39.106.22.44
Geolocation
| Network | 39.104.0.0/14 |
| Postal Code | N/A |
| City | Beijing |
| Country | China (CN) |
| Continent | Asia |
| Locale Code | en |
| Geo Point | 39.911, 116.395 |
| Updated At | 15 Jan 2026, 00:36:22 UTC |
Whois
| Network | 39.104.0.0/14 |
| Organization | Hangzhou Alibaba Advertising Co.,Ltd. |
| Desc | Hangzhou Alibaba Advertising Co.,Ltd. |
| Updated At | 09 Dec 2024, 11:26:59 UTC |
Geolocation
| Network | 39.104.0.0/14 |
| Postal Code | N/A |
| City | Beijing |
| Country | China (CN) |
| Continent | Asia |
| Locale Code | en |
| Geo Point | 39.911, 116.395 |
| Updated At | 15 Jan 2026, 00:36:22 UTC |
Whois
| Network | 39.104.0.0/14 |
| Organization | Hangzhou Alibaba Advertising Co.,Ltd. |
| Desc | Hangzhou Alibaba Advertising Co.,Ltd. |
| Updated At | 09 Dec 2024, 11:26:59 UTC |
| Product | Pure-FTPd |
| Version | N/A |
| Extra Info | N/A |
{
"banner": "220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\r\n220-You are user number 1 of 50 allowed.\r\n220-Local time is now 16:09. Server port: 21.\r\n220-This is a private system - No anonymous login\r\n220 You will be disconnected after 15 minutes of inactivity.\r\n"
}| Product | OpenSSH |
| Version | 5.3 |
| Extra Info | protocol 2.0 |
| CVEs | CVE-2007-2768CVE-2008-3844CVE-2010-4478CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795 |
{
"banner": "SSH-2.0-OpenSSH_5.3",
"client_to_server_ciphers": [
"aes128-ctr",
"aes192-ctr",
"aes256-ctr",
"arcfour256",
"arcfour128",
"aes128-cbc",
"3des-cbc",
"blowfish-cbc",
"cast128-cbc",
"aes192-cbc",
"aes256-cbc",
"arcfour",
"[email protected]"
],
"client_to_server_compression": [
"none",
"[email protected]"
],
"client_to_server_macs": [
"hmac-md5",
"hmac-sha1",
"[email protected]",
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-ripemd160",
"[email protected]",
"hmac-sha1-96",
"hmac-md5-96"
],
"host_key_algorithms": [
"ssh-rsa",
"ssh-dss"
],
"kex_algorithms": [
"diffie-hellman-group-exchange-sha256",
"diffie-hellman-group-exchange-sha1",
"diffie-hellman-group14-sha1",
"diffie-hellman-group1-sha1"
],
"key": {
"algorithm": "ssh-rsa",
"fingerprint_sha256": "ccaec5ac4c2d223797b52b3083d7161fac59be568d9e2eb094b65a8b77996f37",
"raw": "AAAAB3NzaC1yc2EAAAABIwAAAQEAoeY+FfEKUOIvUHaLNpeHvhZEtdjuxK3e2QREFQYTxAuYL72GPd6/T9nOStrxOo0SIn8KdBLVBB/uB99DB/LPBvrKLT9ga8O7nZho7R1SeCr/v/O1JjrqGz80MCyIwBOZelT9ZZKlMdYKbH2z0/cUOwQL1PNN9PFY8CT8xzlhXU2ZviPc5bVKJUixtyq6urAR/c2zP3Jrn2dPJKxi41LA3QVNz+t0JtLbfkGBUGJ/veMCSUkOsU1bnJPqKkxHzBc0tW88UbSW/Gacc1xkd3ForjcrwhS1/F8uXRNQIEJnQoNPzODLPmuhGPhvDO+Fb2XEQlNoYmPB5W4DwodELybDjw=="
},
"server_to_client_ciphers": [
"aes128-ctr",
"aes192-ctr",
"aes256-ctr",
"arcfour256",
"arcfour128",
"aes128-cbc",
"3des-cbc",
"blowfish-cbc",
"cast128-cbc",
"aes192-cbc",
"aes256-cbc",
"arcfour",
"[email protected]"
],
"server_to_client_compression": [
"none",
