120.77.166.131

Regular View Raw Data
Last Seen: 2024-04-25

GeneralInformation

Country China
City Shenzhen
Organization Aliyun Computing Co., LTD
ISP Hangzhou Alibaba Advertising Co.,Ltd.
ASN AS37963

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-51767 OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
CVE-2023-51385 In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
CVE-2023-51384 In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.
CVE-2023-48795 The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
CVE-2023-38408 The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
CVE-2021-41617 4.4sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
CVE-2021-36368 2.6An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass, since nothing is being bypassed.
CVE-2020-15778 6.8scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
CVE-2020-14145 4.3The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
CVE-2019-6111 5.8An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
CVE-2019-6110 4.0In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
CVE-2019-6109 4.0An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
CVE-2018-20685 2.6In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
CVE-2018-15919 5.0Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
CVE-2018-15473 5.0OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
CVE-2017-15906 5.0The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
CVE-2016-3115 5.5Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
CVE-2016-20012 4.3OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
CVE-2016-1908 7.5The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
CVE-2016-10708 5.0sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
CVE-2016-10012 7.2The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
CVE-2016-10011 2.1authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
CVE-2016-10010 6.9sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
CVE-2016-10009 7.5Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
CVE-2016-0777 4.0The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
CVE-2015-6564 6.9Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
CVE-2015-6563 1.9The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
CVE-2015-5600 8.5The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
CVE-2015-5352 4.3The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
CVE-2014-2653 5.8The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
CVE-2014-2532 5.8sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
CVE-2014-1692 7.5The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.
CVE-2012-0814 3.5The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
CVE-2011-5000 3.5The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
CVE-2011-4327 2.1ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.
CVE-2010-5107 5.0The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
CVE-2010-4755 4.0The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
CVE-2010-4478 7.5OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
CVE-2008-3844 9.3Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
CVE-2007-2768 4.3OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.

OpenPorts

11131517192123252637434953798082838497991001021041101191221351431751791952212643113894274444655035155415485545936316366666857717898008058068739929939991012102310241025102810991153116711771200123413111337140014331494151515211599160417231741180018011883191119251926195119622000200220082010201220502067207920812082208320872121215421812201222223232332234523752376240424552480256027612762300130483050308531093129326032683269329933013306331033523388338934013408340935413542355135543559356036903749378039524000402240404042406340644117415742424282432143694433444345004506473447474786484048994911494950015004500650075009501050255172520152225269543254355454556756725673582258585900590659385984598559865990600060016002600460806379644365036510660566336653666666676668669770017002707171717218740174157434744374447535754876577998800180098012801980238027803780558060807180818083808580878089809580998101810481078111812381268139814081808181824182528291833384078415842284298432844384468500855485758623863787008728876587668784878888038804882088238830883488388840884988508852886188658867888088818885888888909000900190029021903990429048905090519070909190929095910091059119913691519160920192959302930694189443953096009633976198009943999799989999100001013410443105541090910911110001111211210112111130012000123451414714265143441699216993180811824518553190001907120000202562054721025213792302325001255652701527017280152808028107300023000331337327643306035000377774415844818479904915249153500005007050100511065123554138550005544355553555546012961613
366084633 | 2024-04-22T13:44:29.198619
  
