39.107.11.210

Regular View Raw Data
Last Seen: 2024-05-08

GeneralInformation

Hostnames wwwcache.10219.com
wwwhost-ox001.10219.com
prodkm.11222.cn
ahengheahvongyi.1688.com
doto.arn.1688.com
right.arn.1688.com
asjvbongjixie.1688.com
baidabengye.1688.com
diqian.1688.com
goak02.1688.com
grinword.1688.com
jonghvogs.1688.com
rvyinooshon90999.1688.com
shog141778j891985.1688.com
shog1419612529462.1688.com
shog1429548421557.1688.com
shog2j628j8o33140.1688.com
shog6241b045g3109.1688.com
shog641o1n76057k9.1688.com
shog6t37772q01486.1688.com
shop0397112nnc805.1688.com
shop1370624548167.1688.com
shop47797351729o3.1688.com
xiaofen17.1688.com
xvsheng0710.1688.com
ydbvtterfjy.1688.com
yqgjoss.1688.com
ysn1288.1688.com
ytenrvbber.1688.com
yvonfon.1688.com
ywlanlong.1688.com
zotog168.1688.com
m.2cloo.com
config.56xiniao.com
aliapp-open.9game.cn
ynuf.aliapp.org
aontroat.ojibobo-ina.aon.alibaba-inc.com
bvddho.ojibobo-ina.aon.alibaba-inc.com
dotov.ojibobo-ina.aon.alibaba-inc.com
fengxing.ojibobo-ina.aon.alibaba-inc.com
gre-jstroaker.ojibobo-ina.aon.alibaba-inc.com
hb-ogi.ojibobo-ina.aon.alibaba-inc.com
ornor.ojibobo-ina.aon.alibaba-inc.com
va.stors.ojibobo-ina.aon.alibaba-inc.com
tvrkey.ojibobo-ina.aon.alibaba-inc.com
arms.alibaba-inc.com
builder.alibaba-inc.com
autoumars.cs.daily.alibaba-inc.com
dsq.alibaba-inc.com
dtoolnlsql.alibaba-inc.com
pai.dw.alibaba-inc.com
iperformance2.alibaba-inc.com
pre-phenix.alibaba-inc.com
wap.alibaba-inc.com
0995.bjog.ahino.alibaba.com
dvbbo.alibaba.com
bvahvon.en.alibaba.com
fijebroker-jzd-gk.alibaba.com
filebroker-lzd-my.alibaba.com
123.fn.alibaba.com
n.hebred.alibaba.com
os30-sg94.dogbridge.oserver-jozodo.alibaba.com
vn.alibaba.com
tesla-server.alibaba.net
acs-mum.alibabachengdun.com
pgw-cld-s.alicdn.com
barrnet.aliexpress.com
filebroker.aliexpress.com
baseus6.pt.aliexpress.com
merrys.pt.aliexpress.com
roundrinn.aliexpress.com
api.alihealth.cn
file.aliwork.com
ron-ovth-test.an-shonghoi.ojiyvn-ina.aon.aliyun-inc.com
esa.ojiyvn-ina.aon.aliyun-inc.com
sts-internoj.ev-aentroj-1.ojiyvn-ina.aon.aliyun-inc.com
gde.ojiyvn-ina.aon.aliyun-inc.com
gre-aonf-server-an.ojiyvn-ina.aon.aliyun-inc.com
gresto-gvbjia.ojiyvn-ina.aon.aliyun-inc.com
grod-obn-taonf.ojiyvn-ina.aon.aliyun-inc.com
nst.ojiyvn-ina.aon.aliyun-inc.com
oaaovnt-svb-grofije-an-shonghoi-tyjr-shore.ojiyvn-ina.aon.aliyun-inc.com
ron-internoj.og-northeost-1.ojiyvn-ina.aon.aliyun-inc.com
soghon-event.ojiyvn-ina.aon.aliyun-inc.com
netria-ans.v3.ojiyvn-ina.aon.aliyun-inc.com
gre.netria-ans.v3.ojiyvn-ina.aon.aliyun-inc.com
yvndvn-oen-an-hongzhov.ojiyvn-ina.aon.aliyun-inc.com
eci-data-cn-chengdu.aliyun-inc.com
presto-public.aliyun-inc.com
qt-stability-locate.aliyun-inc.com
aliyun.com
ai-op.aliyun.com
ais-delivery.aliyun.com
alimail-cn.aliyun.com
aliserver.aliyun.com
dns.aonsoje.aliyun.com
tn.aonsoje.aliyun.com
vvg.aonsoje.aliyun.com
yvndvn.aonsoje.aliyun.com
apr.aliyun.com
asahot-aas.aliyun.com
aurora2.aliyun.com
bloan.aliyun.com
booking-my.aliyun.com
08yt.blog.china.aliyun.com
cr-private-share.cn-hangzhou.aliyun.com
eci-inner.cn-heyuan.aliyun.com
eci-vpc.cn-shanghai.aliyun.com
bff-cn-shanghai-finance-1.data.aliyun.com
devops.aliyun.com
dfxytea.aliyun.com
djsz99.aliyun.com
dondong.aliyun.com
noriodi-an-shonghoi.doto.aliyun.com
app110835.eapps.aliyun.com
hadjy.aliyun.com
hotel.aliyun.com
huagangshoushi.aliyun.com
master.jenkins.aliyun.com
linkgn-useast-internal.aliyun.com
luxiaunt.aliyun.com
moss-resource-api-tisplus-online.aliyun.com
serviae.an-beijing.noxaongvte.aliyun.com
odins.aliyun.com
ojibobodood.aliyun.com
p2p-msc.aliyun.com
zb-dsw-dsw50440-80.pcs-svr.aliyun.com
poctest-qwerasdf.aliyun.com
pop3.aliyun.com
pre-hot.aliyun.com
pre-phenix.aliyun.com
pre-quanxi-qa-tlog.aliyun.com
ups_lazada.security-nash.aliyun.com
shop1418229697260.aliyun.com
shop1443459323612.aliyun.com
shop36489204.aliyun.com
shop36825243.aliyun.com
shop36912637.aliyun.com
shop36940336.aliyun.com
shop382882869.aliyun.com
uw-insight2-green-online.aliyun.com
ververica-share.aliyun.com
wpk.aliyun.com
xy.aliyun.com
adda-inner-shore.aliyuncs.com
eas-vga.an-shenzhen.aliyuncs.com
doahejg.aliyuncs.com
log.aliyuncs.com
eas.ne-eost-1.aliyuncs.com
dofogenogi.og-sovtheost-1.aliyuncs.com
eai-inner.og-sovtheost-2.aliyuncs.com
xingzhen-shore.aliyuncs.com
adiu.amap.com
apistore.amap.com
m5-x.amap.com
poi-picture.amap.com
poigate.amap.com
sns.amap.com
aero.cainiao-inc.com
dcc.cainiao-inc.com
pre-apollo.cainiao-inc.com
tp-unify.cainiao-inc.com
combine.cainiao.com
management-open.gfn.cainiao.com
picasso.cainiao.com
task.cainiao.com
win.cainiao.com
z11.cnzz.com
ops.danniao.com
alidocs-activity.dingtalk.com
bridge.dingtalk.com
login.dingtalk.com
vip.dingtalk.com
app118614.eapps.dingtalkcloud.com
clairvoyant.ele.me
wwwapp.faas.ele.me
wwwproduction.faas.ele.me
wwwproxy.faas.ele.me
wwwservice.faas.ele.me
lpdv5.ele.me
nrshop.ele.me
waltz.ele.me
h5api.m.etao.com
wwwcontrol.fl.fliggy.com
www.zqlgzly-9.fliggy.com
survey.goofish.com
marketplace.hemaos.com
huasuzx.com
mum.hzchengdun.com
mail.hzqzhcs.com
astore-alsc-l100crm.koubei.com
api-th.lazada-seller.cn
gsp-stg.lazada-seller.cn
sellercenter-ph-staging.lazada-seller.cn
sellercenter-vn.lazada-seller.cn
datafeeds.lazada.co.id
university.lazada.co.id
acs-wapa.lazada.co.th
cs.lazada.co.th
alimebot.lazada.com
booking-th.lazada.com
p-p.dev-arise.lazada.com
prs.lazada.com
least.lazada.com.my
logistics.lazada.com.my
psc-alimebot.lazada.com.my
login.sellercenter.lazada.com.my
admin.lazada.com.ph
education-staging.lazada.com.ph
psc-alimebot.lazada.com.ph
affiliate.lazada.sg
checkout-m.lazada.sg
filebroker-src-staging.lazada.sg
p-p.lazada.sg
pages.lazada.sg
redmart.lazada.sg
servicemarket.lazada.sg
shop-alimebot.lazada.sg
stp.lazada.sg
sug.lazada.sg
member-m.lazada.vn
map-my.lel.asia
map-vn.lel.asia
reward-store.lingxigames.com
pkcity.com
drive-m.quark.cn
drive-pc.quark.cn
redmart.com
www1.tarpf.saee.org.cn
sui.shuqiapi.com
zm.sm-tc.cn
chajian.sto.cn
cloudinter-linkgateway.sto.cn
mail.sunwayworld.com
433sgort.taobao.com
880629.taobao.com
svaoi.donggv.taobao.com
gonshi.taobao.com
i56.taobao.com
ngd.n.taobao.com
nedretoij.norketingbox.taobao.com
shog36222363.taobao.com
shog36237394.taobao.com
shog36304596.taobao.com
shog36308341.taobao.com
shog36639928.taobao.com
shog36735366.taobao.com
shog37074687.taobao.com
shop36203510.taobao.com
shop36441480.taobao.com
shop36820160.taobao.com
ajiak.nz.sinbo.taobao.com
syan-seorah.taobao.com
vjond.taobao.com
zhooshong.taobao.com
barn.taobao.org
brito.tmall.com
msc.cbbs.tmall.com
dkvon.tmall.com
fengyvsn.tmall.com
jingzhvongjinyiqi.tmall.com
ongfo.tmall.com
deb.san.tmall.com
survey.tmall.com
tengxvnznsb.tmall.com
tgyjiojv.tmall.com
txd-goge-bvijder.tmall.com
zhooshong.tmall.com
h5api.m.tmall.hk
www.c.uc.cn
m-api.uc.cn
apm.umeng.com
msg.umeng.com
www6.alrouter.xixikf.cn
www9.art.xixikf.cn
www4.bubastis.xixikf.cn
www8.crayola.xixikf.cn
www8.cwh.xixikf.cn
www0.pamela.xixikf.cn
www9.smt2.xixikf.cn
mi.atm.youku.com
mail.yuanzhou.com.cn
apr.yunos-inc.com
zhijinbao.net
mail.zushoushou.com
Domains 10219.com 11222.cn 1688.com 2cloo.com 56xiniao.com 9game.cn aliapp.org alibaba-inc.com alibaba.com alibaba.net alibabachengdun.com alicdn.com aliexpress.com alihealth.cn aliwork.com aliyun-inc.com aliyun.com aliyuncs.com amap.com cainiao-inc.com cainiao.com cnzz.com danniao.com dingtalk.com dingtalkcloud.com ele.me etao.com fliggy.com goofish.com hemaos.com huasuzx.com hzchengdun.com hzqzhcs.com koubei.com lazada-seller.cn lazada.co.id lazada.co.th lazada.com lazada.com.my lazada.com.ph lazada.sg lazada.vn lel.asia lingxigames.com pkcity.com quark.cn redmart.com saee.org.cn shuqiapi.com sm-tc.cn sto.cn sunwayworld.com taobao.com taobao.org tmall.com tmall.hk uc.cn umeng.com xixikf.cn youku.com yuanzhou.com.cn yunos-inc.com zhijinbao.net zushoushou.com 
Country China
City Beijing
Organization Aliyun Computing Co., LTD
ISP Hangzhou Alibaba Advertising Co.,Ltd.
ASN AS37963

