101.52.239.165

Regular View Raw Data
Last Seen: 2024-05-31

GeneralInformation

Country China
City Shenzhen
Organization GDS CHANGAN SERVICES Ltd.
ISP China Telecom (Group)
ASN AS4816

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-44487 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CVE-2021-3618 5.8ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
-995207579 | 2024-05-30T07:02:20.700430
  
80 / tcp
540591556 | 2024-05-23T19:49:59.323191
  
443 / tcp
731197476 | 2024-05-10T23:40:13.485239
  
666 / tcp
369089880 | 2024-05-30T01:24:58.853213
  
3001 / tcp
547094274 | 2024-05-21T15:04:06.480095
  
4433 / tcp
-709757703 | 2024-05-28T09:49:29.318036
  
7443 / tcp
1428194387 | 2024-05-15T07:11:13.348581
  
7777 / tcp
-1903379194 | 2024-05-31T06:27:48.506516
  
8000 / tcp
731197476 | 2024-05-10T01:35:12.595296
  
8001 / tcp
159606397 | 2024-05-08T23:33:25.841502
  
8010 / tcp
1937222837 | 2024-05-29T07:07:19.323052
  
8085 / tcp
-2002685878 | 2024-05-11T10:57:25.103885
  
8099 / tcp
1651973090 | 2024-05-11T22:29:32.324637
  
8100 / tcp
540591556 | 2024-05-18T17:04:18.537318
  
8443 / tcp
-470651509 | 2024-05-30T09:13:49.033785
  
8887 / tcp
447676004 | 2024-05-15T22:26:46.596093
  
9000 / tcp
159606397 | 2024-05-23T03:37:34.738159
  
55443 / tcp



Contact Us

Shodan ® - All rights reserved