11 / tcp
-1036370807 | 2024-03-29T04:40:48.711688
  
13 / tcp
1212921144 | 2024-04-23T08:51:52.300868
  
15 / tcp
268196945 | 2024-04-24T02:35:17.170544
  
17 / tcp
829384519 | 2024-04-23T16:07:36.862739
  
19 / tcp
2116898107 | 2024-04-19T01:21:50.301439
  
21 / tcp
-2107996212 | 2024-04-20T15:48:21.785646
  
23 / tcp
921225407 | 2024-04-24T06:03:37.978116
  
25 / tcp
51259122 | 2024-04-02T16:49:38.204169
  
26 / tcp
1472866667 | 2024-04-22T01:35:32.051994
  
37 / tcp
-971970408 | 2024-04-16T18:30:39.101064
  
43 / tcp
588096080 | 2024-04-17T16:06:06.673277
  
49 / tcp
-1370420049 | 2024-04-25T10:38:13.243334
  
53 / tcp
-1770051369 | 2024-04-19T02:48:37.814422
  
79 / tcp
-1016177802 | 2024-04-16T15:25:09.616260
  
80 / tcp
-1344535834 | 2024-04-13T16:06:32.445863
  
82 / tcp
1261582754 | 2024-04-12T13:02:25.393679
  
83 / tcp
104385780 | 2024-04-23T03:59:47.848526
  
84 / tcp
-1428621233 | 2024-04-12T19:40:04.571167
  
97 / tcp
636169965 | 2024-04-11T17:10:36.075136
  
99 / tcp
-1279886438 | 2024-03-31T19:28:35.170802
  
100 / tcp
1126993057 | 2024-04-21T19:10:48.542715
  
102 / tcp
-1399940268 | 2024-04-25T12:43:50.325797
  
104 / tcp
-653033013 | 2024-04-25T00:20:36.776818
  
110 / tcp
141730637 | 2024-04-12T01:45:50.931507
  
119 / tcp
1723769361 | 2024-04-04T15:43:42.450116
  
122 / tcp
1302177452 | 2024-04-15T08:10:14.984628
  
135 / tcp
-382990917 | 2024-04-20T21:10:30.331528
  
143 / tcp
1381121983 | 2024-04-18T05:52:28.870042
  
175 / tcp
-399606100 | 2024-03-28T06:25:26.330524
  
179 / tcp
819727972 | 2024-04-23T05:12:43.742666
  
195 / tcp
1911457608 | 2024-04-09T15:45:01.095653
  
221 / tcp
-1180827859 | 2024-04-09T23:57:47.144867
  
264 / tcp
-1547976805 | 2024-04-25T10:57:47.142441
  
311 / tcp
-1639129386 | 2024-04-19T08:39:55.394186
  
389 / tcp
-349937125 | 2024-04-17T06:05:23.955057
  
427 / tcp
-971970408 | 2024-04-21T19:18:45.405898
  
444 / tcp
897328069 | 2024-04-01T13:41:36.116763
  
465 / tcp
-1399940268 | 2024-03-26T15:11:38.513551
  
503 / tcp
1850902677 | 2024-04-10T10:05:06.837182
  
515 / tcp
268285291 | 2024-04-11T15:44:34.343246
  
541 / tcp
1801869778 | 2024-04-24T00:53:41.401306
  
548 / tcp
285770450 | 2024-04-24T05:25:39.804665
  
554 / tcp
1308377066 | 2024-04-24T23:12:39.020270
  
593 / tcp
-1316491703 | 2024-04-03T01:56:39.635123
  
631 / tcp
1732481781 | 2024-04-24T09:04:45.917304
  
636 / tcp
-1960639992 | 2024-04-11T08:06:57.933587
  
666 / tcp
-1428621233 | 2024-03-27T15:57:28.648694
  
685 / tcp
-1888448627 | 2024-04-24T02:46:02.563209
  
771 / tcp
-2096652808 | 2024-04-17T23:40:59.494908
  
789 / tcp
-1175496255 | 2024-04-10T07:34:55.428390
  
800 / tcp
819727972 | 2024-04-17T23:20:52.858731
  
805 / tcp
-1598265216 | 2024-03-28T01:02:16.453147
  
806 / tcp
-1970692834 | 2024-04-24T05:14:23.112797
  
873 / tcp
-1242315829 | 2024-04-24T18:15:45.052726
  
992 / tcp
819727972 | 2024-04-21T23:21:12.278302
  
993 / tcp
1877619804 | 2024-04-08T05:11:19.845055
  
999 / tcp
