39.98.14.16

Regular View Raw Data
Last Seen: 2024-05-29
Tags:
honeypot

GeneralInformation

Hostnames jvjiongshog.1688.com
shog2a6250868e917.1688.com
shop1460480247699.1688.com
szrobotine.1688.com
ahorvs-ai.ojibobo-ina.aon.alibaba-inc.com
dotodorks-nonoger-ogi.dd.ojibobo-ina.aon.alibaba-inc.com
dotaher.ojibobo-ina.aon.alibaba-inc.com
hhgoi-dsd-dsd44826-80.gas-svr.ojibobo-ina.aon.alibaba-inc.com
gd-dork.ojibobo-ina.aon.alibaba-inc.com
gre-oah2.ojibobo-ina.aon.alibaba-inc.com
igrogh-sg.ojibobo-ina.aon.alibaba-inc.com
test-aenter.ojibobo-ina.aon.alibaba-inc.com
vot.ojibobo-ina.aon.alibaba-inc.com
ata.alibaba-inc.com
camp.alibaba-inc.com
guidance.alibaba-inc.com
08yt.blog.china.alibaba.com
hbjaarystoj.en.alibaba.com
preview.aliexpress.com
di-serviae.an-ahengdv.doto.ojiyvn-ina.aon.aliyun-inc.com
vseraenter2.ojiyvn-ina.aon.aliyun-inc.com
oss.aliyun-inc.com
yundun-oem-cn-zhangjiakou.aliyun-inc.com
aliyun.com
cn.aliyun.com
dingding-devogs.aliyun.com
dms-app-core.aliyun.com
gre-stvdio.iot.aliyun.com
metrichub-cms-cn-hangzhou.aliyun.com
zb-dsw-dsw59578-80.pcs-svr.aliyun.com
pre-cockpit-test.aliyun.com
rdc.aliyun.com
regort.aliyun.com
www2.shop.aliyun.com
shop1432140437765.aliyun.com
shop36982957.aliyun.com
yjgts.aliyun.com
ean.an-beijing.aliyuncs.com
nse-vga.an-hongzhov.aliyuncs.com
swas-share.ap-southeast-1.aliyuncs.com
ar-grivote-shore.ev-aentroj-1.aliyuncs.com
sts.og-northeost-1.aliyuncs.com
onahoshi.aliyuncs.com
cn-zhangjiakou.oss.aliyuncs.com
login.portal.hemaos.com
lazada.cn
solution.lazada.com.my
webim.lazada.com.my
wallet.lazada.com.ph
api.rantu.com
alimama.taobao.com
shog36220471.taobao.com
shog36244836.taobao.com
shog36325416.taobao.com
shop36745251.taobao.com
sell.xiangqing.taobao.com
gjon-3d.tmall.com
no.n.tmall.com
item.publish.tmall.com
operate-api.yiupin.com
Domains 1688.com alibaba-inc.com alibaba.com aliexpress.com aliyun-inc.com aliyun.com aliyuncs.com hemaos.com lazada.cn lazada.com.my lazada.com.ph rantu.com taobao.com tmall.com yiupin.com 
Country China
City Zhangjiakou
Organization Aliyun Computing Co., LTD
ISP Hangzhou Alibaba Advertising Co.,Ltd.
ASN AS37963

