106.11.84.4

Regular View Raw Data
Last Seen: 2024-04-18
Tags:
honeypot

GeneralInformation

Hostnames shog3509n881244h5.1688.com
laoken.en.alibaba.com
alicdn.com
alikunlun.com
cmos.greencompute.org
m.intl.taobao.com
s.tbcdn.cn
Domains 1688.com alibaba.com alicdn.com alikunlun.com greencompute.org taobao.com tbcdn.cn 
Country China
City Shanghai
Organization Zhejiang Taobao Network Co.,Ltd
ISP Hangzhou Alibaba Advertising Co.,Ltd.
ASN AS37963

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-51767 7.0OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
CVE-2023-51385 6.5In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
CVE-2023-51384 5.5In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.
CVE-2023-48795 5.9The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
CVE-2023-38408 9.8The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
CVE-2021-41617 7.0sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
CVE-2021-36368 3.7An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass, since nothing is being bypassed.
CVE-2020-15778 7.8scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
CVE-2020-14145 5.9The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
CVE-2019-6111 5.9An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
CVE-2019-6110 6.8In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
CVE-2019-6109 6.8An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
CVE-2019-16905 7.8OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
CVE-2018-20685 5.3In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
CVE-2018-15919 5.3Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
CVE-2018-15473 5.3OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
CVE-2017-15906 5.3The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
CVE-2016-20012 5.3OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
CVE-2013-2220 7.5Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
CVE-2008-3844 Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
CVE-2007-3205 5.0The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.
CVE-2007-2768 OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.
1741579575 | 2024-04-11T20:06:42.861887
  