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-51767 OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
CVE-2023-51385 In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
CVE-2023-51384 In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.
CVE-2023-48795 The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
CVE-2023-38408 The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
CVE-2023-37582 The RocketMQ NameServer component still has a remote command execution vulnerability as the CVE-2023-33246 issue was not completely fixed in version 5.1.1. When NameServer address are leaked on the extranet and lack permission verification, an attacker can exploit this vulnerability by using the update configuration function on the NameServer component to execute commands as the system users that RocketMQ is running as. It is recommended for users to upgrade their NameServer version to 5.1.2 or above for RocketMQ 5.x or 4.9.7 or above for RocketMQ 4.x to prevent these attacks.
CVE-2023-33246 9.8RocketMQ versions 5.1.0 and below are vulnerable to Arbitrary Code Injection
CVE-2021-41617 4.4sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
CVE-2021-36368 2.6An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass, since nothing is being bypassed.
CVE-2020-15778 6.8scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
CVE-2020-14145 4.3The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
CVE-2019-6111 5.8An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
CVE-2019-6110 4.0In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
CVE-2019-6109 4.0An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
CVE-2019-16905 4.4OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
CVE-2018-20685 2.6In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
CVE-2018-15919 5.0Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
CVE-2018-15473 5.0OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
CVE-2017-15906 5.0The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
CVE-2016-3115 5.5Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
CVE-2016-20012 4.3OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
CVE-2016-1908 7.5The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
CVE-2016-10708 5.0sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
CVE-2016-10012 7.2The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
CVE-2016-10011 2.1authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
CVE-2016-10010 6.9sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
CVE-2016-10009 7.5Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
CVE-2016-0777 4.0The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
CVE-2015-6564 6.9Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
CVE-2015-6563 1.9The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
CVE-2015-5600 8.5The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
CVE-2015-5352 4.3The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
CVE-2014-2653 5.8The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
CVE-2014-2532 5.8sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
CVE-2014-1692 7.5The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.
CVE-2012-0814 3.5The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
CVE-2011-5000 3.5The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
CVE-2011-4327 2.1ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.
CVE-2010-5107 5.0The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
CVE-2010-4755 4.0The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
CVE-2010-4478 7.5OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
CVE-2008-3844 9.3Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
CVE-2007-2768 4.3OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.