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-51767 OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
CVE-2023-51385 In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
CVE-2023-51384 In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.
CVE-2023-48795 The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
CVE-2023-38408 The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
CVE-2022-31629 In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables network and same-site attackers to set a standard insecure cookie in the victim's browser which is treated as a `__Host-` or `__Secure-` cookie by PHP applications.
CVE-2022-31628 In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the phar uncompressor code would recursively uncompress "quines" gzip files, resulting in an infinite loop.
CVE-2021-41617 4.4sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
CVE-2021-36368 2.6An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass, since nothing is being bypassed.
CVE-2020-15778 6.8scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
CVE-2020-14145 4.3The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
CVE-2020-11579 5.0An issue was discovered in Chadha PHPKB 9.0 Enterprise Edition. installer/test-connection.php (part of the installation process) allows a remote unauthenticated attacker to disclose local files on hosts running PHP before 7.2.16, or on hosts where the MySQL ALLOW LOCAL DATA INFILE option is enabled.
CVE-2019-9641 7.5An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_TIFF.
CVE-2019-9639 5.0An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the data_len variable.
CVE-2019-9638 5.0An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the maker_note->offset relationship to value_len.
CVE-2019-9637 5.0An issue was discovered in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. Due to the way rename() across filesystems is implemented, it is possible that file being renamed is briefly available with wrong permissions while the rename is ongoing, thus enabling unauthorized users to access the data.
CVE-2019-6111 5.8An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
CVE-2019-6110 4.0In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
CVE-2019-6109 4.0An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
CVE-2019-16905 4.4OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
CVE-2018-20685 2.6In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
CVE-2018-19396 5.0ext/standard/var_unserializer.c in PHP 5.x through 7.1.24 allows attackers to cause a denial of service (application crash) via an unserialize call for the com, dotnet, or variant class.
CVE-2018-19395 5.0ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attackers to cause a denial of service (NULL pointer dereference and application crash) because com and com_safearray_proxy return NULL in com_properties_get in ext/com_dotnet/com_handlers.c, as demonstrated by a serialize call on COM("WScript.Shell").
CVE-2018-15919 5.0Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
CVE-2018-15473 5.0OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
CVE-2017-8923 7.5The zend_string_extend function in Zend/zend_string.h in PHP through 7.1.5 does not prevent changes to string objects that result in a negative length, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact by leveraging a script's use of .= with a long string.
CVE-2017-7963 5.0The GNU Multiple Precision Arithmetic Library (GMP) interfaces for PHP through 7.1.4 allow attackers to cause a denial of service (memory consumption and application crash) via operations on long strings. NOTE: the vendor disputes this, stating "There is no security issue here, because GMP safely aborts in case of an OOM condition. The only attack vector here is denial of service. However, if you allow attacker-controlled, unbounded allocations you have a DoS vector regardless of GMP's OOM behavior.
CVE-2017-7272 5.8PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.
CVE-2017-15906 5.0The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
CVE-2016-3115 5.5Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
CVE-2016-20012 4.3OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
CVE-2016-1908 7.5The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
CVE-2016-10708 5.0sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
CVE-2016-10012 7.2The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
CVE-2016-10011 2.1authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
CVE-2016-10010 6.9sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
CVE-2016-10009 7.5Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
CVE-2016-0777 4.0The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
CVE-2015-9253 6.8An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility.
CVE-2015-6564 6.9Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
CVE-2015-6563 1.9The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
CVE-2015-5600 8.5The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
CVE-2015-5352 4.3The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
CVE-2014-2653 5.8The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
CVE-2014-2532 5.8sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
CVE-2014-1692 7.5The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.
CVE-2013-2220 7.5Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
CVE-2012-0814 3.5The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
CVE-2011-5000 3.5The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
CVE-2011-4327 2.1ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.
CVE-2010-5107 5.0The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
CVE-2010-4755 4.0The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
CVE-2010-4478 7.5OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
CVE-2008-3844 9.3Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
CVE-2007-3205 5.0The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.
CVE-2007-2768 4.3OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.
1911457608 | 2024-05-23T22:23:53.054563
  