-1327660293 | 2024-04-17T02:05:34.738349
  
1012 / tcp
546151771 | 2024-04-21T02:12:21.876724
  
1023 / tcp
1778988322 | 2024-03-30T19:12:01.460041
  
1024 / tcp
-1746074029 | 2024-04-20T16:22:20.284602
  
1025 / tcp
-2089734047 | 2024-04-11T21:40:16.019583
  
1028 / tcp
819727972 | 2024-04-12T05:16:42.318810
  
1099 / tcp
15018106 | 2024-04-13T02:40:52.880780
  
1153 / tcp
-1399940268 | 2024-04-18T14:10:22.307440
  
1167 / tcp
1842524259 | 2024-04-25T02:22:23.760915
  
1177 / tcp
-2046514463 | 2024-04-19T01:44:29.880142
  
1200 / tcp
677934968 | 2024-04-22T04:22:15.100585
  
1234 / tcp
660175493 | 2024-04-05T10:15:01.925340
  
1311 / tcp
-971970408 | 2024-04-24T18:55:39.543648
  
1337 / tcp
-1453516345 | 2024-04-09T01:00:22.258149
  
1400 / tcp
-182670276 | 2024-04-08T17:30:15.781544
  
1433 / tcp
-1049213899 | 2024-04-23T23:09:09.764532
  
1494 / tcp
539065883 | 2024-04-24T18:57:21.824706
  
1515 / tcp
-541815454 | 2024-04-24T20:42:44.778660
  
1521 / tcp
2087396567 | 2024-04-22T15:28:57.720335
  
1599 / tcp
550048729 | 2024-04-17T21:02:15.951328
  
1604 / tcp
-1608241410 | 2024-04-20T10:51:09.757981
  
1723 / tcp
-2081419599 | 2024-04-13T00:31:12.874066
  
1741 / tcp
921225407 | 2024-04-23T23:20:07.635725
  
1800 / tcp
1725077471 | 2024-04-09T20:05:25.339515
  
1801 / tcp
-2080784861 | 2024-04-15T01:02:23.660997
  
1883 / tcp
-1399940268 | 2024-04-23T12:38:32.548295
  
1911 / tcp
-1760806421 | 2024-04-15T11:18:23.482287
  
1925 / tcp
-2031152423 | 2024-04-23T09:20:12.579523
  
1926 / tcp
1911457608 | 2024-03-28T01:30:03.599002
  
1951 / tcp
1911457608 | 2024-04-11T13:34:54.491212
  
1962 / tcp
819727972 | 2024-04-13T14:34:39.173785
  
2000 / tcp
-1681927087 | 2024-04-08T08:32:35.028027
  
2002 / tcp
585675468 | 2024-04-01T23:00:38.178101
  
2008 / tcp
-1899074860 | 2024-04-25T12:07:39.726894
  
2010 / tcp
1763259671 | 2024-04-19T23:10:19.083034
  
2012 / tcp
-345718689 | 2024-04-10T21:35:50.198176
  
2050 / tcp
2087396567 | 2024-04-01T15:37:30.760070
  
2067 / tcp
-303199180 | 2024-04-18T05:48:37.312832
  
2079 / tcp
1911457608 | 2024-04-17T18:43:47.172661
  
2081 / tcp
1072892569 | 2024-03-31T18:31:11.329537
  
2082 / tcp
-1795027372 | 2024-04-25T02:52:03.721733
  
2083 / tcp
104385780 | 2024-04-19T02:11:11.264502
  
2087 / tcp
2047379038 | 2024-04-19T00:38:46.005802
  
2121 / tcp
-1881409212 | 2024-04-17T03:19:28.763730
  
2154 / tcp
546151771 | 2024-04-24T14:05:59.401576
  
2181 / tcp
-358801646 | 2024-04-04T13:42:18.741671
  
2201 / tcp
-1152923582 | 2024-04-21T08:02:44.585468
  
2222 / tcp
1662205251 | 2024-04-23T22:09:36.424798
  
2323 / tcp
819727972 | 2024-04-24T05:25:48.603870
  
2332 / tcp
1911457608 | 2024-04-23T04:58:53.965459
  
2345 / tcp
660175493 | 2024-04-20T03:36:03.539171
  
2375 / tcp
-747911285 | 2024-04-17T09:30:03.741355
  
2376 / tcp
-1888448627 | 2024-04-11T02:12:01.123622
  
2404 / tcp
1778988322 | 2024-04-18T18:24:39.393072
  
2455 / tcp
842535728 | 2024-04-24T07:21:08.560445
  
2480 / tcp
