RouterOS router configuration page: 7 out of 10 red risk status: http://toolbar.netcraft.com/site_report?url=http://91.240.97.45 malware at site blocked by Bitdefender TrafficLight.
This web site does not have a description.
Scanning target: 91.240.97.45 [ HTTPS port 443 ] …
Found 1 servers with port 443 open
Checking for OpenSSL Heartbleed vulnerability…
91.240.97.45 NOT Vulnerable
sha1WithRSAEncryption (SHA-1 is being phased out)
Site not listed in the certificate.
Detected here as malicious: https://sslbl.abuse.ch/intel/11c94f0bf7c5f512ddf3b016c206674a6f630dd0
Trusted No (The certificate is self signed and the same certificate cannot be found in the list of trusted certificates.)
SSL verification issue (Possibly mis-matched URL or bad intermediate cert.). Details:
ERROR: certificate common name ‘aJVeM2eAHqVlGo9hbK9Z1xDn’ doesn’t match requested host name ‘91.240.97.45’.
SSL certficate is using SHA-1 algorithm that expires after 2015. You should re-issue your SSL certificate as SHA-2 to avoid padlock warning in Chrome.
Server supports SSLv3, may be vulnerable to POODLE attack. It is suggested to disable the SSLv3 protocol.
Server certificate Subject: commonName=aJVeM2eAHqVlGo9hbK9Z1xDn/organizationName=FJSCCIGDuwFOdmWPSXiTPJgk/stateOrProvinceName=ST/countryName=CN tls-nextprotoneg: MikroTik RouterOS sshd (protocol 2.0) -
exploitable sshd, read:https://www.exploit-db.com/exploits/28056/
polonus (volunteer website security analyst and website error-hunter)