input stringclasses 35
values | output stringclasses 6
values |
|---|---|
Port 5432/tcp open postgresql PostgreSQL 13.2 | Risk: Unclassified. Review manually. |
Port 3389/tcp open ms-wbt-server Microsoft Terminal Services | Critical. Exposed RDP. Brute force risk. |
Port 23/tcp open telnet Linux telnetd | High. Cleartext protocol. Replace with SSH. |
Port 53/udp open domain BIND 9.16.1 | Risk: Unclassified. Review manually. |
Port 53/udp open domain BIND 9.11.4 | Risk: Unclassified. Review manually. |
Port 23/tcp open telnet Linux telnetd | High. Cleartext protocol. Replace with SSH. |
Port 53/udp open domain BIND 9.16.1 | Risk: Unclassified. Review manually. |
Port 3306/tcp open mysql MySQL 5.5.62 | High. EOL database exposed. |
Port 22/tcp open ssh OpenSSH 7.2p2 | Risk: Unclassified. Review manually. |
Port 443/tcp open https nginx 2.4.52 | Risk: Unclassified. Review manually. |
Port 443/tcp open https Apache 2.4.52 | Risk: Unclassified. Review manually. |
Port 3389/tcp open ms-wbt-server Microsoft Terminal Services | Critical. Exposed RDP. Brute force risk. |
Port 445/tcp open microsoft-ds Windows SMB | High. Potential for EternalBlue. |
Port 80/tcp open http nginx 2.4.41 | Risk: Unclassified. Review manually. |
Port 22/tcp open ssh OpenSSH 7.2p2 | Risk: Unclassified. Review manually. |
Port 5432/tcp open postgresql PostgreSQL 9.6 | Risk: Unclassified. Review manually. |
Port 80/tcp open http Apache 1.18.0 | Risk: Unclassified. Review manually. |
Port 5432/tcp open postgresql PostgreSQL 13.2 | Risk: Unclassified. Review manually. |
Port 3306/tcp open mysql MySQL 5.7.33 | Risk: Unclassified. Review manually. |
Port 25/tcp open smtp Exim 3.4.8 | Risk: Unclassified. Review manually. |
Port 3306/tcp open mysql MySQL 5.7.33 | Risk: Unclassified. Review manually. |
Port 5432/tcp open postgresql PostgreSQL 9.6 | Risk: Unclassified. Review manually. |
Port 3389/tcp open ms-wbt-server Microsoft Terminal Services | Critical. Exposed RDP. Brute force risk. |
Port 443/tcp open https nginx 2.4.52 | Risk: Unclassified. Review manually. |
Port 25/tcp open smtp Exim 4.92 | Risk: Unclassified. Review manually. |
Port 443/tcp open https nginx 2.4.52 | Risk: Unclassified. Review manually. |
Port 3306/tcp open mysql MySQL 5.5.62 | High. EOL database exposed. |
Port 443/tcp open https nginx 2.4.52 | Risk: Unclassified. Review manually. |
Port 80/tcp open http IIS 1.18.0 | Risk: Unclassified. Review manually. |
Port 21/tcp open ftp vsftpd 3.0.3 | Risk: Unclassified. Review manually. |
Port 443/tcp open https nginx 1.21.0 | Risk: Unclassified. Review manually. |
Port 25/tcp open smtp Postfix 4.92 | Risk: Unclassified. Review manually. |
Port 53/udp open domain BIND 9.16.1 | Risk: Unclassified. Review manually. |
Port 23/tcp open telnet Linux telnetd | High. Cleartext protocol. Replace with SSH. |
Port 23/tcp open telnet Linux telnetd | High. Cleartext protocol. Replace with SSH. |
Port 3389/tcp open ms-wbt-server Microsoft Terminal Services | Critical. Exposed RDP. Brute force risk. |
Port 23/tcp open telnet Linux telnetd | High. Cleartext protocol. Replace with SSH. |
Port 5432/tcp open postgresql PostgreSQL 12.3 | Risk: Unclassified. Review manually. |
Port 3389/tcp open ms-wbt-server Microsoft Terminal Services | Critical. Exposed RDP. Brute force risk. |
Port 443/tcp open https Apache 1.21.0 | Risk: Unclassified. Review manually. |
Port 21/tcp open ftp ProFTPD 2.3.4 | Risk: Unclassified. Review manually. |
Port 5432/tcp open postgresql PostgreSQL 9.6 | Risk: Unclassified. Review manually. |
Port 5432/tcp open postgresql PostgreSQL 13.2 | Risk: Unclassified. Review manually. |
Port 445/tcp open microsoft-ds Windows SMB | High. Potential for EternalBlue. |
Port 5432/tcp open postgresql PostgreSQL 12.3 | Risk: Unclassified. Review manually. |
Port 21/tcp open ftp ProFTPD 3.0.3 | Risk: Unclassified. Review manually. |
Port 5432/tcp open postgresql PostgreSQL 13.2 | Risk: Unclassified. Review manually. |
Port 22/tcp open ssh OpenSSH 7.2p2 | Risk: Unclassified. Review manually. |
Port 22/tcp open ssh OpenSSH 8.2p1 | Risk: Unclassified. Review manually. |
Port 80/tcp open http IIS 2.4.41 | Risk: Unclassified. Review manually. |
