85.13.148.15
Geolocation
| Network | 85.13.128.0/19 |
| Postal Code | 02742 |
| City | Neusalza-Spremberg |
| Country | Germany (DE) |
| Continent | Europe |
| Locale Code | en |
| Geo Point | 51.0387, 14.5328 |
| Updated At | 13 Dec 2025, 00:39:24 UTC |
Whois
| Network | 85.13.128.0/18 |
| Organization | ORG-NMMG1-RIPE |
| Desc | N/A |
| Updated At | 09 Dec 2024, 11:29:20 UTC |
Geolocation
| Network | 85.13.128.0/19 |
| Postal Code | 02742 |
| City | Neusalza-Spremberg |
| Country | Germany (DE) |
| Continent | Europe |
| Locale Code | en |
| Geo Point | 51.0387, 14.5328 |
| Updated At | 13 Dec 2025, 00:39:24 UTC |
Whois
| Network | 85.13.128.0/18 |
| Organization | ORG-NMMG1-RIPE |
| Desc | N/A |
| Updated At | 09 Dec 2024, 11:29:20 UTC |
| Product | Nagios NSCA |
| Version | N/A |
| Extra Info | N/A |
| Fingerprint | |
| MD5 | A79457E73B2BCE3B128B2008F65284F2 |
| SHA1 | F3EFA82CCFEDB811599373C13E55306166ECDACB |
| SHA256 | 6FD2D3D21F7B598B97F10FC3059A2A5779CC655BD5402DB8E3458B3E099D95FC |
| JARM | 00000000000000000000000000000000000000000000000000000000000000 |
{
"banner": "220 FTP on dd29812.kasserver.com ready\r\n"
}| Product | OpenSSH |
| Version | 8.9p1 Ubuntu 3ubuntu0.13 |
| Extra Info | Ubuntu Linux; protocol 2.0 |
| CVEs | CVE-2007-2768CVE-2008-3844CVE-2023-28531CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795 |
{
"banner": "SSH-2.0-OpenSSH_8.9p1 Ubuntu-3ubuntu0.13",
"client_to_server_ciphers": [
"[email protected]",
"aes128-ctr",
"aes192-ctr",
"aes256-ctr",
"[email protected]",
"[email protected]"
],
"client_to_server_compression": [
"none",
"[email protected]"
],
"client_to_server_macs": [
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-sha1"
],
"host_key_algorithms": [
"rsa-sha2-512",
"rsa-sha2-256",
"ecdsa-sha2-nistp256",
"ssh-ed25519"
],
"kex_algorithms": [
"curve25519-sha256",
"[email protected]",
"ecdh-sha2-nistp256",
"ecdh-sha2-nistp384",
"ecdh-sha2-nistp521",
"[email protected]",
"diffie-hellman-group-exchange-sha256",
"diffie-hellman-group16-sha512",
"diffie-hellman-group18-sha512",
"diffie-hellman-group14-sha256",
"[email protected]"
],
"key": {
"algorithm": "ecdsa-sha2-nistp256",
"fingerprint_sha256": "e036d80a909a7ad63d980cc7f7eb04600ce28a1b3921a1edfd8b3f8079238f19"
},
"server_to_client_ciphers": [
"[email protected]",
"aes128-ctr",
"aes192-ctr",
"aes256-ctr",
"[email protected]",
"[email protected]"
],
"server_to_client_compression": [
"none",
"[email protected]"
],
"server_to_client_macs": [
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-sha1"
],
"software": "OpenSSH_8.9p1",
"version": "2.0"
}| Product | Postfix smtpd |
| Version | N/A |
| Extra Info | N/A |
| Fingerprint | |
| MD5 | A79457E73B2BCE3B128B2008F65284F2 |
| SHA1 | F3EFA82CCFEDB811599373C13E55306166ECDACB |
| SHA256 | 6FD2D3D21F7B598B97F10FC3059A2A5779CC655BD5402DB8E3458B3E099D95FC |
| JARM | 00000000000000000000000000000000000000000000000000000000000000 |
{
