It shows more than just the IP, let me name the things it shows "
Version: 3 (0x2)
Serial Number:
90:71:0c:50:1d:3d:ad:a8:f4:86:27:50:38:29:ce:7d
Signature Algorithm: ecdsa-with-SHA256
Issuer: C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO ECC Domain Validation Secure Server CA 2
Validity
Not Before: Aug 14 00:00:00 2018 GMT
Not After : Feb 20 23:59:59 2019 GMT
Subject: OU=Domain Control Validated, OU=PositiveSSL Multi-Domain,
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (256 bit)
pub:
04:18:cc:ff:09:dd:8f:e9:8e:e2:9e:06:72:5b:b5:
cb:c5:79:0a:18:8a:df:d1:b3:66:71:b4:d8:3f:82:
78:60:aa:36:3b:30:3d:4f:66:b5:33:41:f1:06:e6:
db:94:ac:5e:4e:e2:ba:37:a9:f8:56:3d:f6:d8:ab:
04:93:6c:5d:65
ASN1 OID: prime256v1
X509v3 extensions:
X509v3 Authority Key Identifier:
keyid:40:09:61:67:F0:BC:83:71:4F
E:12:08:2C:6F
4
4:2B:76:3D:96
X509v3 Subject Key Identifier:
35:56:0E:8C:41:0C:B5
7:6B:8C:44:B7:00:37:AC:CD:6F:68:63:E4
X509v3 Key Usage: critical
Digital Signature
X509v3 Basic Constraints: critical
CA:FALSE
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Certificate Policies:
Policy: 1.3.6.1.4.1.6449.1.2.2.7
CPS:
Policy: 2.23.140.1.2.1
X509v3 CRL Distribution Points:
Full Name:
HTTP/1.1 403 Forbidden
Date: Sun, 19 Aug 2018 00:36:07 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
Set-Cookie: __cfduid=d8237b2893e51a6830c1186953f30aa531534638967; expires=Mon, 19-Aug-19 00:36:07 GMT; path=/; domain=.104.27.130.246; HttpOnly
Cache-Control: max-age=15
Expires: Sun, 19 Aug 2018 00:36:22 GMT
X-Frame-Options: SAMEORIGIN
Server: cloudflare-nginx
CF-RAY: 44c88b4833fe9f1d-AMS
--------------------- MERGED ---------------------------
The Plugin Extension also shows us different exploits we could possibly use to do a ftp hack even though that's risky.