http://www.abuseipdb.com/whois/184.14 → http://www.abuseipdb.com/check/184.149.5.45
Why blocked: https://www.blockedservers.com/blocked/ipv4/184.149.5.45/
One match: http://www.blocklist.de/en/search.html?ip=184.149.5.45&action=search&send=start+search
See 7 out of 10 red web risk status: http://toolbar.netcraft.com/site_report?url=http://184.149.5.45
Custom errors:Fail and warnings: https://asafaweb.com/Scan?Url=184.149.5.45 ISS7
Encryption (HTTPS) (1)
Communication is NOT encrypted
HTTP Server: IIS 7.5
Operating System: Windows Server 2008 R2 → http://www.cvedetails.com/vulnerability-list/vendor_id-26/product_id-3436/Microsoft-IIS.html
See: http://whois.domaintools.com/184.149.5.45 Potentially risky methods: TRACE
Starting job… [2015-05-06 16:34:39] Stay on this page for results!
Scanning target: remote.turnedaway.ca on port 443 …
http://whois.domaintools.com/184.149.5.45
Found 1 servers with port 443 open
Checking for SSLv3 POODLE vulnerability…
IP address Hostname Status Vulnerable ciphers
184.149.5.45 remote.turnedaway.ca Vulnerable SSLv3 DES-CBC3-SHA
CMSC.Ca server issued.
E-commerce Safety Information
Transaction Protection
UNTRUSTED BY MICROSOFT
SSL Issuer: cmsc-CMSCSERVER-CA
SSL Expires: 2016-04-29 18:37:54 UTC
polonus