OpenPorts

1113151719202123253743495370798083849295102104110111113131135139143179199221225264311389427443444449465502503515522548554587593631636666771800830873902992993995999101210231025102810991153117712001234133713661433147115151521159916041723180018011833188319111926196220002002200820122057206620672081208320872095212121262154218122222233232323322345240424802554255625622567262827612762300130503060307930803081308230933108311431193120321132603268326932993306331033883389341235413542354835513561356637493780379037923954400040224040406340644157424242824321436944334443444445004506474747824786484048484899491149495001500350055006500750095010502550905172520152095222526953215431543254355494550056005601560456725673585859385984598660006001600260066010644366006602665366646666666866976887700170057170717172187415743474437474749375477548763476577999800180078009801580198029803280378040804380448056806080668069807280818082808380848085808680878089809180988101810881118123812681398140818182008291833384018408840984148416841784218424844385458554857585868623864987288810881388168819882088278829883488678880888888899000900190029005901190269027902990369040904290459050905190909091909290959100910191049108915191609201920592079216922193009306941894439530960096339682976198009876994399449966998199919997999899991000010001101341025010443105541090910911110001111211211113001143412000123451414714265143441601016030169921699318245185531900019071200002025620547210252137923424250012510525565270152701728015300023000331337327643306035000377774180044818479904915249153500005007050100511065123554138550005544355553555546000160129616136161662078
401555314 | 2024-04-13T17:32:52.215846
  