-1399940268 | 2024-03-27T17:47:19.625145
  
2560 / tcp
1975288991 | 2024-04-10T13:25:25.175491
  
2761 / tcp
-2089734047 | 2024-04-10T16:15:12.911057
  
2762 / tcp
165188539 | 2024-04-16T18:35:00.137070
  
3001 / tcp
-1097188123 | 2024-04-16T09:40:10.081602
  
3048 / tcp
-2089734047 | 2024-04-15T10:55:49.772676
  
3050 / tcp
1911457608 | 2024-04-22T13:41:50.157274
  
3085 / tcp
820958131 | 2024-04-10T21:43:48.149032
  
3109 / tcp
-1026951088 | 2024-04-01T21:19:02.607132
  
3129 / tcp
-1914158197 | 2024-04-22T13:22:37.935211
  
3260 / tcp
-879070264 | 2024-04-15T06:37:06.552992
  
3268 / tcp
-980525298 | 2024-04-18T22:56:38.616014
  
3269 / tcp
841014058 | 2024-04-11T18:55:38.318587
  
3299 / tcp
-1428621233 | 2024-04-20T18:22:53.889969
  
3301 / tcp
-1036944024 | 2024-04-24T11:07:26.893833
  
3306 / tcp
321971019 | 2024-04-25T08:00:48.579451
  
3310 / tcp
-1045760528 | 2024-04-11T10:00:52.706465
  
3352 / tcp
-1810987450 | 2024-04-20T12:59:51.889728
  
3388 / tcp
740837454 | 2024-04-25T01:31:34.692646
  
3389 / tcp
-1230049476 | 2024-04-20T02:39:21.768530
  
3401 / tcp
1363464823 | 2024-03-29T15:30:09.178076
  
3408 / tcp
-1099385124 | 2024-04-18T15:54:32.095512
  
3409 / tcp
770016595 | 2024-04-17T09:09:31.428621
  
3541 / tcp
550048729 | 2024-04-15T14:15:14.909471
  
3542 / tcp
198844676 | 2024-04-21T20:41:21.755960
  
3551 / tcp
165188539 | 2024-04-21T20:38:22.122141
  
3554 / tcp
-1399940268 | 2024-03-29T18:18:38.309079
  
3559 / tcp
-1399940268 | 2024-04-19T19:52:58.616901
  
3560 / tcp
-891714208 | 2024-04-05T03:15:46.795720
  
3690 / tcp
104385780 | 2024-04-12T19:00:02.040057
  
3749 / tcp
1830187220 | 2024-04-20T14:58:29.706549
  
3780 / tcp
-1327660293 | 2024-04-08T17:50:01.254676
  
3952 / tcp
1170207731 | 2024-04-21T05:43:43.249585
  
4000 / tcp
1911457608 | 2024-04-19T05:31:35.863648
  
4022 / tcp
-1461540015 | 2024-04-04T15:44:54.811765
  
4040 / tcp
-1230049476 | 2024-04-03T08:39:55.857625
  
4042 / tcp
2063598737 | 2024-04-24T05:21:57.517900
  
4063 / tcp
819727972 | 2024-04-08T16:49:24.563719
  
4064 / tcp
819727972 | 2024-04-01T06:20:10.217867
  
4117 / tcp
2087396567 | 2024-04-24T08:02:30.512394
  
4157 / tcp
-1914158197 | 2024-04-04T06:59:28.346514
  
4242 / tcp
957278843 | 2024-04-23T23:55:54.079993
  
4282 / tcp
-1250504565 | 2024-04-24T15:24:47.178753
  
4321 / tcp
-358801646 | 2024-04-15T15:42:14.911404
  
4369 / tcp
2087396567 | 2024-04-16T19:42:34.076597
  
4433 / tcp
2140295939 | 2024-04-20T22:48:33.999201
  
4443 / tcp
-345718689 | 2024-04-19T04:44:38.374597
  
4500 / tcp
546151771 | 2024-04-11T16:46:29.120159
  
4506 / tcp
-375604792 | 2024-04-23T04:24:34.959625
  
4734 / tcp
1911457608 | 2024-04-09T05:51:59.003602
  
4747 / tcp
709622286 | 2024-04-24T10:20:48.360476
  
4786 / tcp
1911457608 | 2024-04-08T22:54:34.883516
  
4840 / tcp
2087396567 | 2024-04-25T02:51:31.879598
  
4899 / tcp
-1329831334 | 2024-04-17T19:08:44.213250
  
4911 / tcp
585675468 | 2024-04-01T16:33:53.926416
  
4949 / tcp
