45.141.76.88

Regular View Raw Data
Last Seen: 2024-04-12

GeneralInformation

Hostnames boklenaliy.beget.app
www.boklenaliy.beget.app
Domains beget.app 
Country Russian Federation
City Saint Petersburg
Organization Beget LLC
ISP Beget LLC
ASN AS198610

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-44487 7.5The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CVE-2021-3618 7.4ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
CVE-2021-23017 7.7A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.

OpenPorts

677579724 | 2024-04-11T21:46:28.759818
  
80 / tcp
-783928379 | 2024-04-08T11:45:58.287175
  
443 / tcp
2131906928 | 2024-04-08T08:19:02.194092
  
3306 / tcp
-795948505 | 2024-04-12T20:23:57.728251
  
33060 / tcp



Contact Us

Shodan ® - All rights reserved