11 / tcp
1286504516 | 2024-04-30T02:53:05.554529
  
13 / tcp
-971970408 | 2024-04-25T02:55:37.111839
  
15 / tcp
268196945 | 2024-05-03T09:44:14.595189
  
17 / tcp
1978059005 | 2024-04-19T05:13:29.626681
  
19 / tcp
-1013082686 | 2024-04-17T13:45:40.312760
  
20 / tcp
1564456597 | 2024-04-28T11:29:18.204809
  
21 / tcp
-2107996212 | 2024-04-22T06:20:58.913587
  
23 / tcp
-1375131644 | 2024-05-04T20:12:10.084100
  
25 / tcp
1443000738 | 2024-04-18T21:25:01.120060
  
37 / tcp
-971970408 | 2024-04-23T08:16:41.848992
  
43 / tcp
1160472910 | 2024-05-05T02:17:17.355617
  
49 / tcp
1127377266 | 2024-04-22T07:47:25.599103
  
53 / tcp
175081126 | 2024-05-08T00:52:29.053657
  
70 / tcp
-2101653054 | 2024-05-03T05:20:10.734575
  
79 / tcp
1051970120 | 2024-05-07T18:46:08.149884
  
80 / tcp
550048729 | 2024-04-12T11:36:40.571929
  
83 / tcp
641705735 | 2024-05-04T16:53:35.968021
  
84 / tcp
-1399940268 | 2024-04-30T11:54:08.182773
  
92 / tcp
321971019 | 2024-04-28T09:51:40.392258
  
95 / tcp
2063598737 | 2024-05-06T08:59:49.774782
  
102 / tcp
671605376 | 2024-05-06T02:18:29.490265
  
104 / tcp
205347087 | 2024-04-22T20:47:15.155309
  
110 / tcp
2087396567 | 2024-05-05T02:28:24.260588
  
111 / tcp
-1678345660 | 2024-05-07T21:26:48.325612
  
113 / tcp
722711397 | 2024-04-27T12:53:07.064837
  
131 / tcp
1302177452 | 2024-05-06T21:55:22.921403
  
135 / tcp
-1270998736 | 2024-05-07T00:58:05.037847
  
139 / tcp
-100373866 | 2024-04-26T17:08:54.339594
  
143 / tcp
-399606100 | 2024-04-15T02:14:24.485355
  
179 / tcp
410249975 | 2024-04-09T00:51:42.773458
  
199 / tcp
575925250 | 2024-05-04T02:49:26.384289
  
221 / tcp
1911457608 | 2024-04-21T21:05:44.673007
  
225 / tcp
-1718229072 | 2024-04-25T01:50:53.830371
  
264 / tcp
-1547976805 | 2024-04-27T12:05:07.325162
  
311 / tcp
-1907080992 | 2024-05-08T09:05:26.510198
  
389 / tcp
-525136240 | 2024-05-08T06:04:05.707090
  
427 / tcp
1698496327 | 2024-04-22T10:55:40.731735
  
443 / tcp
401555314 | 2024-05-06T13:46:40.490101
  
444 / tcp
-826610984 | 2024-05-03T13:24:46.661530
  
449 / tcp
897328069 | 2024-04-09T22:02:55.362920
  
465 / tcp
1975288991 | 2024-04-21T21:27:46.091817
  
502 / tcp
819727972 | 2024-05-07T12:33:18.269502
  
503 / tcp
1615193817 | 2024-05-05T03:13:12.588490
  
515 / tcp
-1888448627 | 2024-04-25T02:11:52.679248
  
522 / tcp
-1769206458 | 2024-04-27T20:40:27.197524
  
548 / tcp
-1142488525 | 2024-04-30T22:04:37.138210
  
554 / tcp
745343730 | 2024-04-16T16:04:32.277182
  
587 / tcp
1308377066 | 2024-04-21T07:24:15.292488
  
593 / tcp
178736976 | 2024-04-20T06:33:59.947094
  
631 / tcp
1239199743 | 2024-04-29T12:40:55.796367
  
636 / tcp
1300162323 | 2024-04-29T17:31:56.855816
  
666 / tcp
-784071826 | 2024-05-05T18:30:02.609066
  
771 / tcp
-1592058715 | 2024-04-16T08:21:45.033237
  
800 / tcp
103159425 | 2024-04-25T17:33:33.251810
  
830 / tcp
-976882525 | 2024-05-05T15:48:02.522861
  
873 / tcp
1956828827 | 2024-05-06T15:09:55.943222
  
902 / tcp
-1242315829 | 2024-04-29T21:04:46.084817
  
992 / tcp
1126993057 | 2024-05-02T19:01:48.209927
  
993 / tcp
-1199842642 | 2024-04-11T20:21:32.084301
  
995 / tcp
-1216336508 | 2024-04-28T14:41:59.885544
  
999 / tcp
-1399940268 | 2024-05-04T15:49:58.675631
  
1012 / tcp
-358801646 | 2024-04-14T14:14:04.042935
  
1023 / tcp
-2107996212 | 2024-05-02T02:13:50.229676
  
1025 / tcp
1615193817 | 2024-04-24T05:33:15.678231
  
1028 / tcp
1911457608 | 2024-05-07T21:44:27.619561
  
1099 / tcp
575925250 | 2024-05-06T10:14:01.714574
  
1153 / tcp
2087396567 | 2024-05-02T10:36:53.814495
  
1177 / tcp
660175493 | 2024-05-03T21:31:29.398219
  
1200 / tcp
-1399940268 | 2024-04-18T20:07:01.962798
  
1234 / tcp
1761482307 | 2024-05-06T01:30:35.018187
  
1337 / tcp
-801484042 | 2024-05-05T07:27:10.368441
  
1366 / tcp
419886129 | 2024-04-23T22:42:13.596390
  
1433 / tcp
2139670385 | 2024-04-30T17:04:57.831630
  
1471 / tcp
-971970408 | 2024-05-08T02:10:58.014965
  
1515 / tcp
-541815454 | 2024-05-08T11:04:18.738356
  
1521 / tcp
1996932384 | 2024-04-30T11:41:26.168128
  
1599 / tcp
-971970408 | 2024-05-03T05:04:42.171338
  
1604 / tcp
1103582599 | 2024-05-04T19:27:37.970656
  
1723 / tcp
-142686627 | 2024-05-02T10:06:23.240069
  
1800 / tcp
1535389866 | 2024-05-05T20:42:30.227142
  
1801 / tcp
1492413928 | 2024-04-17T00:24:26.258975
  
1833 / tcp
-1265999252 | 2024-04-14T13:15:45.571304
  
1883 / tcp
1212285915 | 2024-04-27T01:45:21.987540
  