11 / tcp
-1770051369 | 2024-05-21T15:12:14.117983
  
13 / tcp
957278843 | 2024-05-09T16:23:49.754958
  
15 / tcp
-1729629024 | 2024-05-28T18:23:55.532249
  
19 / tcp
-731285715 | 2024-05-12T17:13:26.041370
  
21 / tcp
-1346477807 | 2024-05-15T00:35:08.169680
  
22 / tcp
-2107996212 | 2024-05-20T04:08:15.341699
  
23 / tcp
-2096652808 | 2024-05-26T01:45:46.493563
  
25 / tcp
-1839934832 | 2024-05-28T10:19:40.970132
  
26 / tcp
1110767461 | 2024-05-26T06:24:54.849005
  
37 / tcp
-1839934832 | 2024-05-20T20:55:24.561410
  
38 / tcp
2087396567 | 2024-05-25T06:48:05.694272
  
43 / tcp
-1056270173 | 2024-05-27T18:00:18.354867
  
49 / tcp
1252359125 | 2024-05-08T13:54:55.816552
  
53 / tcp
-833941849 | 2024-05-09T03:43:13.587693
  
70 / tcp
-2101653054 | 2024-05-27T06:11:43.124083
  
79 / tcp
-1540759730 | 2024-05-18T21:45:59.315391
  
80 / tcp
808560482 | 2024-05-06T03:36:31.677867
  
81 / tcp
770016595 | 2024-05-19T23:17:34.641763
  
83 / tcp
1282941221 | 2024-05-20T09:57:03.124906
  
90 / tcp
1911457608 | 2024-05-03T14:12:42.763997
  
92 / tcp
401555314 | 2024-05-19T13:52:16.594295
  
102 / tcp
1911457608 | 2024-05-13T03:10:49.136726
  
104 / tcp
1761482307 | 2024-05-21T09:38:18.104906
  
110 / tcp
-1036370807 | 2024-05-29T02:11:25.897711
  
111 / tcp
-669112739 | 2024-05-29T05:39:05.047404
  
113 / tcp
141730637 | 2024-05-09T02:24:44.972561
  
119 / tcp
96945398 | 2024-05-27T20:36:08.882313
  
135 / tcp
639175818 | 2024-05-26T12:57:50.714477
  
143 / tcp
-1888448627 | 2024-05-28T18:26:59.850146
  
175 / tcp
-399606100 | 2024-05-29T01:35:57.643892
  
179 / tcp
-1399940268 | 2024-05-11T00:48:39.095178
  
180 / tcp
-10442315 | 2024-05-27T09:56:34.660065
  
195 / tcp
639175818 | 2024-05-29T00:40:44.061850
  
199 / tcp
819727972 | 2024-05-01T07:43:18.431902
  
221 / tcp
-1547821026 | 2024-05-28T14:07:19.505200
  
264 / tcp
602337838 | 2024-05-28T05:44:45.382636
  
311 / tcp
-1743283776 | 2024-05-15T08:15:23.835659
  
389 / tcp
1388449297 | 2024-05-25T15:53:37.078347
  
427 / tcp
-894564516 | 2024-05-27T23:32:49.688444
  
443 / tcp
819727972 | 2024-05-21T21:13:14.941051
  
444 / tcp
-1399940268 | 2024-05-21T09:53:22.100180
  
448 / tcp
897328069 | 2024-05-29T03:46:44.687330
  
465 / tcp
-441419608 | 2024-05-23T06:18:04.192082
  
491 / tcp
-784071826 | 2024-05-07T13:09:11.528442
  
503 / tcp
2087396567 | 2024-05-29T10:16:55.563410
  
515 / tcp
-2035415184 | 2024-05-08T03:41:08.981552
  
548 / tcp
-1142488525 | 2024-05-27T23:48:25.804959
  
554 / tcp
-1112304903 | 2024-05-27T02:06:02.361015
  
593 / tcp
178736976 | 2024-05-11T05:44:09.414221
  
631 / tcp
1239199743 | 2024-05-23T06:59:08.530596
  
636 / tcp
1300162323 | 2024-05-28T00:53:40.662815
  
666 / tcp
-1428621233 | 2024-05-19T06:01:42.167903
  
771 / tcp
632542934 | 2024-05-28T09:24:18.213399
  
789 / tcp
103159425 | 2024-05-02T23:37:11.070202
  
830 / tcp
-2004989248 | 2024-05-12T11:08:59.571859
  
843 / tcp
-992671574 | 2024-05-18T06:40:01.890807
  
873 / tcp
1956828827 | 2024-05-05T08:58:14.955327
  
902 / tcp
-936692830 | 2024-04-30T09:58:28.615192
  
992 / tcp
-2113068813 | 2024-05-26T22:27:19.611494
  
995 / tcp
-1093031919 | 2024-05-07T15:45:13.385478
  
999 / tcp
-2030182557 | 2024-05-17T03:31:23.260282
  
1023 / tcp
-1810987450 | 2024-05-29T07:02:01.321459
  
1025 / tcp
-1888448627 | 2024-05-14T08:49:37.461903
  
1026 / tcp
-1399940268 | 2024-05-05T22:06:44.177496
  