11 / tcp
847304496 | 2024-03-30T23:34:34.716272
  
13 / tcp
1741579575 | 2024-04-02T02:20:27.048693
  
15 / tcp
-1296032851 | 2024-04-04T12:36:06.494266
  
17 / tcp
829384519 | 2024-04-13T05:46:18.276448
  
19 / tcp
1210838212 | 2024-04-14T10:05:56.252928
  
21 / tcp
-980525298 | 2024-04-18T03:01:10.858742
  
25 / tcp
707919486 | 2024-04-17T22:50:56.611451
  
26 / tcp
-321444299 | 2024-04-16T12:56:35.626455
  
43 / tcp
-1101712668 | 2024-04-12T15:48:33.502578
  
49 / tcp
-42462918 | 2024-04-13T02:25:02.670618
  
53 / tcp
268196945 | 2024-04-08T09:02:51.156721
  
79 / tcp
392038239 | 2024-04-15T14:05:30.724704
  
80 / tcp
104385780 | 2024-04-16T20:45:36.332066
  
84 / tcp
-1746074029 | 2024-04-18T00:06:52.444770
  
85 / tcp
1134517380 | 2024-04-17T23:56:29.057725
  
89 / tcp
-1189269828 | 2024-04-02T21:55:31.963186
  
102 / tcp
-441419608 | 2024-04-16T05:05:27.071785
  
104 / tcp
321971019 | 2024-04-18T01:46:11.600522
  
110 / tcp
-1176831769 | 2024-04-12T02:55:35.862881
  
113 / tcp
141730637 | 2024-04-04T04:08:12.511488
  
119 / tcp
-858402222 | 2024-03-27T03:41:48.323884
  
143 / tcp
1308377066 | 2024-03-23T10:26:23.465943
  
175 / tcp
-399606100 | 2024-04-14T08:35:11.902420
  
179 / tcp
-1399940268 | 2024-04-09T04:56:07.568184
  
195 / tcp
-1399940268 | 2024-04-10T10:07:42.761447
  
221 / tcp
-654288545 | 2024-04-09T15:39:15.183172
  
264 / tcp
-1547976805 | 2024-04-16T06:08:40.123420
  
311 / tcp
-1743283776 | 2024-04-11T06:23:56.952923
  
389 / tcp
1530390632 | 2024-04-11T14:21:00.496282
  
427 / tcp
1973469789 | 2024-04-11T07:39:41.778321
  
443 / tcp
-971970408 | 2024-04-18T07:54:49.171411
  
444 / tcp
1911457608 | 2024-03-19T18:26:53.079801
  
448 / tcp
1210754493 | 2024-03-20T17:29:02.093935
  
502 / tcp
-904840257 | 2024-03-22T18:55:20.833753
  
503 / tcp
-1453516345 | 2024-04-05T03:31:21.893760
  
515 / tcp
155249582 | 2024-04-03T05:43:05.216316
  
548 / tcp
1060450357 | 2024-03-22T10:18:59.071669
  
554 / tcp
1308377066 | 2024-04-13T06:40:40.720178
  
593 / tcp
-1316491703 | 2024-04-16T00:16:10.543808
  
631 / tcp
-1036370807 | 2024-03-23T12:02:41.918439
  
636 / tcp
1300162323 | 2024-04-02T18:23:30.878624
  
666 / tcp
1830187220 | 2024-04-05T09:11:14.695300
  
771 / tcp
-339084706 | 2024-04-13T18:29:15.926278
  
789 / tcp
-1598265216 | 2024-03-30T19:23:26.993802
  
873 / tcp
-262532376 | 2024-04-12T15:12:33.321272
  
888 / tcp
-936692830 | 2024-04-10T08:59:52.758227
  
992 / tcp
689999346 | 2024-04-02T11:19:05.375920
  
995 / tcp
819727972 | 2024-04-14T09:26:29.112300
  
1023 / tcp
770016595 | 2024-04-08T13:31:33.168676
  
1024 / tcp
632542934 | 2024-04-08T07:51:20.038661
  
1025 / tcp
1282941221 | 2024-03-27T20:37:05.179034
  
1063 / tcp
1911457608 | 2024-04-13T11:13:13.216037
  
1099 / tcp
-740312032 | 2024-03-27T15:44:24.102403
  
1110 / tcp
669849225 | 2024-04-16T10:28:35.388918
  
1153 / tcp
233634112 | 2024-04-01T18:43:58.642871
  
1200 / tcp
996960436 | 2024-03-22T18:13:40.154286
  
1337 / tcp
637263328 | 2024-04-02T01:17:02.996383
  
1433 / tcp
-1049213899 | 2024-04-05T16:32:23.441845
  
