39.106.8.95
{
"scan_id": 1749333393,
"ip": "39.106.8.95",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "39.104.0.0/14",
"postal_code": "",
"coordinates": {
"latitude": "39.911",
"longitude": "116.395"
},
"geo_point": "39.911, 116.395",
"locale_code": "en",
"continent": "Asia",
"country_code": "CN",
"country_name": "China",
"city": "Beijing"
},
"location_updated_at": "2025-06-08T18:16:29Z",
"asn": {
"number": "AS37963",
"organization": "Hangzhou Alibaba Advertising Co.,Ltd.",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "39.104.0.0/14",
"organization": "Hangzhou Alibaba Advertising Co.,Ltd.",
"descr": "Hangzhou Alibaba Advertising Co.,Ltd.",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T11:26:59Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-06-08T18:16:29Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-06-08T22:40:18Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-06-08T18:16:29Z"
}
],
"services": [
{
"port": 22,
"protocol": "tcp",
"name": "ssh",
"version": "9.6p1 Ubuntu 3ubuntu13.11",
"product": "OpenSSH",
"extra_info": "Ubuntu Linux; protocol 2.0",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:openbsd:openssh:9.6p1",
"part": "a",
"vendor": "openbsd",
"product": "openssh",
"version": "9\\.6p1",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:linux:linux_kernel",
"part": "o",
"vendor": "linux",
"product": "linux_kernel",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"ssh": {
"banner": "SSH-2.0-OpenSSH_9.6p1 Ubuntu-3ubuntu13.11",
"client_to_server_ciphers": [
"[email protected]",
"aes128-ctr",
"aes192-ctr",
"aes256-ctr",
"[email protected]",
"[email protected]"
],
"client_to_server_compression": [
"none",
"[email protected]"
],
"client_to_server_macs": [
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-sha1"
],
"host_key_algorithms": [
"rsa-sha2-512",
"rsa-sha2-256",
"ecdsa-sha2-nistp256",
"ssh-ed25519"
],
"kex_algorithms": [
"[email protected]",
"curve25519-sha256",
"[email protected]",
"ecdh-sha2-nistp256",
"ecdh-sha2-nistp384",
"ecdh-sha2-nistp521",
"diffie-hellman-group-exchange-sha256",
"diffie-hellman-group16-sha512",
"diffie-hellman-group18-sha512",
"diffie-hellman-group14-sha256",
"ext-info-s",
"[email protected]"
],
"key": {
"algorithm": "ecdsa-sha2-nistp256",
"fingerprint_sha256": "319cfb8394ecc2744635e7cd5cc010732fba1c857d810cb3eb69d5a4a297e29a",
"raw": "AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBF8RERHNUDNc6pvP9lBJeF2Jy9ezWsomOuDXmopNEwqZV3i+IZ3MCD3ic9MvAaTzuUj1H6n3DRG/b7hIjMks/FQ="
},
"server_to_client_ciphers": [
"[email protected]",
"aes128-ctr",
"aes192-ctr",
"aes256-ctr",
"[email protected]",
"[email protected]"
],
"server_to_client_compression": [
"none",
"[email protected]"
],
"server_to_client_macs": [
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-sha1"
],
"software": "OpenSSH_9.6p1",
"version": "2.0"
}
},
"cve": [
{
"id": "CVE-2007-2768",
"score": 4.3,
"severity": "medium"
},
{
"id": "CVE-2008-3844",
"score": 9.3,
"severity": "high"
},
{
"id": "CVE-2023-51767",
"score": 7,
"severity": "high"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-06-04T13:45:16.963Z"
},
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "1.21.5",
"product": "nginx",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:igor_sysoev:nginx:1.21.5",
"part": "a",
"vendor": "igor_sysoev",
"product": "nginx",
"version": "1\\.21\\.5",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n<title>Welcome to nginx!</title>\n<style>\nhtml { color-scheme: light dark; }\nbody { width: 35em; margin: 0 auto;\nfont-family: Tahoma, Verdana, Arial, sans-serif; }\n</style>\n</head>\n<body>\n<h1>Welcome to nginx!</h1>\n<p>If you see this page, the nginx web server is successfully installed and\nworking. Further configuration is required.</p>\n\n<p>For online documentation and support please refer to\n<a href=\"http://nginx.org/\">nginx.org</a>.<br/>\nCommercial support is available at\n<a href=\"http://nginx.com/\">nginx.com</a>.</p>\n\n<p><em>Thank you for using nginx.</em></p>\n</body>\n</html>\n",
"body_murmur": 1637199859,
"body_sha256": "fb47468a2cd3953c7131431991afcc6a2703f14640520102eea0a685a7e8d6de",
"component": [
"Nginx:1.21.5"
],
"content_length": 615,
"headers": {
"accept_ranges": [
"bytes"
],
"connection": [
"keep-alive"
],
"content_length": [
"615"
],
"content_type": [
"text/html"
],
"date": [
"Mon, 09 Jun 2025 13:41:08 GMT"
],
"etag": [
"\"61cb2d26-267\""
],
"last_modified": [
"Tue, 28 Dec 2021 15:28:38 GMT"
],
"server": [
"nginx/1.21.5"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "39.106.8.95",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Welcome to nginx!"