1911 / tcp
2087396567 | 2024-05-03T05:43:43.363139
  
1926 / tcp
-2031152423 | 2024-05-02T20:02:25.402315
  
1962 / tcp
-1746074029 | 2024-04-28T21:13:05.386482
  
2000 / tcp
1632932802 | 2024-05-07T15:10:08.910905
  
2002 / tcp
921225407 | 2024-05-03T02:38:42.759436
  
2008 / tcp
1911457608 | 2024-04-17T11:47:20.836314
  
2012 / tcp
165188539 | 2024-04-19T04:35:41.906865
  
2057 / tcp
1911457608 | 2024-04-22T20:27:32.534298
  
2066 / tcp
-2107996212 | 2024-05-05T07:16:02.984778
  
2067 / tcp
-1230049476 | 2024-05-02T12:24:01.544594
  
2081 / tcp
842535728 | 2024-05-01T22:05:46.444888
  
2083 / tcp
-1230049476 | 2024-04-30T11:02:43.920723
  
2087 / tcp
669849225 | 2024-04-24T23:26:25.360777
  
2095 / tcp
141730637 | 2024-04-28T04:00:07.077211
  
2121 / tcp
-2042671887 | 2024-04-30T15:29:22.360915
  
2126 / tcp
-1729629024 | 2024-05-06T21:17:35.006990
  
2154 / tcp
546151771 | 2024-05-08T04:01:27.974048
  
2181 / tcp
-358801646 | 2024-05-02T02:55:17.263254
  
2222 / tcp
671605376 | 2024-05-03T02:21:20.116280
  
2233 / tcp
1662205251 | 2024-05-06T15:06:58.265710
  
2323 / tcp
1570553339 | 2024-05-07T05:55:07.441748
  
2332 / tcp
1282941221 | 2024-04-27T02:54:32.340661
  
2345 / tcp
-2089734047 | 2024-04-30T16:41:51.467091
  
2404 / tcp
-1559123399 | 2024-04-17T21:05:15.414729
  
2480 / tcp
1911457608 | 2024-05-08T05:59:47.704041
  
2554 / tcp
1911457608 | 2024-04-10T19:22:51.256706
  
2556 / tcp
740837454 | 2024-04-18T05:35:08.695250
  
2562 / tcp
-1428621233 | 2024-05-06T07:52:08.819080
  
2567 / tcp
104385780 | 2024-05-04T15:28:44.207860
  
2628 / tcp
-1399940268 | 2024-05-03T03:59:20.686904
  
2761 / tcp
819727972 | 2024-05-01T15:31:08.917923
  
2762 / tcp
1741579575 | 2024-05-07T22:07:39.854215
  
3001 / tcp
599074451 | 2024-05-05T14:15:04.897961
  
3050 / tcp
1620329124 | 2024-04-20T18:42:19.584112
  
3060 / tcp
-903067560 | 2024-04-26T19:00:37.064585
  
3079 / tcp
165188539 | 2024-04-28T12:09:48.774374
  
3080 / tcp
1911457608 | 2024-04-12T08:00:37.365027
  
3081 / tcp
-1810987450 | 2024-04-23T23:11:29.736829
  
3082 / tcp
820958131 | 2024-05-03T03:02:56.440189
  
3093 / tcp
-1839934832 | 2024-04-26T17:46:43.781140
  
3108 / tcp
-1746074029 | 2024-04-26T23:55:47.523950
  
3114 / tcp
669849225 | 2024-04-28T10:59:02.190360
  
3119 / tcp
-1626979812 | 2024-04-27T21:16:54.843423
  
3120 / tcp
-1804465946 | 2024-05-03T22:37:09.197371
  
3211 / tcp
1655023012 | 2024-04-26T06:59:41.943981
  
3260 / tcp
1213931722 | 2024-05-02T08:06:35.080865
  
3268 / tcp
-1839934832 | 2024-05-01T22:16:54.410158
  
3269 / tcp
1741579575 | 2024-05-03T21:46:34.133835
  
3299 / tcp
292351399 | 2024-04-28T23:42:40.910045
  
3306 / tcp
-903067560 | 2024-05-02T18:48:49.564788
  
3310 / tcp
-1099385124 | 2024-05-07T20:43:24.130178
  
3388 / tcp
740837454 | 2024-05-06T15:45:32.114952
  
3389 / tcp
1911457608 | 2024-04-11T16:12:26.120245
  
3412 / tcp
660175493 | 2024-04-16T15:23:32.769952
  
3541 / tcp
104385780 | 2024-05-03T21:41:50.663277
  
3542 / tcp
1077013874 | 2024-04-28T02:27:38.991767
  
3548 / tcp
198844676 | 2024-05-04T00:23:54.029205
  
3551 / tcp
897328069 | 2024-05-05T03:31:09.581328
  
3561 / tcp
1726594447 | 2024-05-04T13:20:37.535217
  
3566 / tcp
1824169301 | 2024-05-08T02:21:17.502074
  
3749 / tcp
2087396567 | 2024-04-16T05:58:13.215111
  
3780 / tcp
2087396567 | 2024-05-01T20:02:50.666952
  
3790 / tcp
1911457608 | 2024-05-04T19:00:52.435457
  
3792 / tcp
-1399940268 | 2024-04-10T22:47:32.731336
  
3954 / tcp
470305186 | 2024-05-06T02:42:04.011325
  
4000 / tcp
550048729 | 2024-05-06T11:33:52.073889
  
4022 / tcp
1852418385 | 2024-04-27T03:19:38.788547
  
4040 / tcp
2087396567 | 2024-05-06T12:22:00.769758
  
4063 / tcp
-1327660293 | 2024-05-02T18:42:14.764222
  
4064 / tcp
1778988322 | 2024-05-06T20:23:00.049958
  
4157 / tcp
-1341662640 | 2024-04-26T12:34:53.256640
  
4242 / tcp
-10442315 | 2024-04-30T00:27:46.459807
  
4282 / tcp
-1250504565 | 2024-04-21T15:57:58.161900
  
4321 / tcp
-1399940268 | 2024-04-20T12:40:35.266938
  
4369 / tcp
-1316491703 | 2024-04-23T22:41:56.197298
  
4433 / tcp
594761768 | 2024-05-08T05:00:58.396689
  
4443 / tcp
165188539 | 2024-05-04T14:01:06.106189
  
4444 / tcp
1911457608 | 2024-05-05T09:10:50.975643
  
4500 / tcp
416263569 | 2024-05-04T05:04:52.107005
  
4506 / tcp
321971019 | 2024-05-08T09:49:54.200351
  
4747 / tcp
104385780 | 2024-05-06T05:24:56.102179
  
4782 / tcp