"banner": "220 dd29812.kasserver.com ESMTP\r\n"
}| Product | Apache httpd |
| Version | N/A |
| Extra Info | N/A |
| CVEs | CVE-1999-0070CVE-1999-1199CVE-2023-25690CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795 |
| Status Code | 503 |
| Title | 503 Service Temporarily Unavailable |
| Body SHA256 | 6af88a8c24fe7203fe1bf56c3117bec7ac2f3125520613da350f7bb85c4e1c87 |
| Component | Apache HTTP Server |
| Response Headers | |
| content type | text/html |
| date | Wed, 10 Dec 2025 23:51:06 GMT |
| retry after | 3600 |
| server | Apache |
| vary | User-Agent |
{
"body_murmur": 1201644064,
"body_sha256": "6af88a8c24fe7203fe1bf56c3117bec7ac2f3125520613da350f7bb85c4e1c87",
"component": [
"Apache HTTP Server"
],
"content_length": -1,
"headers": {
"content_type": [
"text/html"
],
"date": [
"Wed, 10 Dec 2025 23:51:06 GMT"
],
"retry_after": [
"3600"
],
"server": [
"Apache"
],
"vary": [
"User-Agent"
]
},
"protocol": "HTTP/1.1",
"status_code": 503,
"title": "503 Service Temporarily Unavailable",
"transfer_encoding": [
"chunked"
]
}| Product | Dovecot pop3d |
| Version | N/A |
| Extra Info | N/A |
| Fingerprint | |
| MD5 | A79457E73B2BCE3B128B2008F65284F2 |
| SHA1 | F3EFA82CCFEDB811599373C13E55306166ECDACB |
| SHA256 | 6FD2D3D21F7B598B97F10FC3059A2A5779CC655BD5402DB8E3458B3E099D95FC |
| JARM | 00000000000000000000000000000000000000000000000000000000000000 |
{
"banner": "+OK kasserver.com mailserver ready.\r\n"
}| Product | Dovecot imapd |
| Version | N/A |
| Extra Info | N/A |
| Fingerprint | |
| MD5 | A79457E73B2BCE3B128B2008F65284F2 |
| SHA1 | F3EFA82CCFEDB811599373C13E55306166ECDACB |
| SHA256 | 6FD2D3D21F7B598B97F10FC3059A2A5779CC655BD5402DB8E3458B3E099D95FC |
| JARM | 00000000000000000000000000000000000000000000000000000000000000 |
{
"banner": "* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE XLIST LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN] kasserver.com mailserver ready.\r\n"
}| Product | Apache httpd |
| Version | N/A |
| Extra Info | N/A |
| CVEs | CVE-1999-0070CVE-1999-1199CVE-2023-25690CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795 |
| Status Code | 503 |
| Title | 503 Service Temporarily Unavailable |
| Body SHA256 | 6af88a8c24fe7203fe1bf56c3117bec7ac2f3125520613da350f7bb85c4e1c87 |
| Component | Apache HTTP Server |
| Response Headers | |
| content type | text/html |
| date | Tue, 02 Dec 2025 01:00:13 GMT |
| retry after | 3600 |
| server | Apache |
| vary | User-Agent |
| Fingerprint | |
| MD5 | A79457E73B2BCE3B128B2008F65284F2 |
| SHA1 | F3EFA82CCFEDB811599373C13E55306166ECDACB |
| SHA256 | 6FD2D3D21F7B598B97F10FC3059A2A5779CC655BD5402DB8E3458B3E099D95FC |
| JARM | 33d3fd16d29d29d00042d43d000000f969de8346060623ff1a681e56326e65 |
{
"body_murmur": 1201644064,
"body_sha256": "6af88a8c24fe7203fe1bf56c3117bec7ac2f3125520613da350f7bb85c4e1c87",
"component": [
"Apache HTTP Server"
],
"content_length": -1,
"headers": {
"content_type": [
