Dataset Viewer
Auto-converted to Parquet Duplicate
input
stringclasses
35 values
output
stringclasses
6 values
Port 5432/tcp open postgresql PostgreSQL 13.2
Risk: Unclassified. Review manually.
Port 3389/tcp open ms-wbt-server Microsoft Terminal Services
Critical. Exposed RDP. Brute force risk.
Port 23/tcp open telnet Linux telnetd
High. Cleartext protocol. Replace with SSH.
Port 53/udp open domain BIND 9.16.1
Risk: Unclassified. Review manually.
Port 53/udp open domain BIND 9.11.4
Risk: Unclassified. Review manually.
Port 23/tcp open telnet Linux telnetd
High. Cleartext protocol. Replace with SSH.
Port 53/udp open domain BIND 9.16.1
Risk: Unclassified. Review manually.
Port 3306/tcp open mysql MySQL 5.5.62
High. EOL database exposed.
Port 22/tcp open ssh OpenSSH 7.2p2
Risk: Unclassified. Review manually.
Port 443/tcp open https nginx 2.4.52
Risk: Unclassified. Review manually.
Port 443/tcp open https Apache 2.4.52
Risk: Unclassified. Review manually.
Port 3389/tcp open ms-wbt-server Microsoft Terminal Services
Critical. Exposed RDP. Brute force risk.
Port 445/tcp open microsoft-ds Windows SMB
High. Potential for EternalBlue.
Port 80/tcp open http nginx 2.4.41
Risk: Unclassified. Review manually.
Port 22/tcp open ssh OpenSSH 7.2p2
Risk: Unclassified. Review manually.
Port 5432/tcp open postgresql PostgreSQL 9.6
Risk: Unclassified. Review manually.
Port 80/tcp open http Apache 1.18.0
Risk: Unclassified. Review manually.
Port 5432/tcp open postgresql PostgreSQL 13.2
Risk: Unclassified. Review manually.
Port 3306/tcp open mysql MySQL 5.7.33
Risk: Unclassified. Review manually.
Port 25/tcp open smtp Exim 3.4.8
Risk: Unclassified. Review manually.
Port 3306/tcp open mysql MySQL 5.7.33
Risk: Unclassified. Review manually.
Port 5432/tcp open postgresql PostgreSQL 9.6
Risk: Unclassified. Review manually.
Port 3389/tcp open ms-wbt-server Microsoft Terminal Services
Critical. Exposed RDP. Brute force risk.
Port 443/tcp open https nginx 2.4.52
Risk: Unclassified. Review manually.
Port 25/tcp open smtp Exim 4.92
Risk: Unclassified. Review manually.
Port 443/tcp open https nginx 2.4.52
Risk: Unclassified. Review manually.
Port 3306/tcp open mysql MySQL 5.5.62
High. EOL database exposed.
Port 443/tcp open https nginx 2.4.52
Risk: Unclassified. Review manually.
Port 80/tcp open http IIS 1.18.0
Risk: Unclassified. Review manually.
Port 21/tcp open ftp vsftpd 3.0.3
Risk: Unclassified. Review manually.
Port 443/tcp open https nginx 1.21.0
Risk: Unclassified. Review manually.
Port 25/tcp open smtp Postfix 4.92
Risk: Unclassified. Review manually.
Port 53/udp open domain BIND 9.16.1
Risk: Unclassified. Review manually.
Port 23/tcp open telnet Linux telnetd
High. Cleartext protocol. Replace with SSH.
Port 23/tcp open telnet Linux telnetd
High. Cleartext protocol. Replace with SSH.
Port 3389/tcp open ms-wbt-server Microsoft Terminal Services
Critical. Exposed RDP. Brute force risk.
Port 23/tcp open telnet Linux telnetd
High. Cleartext protocol. Replace with SSH.
Port 5432/tcp open postgresql PostgreSQL 12.3
Risk: Unclassified. Review manually.
Port 3389/tcp open ms-wbt-server Microsoft Terminal Services
Critical. Exposed RDP. Brute force risk.
Port 443/tcp open https Apache 1.21.0
Risk: Unclassified. Review manually.
Port 21/tcp open ftp ProFTPD 2.3.4
Risk: Unclassified. Review manually.
Port 5432/tcp open postgresql PostgreSQL 9.6
Risk: Unclassified. Review manually.
Port 5432/tcp open postgresql PostgreSQL 13.2
Risk: Unclassified. Review manually.
Port 445/tcp open microsoft-ds Windows SMB
High. Potential for EternalBlue.
Port 5432/tcp open postgresql PostgreSQL 12.3
Risk: Unclassified. Review manually.
Port 21/tcp open ftp ProFTPD 3.0.3
Risk: Unclassified. Review manually.
Port 5432/tcp open postgresql PostgreSQL 13.2
Risk: Unclassified. Review manually.
Port 22/tcp open ssh OpenSSH 7.2p2
Risk: Unclassified. Review manually.
Port 22/tcp open ssh OpenSSH 8.2p1
Risk: Unclassified. Review manually.