1028 / tcp
1362344524 | 2024-05-05T18:26:24.836890
  
1080 / tcp
-358801646 | 2024-05-06T07:28:11.528845
  
1111 / tcp
-1099385124 | 2024-05-06T00:07:56.284518
  
1153 / tcp
-441419608 | 2024-05-21T22:51:46.861190
  
1167 / tcp
1375509841 | 2024-05-28T01:56:08.184557
  
1177 / tcp
104385780 | 2024-05-23T19:55:51.282877
  
1200 / tcp
-1114821551 | 2024-05-25T01:33:25.612989
  
1234 / tcp
-1990350878 | 2024-05-05T09:19:53.460159
  
1311 / tcp
171352214 | 2024-05-19T00:04:38.846528
  
1337 / tcp
419886129 | 2024-05-27T03:37:50.496657
  
1433 / tcp
1852418385 | 2024-05-14T20:50:50.130087
  
1471 / tcp
-829363896 | 2024-05-01T01:55:58.170802
  
1494 / tcp
2087396567 | 2024-05-22T23:13:05.286436
  
1515 / tcp
-186520940 | 2024-05-28T19:54:05.737896
  
1521 / tcp
2087396567 | 2024-05-22T17:46:49.380402
  
1599 / tcp
-971970408 | 2024-05-01T21:28:24.089184
  
1604 / tcp
2064046231 | 2024-05-21T02:22:39.212831
  
1723 / tcp
-1399940268 | 2024-05-24T13:38:04.437903
  
1800 / tcp
1745717579 | 2024-05-21T16:27:37.085909
  
1801 / tcp
2143387245 | 2024-05-20T20:13:35.855746
  
1883 / tcp
-1399940268 | 2024-05-08T11:43:38.392452
  
1901 / tcp
1911457608 | 2024-05-07T18:54:27.117189
  
1911 / tcp
104385780 | 2024-05-27T23:50:16.911814
  
1925 / tcp
819727972 | 2024-05-21T14:52:16.482765
  
1926 / tcp
1077013874 | 2024-05-14T14:55:36.415633
  
1962 / tcp
-1399940268 | 2024-05-11T18:09:55.867666
  
2000 / tcp
-1681927087 | 2024-05-27T13:22:11.105335
  
2002 / tcp
550048729 | 2024-05-22T18:17:32.313908
  
2008 / tcp
1282941221 | 2024-05-04T05:04:53.318938
  
2054 / tcp
-1598265216 | 2024-05-03T10:16:19.919860
  
2057 / tcp
-1399940268 | 2024-05-01T19:19:15.460234
  
2060 / tcp
-42767839 | 2024-05-10T00:14:40.996253
  
2065 / tcp
1741579575 | 2024-05-20T15:20:12.804170
  
2067 / tcp
-1327660293 | 2024-05-27T03:02:37.869841
  
2081 / tcp
-1316491703 | 2024-05-13T07:04:38.469343
  
2086 / tcp
1911457608 | 2024-05-27T01:53:26.433695
  
2087 / tcp
141730637 | 2024-05-24T11:20:22.716806
  
2121 / tcp
-1626979812 | 2024-05-17T00:42:17.251008
  
2122 / tcp
1059192566 | 2024-05-18T16:55:56.421736
  
2154 / tcp
546151771 | 2024-05-27T22:51:39.597912
  
2181 / tcp
-1746074029 | 2024-04-30T00:48:33.205432
  
2220 / tcp
58083962 | 2024-05-10T10:22:16.850721
  
2222 / tcp
1662205251 | 2024-05-27T11:27:33.495836
  
2323 / tcp
1632932802 | 2024-05-21T19:10:45.298085
  
2332 / tcp
819727972 | 2024-05-19T04:25:30.666385
  
2345 / tcp
2033888749 | 2024-05-15T08:19:05.456342
  
2375 / tcp
2087396567 | 2024-05-20T09:46:22.573210
  
2376 / tcp
-1810987450 | 2024-05-24T03:00:21.058325
  
2404 / tcp
-786044033 | 2024-05-25T07:45:21.884270
  
2455 / tcp
-2089734047 | 2024-05-22T01:57:23.460205
  
2556 / tcp
-358801646 | 2024-05-28T18:34:42.944680
  
2561 / tcp
1911457608 | 2024-05-10T20:44:17.094616
  
2562 / tcp
-1900404274 | 2024-05-23T03:43:57.804485
  
2628 / tcp
321971019 | 2024-05-29T04:05:08.808601
  
2761 / tcp
-1888448627 | 2024-05-07T04:13:49.881872
  
2762 / tcp
-2089734047 | 2024-05-08T04:58:05.728354
  
3001 / tcp
391958514 | 2024-05-18T02:40:34.982002
  
3005 / tcp
-1733106930 | 2024-05-16T14:19:43.909327
  
3050 / tcp
-2089734047 | 2024-05-07T09:27:11.507842
  
3062 / tcp
-1399940268 | 2024-05-17T22:14:45.694510
  
3081 / tcp
1396488228 | 2024-05-02T15:53:18.255535
  
3090 / tcp
-1888448627 | 2024-05-25T03:00:41.755485
  