1494 / tcp
-2017887953 | 2024-04-16T20:34:08.773040
  
1515 / tcp
1869192275 | 2024-04-03T14:13:06.047751
  
1521 / tcp
1911457608 | 2024-04-16T07:33:20.468191
  
1588 / tcp
550048729 | 2024-04-15T23:43:48.744374
  
1604 / tcp
1103582599 | 2024-04-14T16:07:12.497875
  
1723 / tcp
-1399940268 | 2024-04-18T08:53:10.193798
  
1800 / tcp
-1139999322 | 2024-03-29T11:17:24.247488
  
1801 / tcp
2087396567 | 2024-04-15T20:09:04.581819
  
1883 / tcp
1911457608 | 2024-04-01T22:10:58.756886
  
1911 / tcp
104385780 | 2024-04-13T08:41:54.212754
  
1925 / tcp
1690634669 | 2024-04-12T01:01:19.609192
  
1926 / tcp
-249504111 | 2024-04-17T06:36:27.907285
  
2000 / tcp
819727972 | 2024-04-10T03:25:48.140935
  
2001 / tcp
1230233688 | 2024-04-04T10:34:23.823693
  
2002 / tcp
171352214 | 2024-04-12T14:19:39.182027
  
2008 / tcp
970156442 | 2024-04-13T10:26:49.739268
  
2020 / tcp
-1839934832 | 2024-03-20T16:31:58.934320
  
2021 / tcp
-1327660293 | 2024-03-28T16:48:37.503711
  
2064 / tcp
-971970408 | 2024-04-11T05:58:06.974520
  
2067 / tcp
-42767839 | 2024-04-15T22:07:33.101446
  
2068 / tcp
1332894250 | 2024-04-11T16:52:27.719250
  
2081 / tcp
1082732927 | 2024-04-05T18:01:41.185345
  
2083 / tcp
819727972 | 2024-04-15T22:08:23.833303
  
2087 / tcp
546151771 | 2024-04-02T04:00:51.343423
  
2181 / tcp
-1152923582 | 2024-04-16T12:28:37.820666
  
2222 / tcp
1662205251 | 2024-04-04T10:43:11.830152
  
2323 / tcp
-1888448627 | 2024-04-16T13:58:29.615589
  
2345 / tcp
-893477759 | 2024-04-11T07:51:46.690151
  
2376 / tcp
921225407 | 2024-04-11T08:45:17.666200
  
2404 / tcp
-498480441 | 2024-04-01T10:41:37.407625
  
2525 / tcp
-2107996212 | 2024-03-25T16:29:33.090016
  
2549 / tcp
1543809371 | 2024-04-13T19:56:22.484670
  
2555 / tcp
1991883981 | 2024-03-28T02:38:40.684166
  
2560 / tcp
921225407 | 2024-04-12T23:11:30.129986
  
2570 / tcp
1004056929 | 2024-04-12T09:07:03.849711
  
2628 / tcp
-1453516345 | 2024-04-13T11:31:08.518651
  
2761 / tcp
401555314 | 2024-03-19T21:53:25.311214
  
2762 / tcp
-1839934832 | 2024-04-18T00:15:16.370541
  
3001 / tcp
-1105333987 | 2024-04-11T03:31:14.325801
  
3002 / tcp
1911457608 | 2024-04-15T22:01:20.540779
  
3050 / tcp
819727972 | 2024-03-26T11:39:38.961926
  
3053 / tcp
-1795027372 | 2024-03-29T20:53:36.553160
  
3055 / tcp
-2140303521 | 2024-03-28T23:29:33.647191
  
3068 / tcp
-441419608 | 2024-04-01T01:55:34.037172
  
3073 / tcp
1911457608 | 2024-03-22T18:59:13.200551
  
3074 / tcp
-1279886438 | 2024-03-30T00:47:14.903171
  
3086 / tcp
103159425 | 2024-04-09T15:32:16.609595
  
3115 / tcp
1332894250 | 2024-03-31T06:32:03.922819
  
3117 / tcp
-862070606 | 2024-03-31T04:04:42.669992
  
3260 / tcp
198844676 | 2024-04-16T14:56:36.797875
  
3268 / tcp
709622286 | 2024-04-17T12:54:00.156377
  
3269 / tcp
707919486 | 2024-03-31T23:14:35.661964
  
3301 / tcp
849822411 | 2024-04-14T21:06:18.658695
  
3306 / tcp
819727972 | 2024-04-12T15:19:35.756695
  
3310 / tcp
-1373613804 | 2024-03-20T19:14:29.425823
  
3311 / tcp
-2089734047 | 2024-03-24T08:03:33.587575
  
3388 / tcp
1908555143 | 2024-04-12T09:45:04.671869
  