"text/html"
],
"date": [
"Tue, 02 Dec 2025 01:00:13 GMT"
],
"retry_after": [
"3600"
],
"server": [
"Apache"
],
"vary": [
"User-Agent"
]
},
"protocol": "HTTP/1.1",
"redirects": [
{
"body_murmur": 1805895075,
"body_sha256": "086537bf092d5af93aaceafadd7e641ce1f1c5d6d02eb592205da8dd6f12ba9d",
"content_length": 228,
"location": "http://85.13.148.15/",
"status_code": 301,
"status_line": "301 Moved Permanently"
}
],
"status_code": 503,
"title": "503 Service Temporarily Unavailable",
"transfer_encoding": [
"chunked"
]
}| Product | Samba smbd |
| Version | 4 |
| Extra Info | N/A |
| CVEs | CVE-2011-2411CVE-2015-5252CVE-2015-5296CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795 |
{
"capabilities": {
"dfs_support": true,
"leasing_support": true,
"multicredit_support": true
},
"has_ntlm": true,
"negotiation": {
"authentication_types": [
"1.3.6.1.4.1.311.2.2.10"
],
"capabilities": 7,
"credits": 1,
"dialect_revision": 528,
"flags": 1,
"protocol_id": "AAAAAP5TTUI=",
"security_mode": 3,
"server_guid": "AAAAAAAAAAAAAAAAAAAAAGRkMjk4MTIAAAAAAAAAAAA=",
"server_start_time": "2009-04-22T19:24:48Z",
"system_time": "2025-12-07T04:41:38Z"
},
"smbv1_support": false,
"version": "2.1.0"
}| Product | Postfix smtpd |
| Version | N/A |
| Extra Info | N/A |
| Product | Postfix smtpd |
| Version | N/A |
| Extra Info | N/A |
| Fingerprint | |
| MD5 | A79457E73B2BCE3B128B2008F65284F2 |
| SHA1 | F3EFA82CCFEDB811599373C13E55306166ECDACB |
| SHA256 | 6FD2D3D21F7B598B97F10FC3059A2A5779CC655BD5402DB8E3458B3E099D95FC |
| JARM | 00000000000000000000000000000000000000000000000000000000000000 |
{
"banner": "220 dd29812.kasserver.com ESMTP\r\n"
}| Product | MariaDB |
| Version | 5.5.5-10.6.22 |
| Extra Info | N/A |
| CVEs | CVE-2005-0004CVE-2012-0540CVE-2012-0572CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795CVE-2023-48795 |
| Fingerprint | |
| MD5 | A79457E73B2BCE3B128B2008F65284F2 |
| SHA1 | F3EFA82CCFEDB811599373C13E55306166ECDACB |
| SHA256 | 6FD2D3D21F7B598B97F10FC3059A2A5779CC655BD5402DB8E3458B3E099D95FC |
| JARM | 00000000000000000000000000000000000000000000000000000000000000 |
{
"capability_flags": {
"CLIENT_CAN_HANDLE_EXPIRED_PASSWORDS": true,
"CLIENT_COMPRESS": true,
"CLIENT_CONNECT_ATTRS": true,
"CLIENT_CONNECT_WITH_DB": true,
"CLIENT_DEPRECATED_EOF": true,
"CLIENT_FOUND_ROWS": true,
"CLIENT_IGNORE_SIGPIPE": true,
"CLIENT_IGNORE_SPACE": true,
"CLIENT_INTERACTIVE": true,
"CLIENT_LOCAL_FILES": true,
"CLIENT_LONG_FLAG": true,
"CLIENT_MULTI_RESULTS": true,
"CLIENT_MULTI_STATEMENTS": true,
"CLIENT_NO_SCHEMA": true,
"CLIENT_ODBC": true,
"CLIENT_PLUGIN_AUTH": true,
"CLIENT_PLUGIN_AUTH_LEN_ENC_CLIENT_DATA": true,
"CLIENT_PROTOCOL_41": true,
"CLIENT_PS_MULTI_RESULTS": true,
"CLIENT_RESERVED": true,
"CLIENT_SECURE_CONNECTION": true,
"CLIENT_SESSION_TRACK": true,
"CLIENT_SSL": true,
"CLIENT_TRANSACTIONS": true
},
"protocol_version": 10,
"version": "5.5.5-10.6.22-MariaDB-0ubuntu0.22.04.1-log"
}