"[email protected]"
],
"server_to_client_macs": [
"hmac-md5",
"hmac-sha1",
"[email protected]",
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-ripemd160",
"[email protected]",
"hmac-sha1-96",
"hmac-md5-96"
],
"software": "OpenSSH_5.3",
"version": "2.0"
}| Product | Exim smtpd |
| Version | 4.89 |
| Extra Info | N/A |
| CVEs | CVE-2017-1000369CVE-2017-16943CVE-2017-16944CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795 |
| Fingerprint | |
| MD5 | 66E094A2E30975283646A9BFECB52B41 |
| SHA1 | DF35BDC0DA7E739333A2C84B39DDCFB77F580241 |
| SHA256 | 85B11ED30C5367827EECC39E70B57855BFE697D9971D512001F12A1B48998593 |
| JARM | 00000000000000000000000000000000000000000000000000000000000000 |
{
"banner": "220 iZ2zeg1aoiz084tmjv181kZ ESMTP Exim 4.89 Fri, 16 Jan 2026 14:57:42 +0800\r\n"
}| Product | Apache httpd |
| Version | N/A |
| Extra Info | N/A |
| CVEs | CVE-1999-0070CVE-1999-1199CVE-2023-25690CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795 |
| Status Code | 403 |
| Title | 403 Forbidden |
| Body SHA256 | a2410f851736ea2f72213e4d0087719281bd88984ad8fd0fdf8b11de36a2db50 |
| Component | Apache HTTP Server |
| Response Headers | |
| content type | text/html; charset=iso-8859-1 |
| date | Mon, 12 Jan 2026 12:49:26 GMT |
| server | Apache |
| vary | Accept-Encoding |
{
"body": "<!DOCTYPE HTML PUBLIC \"-//IETF//DTD HTML 2.0//EN\">\n<html><head>\n<title>403 Forbidden</title>\n</head><body>\n<h1>Forbidden</h1>\n<p>You don't have permission to access /\non this server.</p>\n<hr>\n<address>Apache Server at 39.106.22.44 Port 80</address>\n</body></html>\n",
"body_murmur": -732527885,
"body_sha256": "a2410f851736ea2f72213e4d0087719281bd88984ad8fd0fdf8b11de36a2db50",
"component": [
"Apache HTTP Server"
],
"content_length": -1,
"headers": {
"content_type": [
"text/html; charset=iso-8859-1"
],
"date": [
"Mon, 12 Jan 2026 12:49:26 GMT"
],
"server": [
"Apache"
],
"vary": [
"Accept-Encoding"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "39.106.22.44",
"path": "",
"scheme": "http"
}
},
"status_code": 403,
"title": "403 Forbidden"
}| Product | Exim smtpd |
| Version | 4.89 |
| Extra Info | N/A |
| CVEs | CVE-2017-1000369CVE-2017-16943CVE-2017-16944CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795 |
| Product | Exim smtpd |
| Version | 4.89 |
| Extra Info | N/A |
| CVEs | CVE-2017-1000369CVE-2017-16943CVE-2017-16944CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795 |
| Fingerprint | |
| MD5 | 66E094A2E30975283646A9BFECB52B41 |
| SHA1 | DF35BDC0DA7E739333A2C84B39DDCFB77F580241 |
| SHA256 | 85B11ED30C5367827EECC39E70B57855BFE697D9971D512001F12A1B48998593 |
| JARM | 00000000000000000000000000000000000000000000000000000000000000 |
{
"banner": "220 iZ2zeg1aoiz084tmjv181kZ ESMTP Exim 4.89 Wed, 14 Jan 2026 20:21:02 +0800\r\n"
}| Product | MySQL |
| Version | N/A |
| Extra Info | unauthorized |