3389 / tcp
321971019 | 2024-04-17T01:31:51.232837
  
3503 / tcp
198844676 | 2024-04-14T08:10:15.796926
  
3551 / tcp
1911457608 | 2024-03-27T11:16:11.514183
  
3568 / tcp
-1399940268 | 2024-03-25T21:16:31.881029
  
3569 / tcp
-891714208 | 2024-04-18T02:18:37.724198
  
3690 / tcp
770016595 | 2024-04-18T00:45:16.637136
  
3749 / tcp
2087396567 | 2024-04-17T07:48:35.554964
  
3780 / tcp
1642597142 | 2024-04-11T04:27:36.867373
  
3792 / tcp
-358707605 | 2024-04-01T22:50:38.676654
  
3922 / tcp
-409020351 | 2024-04-05T19:40:53.125856
  
4000 / tcp
1134517380 | 2024-03-28T00:26:49.333192
  
4022 / tcp
-2089734047 | 2024-03-24T23:50:12.476256
  
4042 / tcp
1741579575 | 2024-03-27T01:07:24.454524
  
4063 / tcp
-1399940268 | 2024-04-09T15:40:19.465709
  
4064 / tcp
2087396567 | 2024-04-15T08:28:53.182713
  
4157 / tcp
-1695841648 | 2024-03-26T09:36:14.062204
  
4242 / tcp
-1399940268 | 2024-04-11T11:12:12.567260
  
4282 / tcp
-1250504565 | 2024-04-01T13:27:28.633002
  
4321 / tcp
-1059554316 | 2024-04-09T02:15:54.297795
  
4369 / tcp
1140068775 | 2024-03-25T09:39:23.046922
  
4443 / tcp
819727972 | 2024-04-12T19:11:00.598831
  
4444 / tcp
-2089734047 | 2024-03-28T16:10:35.134250
  
4445 / tcp
-1810987450 | 2024-04-14T11:01:40.039649
  
4500 / tcp
-971970408 | 2024-04-08T23:02:29.364206
  
4506 / tcp
-1099385124 | 2024-03-22T10:15:57.216136
  
4643 / tcp
1321679546 | 2024-04-08T13:45:11.973686
  
4782 / tcp
671605376 | 2024-04-18T06:05:10.675258
  
4840 / tcp
-260710842 | 2024-03-29T06:53:33.776804
  
4899 / tcp
-1947777893 | 2024-04-16T09:57:01.299844
  
4911 / tcp
-358801646 | 2024-04-14T10:02:01.671429
  
4949 / tcp
2087396567 | 2024-03-27T09:12:50.010602
  
5001 / tcp
550048729 | 2024-04-14T01:35:10.112031
  
5005 / tcp
2087396567 | 2024-03-31T02:21:59.445321
  
5006 / tcp
-1428621233 | 2024-04-13T13:16:30.450745
  
5007 / tcp
1472866667 | 2024-03-22T07:52:40.556100
  
5009 / tcp
-1733645023 | 2024-04-17T00:03:13.326322
  
5025 / tcp
819727972 | 2024-04-14T22:04:28.407416
  
5090 / tcp
819727972 | 2024-03-30T18:57:33.429673
  
5150 / tcp
819727972 | 2024-04-03T03:42:42.889893
  
5172 / tcp
-1399940268 | 2024-04-01T18:06:51.605736
  
5201 / tcp
820958131 | 2024-03-23T11:08:48.035177
  
5209 / tcp
2087396567 | 2024-04-14T11:57:20.700955
  
5222 / tcp
-445721795 | 2024-03-29T19:44:55.790730
  
5400 / tcp
-981921233 | 2024-04-05T03:40:28.959874
  
5431 / tcp
-904840257 | 2024-04-14T19:22:58.038465
  
5432 / tcp
-1733645023 | 2024-04-11T10:24:43.994307
  
5435 / tcp
-409020351 | 2024-03-29T03:02:02.717791
  
5560 / tcp
-1105333987 | 2024-04-02T20:19:35.443394
  
5593 / tcp
-1399940268 | 2024-04-04T17:42:32.146920
  
5594 / tcp
-653033013 | 2024-03-21T09:03:06.668230
  
5595 / tcp
575925250 | 2024-03-31T08:16:55.692006
  
5672 / tcp
-1316398834 | 2024-04-11T08:40:16.460528
  
5858 / tcp
1754446871 | 2024-04-05T07:36:33.131747
  
5900 / tcp
819727972 | 2024-04-08T15:14:58.138940
  
5938 / tcp
1999272906 | 2024-04-12T17:05:08.139939
  
5984 / tcp
-1142844482 | 2024-03-19T23:24:27.072634
  
5985 / tcp
