188.165.246.77

Regular View Raw Data
Last Seen: 2024-04-29
Tags:
starttlsvpn

GeneralInformation

Hostnames gametdb.com
art.gametdb.com
mail.gametdb.com
smtp.gametdb.com
www.gametdb.com
lustark.com
mail.lustark.com
smtp.lustark.com
www.lustark.com
orilum.com
ftp.orilum.com
mail.orilum.com
smtp.orilum.com
www.orilum.com
trebbi.fr
mail.trebbi.fr
smtp.trebbi.fr
www.trebbi.fr
vertrixgame.com
mail.vertrixgame.com
smtp.vertrixgame.com
www.vertrixgame.com
Domains gametdb.com lustark.com orilum.com trebbi.fr vertrixgame.com 
Country France
City Lille
Organization OVH SAS
ISP OVH SAS
ASN AS16276

Vulnerabilities

CVE-2015-4000 4.3The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.
CVE-2015-0204 4.3The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.
-737516092 | 2024-04-23T09:21:05.456628
  
25 / tcp
1481690068 | 2024-04-29T11:43:42.319495
  
53 / tcp
1481690068 | 2024-04-12T23:48:47.404673
  
53 / udp
-880430794 | 2024-04-23T11:04:04.018004
  
110 / tcp
-120512089 | 2024-04-02T16:30:10.228782
  
143 / tcp
-744195776 | 2024-04-29T11:38:33.689495
  
443 / tcp
100200016 | 2024-04-03T10:56:00.868725
  
587 / tcp
864759704 | 2024-04-18T16:56:15.936085
  
993 / tcp
261189147 | 2024-04-25T02:48:42.576381
  
1723 / tcp



Contact Us

Shodan ® - All rights reserved