Port 80/tcp open http IIS 2.4.41
Risk: Unclassified. Review manually.
Port 5432/tcp open postgresql PostgreSQL 13.2
Risk: Unclassified. Review manually.
Port 25/tcp open smtp Exim 3.4.8
Risk: Unclassified. Review manually.
Port 80/tcp open http Apache 2.4.41
Risk: Unclassified. Review manually.
Port 80/tcp open http IIS 2.4.41
Risk: Unclassified. Review manually.
Port 443/tcp open https nginx 1.21.0
Risk: Unclassified. Review manually.
Port 23/tcp open telnet Linux telnetd
High. Cleartext protocol. Replace with SSH.
Port 3389/tcp open ms-wbt-server Microsoft Terminal Services
Critical. Exposed RDP. Brute force risk.
Port 3306/tcp open mysql MySQL 5.7.33
Risk: Unclassified. Review manually.
Port 3389/tcp open ms-wbt-server Microsoft Terminal Services
Critical. Exposed RDP. Brute force risk.
Port 443/tcp open https nginx 1.21.0
Risk: Unclassified. Review manually.
Port 5432/tcp open postgresql PostgreSQL 9.6
Risk: Unclassified. Review manually.
Port 23/tcp open telnet Linux telnetd
High. Cleartext protocol. Replace with SSH.
Port 80/tcp open http IIS 1.18.0
Risk: Unclassified. Review manually.
Port 5432/tcp open postgresql PostgreSQL 13.2
Risk: Unclassified. Review manually.
Port 53/udp open domain BIND 9.16.1
Risk: Unclassified. Review manually.
Port 80/tcp open http nginx 1.18.0
Risk: Unclassified. Review manually.
Port 23/tcp open telnet Linux telnetd
High. Cleartext protocol. Replace with SSH.
Port 25/tcp open smtp Postfix 3.4.8
Risk: Unclassified. Review manually.
Port 443/tcp open https nginx 2.4.52
Risk: Unclassified. Review manually.
Port 53/udp open domain BIND 9.16.1
Risk: Unclassified. Review manually.
Port 3389/tcp open ms-wbt-server Microsoft Terminal Services
Critical. Exposed RDP. Brute force risk.
Port 5432/tcp open postgresql PostgreSQL 13.2
Risk: Unclassified. Review manually.
Port 5432/tcp open postgresql PostgreSQL 12.3
Risk: Unclassified. Review manually.
Port 53/udp open domain BIND 9.11.4
Risk: Unclassified. Review manually.
Port 5432/tcp open postgresql PostgreSQL 9.6
Risk: Unclassified. Review manually.
Port 23/tcp open telnet Linux telnetd
High. Cleartext protocol. Replace with SSH.
Port 25/tcp open smtp Exim 3.4.8
Risk: Unclassified. Review manually.
Port 22/tcp open ssh OpenSSH 7.2p2
Risk: Unclassified. Review manually.
Port 445/tcp open microsoft-ds Windows SMB
High. Potential for EternalBlue.
Port 3306/tcp open mysql MySQL 5.5.62
High. EOL database exposed.
Port 80/tcp open http IIS 1.18.0
Risk: Unclassified. Review manually.
Port 21/tcp open ftp vsftpd 2.3.4
Critical. Backdoor present.
Port 445/tcp open microsoft-ds Windows SMB
High. Potential for EternalBlue.
Port 3389/tcp open ms-wbt-server Microsoft Terminal Services
Critical. Exposed RDP. Brute force risk.
Port 80/tcp open http IIS 2.4.41
Risk: Unclassified. Review manually.
Port 3306/tcp open mysql MySQL 5.7.33
Risk: Unclassified. Review manually.
Port 23/tcp open telnet Linux telnetd
High. Cleartext protocol. Replace with SSH.
Port 21/tcp open ftp ProFTPD 3.0.3
Risk: Unclassified. Review manually.
Port 5432/tcp open postgresql PostgreSQL 9.6
Risk: Unclassified. Review manually.
Port 3306/tcp open mysql MySQL 5.7.33
Risk: Unclassified. Review manually.
Port 3389/tcp open ms-wbt-server Microsoft Terminal Services
Critical. Exposed RDP. Brute force risk.
Port 22/tcp open ssh OpenSSH 7.2p2
Risk: Unclassified. Review manually.
Port 53/udp open domain BIND 9.16.1
Risk: Unclassified. Review manually.
Port 80/tcp open http IIS 10.0
Risk: Unclassified. Review manually.
Port 53/udp open domain BIND 9.16.1
Risk: Unclassified. Review manually.
Port 53/udp open domain BIND 9.16.1
Risk: Unclassified. Review manually.
Port 80/tcp open http Apache 1.18.0
Risk: Unclassified. Review manually.
Port 22/tcp open ssh OpenSSH 8.2p1
Risk: Unclassified. Review manually.
Port 5432/tcp open postgresql PostgreSQL 12.3
Risk: Unclassified. Review manually.
Port 3389/tcp open ms-wbt-server Microsoft Terminal Services
Critical. Exposed RDP. Brute force risk.
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
4