}
},
"url": "http://39.106.8.95/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-06-09T13:41:12.424Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "1.21.5",
"product": "nginx",
"extra_info": "",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:igor_sysoev:nginx:1.21.5",
"part": "a",
"vendor": "igor_sysoev",
"product": "nginx",
"version": "1\\.21\\.5",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n <head>\n <meta charset=\"UTF-8\">\n <meta name=\"viewport\" content=\"width=device-width, initial-scale=1\">\n <title>MinIO Browser</title>\n\n <link rel=\"icon\" type=\"image/png\" sizes=\"32x32\" href=\"/minio/favicon-32x32.png\">\n <link rel=\"icon\" type=\"image/png\" sizes=\"96x96\" href=\"/minio/favicon-96x96.png\">\n <link rel=\"icon\" type=\"image/png\" sizes=\"16x16\" href=\"/minio/favicon-16x16.png\">\n\n <link rel=\"stylesheet\" href=\"/minio/loader.css\" type=\"text/css\">\n </head>\n\n <body>\n <div class=\"page-load\">\n <div class=\"pl-inner\">\n <img src=\"/minio/logo.svg\" alt=\"\">\n </div>\n </div>\n <div id=\"root\"></div>\n\n <!--[if lt IE 11]>\n <div class=\"ie-warning\">\n <div class=\"iw-inner\">\n <i class=\"iwi-icon fas fa-exclamation-triangle\"></i>\n\n You are using Internet Explorer version 12.0 or lower. Due to security issues and lack of support for Web Standards it is highly recommended that you upgrade to a modern browser\n\n <ul>\n <li>\n <a href=\"http://www.google.com/chrome/\">\n <img src=\"chrome.png\" alt=\"\">\n <div>Chrome</div>\n </a>\n </li>\n <li>\n <a href=\"https://www.mozilla.org/en-US/firefox/new/\">\n <img src=\"firefox.png\" alt=\"\">\n <div>Firefox</div>\n </a>\n </li>\n <li>\n <a href=\"https://www.apple.com/safari/\">\n <img src=\"safari.png\" alt=\"\">\n <div>Safari</div>\n </a>\n </li>\n </ul>\n\n <div class=\"iwi-skip\">Skip & Continue</div>\n </div>\n </div>\n <![endif]-->\n\n <script>currentUiVersion = 'MINIO_UI_VERSION'</script>\n <script src=\"/minio/index_bundle.js\"></script>\n </body>\n</html>\n",
"body_murmur": -352285322,
"body_sha256": "9a8727ddd8e7ef78341db6a1b5efef944fab8c59ae6065b816cf32de587f7a39",
"component": [
"Nginx:1.21.5"
],
"content_length": -1,
"headers": {
"accept_ranges": [
"bytes"
],
"cache_control": [
"no-store",
"no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0"
],
"connection": [
"keep-alive"
],
"content_security_policy": [
"block-all-mixed-content"
],
"content_type": [
"text/html; charset=utf-8"
],
"date": [
"Mon, 09 Jun 2025 02:56:48 GMT"
],
"server": [
"nginx/1.21.5"
],
"unknown": [
{
"key": "x_amz_request_id",
"value": [
"1847406B068DF4CA"
]
}
],
"vary": [
"Origin",
"Accept-Encoding"
],
"x_xss_protection": [
"1; mode=block"
]
},
"protocol": "HTTP/1.1",
"redirects": [
{
"body": "<a href=\"/minio/\">Temporary Redirect</a>.\n\n",
"body_murmur": 1500860202,
"body_sha256": "fc3a86d76dd3be960188a0ce8751cebd90c68ca981c1cc32172e7ed11ebcc5a7",
"content_length": 43,
"headers": {
"cache_control": [
"no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0"
],
"connection": [
"keep-alive"
],
"content_length": [
"43"
],
"content_type": [
"text/html; charset=utf-8"
],
"date": [
"Mon, 09 Jun 2025 02:56:48 GMT"
],
"location": [
"/minio/"
],
"server": [
"nginx/1.21.5"
],
"vary": [
"Origin"
]
},
"location": "/minio/",
"protocol": "HTTP/1.1",
"status_code": 307,
"status_line": "307 Temporary Redirect"
}
],
"request": {
"headers": {
"accept": [
"*/*"
],
"referer": [
"https://39.106.8.95"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "39.106.8.95",