2087396567 | 2024-04-17T07:36:37.302401
  
5986 / tcp
1519486042 | 2024-04-11T14:43:02.539646
  
6000 / tcp
321971019 | 2024-04-15T15:42:17.421968
  
6001 / tcp
-928568622 | 2024-04-17T23:09:32.267245
  
6002 / tcp
2103111368 | 2024-04-04T15:05:24.465083
  
6363 / tcp
380146262 | 2024-03-30T00:56:03.253280
  
6511 / tcp
-1648456501 | 2024-03-21T17:20:49.945651
  
6560 / tcp
-1839934832 | 2024-03-26T17:16:52.361627
  
6561 / tcp
-784071826 | 2024-03-29T10:10:28.552069
  
6653 / tcp
770016595 | 2024-03-31T16:33:14.592614
  
6664 / tcp
4935895 | 2024-04-09T19:02:09.081340
  
6666 / tcp
641705735 | 2024-04-02T03:05:12.356717
  
6667 / tcp
-2089734047 | 2024-04-17T21:48:32.273472
  
6668 / tcp
-1399940268 | 2024-04-13T11:41:18.480464
  
6697 / tcp
1827807483 | 2024-04-08T17:12:53.272393
  
7001 / tcp
1632932802 | 2024-04-13T12:30:26.309825
  
7071 / tcp
-1399940268 | 2024-04-13T08:58:06.031369
  
7171 / tcp
2071407588 | 2024-04-17T14:20:46.813306
  
7218 / tcp
-136006866 | 2024-04-12T07:06:57.962006
  
7415 / tcp
-2096652808 | 2024-04-17T05:42:15.583538
  
7434 / tcp
328982367 | 2024-04-03T13:16:38.658942
  
7443 / tcp
-980525298 | 2024-04-13T03:31:07.553028
  
7465 / tcp
1119512965 | 2024-03-31T02:31:33.814372
  
7474 / tcp
-1344535834 | 2024-03-28T09:11:29.691287
  
7547 / tcp
-345718689 | 2024-04-16T05:50:17.088405
  
7548 / tcp
2087396567 | 2024-03-27T03:20:32.024153
  
7634 / tcp
632542934 | 2024-03-30T12:48:33.167910
  
7778 / tcp
-1559123399 | 2024-03-21T05:04:35.512939
  
7779 / tcp
1623746877 | 2024-03-19T12:23:50.920203
  
7887 / tcp
-984990168 | 2024-03-27T15:29:30.791050
  
7989 / tcp
819727972 | 2024-04-02T15:59:25.333335
  
7998 / tcp
1072892569 | 2024-04-15T03:26:50.988989
  
8001 / tcp
1320285193 | 2024-03-31T08:37:15.093930
  
8007 / tcp
-1261090339 | 2024-04-14T09:19:10.334171
  
8009 / tcp
841014058 | 2024-04-16T08:08:52.703795
  
8010 / tcp
-1399940268 | 2024-03-19T10:50:32.782396
  
8014 / tcp
165188539 | 2024-04-17T02:28:59.568401
  
8023 / tcp
669849225 | 2024-03-25T04:23:24.716107
  
8027 / tcp
819727972 | 2024-04-16T08:52:59.993446
  
8029 / tcp
-1399940268 | 2024-03-31T14:41:03.589110
  
8038 / tcp
1223115691 | 2024-04-17T18:25:18.971507
  
8040 / tcp
-2031152423 | 2024-04-14T16:13:24.859037
  
8041 / tcp
2087396567 | 2024-04-02T23:34:06.976523
  
8081 / tcp
-445721795 | 2024-03-30T21:43:44.824156
  
8083 / tcp
-971970408 | 2024-04-15T00:23:18.919865
  
8085 / tcp
-1399940268 | 2024-03-20T07:41:20.297593
  
8087 / tcp
2033888749 | 2024-04-13T00:25:06.823182
  
8089 / tcp
819727972 | 2024-03-22T05:40:58.570187
  
8095 / tcp
-1810987450 | 2024-04-04T18:24:05.082121
  
8101 / tcp
770016595 | 2024-04-03T05:14:24.548281
  
8123 / tcp
-1261090339 | 2024-04-12T05:03:24.300621
  
8126 / tcp
-1626979812 | 2024-03-28T13:54:23.842643
  
8143 / tcp
1161309183 | 2024-04-09T20:39:21.993186
  
8181 / tcp
1911457608 | 2024-03-28T05:06:30.522973
  
8182 / tcp
-678709746 | 2024-04-10T21:28:46.279689
  
8200 / tcp
-1399940268 | 2024-03-21T02:11:45.611355
  
8236 / tcp
-407828767 | 2024-04-03T23:31:10.381732
  