3095 / tcp
-1399940268 | 2024-05-21T06:53:13.183715
  
3098 / tcp
740837454 | 2024-05-28T15:32:11.196264
  
3117 / tcp
829702513 | 2024-05-08T15:45:18.997515
  
3221 / tcp
1655023012 | 2024-05-23T09:10:59.910926
  
3260 / tcp
198844676 | 2024-05-20T13:57:41.929126
  
3268 / tcp
-1399940268 | 2024-05-26T06:34:09.134809
  
3269 / tcp
-1476017887 | 2024-04-29T22:33:51.236711
  
3299 / tcp
1426971893 | 2024-05-25T18:30:41.004721
  
3301 / tcp
292351399 | 2024-05-29T06:14:39.587424
  
3306 / tcp
1282941221 | 2024-05-26T08:52:03.411534
  
3310 / tcp
-567518421 | 2024-04-30T04:15:36.353397
  
3333 / tcp
165188539 | 2024-05-08T19:26:07.786152
  
3352 / tcp
-2096652808 | 2024-05-29T04:16:32.483735
  
3388 / tcp
848680996 | 2024-05-20T03:22:33.352885
  
3389 / tcp
-1888448627 | 2024-05-10T18:19:38.386509
  
3401 / tcp
-1779118422 | 2024-04-29T18:32:57.822489
  
3407 / tcp
104385780 | 2024-05-14T20:49:04.398828
  
3522 / tcp
660175493 | 2024-05-26T21:27:44.609685
  
3541 / tcp
-1428621233 | 2024-05-22T03:23:40.267730
  
3548 / tcp
-1399940268 | 2024-05-12T18:39:38.511570
  
3550 / tcp
198844676 | 2024-05-27T23:07:39.449441
  
3551 / tcp
1615193817 | 2024-05-20T18:57:03.944636
  
3561 / tcp
1077013874 | 2024-05-04T16:57:26.904248
  
3563 / tcp
15018106 | 2024-05-29T10:46:05.699258
  
3567 / tcp
-2096652808 | 2024-05-09T23:37:02.647228
  
3568 / tcp
819727972 | 2024-05-01T11:32:57.607452
  
3780 / tcp
422524323 | 2024-05-28T12:08:46.622765
  
3790 / tcp
1300162323 | 2024-05-27T22:01:14.864949
  
4000 / tcp
740837454 | 2024-05-14T05:42:20.120685
  
4022 / tcp
-2089734047 | 2024-05-17T10:58:33.243794
  
4063 / tcp
-345718689 | 2024-05-04T15:49:35.519816
  
4064 / tcp
745343730 | 2024-05-22T15:18:39.510281
  
4157 / tcp
-1341662640 | 2024-05-28T07:23:32.012456
  
4242 / tcp
2087396567 | 2024-05-14T01:06:12.470213
  
4282 / tcp
-1250504565 | 2024-05-23T12:58:14.129962
  
4321 / tcp
1308377066 | 2024-05-26T06:43:02.442718
  
4369 / tcp
671605376 | 2024-05-21T14:49:54.165648
  
4433 / tcp
141533638 | 2024-05-21T21:06:54.174529
  
4443 / tcp
-314039103 | 2024-05-19T21:32:54.058140
  
4444 / tcp
-1839934832 | 2024-05-28T15:08:41.409452
  
4500 / tcp
-984990168 | 2024-05-06T13:21:29.906150
  
4506 / tcp
1865391109 | 2024-05-18T03:30:39.725695
  
4782 / tcp
307999478 | 2024-05-14T19:15:54.974755
  
4786 / tcp
819727972 | 2024-05-07T07:19:53.285039
  
4840 / tcp
-358801646 | 2024-05-26T21:32:02.992775
  
4899 / tcp
-1996280214 | 2024-05-21T14:36:45.779631
  
4911 / tcp
2087396567 | 2024-05-26T06:36:47.894047
  
4949 / tcp
290819026 | 2024-04-30T19:13:29.070129
  
5005 / tcp
957278843 | 2024-05-28T10:55:50.875421
  
5006 / tcp
-653033013 | 2024-05-28T23:33:46.913242
  
5007 / tcp
-1122307493 | 2024-05-07T04:41:04.836271
  
5009 / tcp
504717326 | 2024-05-22T10:32:13.087213
  
5010 / tcp
1741579575 | 2024-05-05T23:17:14.482603
  
5025 / tcp
758842125 | 2024-05-29T12:30:41.617321
  
5080 / tcp
1911457608 | 2024-05-23T00:15:03.016126
  
5150 / tcp
114471724 | 2024-05-27T00:03:34.009234
  
5172 / tcp
-2031152423 | 2024-05-20T05:07:22.848426
  
5222 / tcp
-1165098486 | 2024-05-28T20:15:10.500321
  
5269 / tcp
-1013082686 | 2024-05-27T21:35:41.961442
  
5432 / tcp
-2096652808 | 2024-05-19T22:46:25.467214
  
5435 / tcp
550048729 | 2024-05-08T05:45:11.410118
  
5601 / tcp
-2031152423 | 2024-05-19T21:39:12.016128
  
5608 / tcp