819727972 | 2024-04-10T00:39:34.835640
  
5001 / tcp
-2089734047 | 2024-04-15T10:05:32.839842
  
5004 / tcp
-971970408 | 2024-04-04T08:43:36.354143
  
5006 / tcp
1726594447 | 2024-04-21T16:46:27.857431
  
5007 / tcp
1182822286 | 2024-04-25T12:03:55.746071
  
5009 / tcp
-1730858130 | 2024-04-23T20:12:07.025263
  
5010 / tcp
740837454 | 2024-04-24T21:27:57.102453
  
5025 / tcp
1741579575 | 2024-04-15T23:52:27.619755
  
5172 / tcp
921225407 | 2024-04-18T14:58:48.385327
  
5201 / tcp
585675468 | 2024-04-25T04:35:05.788013
  
5222 / tcp
1462885993 | 2024-04-16T11:09:23.225938
  
5269 / tcp
-1148066627 | 2024-04-19T13:50:18.351628
  
5432 / tcp
89142341 | 2024-04-11T03:45:09.651776
  
5435 / tcp
-1105333987 | 2024-04-11T00:23:05.369585
  
5454 / tcp
-1399940268 | 2024-04-08T21:33:15.707563
  
5567 / tcp
575925250 | 2024-04-01T21:58:50.227551
  
5672 / tcp
321971019 | 2024-04-23T02:51:36.076954
  
5673 / tcp
-1547976805 | 2024-04-21T22:22:41.764467
  
5822 / tcp
2087396567 | 2024-04-19T08:14:02.112905
  
5858 / tcp
497968563 | 2024-04-05T06:25:57.752330
  
5900 / tcp
-1249500036 | 2024-04-20T19:24:48.755874
  
5906 / tcp
-1399940268 | 2024-04-15T21:37:41.136452
  
5938 / tcp
1999272906 | 2024-04-21T21:38:04.248146
  
5984 / tcp
-805362002 | 2024-04-21T16:13:09.283772
  
5985 / tcp
2087396567 | 2024-04-04T23:01:23.594947
  
5986 / tcp
103159425 | 2024-04-05T09:01:31.200720
  
5990 / tcp
819727972 | 2024-04-15T04:31:51.438903
  
6000 / tcp
-1626979812 | 2024-04-03T12:49:23.792517
  
6001 / tcp
819727972 | 2024-04-22T19:37:10.751596
  
6002 / tcp
205347087 | 2024-03-28T02:39:03.026682
  
6004 / tcp
585675468 | 2024-04-04T19:30:44.018519
  
6080 / tcp
321971019 | 2024-04-17T18:31:22.680394
  
6379 / tcp
2087396567 | 2024-04-22T17:23:51.187823
  
6443 / tcp
-1399940268 | 2024-04-19T19:49:49.641920
  
6503 / tcp
-1327849035 | 2024-04-12T10:26:06.322976
  
6510 / tcp
921225407 | 2024-04-09T16:50:58.255940
  
6605 / tcp
165188539 | 2024-04-13T17:21:24.508391
  
6633 / tcp
-1899074860 | 2024-04-18T00:29:11.925824
  
6653 / tcp
4935895 | 2024-04-09T00:04:25.799138
  
6666 / tcp
1327134490 | 2024-04-20T11:58:59.416240
  
6667 / tcp
1830697416 | 2024-04-08T06:58:59.341470
  
6668 / tcp
-358801646 | 2024-04-08T10:01:35.968986
  
6697 / tcp
1827807483 | 2024-04-08T15:05:22.551782
  
7001 / tcp
1212285915 | 2024-04-13T02:42:34.213864
  
7002 / tcp
819727972 | 2024-04-12T19:56:21.136211
  
7071 / tcp
-1399940268 | 2024-04-16T05:47:18.777052
  
7171 / tcp
-1399940268 | 2024-04-02T10:07:28.753467
  
7218 / tcp
-1399940268 | 2024-03-29T18:02:27.954006
  
7401 / tcp
819727972 | 2024-04-14T04:35:30.179378
  
7415 / tcp
819727972 | 2024-04-21T11:18:14.749857
  
7434 / tcp
1320285193 | 2024-04-23T04:03:12.339949
  
7443 / tcp
820958131 | 2024-04-14T22:12:08.097059
  
7444 / tcp
-1399940268 | 2024-03-30T10:05:36.265143
  
7535 / tcp
2087396567 | 2024-04-10T23:37:14.016608
  
7548 / tcp
-1900404274 | 2024-03-30T12:53:06.461462
  
7657 / tcp