"path": "/minio/",
"scheme": "https"
}
},
"status_code": 200,
"title": "MinIO Browser"
},
"tls": {
"certificate": {
"extensions": {
"authority_info_access": {
"issuer_urls": [
"http://cacerts.digicert.com/EncryptionEverywhereDVTLSCA"
],
"ocsp_urls": [
"http://ocsp.digicert.com"
]
},
"authority_key_id": "78df91905feedeacf6c575ebd54c5553ef244ab6",
"basic_constraints": {
"is_ca": true
},
"certificate_policies": [
{
"cps": [
"http://www.digicert.com/CPS"
],
"id": "2.23.140.1.2.1"
}
],
"ct_precert_scts": "Signed Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : 96:97:64:BF:55:58:97:AD:F7:43:87:68:37:08:42:77:\n E9:F0:3A:D5:F6:A4:F3:36:6E:46:A4:3F:0F:CA:A9:C6\n Timestamp : Feb 6 10:10:06.138 2025 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:44:02:20:48:F2:F9:46:64:8A:F3:96:63:44:E7:D7:\n 6F:25:0A:64:00:7C:DF:9F:EA:6A:D3:EF:51:1E:C5:15:\n 0D:DD:02:FF:02:20:06:3C:90:3B:A9:39:F5:4F:14:DC:\n BC:ED:AD:02:BE:CE:7F:E2:00:B4:6E:54:5A:F5:A6:C1:\n 5A:50:78:A2:ED:C0\nSigned Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : 64:11:C4:6C:A4:12:EC:A7:89:1C:A2:02:2E:00:BC:AB:\n 4F:28:07:D4:1E:35:27:AB:EA:FE:D5:03:C9:7D:CD:F0\n Timestamp : Feb 6 10:10:06.064 2025 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:44:02:20:79:58:52:AC:19:30:00:7D:F0:90:0B:03:\n 55:F9:10:B2:6C:E3:51:B8:62:E4:D9:88:9D:32:89:2F:\n F5:27:C0:8F:02:20:06:D2:E5:8D:F5:F5:72:AD:9C:82:\n 66:E8:5F:2C:21:44:FA:45:0E:B6:42:7D:DE:E8:23:0E:\n EB:68:E2:80:61:3A\nSigned Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : 49:9C:9B:69:DE:1D:7C:EC:FC:36:DE:CD:87:64:A6:B8:\n 5B:AF:0A:87:80:19:D1:55:52:FB:E9:EB:29:DD:F8:C3\n Timestamp : Feb 6 10:10:06.076 2025 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:45:02:21:00:EB:42:1F:08:05:D5:27:A0:35:83:A0:\n 8C:91:73:17:5A:B5:6C:14:67:E7:FF:D7:A3:25:2F:FC:\n C8:3D:BA:AA:AA:02:20:07:15:E1:F1:3F:CA:4C:B9:16:\n 2F:85:85:4B:BE:32:C3:28:87:0D:ED:24:8B:B3:30:ED:\n 16:6E:38:1E:6D:B7:17",
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
},
"subject_alt_name": {
"dns_names": [
"image.yunproperty.cn"
]
},
"subject_key_id": "b243b63ea81d0a10ef0a01b0032bf388f5870729"
},
"fingerprint_md5": "A71B80796E6A7D960A9A5B854B305F03",
"fingerprint_sha1": "C2D61C5159E129089EF8240431F1E983DD21C8B4",
"fingerprint_sha256": "48BDC84EEA60A12D493D0B13BC2E94CB8A8ABE6A7E0651A43DCEA6DB49BBF546",
"issuer": {
"common_name": [
"Encryption Everywhere DV TLS CA - G2"
],
"country": [
"US"
],
"organization": [
"DigiCert Inc"
],
"organizational_unit": [
"www.digicert.com"
]
},
"issuer_dn": "/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=Encryption Everywhere DV TLS CA - G2",
"jarm": "29d29d00029d29d00042d42d00000000f78d2dc0ce6e5bbc5b8149a4872356",
"redacted": false,
"revocation": {
"ocsp": {
"next_update": "2025-06-15T04:33:02",
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "21105879102980046458616488248285064620",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false,
"value": "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"
},
"signed_certificate_timestamps": [
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "969764bf555897adf743876837084277e9f03ad5f6a4f3366e46a43f0fcaa9c6",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3044022048f2f946648af3966344e7d76f250a64007cdf9fea6ad3ef511ec5150ddd02ff0220063c903ba939f54f14dcbcedad02bece7fe200b46e545af5a6c15a5078a2edc0"
},