575925250 | 2024-05-27T19:48:56.364713
  
5672 / tcp
-2050145619 | 2024-05-17T04:13:51.361502
  
5822 / tcp
165188539 | 2024-05-18T12:54:31.203364
  
5858 / tcp
-1641514916 | 2024-05-28T10:36:32.244656
  
5907 / tcp
671605376 | 2024-05-27T03:51:10.180952
  
5938 / tcp
1999272906 | 2024-05-24T16:43:58.544139
  
5984 / tcp
320677201 | 2024-05-26T10:37:44.957883
  
5986 / tcp
401555314 | 2024-05-21T14:27:44.673116
  
6000 / tcp
-1399940268 | 2024-05-28T03:17:08.739205
  
6001 / tcp
996960436 | 2024-05-24T03:10:19.298491
  
6002 / tcp
-1399940268 | 2024-05-14T16:07:48.522735
  
6010 / tcp
-1099385124 | 2024-05-05T03:11:30.891233
  
6161 / tcp
1813977069 | 2024-05-09T20:27:35.516521
  
6379 / tcp
-971970408 | 2024-05-26T21:21:20.178782
  
6443 / tcp
819727972 | 2024-05-06T17:00:15.322119
  
6464 / tcp
-339084706 | 2024-05-02T21:08:37.693300
  
6560 / tcp
-980525298 | 2024-05-21T01:49:32.221996
  
6561 / tcp
-1810987450 | 2024-05-20T09:06:54.631125
  
6590 / tcp
-2017887953 | 2024-05-02T00:10:57.769503
  
6600 / tcp
1308377066 | 2024-05-18T22:00:15.108096
  
6605 / tcp
-599252106 | 2024-05-04T14:36:54.182498
  
6653 / tcp
4935895 | 2024-05-19T22:09:00.338898
  
6666 / tcp
1267517148 | 2024-05-19T18:44:25.805233
  
6667 / tcp
1208318993 | 2024-05-27T05:02:59.238565
  
6668 / tcp
1189133115 | 2024-05-15T21:28:26.629925
  
6697 / tcp
-2089734047 | 2024-05-26T09:29:39.973951
  
6887 / tcp
641070437 | 2024-05-07T23:11:59.090582
  
7001 / tcp
-2084228232 | 2024-05-24T21:33:58.982668
  
7004 / tcp
-1399940268 | 2024-05-06T03:19:20.177726
  
7010 / tcp
-1746074029 | 2024-05-29T09:58:25.553344
  
7022 / tcp
1690634669 | 2024-05-20T09:17:47.707419
  
7071 / tcp
707919486 | 2024-05-01T07:23:50.800751
  
7171 / tcp
-1681927087 | 2024-05-27T19:43:42.159563
  
7218 / tcp
-1399940268 | 2024-05-02T16:59:24.836268
  
7415 / tcp
-971970408 | 2024-05-21T19:06:13.274700
  
7434 / tcp
1612309769 | 2024-05-10T11:43:55.282032
  
7443 / tcp
-1888448627 | 2024-05-05T21:39:52.257715
  
7444 / tcp
1975288991 | 2024-05-20T19:07:28.655191
  
7548 / tcp
-1881409212 | 2024-05-19T01:28:48.597066
  
7634 / tcp
-784071826 | 2024-05-21T04:40:16.717263
  
8002 / tcp
1989907056 | 2024-05-28T23:10:23.887699
  
8009 / tcp
770016595 | 2024-05-12T16:37:54.103912
  
8010 / tcp
-303199180 | 2024-05-08T00:11:41.812248
  
8015 / tcp
321971019 | 2024-05-25T01:48:55.012429
  
8016 / tcp
1624217396 | 2024-05-20T18:26:10.630868
  
8025 / tcp
-1730858130 | 2024-05-17T06:56:12.456344
  
8027 / tcp
-653033013 | 2024-05-02T11:51:05.692114
  
8051 / tcp
1761482307 | 2024-05-22T11:05:04.572580
  
8057 / tcp
1984588611 | 2024-05-09T15:54:05.786171
  
8060 / tcp
1363464823 | 2024-05-12T21:04:34.594618
  
8071 / tcp
1356825080 | 2024-05-24T18:44:12.077469
  
8081 / tcp
-903067560 | 2024-05-03T04:47:51.186219
  
8082 / tcp
-2031152423 | 2024-05-11T04:04:26.666135
  
8083 / tcp
2087396567 | 2024-05-08T13:22:18.972089
  
8085 / tcp
-122096153 | 2024-05-24T13:43:52.629921
  
8087 / tcp
623236583 | 2024-05-01T17:05:52.319736
  
8099 / tcp
-358707605 | 2024-05-11T08:04:03.410511
  
8139 / tcp
104385780 | 2024-05-28T12:29:22.996903
  
8140 / tcp
-375604792 | 2024-05-17T09:17:45.632275
  
8181 / tcp
-678709746 | 2024-05-25T21:53:45.581379
  
8200 / tcp
1911457608 | 2024-05-15T03:08:56.255167
  
8282 / tcp
-1733645023 | 2024-05-11T14:40:10.053226
  
8291 / tcp