Port 5432/tcp open postgresql PostgreSQL 13.2 | Risk: Unclassified. Review manually. |
Port 25/tcp open smtp Exim 3.4.8 | Risk: Unclassified. Review manually. |
Port 80/tcp open http Apache 2.4.41 | Risk: Unclassified. Review manually. |
Port 80/tcp open http IIS 2.4.41 | Risk: Unclassified. Review manually. |
Port 443/tcp open https nginx 1.21.0 | Risk: Unclassified. Review manually. |
Port 23/tcp open telnet Linux telnetd | High. Cleartext protocol. Replace with SSH. |
Port 3389/tcp open ms-wbt-server Microsoft Terminal Services | Critical. Exposed RDP. Brute force risk. |
Port 3306/tcp open mysql MySQL 5.7.33 | Risk: Unclassified. Review manually. |
Port 3389/tcp open ms-wbt-server Microsoft Terminal Services | Critical. Exposed RDP. Brute force risk. |
Port 443/tcp open https nginx 1.21.0 | Risk: Unclassified. Review manually. |
Port 5432/tcp open postgresql PostgreSQL 9.6 | Risk: Unclassified. Review manually. |
Port 23/tcp open telnet Linux telnetd | High. Cleartext protocol. Replace with SSH. |
Port 80/tcp open http IIS 1.18.0 | Risk: Unclassified. Review manually. |
Port 5432/tcp open postgresql PostgreSQL 13.2 | Risk: Unclassified. Review manually. |
Port 53/udp open domain BIND 9.16.1 | Risk: Unclassified. Review manually. |
Port 80/tcp open http nginx 1.18.0 | Risk: Unclassified. Review manually. |
Port 23/tcp open telnet Linux telnetd | High. Cleartext protocol. Replace with SSH. |
Port 25/tcp open smtp Postfix 3.4.8 | Risk: Unclassified. Review manually. |
Port 443/tcp open https nginx 2.4.52 | Risk: Unclassified. Review manually. |
Port 53/udp open domain BIND 9.16.1 | Risk: Unclassified. Review manually. |
Port 3389/tcp open ms-wbt-server Microsoft Terminal Services | Critical. Exposed RDP. Brute force risk. |
Port 5432/tcp open postgresql PostgreSQL 13.2 | Risk: Unclassified. Review manually. |
Port 5432/tcp open postgresql PostgreSQL 12.3 | Risk: Unclassified. Review manually. |
Port 53/udp open domain BIND 9.11.4 | Risk: Unclassified. Review manually. |
Port 5432/tcp open postgresql PostgreSQL 9.6 | Risk: Unclassified. Review manually. |
Port 23/tcp open telnet Linux telnetd | High. Cleartext protocol. Replace with SSH. |
Port 25/tcp open smtp Exim 3.4.8 | Risk: Unclassified. Review manually. |
Port 22/tcp open ssh OpenSSH 7.2p2 | Risk: Unclassified. Review manually. |
Port 445/tcp open microsoft-ds Windows SMB | High. Potential for EternalBlue. |
Port 3306/tcp open mysql MySQL 5.5.62 | High. EOL database exposed. |
Port 80/tcp open http IIS 1.18.0 | Risk: Unclassified. Review manually. |
Port 21/tcp open ftp vsftpd 2.3.4 | Critical. Backdoor present. |
Port 445/tcp open microsoft-ds Windows SMB | High. Potential for EternalBlue. |
Port 3389/tcp open ms-wbt-server Microsoft Terminal Services | Critical. Exposed RDP. Brute force risk. |
Port 80/tcp open http IIS 2.4.41 | Risk: Unclassified. Review manually. |
Port 3306/tcp open mysql MySQL 5.7.33 | Risk: Unclassified. Review manually. |
Port 23/tcp open telnet Linux telnetd | High. Cleartext protocol. Replace with SSH. |
Port 21/tcp open ftp ProFTPD 3.0.3 | Risk: Unclassified. Review manually. |
Port 5432/tcp open postgresql PostgreSQL 9.6 | Risk: Unclassified. Review manually. |
Port 3306/tcp open mysql MySQL 5.7.33 | Risk: Unclassified. Review manually. |
Port 3389/tcp open ms-wbt-server Microsoft Terminal Services | Critical. Exposed RDP. Brute force risk. |
Port 22/tcp open ssh OpenSSH 7.2p2 | Risk: Unclassified. Review manually. |
Port 53/udp open domain BIND 9.16.1 | Risk: Unclassified. Review manually. |
Port 80/tcp open http IIS 10.0 | Risk: Unclassified. Review manually. |
Port 53/udp open domain BIND 9.16.1 | Risk: Unclassified. Review manually. |
Port 53/udp open domain BIND 9.16.1 | Risk: Unclassified. Review manually. |
Port 80/tcp open http Apache 1.18.0 | Risk: Unclassified. Review manually. |
Port 22/tcp open ssh OpenSSH 8.2p1 | Risk: Unclassified. Review manually. |
Port 5432/tcp open postgresql PostgreSQL 12.3 | Risk: Unclassified. Review manually. |
Port 3389/tcp open ms-wbt-server Microsoft Terminal Services | Critical. Exposed RDP. Brute force risk. |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 4