"timestamp": "2025-02-06T10:10:06.138000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "6411c46ca412eca7891ca2022e00bcab4f2807d41e3527abeafed503c97dcdf0",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "30440220795852ac1930007df0900b0355f910b26ce351b862e4d9889d32892ff527c08f022006d2e58df5f572ad9c8266e85f2c2144fa450eb6427ddee8230eeb68e280613a"
},
"timestamp": "2025-02-06T10:10:06.064000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "499c9b69de1d7cecfc36decd8764a6b85baf0a878019d15552fbe9eb29ddf8c3",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3045022100eb421f0805d527a03583a08c9173175ab56c1467e7ffd7a3252ffcc83dbaaaaa02200715e1f13fca4cb9162f85854bbe32c328870ded248bb330ed166e381e6db717"
},
"timestamp": "2025-02-06T10:10:06.076000",
"version": "v1"
}
],
"signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
"subject": {
"common_name": [
"image.yunproperty.cn"
]
},
"subject_alt_name": {
"dns_names": [
"image.yunproperty.cn"
],
"extended_dns_names": [
{
"domain": "yunproperty",
"fld": "yunproperty.cn",
"subdomain": "image",
"tld": "cn"
}
]
},
"subject_dn": "/CN=image.yunproperty.cn",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "e0b3ff687ddfd9798c275858f9544fc7e7256c5a6c010057c62917c1862e6610",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "7dfb2e0174991bc90f7f52ed3d7dbc02ff14340008b6db2e9a78a16c07dff444",
"tbs_noct_fingerprint": "cc70560a2db3df2b759ea2353b1025b4604bf0bb371aa3feb85df8c4a55f7d4f",
"validation_level": "DV",
"validity": {
"length_seconds": 31536000,
"not_after": "2026-02-05T23:59:59",
"not_before": "2025-02-06T00:00:00"
},
"version": 2
},
"fingerprint_sha256": "48BDC84EEA60A12D493D0B13BC2E94CB8A8ABE6A7E0651A43DCEA6DB49BBF546",
"precert": false,
"raw": "MIIF/jCCBOagAwIBAgIQD+DYLlCJLlyPjSxvpOPtrDANBgkqhkiG9w0BAQsFADBuMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMS0wKwYDVQQDEyRFbmNyeXB0aW9uIEV2ZXJ5d2hlcmUgRFYgVExTIENBIC0gRzIwHhcNMjUwMjA2MDAwMDAwWhcNMjYwMjA1MjM1OTU5WjAfMR0wGwYDVQQDExRpbWFnZS55dW5wcm9wZXJ0eS5jbjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANXOXIOmK/a+KI8owCbNARpQMJ7Uq6W1wDuP0+24Tn5tMgq4YKnHRS12umoUye2rxupVH4Oc4ZH7O6ZTGJtSOz9Yln4h67h+duH4l+/pBsGtqH8NuA65UYKMCvVJ4ydggxlBpu3DoD9/FcP5pWVf9MGiz34Q+wJMj6nk0EVFkkMOP0xE53mRgwwJByNpwj9kJnTTJFbb26ZDQceWsUtkPBCUwoJ357wTPYd7sInAL96ntTKuc67HfCY/Qy+lMB9TtxJJ2g8nPFJ/+V/WBOTpj+8J3jWjNS7ZXfMYcrQhej0vb3UCBhCiv83R9btWJRFqwSk38NjB50z/FImEBzime5MCAwEAAaOCAuUwggLhMB8GA1UdIwQYMBaAFHjfkZBf7t6s9sV169VMVVPvJEq2MB0GA1UdDgQWBBSyQ7Y+qB0KEO8KAbADK/OI9YcHKTAfBgNVHREEGDAWghRpbWFnZS55dW5wcm9wZXJ0eS5jbjA+BgNVHSAENzA1MDMGBmeBDAECATApMCcGCCsGAQUFBwIBFhtodHRwOi8vd3d3LmRpZ2ljZXJ0LmNvbS9DUFMwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjCBgAYIKwYBBQUHAQEEdDByMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wSgYIKwYBBQUHMAKGPmh0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9FbmNyeXB0aW9uRXZlcnl3aGVyZURWVExTQ0EtRzIuY3J0MAwGA1UdEwEB/wQCMAAwggF8BgorBgEEAdZ5AgQCBIIBbASCAWgBZgB1AJaXZL9VWJet90OHaDcIQnfp8DrV9qTzNm5GpD8PyqnGAAABlNq8/LoAAAQDAEYwRAIgSPL5RmSK85ZjROfXbyUKZAB835/qatPvUR7FFQ3dAv8CIAY8kDupOfVPFNy87a0Cvs5/4gC0blRa9abBWlB4ou3AAHUAZBHEbKQS7KeJHKICLgC8q08oB9QeNSer6v7VA8l9zfAAAAGU2rz8cAAABAMARjBEAiB5WFKsGTAAffCQCwNV+RCybONRuGLk2YidMokv9SfAjwIgBtLljfX1cq2cgmboXywhRPpFDrZCfd7oIw7raOKAYToAdgBJnJtp3h187Pw23s2HZKa4W68Kh4AZ0VVS++nrKd34wwAAAZTavPx8AAAEAwBHMEUCIQDrQh8IBdUnoDWDoIyRcxdatWwUZ+f/16MlL/zIPbqqqgIgBxXh8T/KTLkWL4WFS74ywyiHDe0ki7Mw7RZuOB5ttxcwDQYJKoZIhvcNAQELBQADggEBAOxRgelQt6BbqxRB9jWJblsu70ZSoknCNtOr3/ZpJMc5mQnsJMND/QUaukuW41gGV/oFR4rI7KqFnkeZ/Xp1tWaLGnHhcmi+JlOIu5PkUS5ISjA23jC3wQcXvQ7j5Lbhmskd3GdLybhLXhs/umWILuLXpjluUfNfR9CUesJvn0ZIvbZfKS7UHGXbjwyqFPl7NPCmYDQAA16dm4apY5QFtaZPGCGi4nSFqSk7A8W7ooyeCglB5Goae9QMiDqZbr2o24jFviImEZwfn+ttUAF88bTDzy+rSyvMp3sUOaCkoMz6fRtCMoRBu5iohio9p9ZpgJBpgyMBWgldxjdfYPQajtQ=",
