Your IP address is:
Start scanning your system........ Prompt Code > vulnerability scan --script vulners --script-args mincvss=4 PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 3.0.3 | vulners: | cpe:/a:vsftpd:vsftpd:3.0.3: | PRION:CVE-2021-3618 5.8 https://vulners.com/prion/PRION:CVE-2021-3618 |_ PRION:CVE-2021-30047 5.0 https://vulners.com/prion/PRION:CVE-2021-30047 22/tcp open ssh OpenSSH 7.9p1 Debian 10+deb10u2 (protocol 2.0) | vulners: | cpe:/a:openbsd:openssh:7.9p1: | PRION:CVE-2019-6111 5.8 https://vulners.com/prion/PRION:CVE-2019-6111 | EDB-ID:46516 5.8 https://vulners.com/exploitdb/EDB-ID:46516 *EXPLOIT* | EDB-ID:46193 5.8 https://vulners.com/exploitdb/EDB-ID:46193 *EXPLOIT* | 1337DAY-ID-32328 5.8 https://vulners.com/zdt/1337DAY-ID-32328 *EXPLOIT* | 1337DAY-ID-32009 5.8 https://vulners.com/zdt/1337DAY-ID-32009 *EXPLOIT* | PRION:CVE-2019-16905 4.4 https://vulners.com/prion/PRION:CVE-2019-16905 |_ PACKETSTORM:151227 0.0 https://vulners.com/packetstorm/PACKETSTORM:151227 *EXPLOIT* 53/tcp open domain ISC BIND 9.11.5-P4-5.1+deb10u5 (Debian Linux) 80/tcp open http nginx 1.14.2 |_http-server-header: nginx/1.14.2 139/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP) 445/tcp open netbios-ssn Samba smbd 3.X - 4.X (workgroup: WORKGROUP)