-1399940268 | 2024-04-01T21:01:34.502014
  
7998 / tcp
1072892569 | 2024-04-18T17:43:36.755308
  
8001 / tcp
103159425 | 2024-04-13T17:13:12.421412
  
8009 / tcp
-1399940268 | 2024-04-01T04:13:44.113783
  
8012 / tcp
366084633 | 2024-04-02T22:57:30.135843
  
8019 / tcp
-274082663 | 2024-04-18T09:11:15.347058
  
8023 / tcp
-2107996212 | 2024-04-23T21:55:55.482394
  
8027 / tcp
-1399940268 | 2024-04-20T13:42:41.612638
  
8037 / tcp
-1189269828 | 2024-04-17T14:51:23.154321
  
8055 / tcp
546151771 | 2024-04-05T08:05:23.505665
  
8060 / tcp
-1375131644 | 2024-04-19T02:46:14.665606
  
8071 / tcp
1632938300 | 2024-04-25T00:03:49.168911
  
8081 / tcp
819727972 | 2024-04-05T19:47:08.319522
  
8083 / tcp
1282941221 | 2024-04-24T01:25:15.969194
  
8085 / tcp
1996932384 | 2024-04-13T16:05:58.449280
  
8087 / tcp
1830187220 | 2024-04-20T04:28:02.439195
  
8089 / tcp
-1399940268 | 2024-04-17T01:29:31.750095
  
8095 / tcp
-749939074 | 2024-04-11T13:37:17.928033
  
8099 / tcp
-1839934832 | 2024-04-11T21:30:11.468431
  
8101 / tcp
-832380282 | 2024-04-22T21:04:43.296929
  
8104 / tcp
-1265999252 | 2024-04-16T16:18:30.747279
  
8107 / tcp
-2031152423 | 2024-04-05T09:30:27.139535
  
8111 / tcp
1544300041 | 2024-04-12T03:32:13.724057
  
8123 / tcp
-971970408 | 2024-04-21T06:19:23.008341
  
8126 / tcp
-971970408 | 2024-04-16T19:00:50.102589
  
8139 / tcp
1948301213 | 2024-04-03T10:53:37.979419
  
8140 / tcp
1234106376 | 2024-04-25T01:31:49.337108
  
8180 / tcp
2087396567 | 2024-04-11T21:43:59.392879
  
8181 / tcp
632542934 | 2024-04-13T11:12:08.056837
  
8241 / tcp
-1399940268 | 2024-04-09T20:22:31.611546
  
8252 / tcp
722711397 | 2024-04-22T17:51:19.942951
  
8291 / tcp
-1713467553 | 2024-04-14T02:05:14.643827
  
8333 / tcp
819727972 | 2024-04-02T14:36:02.353637
  
8407 / tcp
1911457608 | 2024-04-24T09:18:08.780819
  
8415 / tcp
1989907056 | 2024-04-22T20:00:44.277768
  
8422 / tcp
117101543 | 2024-04-11T09:23:33.258884
  
8429 / tcp
321971019 | 2024-04-17T10:29:15.345832
  
8432 / tcp
814794075 | 2024-04-21T21:20:49.759351
  
8443 / tcp
-1032713145 | 2024-04-18T16:15:02.929674
  
8446 / tcp
1652191202 | 2024-03-27T13:29:10.804644
  
8500 / tcp
1978059005 | 2024-04-19T08:53:48.428376
  
8554 / tcp
1911457608 | 2024-04-19T10:03:11.815803
  
8575 / tcp
-1013082686 | 2024-03-27T21:06:47.840488
  
8623 / tcp
-454087041 | 2024-04-14T11:08:39.266919
  
8637 / tcp
1911457608 | 2024-04-02T00:23:25.119376
  
8700 / tcp
-1399940268 | 2024-04-24T12:39:08.885275
  
8728 / tcp
1911457608 | 2024-04-10T20:59:27.364514
  
8765 / tcp
-1399940268 | 2024-04-13T06:30:19.968454
  
8766 / tcp
50497985 | 2024-04-05T08:38:32.841962
  
8784 / tcp
-1329831334 | 2024-04-01T04:24:26.405087
  
8788 / tcp
-2089734047 | 2024-04-02T20:30:57.879520
  
8803 / tcp
819727972 | 2024-04-03T09:45:21.026927
  
8804 / tcp
-1399940268 | 2024-04-16T03:03:17.025195
  
8820 / tcp
819727972 | 2024-04-13T03:36:57.624202
  
8823 / tcp
-136006866 | 2024-03-30T14:59:42.387353
  
8830 / tcp