"tags": [
"dv",
"trusted"
]
}
},
"url": "https://39.106.8.95/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-06-09T02:57:25.144Z"
}
],
"services_hash": "15dcc374e7ef56d2389db045b63e941ce835a57930e167f3afa0a34479890e78",
"last_updated_at": "2025-06-09T13:41:12.424Z",
"banner": [
"http",
"tls",
"ssh"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-0431": {
"id": "CVE-1999-0431",
"references": [
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
],
"score": 5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-0656": {
"id": "CVE-1999-0656",
"references": [
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348",
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348"
],
"score": 5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"weakness": "CWE-16"
},
"CVE-1999-1285": {
"id": "CVE-1999-1285",
"references": [
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472",
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472"
],
"score": 2.1,
"services": [
"22/ssh"
],
"severity": "low",
"summary": "Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.",
"vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-1442": {
"id": "CVE-1999-1442",
"references": [
"http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html",
"http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html",
"http://www.securityfocus.com/bid/105"
],
"score": 7.2,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.",
"vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-Other"
},
"CVE-2007-2768": {
"id": "CVE-2007-2768",
"references": [
"http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
"http://www.osvdb.org/34601",
"https://security.netapp.com/advisory/ntap-20191107-0002/",
"http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
"http://www.osvdb.org/34601",
"https://security.netapp.com/advisory/ntap-20191107-0002/"
],
"score": 4.3,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.",
"vector_string": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"weakness": "CWE-200"
},
"CVE-2008-3844": {
"id": "CVE-2008-3844",
"references": [
"http://secunia.com/advisories/31575",
"http://secunia.com/advisories/32241",
"http://securitytracker.com/id?1020730",
"http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
"http://www.redhat.com/security/data/openssh-blacklist.html",
"http://www.redhat.com/support/errata/RHSA-2008-0855.html",
"http://www.securityfocus.com/bid/30794",
"http://www.vupen.com/english/advisories/2008/2821",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/44747",
"http://secunia.com/advisories/31575",
"http://secunia.com/advisories/32241",
"http://securitytracker.com/id?1020730",
"http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
"http://www.redhat.com/security/data/openssh-blacklist.html",
"http://www.redhat.com/support/errata/RHSA-2008-0855.html",
"http://www.securityfocus.com/bid/30794",
"http://www.vupen.com/english/advisories/2008/2821",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/44747"
],
"score": 9.3,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.",
"vector_string": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"weakness": "CWE-20"
},
"CVE-2022-3424": {
"id": "CVE-2022-3424",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html",
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html"
],
"score": 7.8,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2022-3707": {