165188539 | 2024-04-15T09:23:15.810859
  
4786 / tcp
-1839934832 | 2024-04-09T20:02:56.336902
  
4840 / tcp
-138733098 | 2024-04-21T10:22:11.738519
  
4848 / tcp
740837454 | 2024-04-17T23:01:30.666430
  
4899 / tcp
1363464823 | 2024-05-06T10:08:34.156736
  
4911 / tcp
2087396567 | 2024-05-01T23:18:04.431017
  
4949 / tcp
2087396567 | 2024-04-23T04:35:46.415789
  
5001 / tcp
-1399940268 | 2024-04-12T08:49:47.494145
  
5003 / tcp
1865391109 | 2024-04-19T03:01:24.203257
  
5005 / tcp
2087396567 | 2024-05-05T22:50:56.766940
  
5006 / tcp
-832380282 | 2024-04-30T14:43:47.020963
  
5007 / tcp
-1122307493 | 2024-05-05T09:56:29.585565
  
5009 / tcp
597764502 | 2024-05-04T19:25:57.089570
  
5010 / tcp
-984990168 | 2024-05-02T07:01:44.321120
  
5025 / tcp
-1189269828 | 2024-04-10T13:36:03.071717
  
5090 / tcp
996960436 | 2024-04-09T14:42:33.589427
  
5172 / tcp
1208318993 | 2024-05-01T01:42:25.509510
  
5201 / tcp
-1327660293 | 2024-04-15T00:51:37.471438
  
5209 / tcp
-358801646 | 2024-05-03T13:41:08.054406
  
5222 / tcp
-1074907534 | 2024-05-08T03:18:34.431997
  
5269 / tcp
165188539 | 2024-04-27T21:56:43.540977
  
5321 / tcp
-582957865 | 2024-04-24T02:29:04.886433
  
5431 / tcp
-1013082686 | 2024-04-09T06:09:19.694228
  
5432 / tcp
819727972 | 2024-04-14T01:36:56.286208
  
5435 / tcp
1189133115 | 2024-04-25T03:09:34.278619
  
5494 / tcp
1023953321 | 2024-04-26T23:15:10.297855
  
5500 / tcp
-703489725 | 2024-04-15T04:17:20.659663
  
5600 / tcp
550048729 | 2024-04-26T16:23:10.795749
  
5601 / tcp
1726594447 | 2024-05-03T20:20:00.988973
  
5604 / tcp
575925250 | 2024-04-19T06:42:39.945176
  
5672 / tcp
-358801646 | 2024-04-19T00:31:25.705600
  
5673 / tcp
539065883 | 2024-05-05T04:22:45.644648
  
5858 / tcp
-1399940268 | 2024-04-24T04:16:54.739923
  
5938 / tcp
1999272906 | 2024-04-23T20:39:00.959160
  
5984 / tcp
-971970408 | 2024-04-09T17:36:53.484784
  
5986 / tcp
-2089734047 | 2024-04-25T04:53:07.133287
  
6000 / tcp
-136006866 | 2024-04-26T14:10:29.333567
  
6001 / tcp
-2107996212 | 2024-05-08T07:55:00.395845
  
6002 / tcp
-1399940268 | 2024-04-21T07:08:22.140125
  
6006 / tcp
1077013874 | 2024-04-29T07:19:05.592739
  
6010 / tcp
1580325543 | 2024-04-30T21:58:28.413285
  
6443 / tcp
-445721795 | 2024-05-06T19:26:34.220987
  
6600 / tcp
-1399940268 | 2024-04-26T23:42:06.815201
  
6602 / tcp
1543809371 | 2024-05-04T22:52:12.120523
  
6653 / tcp
2033888749 | 2024-04-11T22:12:00.435949
  
6664 / tcp
-1327849035 | 2024-05-06T10:37:59.318820
  
6666 / tcp
-2089734047 | 2024-05-06T19:40:09.267847
  
6668 / tcp
-1329831334 | 2024-04-16T20:26:24.156782
  
6697 / tcp
-1399940268 | 2024-04-13T06:41:28.548898
  
6887 / tcp
641070437 | 2024-05-05T14:04:44.022498
  
7001 / tcp
-1399940268 | 2024-04-16T10:49:11.173504
  
7005 / tcp
-1036370807 | 2024-04-09T01:53:04.286957
  
7170 / tcp
-1996280214 | 2024-04-28T23:18:40.597335
  
7171 / tcp
1570553339 | 2024-04-16T05:23:26.987512
  
7218 / tcp
-891714208 | 2024-05-05T12:30:51.154380
  
7415 / tcp
117101543 | 2024-04-28T23:34:44.222900
  
7434 / tcp
-1027277763 | 2024-04-20T23:33:56.112414
  
7443 / tcp
-2118655245 | 2024-04-29T21:19:23.185546
  
7474 / tcp
-1105333987 | 2024-04-28T11:39:29.225036
  
7493 / tcp
550048729 | 2024-05-05T17:27:32.491252
  
7547 / tcp
-1139539254 | 2024-04-29T08:17:06.866456
  
7548 / tcp
1690634669 | 2024-04-14T18:27:14.822618
  
7634 / tcp
873425297 | 2024-04-26T21:48:05.696600
  
7657 / tcp
-1259524839 | 2024-04-21T03:22:46.240815
  
7999 / tcp
1072892569 | 2024-05-06T18:07:53.805782
  
8001 / tcp
163996600 | 2024-04-18T12:08:13.472174
  
8007 / tcp
-980525298 | 2024-04-28T18:11:01.120537
  
8009 / tcp
-1399940268 | 2024-04-25T19:52:43.791794
  
8015 / tcp
819727972 | 2024-04-30T10:00:09.288935
  
8019 / tcp
819727972 | 2024-04-25T22:12:21.381250
  
8029 / tcp
-1839934832 | 2024-04-23T16:50:52.244160
  
8032 / tcp
1762042191 | 2024-04-14T08:18:01.454037
  
8037 / tcp
1223115691 | 2024-04-10T07:31:25.747742
  
8040 / tcp
1726594447 | 2024-05-05T01:16:59.870286
  
8043 / tcp
-2096652808 | 2024-04-27T08:11:56.614251
  
8044 / tcp
-1032713145 | 2024-04-12T03:41:45.218514
  
8056 / tcp
550048729 | 2024-04-13T04:42:32.002716
  
8060 / tcp
2063598737 | 2024-05-03T18:21:39.621498
  
8066 / tcp
1212921144 | 2024-04-21T21:11:53.196827
  
8069 / tcp
819727972 | 2024-04-30T22:13:42.942336
  
8072 / tcp
819727972 | 2024-05-01T19:31:08.760680
  
8081 / tcp