8291 / tcp
-1839934832 | 2024-04-01T17:32:20.167222
  
8403 / tcp
-2089734047 | 2024-04-16T15:23:47.715007
  
8417 / tcp
819727972 | 2024-03-24T07:34:24.029226
  
8425 / tcp
-2089734047 | 2024-03-27T08:30:34.556943
  
8428 / tcp
-653033013 | 2024-04-08T17:30:10.101339
  
8442 / tcp
678632778 | 2024-03-24T11:34:38.531144
  
8443 / tcp
401555314 | 2024-03-27T16:47:03.778679
  
8448 / tcp
1652191202 | 2024-04-16T12:35:18.774958
  
8500 / tcp
410249975 | 2024-04-01T16:17:03.605780
  
8575 / tcp
842535728 | 2024-04-17T02:19:52.264771
  
8649 / tcp
1126993057 | 2024-03-24T13:31:43.258653
  
8809 / tcp
-358801646 | 2024-03-23T21:26:14.635131
  
8811 / tcp
-1888448627 | 2024-04-10T08:32:35.645486
  
8820 / tcp
1911457608 | 2024-03-31T07:52:25.262088
  
8821 / tcp
819727972 | 2024-03-25T03:26:01.032589
  
8822 / tcp
-2089734047 | 2024-04-02T18:33:06.040082
  
8826 / tcp
539065883 | 2024-04-13T22:51:48.151278
  
8834 / tcp
819727972 | 2024-03-27T03:12:10.421440
  
8839 / tcp
-441419608 | 2024-03-26T06:02:40.241847
  
8840 / tcp
-1261090339 | 2024-03-19T15:44:55.823732
  
8847 / tcp
2087396567 | 2024-04-05T22:32:55.413896
  
8880 / tcp
819727972 | 2024-04-12T10:53:41.506316
  
8889 / tcp
1966849516 | 2024-04-14T14:53:08.178684
  
9000 / tcp
-1026951088 | 2024-04-11T02:37:30.842662
  
9001 / tcp
2087396567 | 2024-04-14T00:58:22.198983
  
9002 / tcp
1189133115 | 2024-04-11T21:43:13.099423
  
9022 / tcp
-1140468363 | 2024-03-23T06:15:23.575842
  
9026 / tcp
1489954473 | 2024-03-29T03:55:09.134540
  
9040 / tcp
671605376 | 2024-04-14T21:19:48.913610
  
9042 / tcp
-1888448627 | 2024-03-30T00:55:57.802026
  
9048 / tcp
-784071826 | 2024-04-14T01:01:11.306435
  
9051 / tcp
-2089734047 | 2024-04-12T13:22:53.613222
  
9082 / tcp
-1839934832 | 2024-03-27T02:42:29.563466
  
9088 / tcp
799468586 | 2024-04-09T06:52:33.256523
  
9091 / tcp
-826610984 | 2024-04-08T11:41:49.754825
  
9092 / tcp
-1032713145 | 2024-04-17T15:26:16.089100
  
9095 / tcp
-303199180 | 2024-04-10T08:49:51.166613
  
9100 / tcp
-2080784861 | 2024-04-11T10:28:15.570403
  
9108 / tcp
-1399940268 | 2024-03-22T07:17:04.908414
  
9109 / tcp
171352214 | 2024-04-15T01:54:57.380168
  
9151 / tcp
-1375131644 | 2024-04-10T06:26:52.393331
  
9160 / tcp
-1392039491 | 2024-04-16T23:47:56.640301
  
9191 / tcp
819727972 | 2024-04-15T15:07:35.385034
  
9201 / tcp
320677201 | 2024-03-27T06:37:23.873215
  
9202 / tcp
-585940771 | 2024-03-26T06:27:26.617761
  
9204 / tcp
233634112 | 2024-03-20T10:29:53.100867
  
9418 / tcp
-1991224470 | 2024-03-30T01:09:42.725374
  
9500 / tcp
-1399940268 | 2024-03-27T22:58:35.637305
  
9530 / tcp
1282941221 | 2024-04-11T18:32:43.984522
  
9600 / tcp
546151771 | 2024-04-17T07:59:19.613252
  
9633 / tcp
1911457608 | 2024-04-12T19:07:35.553065
  
9690 / tcp
2070013657 | 2024-04-08T08:09:24.502978
  
9876 / tcp
1712606111 | 2024-04-17T22:01:58.459316
  
9943 / tcp
585675468 | 2024-04-16T20:33:22.129271
  
9944 / tcp
-1917695220 | 2024-04-16T21:02:31.790321
  
9998 / tcp
1161309183 | 2024-04-15T02:58:34.671259
  
9999 / tcp