"id": "CVE-2022-3707",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"
],
"score": 5.5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-460"
},
"CVE-2023-0030": {
"id": "CVE-2023-0030",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270"
],
"score": 7.8,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2023-1390": {
"id": "CVE-2023-1390",
"references": [
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/",
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/"
],
"score": 7.5,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-1050"
},
"CVE-2023-28466": {
"id": "CVE-2023-28466",
"references": [
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/"
],
"score": 7,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-476"
},
"CVE-2023-51767": {
"id": "CVE-2023-51767",
"references": [
"https://access.redhat.com/security/cve/CVE-2023-51767",
"https://arxiv.org/abs/2309.02545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
"https://security.netapp.com/advisory/ntap-20240125-0006/",
"https://ubuntu.com/security/CVE-2023-51767",
"https://access.redhat.com/security/cve/CVE-2023-51767",
"https://arxiv.org/abs/2309.02545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
"https://security.netapp.com/advisory/ntap-20240125-0006/",
"https://ubuntu.com/security/CVE-2023-51767"
],
"score": 7,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-Other"
},
"CVE-2024-6387": {
"id": "CVE-2024-6387",
"references": [
"https://access.redhat.com/errata/RHSA-2024:4312",
"https://access.redhat.com/errata/RHSA-2024:4340",
"https://access.redhat.com/errata/RHSA-2024:4389",
"https://access.redhat.com/errata/RHSA-2024:4469",
"https://access.redhat.com/errata/RHSA-2024:4474",
"https://access.redhat.com/errata/RHSA-2024:4479",
"https://access.redhat.com/errata/RHSA-2024:4484",
"https://access.redhat.com/security/cve/CVE-2024-6387",
"https://bugzilla.redhat.com/show_bug.cgi?id=2294604",
"https://santandersecurityresearch.github.io/blog/sshing_the_masses.html",
"https://www.openssh.com/txt/release-9.8",
"https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt",
"http://seclists.org/fulldisclosure/2024/Jul/18",
"http://seclists.org/fulldisclosure/2024/Jul/19",
"http://seclists.org/fulldisclosure/2024/Jul/20",
"http://www.openwall.com/lists/oss-security/2024/07/01/12",
"http://www.openwall.com/lists/oss-security/2024/07/01/13",
"http://www.openwall.com/lists/oss-security/2024/07/02/1",
"http://www.openwall.com/lists/oss-security/2024/07/03/1",
"http://www.openwall.com/lists/oss-security/2024/07/03/11",
"http://www.openwall.com/lists/oss-security/2024/07/03/2",
"http://www.openwall.com/lists/oss-security/2024/07/03/3",
"http://www.openwall.com/lists/oss-security/2024/07/03/4",
"http://www.openwall.com/lists/oss-security/2024/07/03/5",
"http://www.openwall.com/lists/oss-security/2024/07/04/1",
"http://www.openwall.com/lists/oss-security/2024/07/04/2",
"http://www.openwall.com/lists/oss-security/2024/07/08/2",
"http://www.openwall.com/lists/oss-security/2024/07/08/3",
"http://www.openwall.com/lists/oss-security/2024/07/09/2",
"http://www.openwall.com/lists/oss-security/2024/07/09/5",
"http://www.openwall.com/lists/oss-security/2024/07/10/1",
"http://www.openwall.com/lists/oss-security/2024/07/10/2",
"http://www.openwall.com/lists/oss-security/2024/07/10/3",
"http://www.openwall.com/lists/oss-security/2024/07/10/4",
"http://www.openwall.com/lists/oss-security/2024/07/10/6",
"http://www.openwall.com/lists/oss-security/2024/07/11/1",