-339084706 | 2024-05-02T23:19:03.635310
  
8409 / tcp
-1399940268 | 2024-05-01T01:48:27.153008
  
8432 / tcp
-1102009664 | 2024-05-27T17:23:26.714344
  
8443 / tcp
1911457608 | 2024-05-20T09:37:25.412879
  
8447 / tcp
410249975 | 2024-05-27T18:27:45.450553
  
8500 / tcp
-345718689 | 2024-05-19T18:27:10.167885
  
8545 / tcp
-1059554316 | 2024-05-13T04:14:39.130659
  
8553 / tcp
550048729 | 2024-05-16T02:23:04.598609
  
8554 / tcp
-2031152423 | 2024-05-14T22:46:35.843107
  
8575 / tcp
-42767839 | 2024-05-22T07:14:49.224055
  
8649 / tcp
-1888448627 | 2024-05-16T11:37:48.180786
  
8728 / tcp
819727972 | 2024-05-22T17:26:13.800844
  
8789 / tcp
-180163620 | 2024-05-19T00:34:59.371443
  
8809 / tcp
921225407 | 2024-05-28T21:32:25.850651
  
8815 / tcp
-2031152423 | 2024-05-04T20:44:15.542321
  
8826 / tcp
1542849631 | 2024-05-26T22:00:22.115601
  
8834 / tcp
401555314 | 2024-05-12T19:02:27.587393
  
8853 / tcp
-616720387 | 2024-05-26T00:41:03.921355
  
8856 / tcp
819727972 | 2024-05-22T11:43:34.823118
  
8862 / tcp
2098371729 | 2024-05-10T00:52:14.591282
  
8866 / tcp
-1810987450 | 2024-05-20T00:58:20.361428
  
8879 / tcp
-641479109 | 2024-05-25T17:10:46.879825
  
8880 / tcp
250824264 | 2024-05-08T04:44:24.775415
  
8888 / tcp
863754335 | 2024-05-28T11:55:55.974237
  
8889 / tcp
1911457608 | 2024-05-21T12:01:17.346640
  
8890 / tcp
-2089734047 | 2024-05-13T13:53:32.586933
  
8991 / tcp
-2067028711 | 2024-05-17T23:30:31.809577
  
9000 / tcp
539065883 | 2024-05-25T07:32:39.429012
  
9002 / tcp
165188539 | 2024-05-23T05:46:37.430799
  
9016 / tcp
-2107996212 | 2024-05-12T07:39:59.731230
  
9021 / tcp
-1036370807 | 2024-05-20T23:07:41.728407
  
9031 / tcp
-2089734047 | 2024-04-29T19:17:10.770605
  
9036 / tcp
2063598737 | 2024-05-23T08:39:35.501849
  
9039 / tcp
-1981633887 | 2024-05-26T06:00:29.551071
  
9040 / tcp
819727972 | 2024-05-08T20:30:37.438765
  
9042 / tcp
-1399940268 | 2024-05-27T22:51:24.991757
  
9044 / tcp
819727972 | 2024-05-13T01:31:20.311303
  
9051 / tcp
1082239536 | 2024-05-13T19:10:08.324111
  
9090 / tcp
-971970408 | 2024-05-25T14:58:10.758194
  
9091 / tcp
1308377066 | 2024-05-26T13:21:43.563832
  
9092 / tcp
1911457608 | 2024-05-20T04:57:43.057249
  
9100 / tcp
1504401647 | 2024-05-14T15:08:14.268934
  
9102 / tcp
-1056270173 | 2024-05-14T10:43:47.283215
  
9110 / tcp
2087396567 | 2024-05-17T06:19:10.907052
  
9151 / tcp
-2089734047 | 2024-05-03T17:31:51.250499
  
9160 / tcp
-1611764932 | 2024-05-24T06:09:35.649640
  
9189 / tcp
-1120655012 | 2024-05-06T08:13:05.692070
  
9200 / tcp
1911457608 | 2024-05-05T02:23:12.618254
  
9208 / tcp
-1626979812 | 2024-05-18T05:33:41.902462
  
9214 / tcp
-339084706 | 2024-05-24T23:16:57.459738
  
9218 / tcp
819727972 | 2024-05-11T22:52:20.035833
  
9306 / tcp
1004056929 | 2024-05-04T00:27:22.486572
  
9418 / tcp
-1108280983 | 2024-05-13T21:24:07.519421
  
9443 / tcp
493955023 | 2024-05-24T05:21:47.465750
  
9530 / tcp
921225407 | 2024-05-21T13:05:13.929502
  
9600 / tcp
-1839934832 | 2024-05-25T01:37:26.845006
  
9633 / tcp
-1279886438 | 2024-05-10T00:01:58.191870
  
9663 / tcp
-2089734047 | 2024-05-22T00:09:10.776422
  
9682 / tcp
1911457608 | 2024-05-03T10:48:12.300155
  
9761 / tcp
1412519768 | 2024-05-19T22:29:52.871652
  
9800 / tcp
1072892569 | 2024-05-03T16:25:54.001134
  
9869 / tcp
751610770 | 2024-05-24T14:28:06.051645
  
9943 / tcp
-1316491703 | 2024-05-01T09:53:33.075853
  
