1.116.122.138
Copy IP
Open Ports
2
Unique Services
4
CVEs
0
TLS Services
0
| Port | Protocol | Service | Product | Version | OS | Scan Date |
|---|---|---|---|---|---|---|
| 8080 | http | Node.js | - | - | Feb. 23, 2026 | |
| 3306 | mysql | MySQL | 8.0.21 | - | Feb. 22, 2026 | |
| 3306 | tcp | ventrilo | Ventrilo | 2.1.2+ | - | Dec. 4, 2025 |
| 3306 | tcp | pc-duo | Vector PC-Duo | - | - | Dec. 2, 2025 |
Port 8080
http
Copy
HTTP/1.1 200 OK
X-Powered-By: Express
Content-Type: text/html; charset=utf-8
Accept-Ranges: bytes
Content-Length: 828
ETag: W/"33c-OXOMe1EWwa2u3t0iYxbr8infDdY"
Vary: Accept-Encoding
Date: Mon, 23 Feb 2026 16:50:15 GMT
Connection: close
<!DOCTYPE html>
<html lang="zh-CN">
<head>
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="width=device-width,initial-scale=1.0,maximum-scale=1.0,user-scalable=no">
<meta name="format-detection" content="telephone=no">
<meta name="apple-mobile-web-app-capable" content="yes">
<meta name="apple-mobile-web-app-status-bar-style" content="black">
<link rel="icon" href="/favicon.ico">
<title>\xe5\x95\x86\xe5\x93\x81\xe5\xb1\x95\xe7\xa4\xba\xe7\xb3\xbb\xe7\xbb\x9f</title>
<script defer src="/js/chunk-vendors.js"></script><script defer src="/js/app.js"></script></head>
<body>
<noscript>
<strong>\xe6\x8a\xb1\xe6\xad\x89\xef\xbc\x8c\xe6\xad\xa4\xe5\xba\x94\xe7\x94\xa8\xe9\x9c\x80\xe8\xa6\x81\xe5\x90\xaf\xe7\x94\xa8 JavaScript \xe6\x89\x8d\xe8\x83\xbd\xe6\xad\xa3\xe5\xb8\xb8\xe8\xbf\x90\xe8\xa1\x8c\xe3\x80\x82</strong>
</noscript>
<div id="app"></div>
<!-- built files will be auto injected -->
</body>
</html>
Port 3306
mysql
Copy
J\x00\x00\x00 8.0.21\x00\xf5o\x01\x00\x1d8}\x7f\x0e HW\x00\xff\xff!\x02\x00\xff\xc7\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00t*0l7ePyH?\x07\x03\x00caching_sha2_password\x00
Port 3306
ventrilo
Copy
b"l\x00\x00\x00\xffi\x04Host '89.248.165.124' is blocked because of many connection errors; unblock with 'mysqladmin flush-hosts'"
Port 3306
pc-duo
Copy
b'J\x00\x00\x00\n8.0.21\x00\x1f\xbb\x00\x00rS/&AKsL\x00\xff\xff!\x02\x00\xff\xc7\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00#\x1a#-r~Q\x04\x01YCw\x00caching_sha2_password\x00'
No vulnerabilities found.
No TLS/SSL services found.