-68075478 | 2024-05-03T00:55:00.253871
  
8082 / tcp
1741579575 | 2024-05-04T05:23:40.036273
  
8083 / tcp
165188539 | 2024-05-03T20:45:54.841322
  
8084 / tcp
1948301213 | 2024-05-05T14:29:41.440600
  
8085 / tcp
-79865617 | 2024-05-03T20:27:51.180474
  
8086 / tcp
-1399940268 | 2024-05-04T23:05:27.327720
  
8087 / tcp
1308377066 | 2024-04-26T21:54:59.422180
  
8089 / tcp
-1839934832 | 2024-04-18T22:30:06.770272
  
8091 / tcp
-1392039491 | 2024-04-13T22:09:19.691253
  
8098 / tcp
-2031152423 | 2024-05-07T11:09:30.932109
  
8101 / tcp
1011407350 | 2024-04-24T18:35:53.261965
  
8108 / tcp
819727972 | 2024-05-02T07:21:11.886315
  
8111 / tcp
-1461540015 | 2024-04-24T04:12:47.778069
  
8123 / tcp
819727972 | 2024-04-18T19:47:57.365380
  
8126 / tcp
539065883 | 2024-04-24T01:51:34.536906
  
8139 / tcp
2087396567 | 2024-05-04T04:31:58.418549
  
8140 / tcp
2087396567 | 2024-04-30T05:28:44.840114
  
8181 / tcp
691315198 | 2024-04-21T01:51:24.703405
  
8200 / tcp
819727972 | 2024-04-10T01:29:53.561320
  
8291 / tcp
1335782347 | 2024-04-24T19:28:41.785956
  
8333 / tcp
366084633 | 2024-04-20T10:10:42.440566
  
8401 / tcp
1655023012 | 2024-04-16T22:07:44.104359
  
8408 / tcp
-2017887953 | 2024-04-13T00:19:06.470443
  
8409 / tcp
-1399940268 | 2024-04-08T20:29:11.377245
  
8414 / tcp
740837454 | 2024-05-06T18:34:55.595067
  
8416 / tcp
103159425 | 2024-04-16T15:05:32.432051
  
8417 / tcp
-1626979812 | 2024-04-10T12:33:37.688735
  
8421 / tcp
-2031152423 | 2024-04-25T23:48:08.779305
  
8424 / tcp
1096654864 | 2024-04-24T07:34:23.278310
  
8443 / tcp
-2107996212 | 2024-05-03T22:30:18.448293
  
8545 / tcp
819727972 | 2024-04-13T13:50:31.962005
  
8554 / tcp
-2080784861 | 2024-05-08T07:27:20.342794
  
8575 / tcp
-1795027372 | 2024-04-13T03:00:45.365040
  
8586 / tcp
-1779118422 | 2024-04-13T22:00:27.867344
  
8623 / tcp
842535728 | 2024-04-30T17:02:39.035754
  
8649 / tcp
1308377066 | 2024-05-01T08:47:02.648922
  
8728 / tcp
820958131 | 2024-04-12T10:54:28.932874
  
8810 / tcp
-1013082686 | 2024-04-29T10:07:22.854645
  
8813 / tcp
671605376 | 2024-04-24T22:29:45.568395
  
8816 / tcp
-904840257 | 2024-04-15T07:01:19.074576
  
8819 / tcp
-1399940268 | 2024-04-28T12:09:53.674761
  
8820 / tcp
-2089734047 | 2024-04-30T19:35:26.519866
  
8827 / tcp
819727972 | 2024-04-27T19:30:37.905544
  
8829 / tcp
1761482307 | 2024-04-25T04:17:23.581872
  
8834 / tcp
165188539 | 2024-04-26T23:37:44.899587
  
8867 / tcp
660175493 | 2024-04-29T23:41:05.215751
  
8880 / tcp
250824264 | 2024-04-11T21:50:49.012282
  
8888 / tcp
-2096652808 | 2024-05-01T23:01:54.752498
  
8889 / tcp
1119676909 | 2024-04-30T17:46:01.138084
  
9000 / tcp
-1026951088 | 2024-04-27T14:46:15.933635
  
9001 / tcp
-971970408 | 2024-05-04T07:54:07.122539
  
9002 / tcp
819727972 | 2024-04-26T00:35:23.524991
  
9005 / tcp
-1730858130 | 2024-04-26T11:52:12.044384
  
9011 / tcp
-1810987450 | 2024-05-07T14:35:37.267838
  
9026 / tcp
-1327660293 | 2024-04-12T22:14:24.061069
  
9027 / tcp
-1399940268 | 2024-04-15T19:44:16.073965
  
9029 / tcp
-1435414831 | 2024-04-15T14:37:39.655052
  
9036 / tcp
-1992400236 | 2024-04-13T12:17:45.588929
  
9040 / tcp
-2107996212 | 2024-05-04T14:10:53.863643
  
9042 / tcp
1332894250 | 2024-04-23T20:34:05.721039
  
9045 / tcp
1023953321 | 2024-04-27T02:37:38.471933
  
9050 / tcp
-971970408 | 2024-05-07T23:25:32.225584
  
9051 / tcp
1082239536 | 2024-05-06T19:54:14.687729
  
9090 / tcp
819727972 | 2024-04-29T17:30:25.098887
  
9091 / tcp
89142341 | 2024-05-07T20:18:06.902717
  
9092 / tcp
472902042 | 2024-05-05T00:38:13.120545
  
9095 / tcp
820958131 | 2024-05-06T03:33:38.172467
  
9100 / tcp
-1399940268 | 2024-04-20T13:21:36.240909
  
9101 / tcp
1011407350 | 2024-04-24T05:06:15.698401
  
9104 / tcp
-1487943323 | 2024-05-01T21:30:29.442305
  
9108 / tcp
1220320909 | 2024-05-01T18:58:51.493918
  
9151 / tcp
-2033111675 | 2024-05-07T23:09:34.880249
  
9160 / tcp
1212285915 | 2024-04-22T22:35:08.083793
  
9201 / tcp
-2089734047 | 2024-04-16T12:46:37.511816
  
9205 / tcp
-1399940268 | 2024-04-16T03:44:10.265341
  
9207 / tcp
-616720387 | 2024-04-10T00:39:05.509820
  
9216 / tcp
-2107996212 | 2024-05-05T03:51:07.886609
  
9221 / tcp
-1329831334 | 2024-04-25T06:40:21.335684
  
9300 / tcp
2098371729 | 2024-05-01T10:25:22.461062
  
9306 / tcp
1529351907 | 2024-04-26T07:04:28.351156
  
9418 / tcp
570298945 | 2024-04-28T02:37:02.120644
  
9443 / tcp
1655023012 | 2024-05-01T01:55:37.719674
  
