Help
RSS
API
Feed
Maltego
Contact
Domain > tcpbin.com
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-01-10
45.79.112.203
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Sun, 02 Jun 2024 15:28:51 GMTContent-Type: text/htmlContent-Length: 166Connection: keep-aliveLocation: https://tcpbin.com/Server: tcpbin html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>openresty/center>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Sun, 02 Jun 2024 15:28:51 GMTContent-Type: text/htmlContent-Length: 3845Last-Modified: Fri, 05 Jun 2020 01:42:03 GMTConnection: keep-aliveVary: Accept-EncodingETag: 5ed9a2eb-f05Se !DOCTYPE html>html>head> meta charsetutf-8> meta http-equivX-UA-Compatible contentIEedge> meta nameviewport contentwidthdevice-width, initial-scale1> title>tcpbin.com/title>/head>body classhack> div classmain container> h1>tcpbin.com - A TCP echo server with TLS and mTLS/h1> tcpbin.com is a TCP echo server service developed for demo and integration test purposes.br/> The examples below are for shell based access but you can achieve the same from programming language of your choice. br/> br/> h2>Features/h2> ul> li>TCP echo server (port 4242)/li> li>TCP echo server with TLS support (port 4243)/li> li>TCP echo server with client authentication or mTLS (port 4244)/li> /ul> h2>How to use?/h2> p>Here are some simple examples to test use the endpoints:/p> h3>TCP echo/h3> pre>code classlang-shell>$ nc tcpbin.com 4242Hello server!Hello server! /code>/pre> h3>TCP echo with TLS encryption/h3> pre>code classlang-shell>$ openssl s_client -crlf -connect tcpbin.com:4243 -quietdepth2 O Digital Signature Trust Co., CN DST Root CA X3verify return:1depth1 C US, O Lets Encrypt, CN Lets Encrypt Authority X3verify return:1depth0 CN tcpbin.comverify return:1An encrypted hello!An encrypted hello! /code>/pre> h3>TCP echo with mutual authentication/h3> Please see below on how to get your certificate and private key. pre>code classlang-shell>$ openssl s_client -connect tcpbin.com:4244 -cert client_cert -key client_key -quietdepth2 O Digital Signature Trust Co., CN DST Root CA X3verify return:1depth1 C US, O Lets Encrypt, CN Lets Encrypt Authority X3verify return:1depth0 CN tcpbin.comverify return:1An encrypted and authenticated hello!An encrypted and authenticated hello! /code>/pre> h3>Getting client certificate and key for mTLS/h3> p> To authenticate on port 4244, you will need a valid client certificate and key. Please note that the CA used for this purpos
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]