Odin HomeODIN logoODIN logo

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2026 Cyble Inc. All Rights Reserved.

39.106.22.44

SummaryCVE DetailsRaw Data

Geolocation

Network
39.104.0.0/14
Postal CodeN/A
City
Beijing
Country
China (CN)
Continent
Asia
Locale Code
en
Geo Point
39.911, 116.395
Updated At
15 Jan 2026, 00:36:22 UTC

Whois

Network
39.104.0.0/14
Organization
Hangzhou Alibaba Advertising Co.,Ltd.
Desc
Hangzhou Alibaba Advertising Co.,Ltd.
Updated At
09 Dec 2024, 11:26:59 UTC

Geolocation

Network
39.104.0.0/14
Postal CodeN/A
City
Beijing
Country
China (CN)
Continent
Asia
Locale Code
en
Geo Point
39.911, 116.395
Updated At
15 Jan 2026, 00:36:22 UTC

Whois

Network
39.104.0.0/14
Organization
Hangzhou Alibaba Advertising Co.,Ltd.
Desc
Hangzhou Alibaba Advertising Co.,Ltd.
Updated At
09 Dec 2024, 11:26:59 UTC
16 Jan 2026, 06:57:42 UTC

21/ftpTCPLast Updated At: 14 Jan 2026, 08:09:40 UTC

About Service
Product
Pure-FTPd
VersionN/A
Extra InfoN/A
Softwares
Vendor
pureftpd
Product
pure\-ftpd
URI
cpe:/a:pureftpd:pure-ftpd
//ftp

//ftp

{
  "banner": "220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------\r\n220-You are user number 1 of 50 allowed.\r\n220-Local time is now 16:09. Server port: 21.\r\n220-This is a private system - No anonymous login\r\n220 You will be disconnected after 15 minutes of inactivity.\r\n"
}

22/sshTCPLast Updated At: 14 Jan 2026, 15:30:58 UTC

About Service
Product
OpenSSH
Version
5.3
Extra Info
protocol 2.0
CVEsCVE-2007-2768CVE-2008-3844CVE-2010-4478CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795
Login
Softwares
Vendor
openbsd
Product
openssh
URI
cpe:/a:openbsd:openssh:5.3
//ssh

//ssh

{
  "banner": "SSH-2.0-OpenSSH_5.3",
  "client_to_server_ciphers": [
    "aes128-ctr",
    "aes192-ctr",
    "aes256-ctr",
    "arcfour256",
    "arcfour128",
    "aes128-cbc",
    "3des-cbc",
    "blowfish-cbc",
    "cast128-cbc",
    "aes192-cbc",
    "aes256-cbc",
    "arcfour",
    "[email protected]"
  ],
  "client_to_server_compression": [
    "none",
    "[email protected]"
  ],
  "client_to_server_macs": [
    "hmac-md5",
    "hmac-sha1",
    "[email protected]",
    "hmac-sha2-256",
    "hmac-sha2-512",
    "hmac-ripemd160",
    "[email protected]",
    "hmac-sha1-96",
    "hmac-md5-96"
  ],
  "host_key_algorithms": [
    "ssh-rsa",
    "ssh-dss"
  ],
  "kex_algorithms": [
    "diffie-hellman-group-exchange-sha256",
    "diffie-hellman-group-exchange-sha1",
    "diffie-hellman-group14-sha1",
    "diffie-hellman-group1-sha1"
  ],
  "key": {
    "algorithm": "ssh-rsa",
    "fingerprint_sha256": "ccaec5ac4c2d223797b52b3083d7161fac59be568d9e2eb094b65a8b77996f37",
    "raw": "AAAAB3NzaC1yc2EAAAABIwAAAQEAoeY+FfEKUOIvUHaLNpeHvhZEtdjuxK3e2QREFQYTxAuYL72GPd6/T9nOStrxOo0SIn8KdBLVBB/uB99DB/LPBvrKLT9ga8O7nZho7R1SeCr/v/O1JjrqGz80MCyIwBOZelT9ZZKlMdYKbH2z0/cUOwQL1PNN9PFY8CT8xzlhXU2ZviPc5bVKJUixtyq6urAR/c2zP3Jrn2dPJKxi41LA3QVNz+t0JtLbfkGBUGJ/veMCSUkOsU1bnJPqKkxHzBc0tW88UbSW/Gacc1xkd3ForjcrwhS1/F8uXRNQIEJnQoNPzODLPmuhGPhvDO+Fb2XEQlNoYmPB5W4DwodELybDjw=="
  },
  "server_to_client_ciphers": [
    "aes128-ctr",
    "aes192-ctr",
    "aes256-ctr",
    "arcfour256",
    "arcfour128",
    "aes128-cbc",
    "3des-cbc",
    "blowfish-cbc",
    "cast128-cbc",
    "aes192-cbc",
    "aes256-cbc",
    "arcfour",
    "[email protected]"
  ],
  "server_to_client_compression": [
    "none",
    "[email protected]"
  ],
  "server_to_client_macs": [
    "hmac-md5",
    "hmac-sha1",
    "[email protected]",
    "hmac-sha2-256",
    "hmac-sha2-512",
    "hmac-ripemd160",
    "[email protected]",
    "hmac-sha1-96",
    "hmac-md5-96"
  ],
  "software": "OpenSSH_5.3",
  "version": "2.0"
}