9944 / tcp
-2096652808 | 2024-05-12T05:21:26.980678
  
9997 / tcp
-1340128872 | 2024-05-12T09:59:46.058303
  
9998 / tcp
1161309183 | 2024-05-26T13:37:07.626011
  
9999 / tcp
-2031152423 | 2024-05-01T00:22:20.428142
  
10000 / tcp
1492413928 | 2024-05-22T00:06:51.221849
  
10001 / tcp
-339084706 | 2024-05-27T15:10:09.553197
  
10134 / tcp
819727972 | 2024-05-21T23:03:17.439245
  
10250 / tcp
2087396567 | 2024-05-22T22:11:06.063894
  
10443 / tcp
-527005584 | 2024-05-20T21:27:18.621111
  
10554 / tcp
1426971893 | 2024-05-25T23:39:58.957624
  
10909 / tcp
165188539 | 2024-05-15T11:45:22.183220
  
10911 / tcp
819727972 | 2024-05-23T02:37:57.500500
  
11000 / tcp
119860953 | 2024-05-22T21:38:14.419785
  
11112 / tcp
597764502 | 2024-05-17T19:59:43.210255
  
11210 / tcp
-136006866 | 2024-05-24T02:47:36.736487
  
11211 / tcp
-1986594217 | 2024-05-27T03:39:30.238498
  
11300 / tcp
227700176 | 2024-05-23T19:20:12.619556
  
12000 / tcp
488204803 | 2024-05-28T21:25:23.542330
  
12345 / tcp
-1839934832 | 2024-05-27T22:13:01.701655
  
14147 / tcp
1911457608 | 2024-04-30T03:56:15.509584
  
14265 / tcp
-358801646 | 2024-05-26T12:26:44.021267
  
14344 / tcp
1996932384 | 2024-05-13T21:07:33.839242
  
16993 / tcp
-358801646 | 2024-05-25T18:18:04.070304
  
18081 / tcp
-1013082686 | 2024-05-27T18:20:31.227061
  
19000 / tcp
422524323 | 2024-05-09T22:16:14.062645
  
19071 / tcp
1900503736 | 2024-05-24T04:23:16.962058
  
20000 / tcp
45131230 | 2024-05-25T20:59:34.547856
  
20256 / tcp
-2046514463 | 2024-05-23T17:27:20.662547
  
20547 / tcp
-971970408 | 2024-05-19T21:56:43.937539
  
21025 / tcp
709622286 | 2024-05-28T05:16:53.814566
  
21379 / tcp
-1609150592 | 2024-05-27T11:12:14.941526
  
23023 / tcp
-1729629024 | 2024-05-29T07:10:34.261460
  
23424 / tcp
1911457608 | 2024-05-28T23:13:23.424862
  
25565 / tcp
-1888448627 | 2024-05-27T12:34:46.500063
  
27015 / tcp
1763259671 | 2024-05-05T22:56:34.623778
  
27017 / tcp
-2089734047 | 2024-05-27T20:02:55.653017
  
28015 / tcp
-1681927087 | 2024-05-20T09:37:52.642340
  
30002 / tcp
-1681927087 | 2024-05-11T23:19:09.010050
  
30003 / tcp
-147424911 | 2024-05-12T11:21:19.106874
  
31337 / tcp
2087396567 | 2024-05-21T21:33:01.082258
  
32764 / tcp
539065883 | 2024-05-17T22:03:31.080882
  
33060 / tcp
921225407 | 2024-05-24T01:16:41.402514
  
35000 / tcp
-826610984 | 2024-05-18T01:47:23.771327
  
37777 / tcp
-146605374 | 2024-05-24T07:48:14.520949
  
41800 / tcp
-433302150 | 2024-05-29T03:12:10.274377
  
44158 / tcp
819727972 | 2024-05-22T22:11:06.687546
  
44818 / tcp
2087396567 | 2024-05-27T15:35:40.137095
  
47990 / tcp
-358801646 | 2024-05-24T21:30:12.166444
  
50000 / tcp
-2118655245 | 2024-05-25T10:42:40.888735
  
50050 / tcp
2033888749 | 2024-05-14T07:44:38.244717
  
50070 / tcp
233634112 | 2024-05-27T03:18:29.169242
  
50100 / tcp
1632932802 | 2024-05-03T15:33:39.247776
  
51235 / tcp
2121220663 | 2024-05-23T11:42:44.186951
  
54138 / tcp
-1888448627 | 2024-05-19T20:36:55.250128
  
55000 / tcp
-1514525820 | 2024-05-28T07:49:57.215002
  
55443 / tcp
-1810987450 | 2024-05-22T17:49:48.886788
  
55553 / tcp
770016595 | 2024-05-16T19:05:48.625039
  
60030 / tcp
819727972 | 2024-05-26T16:12:24.875419
  
60129 / tcp
-1399940268 | 2024-05-27T19:00:38.602775
  
61613 / tcp
-1113435755 | 2024-05-27T16:33:11.027999
  
62078 / tcp



Contact Us

Shodan ® - All rights reserved