819727972 | 2024-04-18T11:09:42.636755
  
8834 / tcp
1911457608 | 2024-04-01T18:34:25.795209
  
8838 / tcp
-1476017887 | 2024-04-13T03:12:39.130949
  
8840 / tcp
117101543 | 2024-04-19T04:15:01.369026
  
8849 / tcp
1911457608 | 2024-04-09T03:07:15.866050
  
8850 / tcp
-1399940268 | 2024-04-22T11:27:00.620765
  
8852 / tcp
-2096652808 | 2024-04-10T22:24:12.513545
  
8861 / tcp
-2046514463 | 2024-04-09T17:26:20.757289
  
8865 / tcp
-1428621233 | 2024-03-28T08:57:51.199982
  
8867 / tcp
2087396567 | 2024-04-22T17:14:30.601153
  
8880 / tcp
1282941221 | 2024-04-19T07:12:00.034453
  
8881 / tcp
1308377066 | 2024-04-23T21:46:50.590681
  
8885 / tcp
250824264 | 2024-04-05T15:56:51.156402
  
8888 / tcp
-1487943323 | 2024-04-20T14:14:06.734603
  
8890 / tcp
-2067028711 | 2024-04-18T05:33:38.370318
  
9000 / tcp
-1026951088 | 2024-04-20T09:47:10.355518
  
9001 / tcp
819727972 | 2024-04-14T18:59:04.945044
  
9002 / tcp
1504401647 | 2024-04-16T19:08:48.231759
  
9021 / tcp
-1626979812 | 2024-04-16T02:59:27.577973
  
9039 / tcp
819727972 | 2024-04-01T04:18:55.643560
  
9042 / tcp
2063598737 | 2024-04-21T18:17:05.144680
  
9048 / tcp
-1992735364 | 2024-04-16T18:27:07.437792
  
9050 / tcp
1220320909 | 2024-04-24T11:23:42.850114
  
9051 / tcp
-1399940268 | 2024-04-24T19:33:42.528900
  
9070 / tcp
-2031152423 | 2024-04-25T04:45:21.059656
  
9091 / tcp
819727972 | 2024-04-19T04:24:57.926850
  
9092 / tcp
1741579575 | 2024-04-22T16:35:14.347514
  
9095 / tcp
1911457608 | 2024-04-22T07:47:22.704895
  
9100 / tcp
205347087 | 2024-04-11T00:49:32.704704
  
9105 / tcp
1911457608 | 2024-04-03T02:56:36.932333
  
9119 / tcp
921225407 | 2024-04-11T06:53:50.263530
  
9136 / tcp
2087396567 | 2024-04-03T02:06:25.555951
  
9151 / tcp
1911457608 | 2024-04-05T02:01:26.897115
  
9160 / tcp
1212285915 | 2024-04-12T12:34:01.667995
  
9201 / tcp
-1729629024 | 2024-04-04T23:45:38.445924
  
9295 / tcp
-1746074029 | 2024-04-16T07:14:37.790601
  
9302 / tcp
117101543 | 2024-04-20T21:27:54.523876
  
9306 / tcp
1529351907 | 2024-04-23T11:09:59.822927
  
9418 / tcp
1261582754 | 2024-04-21T19:00:42.288476
  
9443 / tcp
-1888448627 | 2024-04-15T09:12:43.641069
  
9530 / tcp
-2096652808 | 2024-04-22T20:46:33.759813
  
9600 / tcp
104385780 | 2024-04-24T03:07:35.689709
  
9633 / tcp
-1013082686 | 2024-04-24T16:41:36.115901
  
9761 / tcp
641705735 | 2024-04-16T23:05:39.611654
  
9800 / tcp
248249138 | 2024-04-22T01:21:25.682820
  
9943 / tcp
-375604792 | 2024-04-22T13:43:01.008690
  
9997 / tcp
-347274959 | 2024-04-15T04:00:54.442510
  
9998 / tcp
1161309183 | 2024-04-15T16:21:26.346334
  
9999 / tcp
539065883 | 2024-04-11T03:38:14.909269
  
10000 / tcp
320677201 | 2024-04-22T03:20:25.781172
  
10134 / tcp
2033888749 | 2024-04-04T23:05:02.612724
  
10443 / tcp
2087396567 | 2024-04-02T02:07:23.000026
  
10554 / tcp
455076604 | 2024-04-20T18:37:39.084258
  
10909 / tcp
-1114821551 | 2024-04-19T00:55:29.140207
  
10911 / tcp
-2089734047 | 2024-04-21T13:47:18.536952
  