"http://www.openwall.com/lists/oss-security/2024/07/11/3",
"http://www.openwall.com/lists/oss-security/2024/07/23/4",
"http://www.openwall.com/lists/oss-security/2024/07/23/6",
"http://www.openwall.com/lists/oss-security/2024/07/28/2",
"http://www.openwall.com/lists/oss-security/2024/07/28/3",
"https://access.redhat.com/errata/RHSA-2024:4312",
"https://access.redhat.com/errata/RHSA-2024:4340",
"https://access.redhat.com/errata/RHSA-2024:4389",
"https://access.redhat.com/errata/RHSA-2024:4469",
"https://access.redhat.com/errata/RHSA-2024:4474",
"https://access.redhat.com/errata/RHSA-2024:4479",
"https://access.redhat.com/errata/RHSA-2024:4484",
"https://access.redhat.com/security/cve/CVE-2024-6387",
"https://archlinux.org/news/the-sshd-service-needs-to-be-restarted-after-upgrading-to-openssh-98p1/",
"https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux/",
"https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server",
"https://bugzilla.redhat.com/show_bug.cgi?id=2294604",
"https://explore.alas.aws.amazon.com/CVE-2024-6387.html",
"https://forum.vmssoftware.com/viewtopic.php?f=8&t=9132",
"https://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2024-002.txt.asc",
"https://github.com/AlmaLinux/updates/issues/629",
"https://github.com/Azure/AKS/issues/4379",
"https://github.com/PowerShell/Win32-OpenSSH/discussions/2248",
"https://github.com/PowerShell/Win32-OpenSSH/issues/2249",
"https://github.com/microsoft/azurelinux/issues/9555",
"https://github.com/openela-main/openssh/commit/e1f438970e5a337a17070a637c1b9e19697cad09",
"https://github.com/oracle/oracle-linux/issues/149",
"https://github.com/rapier1/hpn-ssh/issues/87",
"https://github.com/zgzhang/cve-2024-6387-poc",
"https://lists.almalinux.org/archives/list/[email protected]/thread/23BF5BMGFVEVUI2WNVAGMLKT557EU7VY/",
"https://lists.mindrot.org/pipermail/openssh-unix-announce/2024-July/000158.html",
"https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-July/041431.html",
"https://news.ycombinator.com/item?id=40843778",
"https://packetstorm.news/files/id/190587/",
"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0010",
"https://santandersecurityresearch.github.io/blog/sshing_the_masses.html",
"https://security-tracker.debian.org/tracker/CVE-2024-6387",
"https://security.netapp.com/advisory/ntap-20240701-0001/",
"https://sig-security.rocky.page/issues/CVE-2024-6387/",
"https://stackdiary.com/openssh-race-condition-in-sshd-allows-remote-code-execution/",
"https://support.apple.com/kb/HT214118",
"https://support.apple.com/kb/HT214119",
"https://support.apple.com/kb/HT214120",
"https://ubuntu.com/security/CVE-2024-6387",
"https://ubuntu.com/security/notices/USN-6859-1",
"https://www.akamai.com/blog/security-research/2024-openssh-vulnerability-regression-what-to-know-and-do",
"https://www.arista.com/en/support/advisories-notices/security-advisory/19904-security-advisory-0100",
"https://www.exploit-db.com/exploits/52269",
"https://www.freebsd.org/security/advisories/FreeBSD-SA-24:04.openssh.asc",
"https://www.openssh.com/txt/release-9.8",
"https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt",
"https://www.splunk.com/en_us/blog/security/cve-2024-6387-regresshion-vulnerability.html",
"https://www.suse.com/security/cve/CVE-2024-6387.html",
"https://www.theregister.com/2024/07/01/regresshion_openssh/",
"https://www.vicarius.io/vsociety/posts/regresshion-an-openssh-regression-error-cve-2024-6387"
],
"score": 8.1,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-364"
}
}
}