25/smtpTCPLast Updated At: 16 Jan 2026, 06:57:42 UTC

About Service
Product
Exim smtpd
Version
4.89
Extra InfoN/A
CVEsCVE-2017-1000369CVE-2017-16943CVE-2017-16944CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795
Login
Softwares
Vendor
exim
Product
exim
URI
cpe:/a:exim:exim:4.89
TLS
Serial Number
10599766569360513357
Validity From
01 Nov 2017, 09:13:04
Validity To
01 Nov 2018, 09:13:04
Subject AN
iZ2zeg1aoiz084tmjv181kZ
Subject CN
iZ2zeg1aoiz084tmjv181kZ
Subject Org
SomeOrganization
Issuer CN
iZ2zeg1aoiz084tmjv181kZ
Issuer Org
SomeOrganization
Fingerprint
MD5
66E094A2E30975283646A9BFECB52B41
SHA1
DF35BDC0DA7E739333A2C84B39DDCFB77F580241
SHA256
85B11ED30C5367827EECC39E70B57855BFE697D9971D512001F12A1B48998593
JARM
00000000000000000000000000000000000000000000000000000000000000
//smtp

//smtp

{
  "banner": "220 iZ2zeg1aoiz084tmjv181kZ ESMTP Exim 4.89 Fri, 16 Jan 2026 14:57:42 +0800\r\n"
}

80/httpTCPLast Updated At: 12 Jan 2026, 12:49:27 UTC

About Service
Product
Apache httpd
VersionN/A
Extra InfoN/A
CVEsCVE-1999-0070CVE-1999-1199CVE-2023-25690CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795
Login
Softwares
Vendor
apache
Product
http_server
URI
cpe:/a:apache:http_server
HTTP
Status Code
403
Title
403 Forbidden
Body SHA256
a2410f851736ea2f72213e4d0087719281bd88984ad8fd0fdf8b11de36a2db50
Component
Apache HTTP Server
Response Headers
content type
text/html; charset=iso-8859-1
date
Mon, 12 Jan 2026 12:49:26 GMT
server
Apache
vary
Accept-Encoding
//http

//http

{
  "body": "<!DOCTYPE HTML PUBLIC \"-//IETF//DTD HTML 2.0//EN\">\n<html><head>\n<title>403 Forbidden</title>\n</head><body>\n<h1>Forbidden</h1>\n<p>You don't have permission to access /\non this server.</p>\n<hr>\n<address>Apache Server at 39.106.22.44 Port 80</address>\n</body></html>\n",
  "body_murmur": -732527885,
  "body_sha256": "a2410f851736ea2f72213e4d0087719281bd88984ad8fd0fdf8b11de36a2db50",
  "component": [
    "Apache HTTP Server"
  ],
  "content_length": -1,
  "headers": {
    "content_type": [
      "text/html; charset=iso-8859-1"
    ],
    "date": [
      "Mon, 12 Jan 2026 12:49:26 GMT"
    ],
    "server": [
      "Apache"
    ],
    "vary": [
      "Accept-Encoding"
    ]
  },
  "protocol": "HTTP/1.1",
  "request": {
    "headers": {
      "accept": [
        "*/*"
      ],
      "user_agent": [
        "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
      ]
    },
    "method": "GET",
    "url": {
      "host": "39.106.22.44",
      "path": "",
      "scheme": "http"
    }
  },
  "status_code": 403,
  "title": "403 Forbidden"
}

465/smtpTCPLast Updated At: 13 Jan 2026, 11:47:02 UTC

About Service
Product
Exim smtpd
Version
4.89
Extra InfoN/A
CVEsCVE-2017-1000369CVE-2017-16943CVE-2017-16944CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795
Login
Softwares
Vendor
exim
Product
exim
URI
cpe:/a:exim:exim:4.89

587/smtpTCPLast Updated At: 14 Jan 2026, 12:41:35 UTC

About Service
Product
Exim smtpd
Version
4.89
Extra InfoN/A
CVEsCVE-2017-1000369CVE-2017-16943CVE-2017-16944CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795
Login
Softwares
Vendor
exim
Product
exim
URI
cpe:/a:exim:exim:4.89
TLS
Serial Number
10599766569360513357
Validity From
01 Nov 2017, 09:13:04
Validity To
01 Nov 2018, 09:13:04
Subject AN
iZ2zeg1aoiz084tmjv181kZ
Subject CN
iZ2zeg1aoiz084tmjv181kZ
Subject Org
SomeOrganization
Issuer CN
iZ2zeg1aoiz084tmjv181kZ
Issuer Org
SomeOrganization
Fingerprint
MD5
66E094A2E30975283646A9BFECB52B41
SHA1
DF35BDC0DA7E739333A2C84B39DDCFB77F580241
SHA256
85B11ED30C5367827EECC39E70B57855BFE697D9971D512001F12A1B48998593
JARM
00000000000000000000000000000000000000000000000000000000000000
//smtp

//smtp

{
  "banner": "220 iZ2zeg1aoiz084tmjv181kZ ESMTP Exim 4.89 Wed, 14 Jan 2026 20:21:02 +0800\r\n"
}

3306/mysqlTCPLast Updated At: 16 Jan 2026, 01:43:42 UTC

About Service
Product
MySQL
VersionN/A
Extra Info
unauthorized
Softwares
Vendor
mysql
Product
mysql
URI
cpe:/a:mysql:mysql