11000 / tcp
-375604792 | 2024-04-10T13:30:06.051365
  
11112 / tcp
671605376 | 2024-04-24T07:36:27.903506
  
11210 / tcp
-136006866 | 2024-04-23T12:04:07.275047
  
11211 / tcp
632542934 | 2024-04-23T02:35:32.645437
  
11300 / tcp
-1723613895 | 2024-04-09T22:18:11.613138
  
12000 / tcp
296364507 | 2024-04-20T22:38:24.858767
  
12345 / tcp
819727972 | 2024-04-17T19:03:44.712457
  
14147 / tcp
1835141311 | 2024-04-17T03:37:42.019981
  
14265 / tcp
165188539 | 2024-04-24T04:47:38.232558
  
14344 / tcp
-1840324437 | 2024-04-22T03:04:00.104350
  
16992 / tcp
1492413928 | 2024-04-10T17:04:53.581657
  
16993 / tcp
-1329831334 | 2024-04-18T14:58:47.652269
  
18081 / tcp
-1139539254 | 2024-04-13T06:33:49.733214
  
18245 / tcp
1261582754 | 2024-04-08T18:47:19.303605
  
18553 / tcp
1767345577 | 2024-04-01T03:04:20.335246
  
19000 / tcp
-1990350878 | 2024-04-20T00:14:51.428170
  
19071 / tcp
1900503736 | 2024-04-20T20:01:09.730073
  
20000 / tcp
-1399940268 | 2024-04-23T05:12:57.564300
  
20256 / tcp
-1189269828 | 2024-04-13T16:20:51.250735
  
20547 / tcp
1975288991 | 2024-04-02T15:31:48.373161
  
21025 / tcp
-1399940268 | 2024-04-21T16:38:21.317147
  
21379 / tcp
1082732927 | 2024-04-04T04:20:38.721938
  
23023 / tcp
-1399940268 | 2024-04-14T01:35:35.958360
  
25001 / tcp
165188539 | 2024-04-24T15:57:20.448555
  
25565 / tcp
-2089734047 | 2024-04-21T18:24:20.459742
  
27015 / tcp
1763259671 | 2024-04-09T10:12:17.544974
  
27017 / tcp
-1036370807 | 2024-04-24T18:52:36.033996
  
28015 / tcp
104385780 | 2024-03-26T14:39:58.354707
  
28080 / tcp
2009276894 | 2024-04-22T21:21:54.628969
  
28107 / tcp
1632932802 | 2024-04-02T00:11:18.715410
  
30002 / tcp
962700458 | 2024-04-20T22:36:24.691684
  
30003 / tcp
-147424911 | 2024-04-25T11:14:43.801904
  
31337 / tcp
2087396567 | 2024-04-18T02:04:04.696441
  
32764 / tcp
1842524259 | 2024-04-15T08:27:27.829766
  
33060 / tcp
-2089734047 | 2024-04-24T23:16:06.502426
  
35000 / tcp
-441419608 | 2024-04-20T03:19:33.811504
  
37777 / tcp
-433302150 | 2024-04-13T11:15:27.501090
  
44158 / tcp
-2089734047 | 2024-04-21T08:16:49.440268
  
44818 / tcp
-971970408 | 2024-04-16T00:53:23.140866
  
47990 / tcp
-2006700298 | 2024-04-12T02:42:17.082679
  
49152 / tcp
770016595 | 2024-04-11T12:15:56.383388
  
49153 / tcp
1741579575 | 2024-04-23T21:48:06.974452
  
50000 / tcp
290819026 | 2024-04-10T09:49:20.179823
  
50070 / tcp
1231376952 | 2024-04-25T11:35:23.990581
  
50100 / tcp
1865391109 | 2024-04-16T08:10:58.149369
  
51106 / tcp
819727972 | 2024-04-12T04:36:38.320767
  
51235 / tcp
819727972 | 2024-04-12T23:42:47.307642
  
54138 / tcp
819727972 | 2024-04-19T18:21:14.696799
  
55000 / tcp
474736340 | 2024-04-14T08:02:08.041951
  
55443 / tcp
2087396567 | 2024-04-19T11:41:36.608407
  
55553 / tcp
819727972 | 2024-04-05T00:38:35.839445
  
55554 / tcp
-1730858130 | 2024-04-25T14:13:00.177224
  
60129 / tcp
-1399940268 | 2024-04-25T14:00:41.899844
  
61613 / tcp



Contact Us

Shodan ® - All rights reserved