1e:82:bb:02: 1c:74:56:20:42:b8:80:88:24:84:24:cf:b3:a2:da: 20:7a:19:cd:ad:15:a5:7a:ff:60:03:3e:ea:41:71: 35:1d:9a:1c:6f:ae:da:70:46:f7:d2:40:02:c9:9a: 96:07:89:3a:ce:00:db:26:41:49:6f:47:aa:4b:8d: 18:97:c5:dc:9e:4e:b7:69:12:92:8e:b4:e0:25:02: bf:5a:e8:da:26:d6:30:b3:a1:c3:e3:69:65:23:a4: de:74:2f:fd:59:35:c1:26:4b:7a:b3:b0:86:d6:c9: 4e:4b:2c:07:89:ea:6e:79:40:c2:99:71:07:92:9b: 11:87:06:13:c8:4d:bd:58:77:14:9b:3b:53:b5:3a: fe:d9:67:6c:3f:42:fa:73:0a:1b:24:9e:b3:ee:40: 54:fd:15:7a:8e:0e:0d:c6:57:52:ab:07:a4:7b:5b: 56:e5 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Authority Key Identifier: 7E:03:5A:65:41:6B:A7:7E:0A:E1:B8:9D:08:EA:1D:8E:1D:6A:C7:65 X509v3 Subject Key Identifier: 7E:F7:23:15:EB:41:27:73:6D:C4:D1:0D:10:42:98:9C:C6:D7:6A:BE X509v3 Key Usage: critical Digital Signature, Key Encipherment X509v3 Basic Constraints: critical CA:FALSE X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication X509v3 Certificate Policies: Policy: 1.3.6.1.4.1.6449.1.2.2.52 CPS: https://sectigo.com/CPS Policy: 2.23.140.1.2.1 X509v3 CRL Distribution Points: Full Name: URI:http://crl.comodoca.com/cPanelIncCertificationAuthority.crl Authority Information Access: CA Issuers - URI:http://crt.comodoca.com/cPanelIncCertificationAuthority.crt OCSP - URI:http://ocsp.comodoca.com X509v3 Subject Alternative Name: DNS:server.unifish.no, DNS:www.server.unifish.no CT Precertificate SCTs: Signed Certificate Timestamp: Version : v1 (0x0) Log ID : 76:FF:88:3F:0A:B6:FB:95:51:C2:61:CC:F5:87:BA:34: B4:A4:CD:BB:29:DC:68:42:0A:9F:E6:67:4C:5A:3A:74 Timestamp : Nov 9 04:15:38.975 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:20:53:77:18:65:90:62:3D:D6:82:09:29:32: 84:5A:A6:B9:A5:7C:28:E6:54:14:CE:6B:36:CF:84:DD: 32:78:36:80:02:21:00:9E:4C:42:74:5A:97:84:55:93: C5:D0:3F:15:0A:CD:F0:5E:9B:EE:76:B9:FB:2E:7A:D7: 4D:0C:2B:BD:9A:12:9A Signed Certificate Timestamp: Version : v1 (0x0) Log ID : 3F:17:4B:4F:D7:22:47:58:94:1D:65:1C:84:BE:0D:12: ED:90:37:7F:1F:85:6A:EB:C1:BF:28:85:EC:F8:64:6E Timestamp : Nov 9 04:15:39.104 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:21:00:D9:1D:41:8A:2B:2C:8D:D9:E4:0F:F0: 15:FE:B6:A3:25:8F:93:4F:28:C0:15:9D:05:27:B6:62: A3:6F:1E:67:D1:02:20:75:91:6F:B4:EF:FA:8F:EC:87: 8D:BE:6B:D3:DA:8F:92:A3:BD:DE:10:87:44:40:9C:78: B2:D1:56:08:9D:93:6A Signed Certificate Timestamp: Version : v1 (0x0) Log ID : EE:CD:D0:64:D5:DB:1A:CE:C5:5C:B7:9D:B4:CD:13:A2: 32:87:46:7C:BC:EC:DE:C3:51:48:59:46:71:1F:B5:9B Timestamp : Nov 9 04:15:39.072 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:46:02:21:00:F8:D2:BC:37:50:6F:9C:DF:00:21:64: DC:FF:95:08:67:93:19:69:FB:B9:1E:1D:DC:2D:96:04: 23:C8:B7:9F:0C:02:21:00:E5:81:51:C1:4B:0F:F6:73: 62:2E:FA:7B:A2:F9:D3:D5:92:F4:7A:87:6B:2B:04:9A: 5B:9C:3F:77:51:D5:8C:AE Signature Algorithm: sha256WithRSAEncryption Signature Value: 7f:93:cd:97:91:1f:dd:87:64:d1:19:5b:03:68:54:bb:50:e7: ce:cd:67:a6:cb:28:da:9b:cb:b6:75:f1:02:72:c3:d5:9b:99: e6:9a:43:d1:65:90:49:10:3e:6c:71:50:09:6f:b1:08:03:9c: ee:23:0c:c8:95:6b:5c:be:c5:76:27:83:42:66:9d:44:79:92: e0:fd:1e:6d:95:a1:a9:09:5a:5b:83:f1:21:7e:dc:88:90:dd: e9:48:fe:5a:8b:ad:60:d3:8c:6b:0c:d4:55:d8:50:d3:3f:66: e6:79:ab:86:d7:4a:f6:a8:14:01:6e:f0:fb:ee:b1:03:3c:fe: a0:e4:64:62:b4:3e:4b:d4:2d:22:6b:a2:b3:02:52:44:a7:b2: d4:1d:20:8b:3b:66:4c:fe:d3:93:41:a9:90:a3:c7:bb:c6:9d: 3d:da:83:f1:e0:02:df:f2:6a:d8:b8:22:78:17:a4:dd:a7:b1: 52:3f:08:f6:23:d8:d6:fd:09:92:d0:b9:c4:17:c6:bd:81:88: 34:ed:41:cb:0b:1a:14:79:d9:15:d4:36:b6:54:6d:4f:ea:11: 5d:65:34:ef:3d:cb:a7:a2:74:b8:14:b6:2b:72:a5:21:c3:67: ed:e3:03:09:fe:33:a3:0e:a1:ca:de:bd:48:9f:39:54:1b:4f: 7a:c2:78:5b
-144279646 | 2024-04-24T18:45:57.8947072096 / tcp
HTTP/1.1 301 Moved Content-length: 114 Location: https://server.unifish.no:2096 Content-type: text/html; charset="utf-8" Cache-Control: no-cache, no-store, must-revalidate, private Pragma: no-cache
853134009 | 2024-04-22T18:02:13.3844753306 / tcp
MariaDB: Error Message: Host '224.65.54.187' is not allowed to connect to this MariaDB server Error Code: 1130