291723434 | 2024-04-16T06:18:27.202450
  
10000 / tcp
1492413928 | 2024-04-10T07:50:38.516362
  
10001 / tcp
-1888448627 | 2024-04-16T02:02:46.232404
  
10134 / tcp
-746114901 | 2024-04-16T15:59:29.774665
  
10250 / tcp
-784071826 | 2024-04-05T18:05:34.650824
  
10443 / tcp
-1839934832 | 2024-04-04T17:39:05.510511
  
10554 / tcp
-801484042 | 2024-04-02T13:45:32.768390
  
10911 / tcp
819727972 | 2024-03-27T21:20:05.549158
  
11000 / tcp
-1399940268 | 2024-04-11T06:45:25.621297
  
11210 / tcp
-136006866 | 2024-03-23T18:19:45.280154
  
11211 / tcp
-457235091 | 2024-03-26T08:24:50.966459
  
12000 / tcp
488204803 | 2024-04-15T14:03:48.933630
  
12345 / tcp
-1399940268 | 2024-03-28T12:13:20.339923
  
14147 / tcp
819727972 | 2024-04-16T00:56:26.611154
  
14265 / tcp
-1399940268 | 2024-03-28T23:19:43.473781
  
14344 / tcp
-1810987450 | 2024-04-08T08:04:34.008709
  
17000 / tcp
-2046514463 | 2024-04-16T13:21:26.078992
  
18081 / tcp
1911457608 | 2024-04-03T05:55:08.583013
  
18245 / tcp
-801484042 | 2024-04-16T02:10:19.679935
  
19000 / tcp
873425297 | 2024-04-13T04:36:31.465954
  
19071 / tcp
1900503736 | 2024-04-12T13:24:40.325655
  
20000 / tcp
639175818 | 2024-04-03T05:14:28.876767
  
20547 / tcp
-1730858130 | 2024-03-21T03:22:11.925845
  
21025 / tcp
-1839934832 | 2024-04-09T22:12:46.462448
  
21379 / tcp
-358801646 | 2024-04-05T19:48:03.228712
  
22222 / tcp
1632932802 | 2024-04-18T06:11:54.512255
  
23023 / tcp
-1344535834 | 2024-04-11T07:02:31.639448
  
23424 / tcp
320677201 | 2024-04-02T23:53:52.660035
  
25001 / tcp
-1399940268 | 2024-04-17T17:55:36.816847
  
25565 / tcp
2098371729 | 2024-03-31T19:07:06.972698
  
27015 / tcp
921225407 | 2024-03-24T10:41:52.737123
  
28015 / tcp
819727972 | 2024-03-26T16:52:59.018042
  
28080 / tcp
-1681927087 | 2024-04-12T23:42:52.305126
  
30002 / tcp
756886313 | 2024-04-05T04:07:33.732285
  
31337 / tcp
1082732927 | 2024-04-12T18:31:55.539203
  
32400 / tcp
-984990168 | 2024-04-03T10:10:48.436708
  
32764 / tcp
-971970408 | 2024-04-01T08:51:54.146644
  
33060 / tcp
1911457608 | 2024-04-09T14:00:32.374978
  
35000 / tcp
-1428621233 | 2024-04-14T13:06:12.631580
  
37777 / tcp
1208318993 | 2024-03-24T10:26:46.409723
  
41800 / tcp
2054287019 | 2024-04-14T09:30:40.344729
  
44158 / tcp
-971970408 | 2024-03-31T00:10:56.655152
  
47990 / tcp
750552733 | 2024-04-15T14:29:07.526463
  
49152 / tcp
-358801646 | 2024-04-17T04:01:43.275313
  
50000 / tcp
-1142844482 | 2024-03-31T07:44:19.412951
  
50100 / tcp
1642597142 | 2024-04-08T05:18:19.949280
  
51235 / tcp
1911457608 | 2024-04-13T04:11:04.243871
  
55000 / tcp
539065883 | 2024-04-10T02:47:49.491801
  
55443 / tcp
2087396567 | 2024-04-17T17:15:12.846910
  
55553 / tcp
-754988795 | 2024-03-28T16:32:46.915232
  
55554 / tcp
-1990350878 | 2024-04-03T07:21:27.027783
  
60001 / tcp
1261582754 | 2024-04-01T15:00:50.781695
  
60010 / tcp
-801484042 | 2024-04-12T02:56:34.749588
  
60129 / tcp
-154107716 | 2024-04-03T13:37:31.557321
  
61616 / tcp
-860824904 | 2024-04-16T22:50:35.487733
  
62078 / tcp



Contact Us

Shodan ® - All rights reserved