785493858 | 2024-06-07T14:13:58.121192
22 /
tcp
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.11
Key type: ssh-rsa
Key: AAAAB3NzaC1yc2EAAAADAQABAAABgQDRK0R+BA8EKDK0Z0d16+QlGPRM+7oEBQXRm3uyaje1ytLl
NqXg/q0K3rXwBWROHDCaLA2HXmRiVHj55FB0XNWUDnxjfZiqCUOgT4HIt1lDVuFTjgFhddk7m4i9
rmQ2dt2fEdZrH3JmjzJ3pPy8ZmhUVhwe0nRdxdJz4L2hy4QCqbO6BrKIP1o4iaMNbLpbA3CmKv9A
9ihMWwNo5F+QF73KCxGXOBvrOuztUkDTbqBnMV8i0jd8lxFTFHdLuZVNQZSlIochebwjZk3rqmit
UYtrHTrHSJS1gPFf21sTBcYjEIRx0YEjU0IZRT5Eh/zqsRnBOwiVQu8lnN+iaRgD8dSFmHVDHyJw
B9HIy7iVN1eKs9/FB4uAZZUjCrGA++1ITNpWmRMLZc5CvYVl50XWl5jbEvqAGQzR3maBq7vYBm9v
Llj3n3Qn4xBA7VQUZJViqLXcuuB20XmYUukGKN+gVW2sKDsa3YShxB7abgwr8N6fBudR/gjqmzaQ
mhqtnkhKiaU=
Fingerprint: b0:5b:4e:05:32:33:8f:bc:b2:8d:45:94:13:84:cd:f5
Kex Algorithms:
curve25519-sha256
curve25519-sha256@libssh.org
ecdh-sha2-nistp256
ecdh-sha2-nistp384
ecdh-sha2-nistp521
diffie-hellman-group-exchange-sha256
diffie-hellman-group16-sha512
diffie-hellman-group18-sha512
diffie-hellman-group14-sha256
kex-strict-s-v00@openssh.com
Server Host Key Algorithms:
rsa-sha2-512
rsa-sha2-256
ssh-rsa
ecdsa-sha2-nistp256
ssh-ed25519
Encryption Algorithms:
chacha20-poly1305@openssh.com
aes128-ctr
aes192-ctr
aes256-ctr
aes128-gcm@openssh.com
aes256-gcm@openssh.com
MAC Algorithms:
umac-64-etm@openssh.com
umac-128-etm@openssh.com
hmac-sha2-256-etm@openssh.com
hmac-sha2-512-etm@openssh.com
hmac-sha1-etm@openssh.com
umac-64@openssh.com
umac-128@openssh.com
hmac-sha2-256
hmac-sha2-512
hmac-sha1
Compression Algorithms:
none
zlib@openssh.com
555228518 | 2024-06-12T18:15:41.462869
80 /
tcp
HTTP/1.1 200 OK
Accept-Ranges: bytes
Content-Length: 18630
Content-Type: text/html; charset=utf-8
Etag: "s5bnz3edi"
Last-Modified: Fri, 08 Dec 2023 00:28:15 GMT
Server: Caddy
Date: Wed, 12 Jun 2024 18:15:41 GMT
-1545777613 | 2024-06-07T00:22:02.097183
6379 /
tcp
-DENIED Redis is running in protected mode because protected mode is enabled and no password is set for the default user. In this mode connections are only accepted from the loopback interface. If you want to connect from external computers to Redis you may adopt one of the following solutions: 1) Just disable protected mode sending the command 'CONFIG SET protected-mode no' from the loopback interface by connecting to Redis from the same host the server is running, however MAKE SURE Redis is not publicly accessible from internet if you do so. Use CONFIG REWRITE to make this change permanent. 2) Alternatively you can just disable the protected mode by editing the Redis configuration file, and setting the protected mode option to 'no', and then restarting the server. 3) If you started the server manually just for testing, restart it with the '--protected-mode no' option. 4) Set up an authentication password for the default user. NOTE: You only need to do one of the above things in order for the server to start accepting connections from the outside.