9530 / tcp
-1626979812 | 2024-05-04T05:19:53.384159
  
9600 / tcp
-358707605 | 2024-05-06T23:22:03.899916
  
9633 / tcp
-1114821551 | 2024-04-30T21:30:35.298109
  
9682 / tcp
819727972 | 2024-04-16T11:29:21.684695
  
9761 / tcp
1375509841 | 2024-04-19T20:53:29.405357
  
9800 / tcp
688031222 | 2024-04-30T13:04:22.402186
  
9876 / tcp
-1839864261 | 2024-05-05T22:30:17.988454
  
9943 / tcp
290819026 | 2024-05-04T23:07:16.140038
  
9944 / tcp
-2096652808 | 2024-04-23T21:18:16.155993
  
9966 / tcp
-119996482 | 2024-04-08T18:08:12.171503
  
9981 / tcp
819727972 | 2024-05-04T22:55:48.090377
  
9991 / tcp
921225407 | 2024-04-20T14:58:23.127366
  
9997 / tcp
-1917695220 | 2024-05-07T01:03:38.704972
  
9998 / tcp
1161309183 | 2024-04-15T09:34:49.515455
  
9999 / tcp
2087396567 | 2024-04-24T00:29:45.292704
  
10000 / tcp
1492413928 | 2024-05-07T11:46:17.288021
  
10001 / tcp
-2089734047 | 2024-05-04T03:19:43.467780
  
10134 / tcp
-1730858130 | 2024-05-07T00:43:19.225283
  
10250 / tcp
1660040625 | 2024-05-07T21:51:45.176634
  
10443 / tcp
-2107996212 | 2024-05-05T20:48:28.006491
  
10554 / tcp
819727972 | 2024-04-26T09:10:35.719598
  
10909 / tcp
-1730858130 | 2024-05-03T21:03:08.655038
  
10911 / tcp
1911457608 | 2024-05-07T23:01:22.668121
  
11000 / tcp
-358801646 | 2024-05-02T13:43:04.035347
  
11112 / tcp
-136006866 | 2024-04-14T09:34:06.035683
  
11211 / tcp
1911457608 | 2024-04-27T17:20:33.684846
  
11300 / tcp
-984990168 | 2024-04-18T20:44:32.954150
  
11434 / tcp
-1245716040 | 2024-04-29T06:50:49.793283
  
12000 / tcp
296364507 | 2024-04-30T16:05:55.658837
  
12345 / tcp
165188539 | 2024-04-22T18:07:58.654107
  
14147 / tcp
1911457608 | 2024-05-05T03:33:44.278287
  
14265 / tcp
51259122 | 2024-05-02T13:34:52.927024
  
14344 / tcp
1072892569 | 2024-04-24T16:55:01.625874
  
16010 / tcp
-527005584 | 2024-04-23T22:51:58.835492
  
16030 / tcp
-1900404274 | 2024-04-17T03:12:01.873823
  
16992 / tcp
2103111368 | 2024-05-03T19:23:25.452437
  
16993 / tcp
398077695 | 2024-05-07T06:02:10.066601
  
18245 / tcp
1082732927 | 2024-05-01T22:14:36.723224
  
18553 / tcp
307999478 | 2024-05-05T16:17:31.378319
  
19000 / tcp
660175493 | 2024-05-03T15:11:15.007893
  
19071 / tcp
1900503736 | 2024-04-12T05:40:35.979382
  
20000 / tcp
819727972 | 2024-05-03T04:32:27.460605
  
20256 / tcp
-146605374 | 2024-05-08T04:17:29.980364
  
20547 / tcp
1689518693 | 2024-05-04T23:46:18.836768
  
21025 / tcp
-1399940268 | 2024-05-08T06:38:07.737134
  
21379 / tcp
585675468 | 2024-04-25T21:36:37.377987
  
23424 / tcp
-1888448627 | 2024-05-03T13:44:41.761792
  
25001 / tcp
550048729 | 2024-04-25T05:00:59.819794
  
25105 / tcp
-1810987450 | 2024-04-28T12:31:50.665492
  
25565 / tcp
401555314 | 2024-04-08T19:37:15.060958
  
27015 / tcp
1763259671 | 2024-04-21T17:50:58.603560
  
27017 / tcp
1948301213 | 2024-05-03T17:04:31.209592
  
28015 / tcp
962700458 | 2024-05-05T04:32:42.052322
  
30002 / tcp
819727972 | 2024-04-11T00:18:33.069279
  
30003 / tcp
756886313 | 2024-05-07T03:08:07.994670
  
31337 / tcp
-375604792 | 2024-05-08T08:12:01.137715
  
32764 / tcp
550048729 | 2024-04-14T17:35:35.137997
  
33060 / tcp
408230060 | 2024-04-14T09:08:51.396001
  
35000 / tcp
-1399940268 | 2024-05-05T12:06:48.697014
  
37777 / tcp
819727972 | 2024-05-08T02:21:15.150850
  
41800 / tcp
-2089734047 | 2024-05-05T02:42:43.717882
  
44818 / tcp
-971970408 | 2024-04-14T18:09:55.551231
  
47990 / tcp
-2006700298 | 2024-04-30T07:52:02.724821
  
49152 / tcp
550048729 | 2024-05-04T23:47:16.286836
  
49153 / tcp
660175493 | 2024-05-04T12:47:59.419384
  
50000 / tcp
-984990168 | 2024-05-07T22:36:58.584204
  
50070 / tcp
-2031152423 | 2024-05-07T01:44:49.750916
  
50100 / tcp
-1311598826 | 2024-04-14T16:37:43.679090
  
51106 / tcp
-1839934832 | 2024-05-02T21:40:52.842618
  
51235 / tcp
-358707605 | 2024-05-08T01:31:58.614416
  
54138 / tcp
-297128567 | 2024-05-07T09:35:28.840921
  
55000 / tcp
2087396567 | 2024-04-14T16:04:23.163403
  
55443 / tcp
1741579575 | 2024-05-02T17:34:57.129039
  
55553 / tcp
1948301213 | 2024-04-27T18:54:15.630311
  
55554 / tcp
841014058 | 2024-05-07T05:28:52.612080
  
60001 / tcp
841014058 | 2024-05-02T04:25:12.592153
  
60129 / tcp
-2140303521 | 2024-05-06T14:39:34.479753
  
61613 / tcp
-1839934832 | 2024-04-17T13:02:47.494693
  
61616 / tcp
980478633 | 2024-05-08T01:10:57.988078
  
62078 / tcp



Contact Us

Shodan ® - All rights reserved