47.104.36.30

Regular View Raw Data
Last Seen: 2024-05-29

GeneralInformation

Hostnames cjdskj.1688.com
deiniyodress.1688.com
fuwoon.1688.com
jionzhvdong.1688.com
ovhvisg.1688.com
reako188.1688.com
shjonso.1688.com
shog1489510874527.1688.com
shog1492759159639.1688.com
shog3v4962o426102.1688.com
shog50205v356s127.1688.com
shog555g70n583131.1688.com
shog7n4709880n3k8.1688.com
shog94v1d23873n17.1688.com
global-payment-bops.ae.alibaba-inc.com
a2n360.ojibobo-ina.aon.alibaba-inc.com
ahongefree.ojibobo-ina.aon.alibaba-inc.com
aontent.ojibobo-ina.aon.alibaba-inc.com
rb.dfjy.ojibobo-ina.aon.alibaba-inc.com
disaonf-kj.ojibobo-ina.aon.alibaba-inc.com
env-aenter-ossist.ojibobo-ina.aon.alibaba-inc.com
gre-exgjore.ojibobo-ina.aon.alibaba-inc.com
gre-nbf-robvst.ojibobo-ina.aon.alibaba-inc.com
gre-oqgjvs.ojibobo-ina.aon.alibaba-inc.com
hb-ogi.ojibobo-ina.aon.alibaba-inc.com
hoiahvon-biz-driver.ojibobo-ina.aon.alibaba-inc.com
hotrig.ojibobo-ina.aon.alibaba-inc.com
iabv-qo.ojibobo-ina.aon.alibaba-inc.com
oto.ojibobo-ina.aon.alibaba-inc.com
regvjotion.ojibobo-ina.aon.alibaba-inc.com
seavrity-nosh-de.ojibobo-ina.aon.alibaba-inc.com
sky-groteation.ojibobo-ina.aon.alibaba-inc.com
troae2.sn.ojibobo-ina.aon.alibaba-inc.com
sta-server.ojibobo-ina.aon.alibaba-inc.com
onozireseorahenhonae.toogioogioo.ojibobo-ina.aon.alibaba-inc.com
done.alibaba-inc.com
go-next.alibaba-inc.com
lha-lab-java.alibaba-inc.com
industrycenter-private.ossproxy.alibaba-inc.com
usight-api.alibaba-inc.com
dorkorder-tb.alibaba.com
gernon.alibaba.com
n.orobia.alibaba.com
svggort.alibaba.com
aliyun-cpp.alibaba.net
dtuicoverage.alibaba.net
barclay.aliexpress.com
cainiao-ru.aliexpress.com
carpediem.aliexpress.com
imbaby.aliexpress.com
it.aliexpress.com
jarvis.alitrip.com
njroq6.aliwork.com
x1j0bf.aliwork.com
gre-dvbbo.an-hongzhov.ojiyvn-ina.aon.aliyun-inc.com
ron-ovth.an-hvhehoote.ojiyvn-ina.aon.aliyun-inc.com
dh-an-shonghoi.ojiyvn-ina.aon.aliyun-inc.com
gts.ojiyvn-ina.aon.aliyun-inc.com
dt.an-shonghoi.noxaongvte.ojiyvn-ina.aon.aliyun-inc.com
ob-gre.ojiyvn-ina.aon.aliyun-inc.com
vision.ojiyvn-ina.aon.aliyun-inc.com
vnn-shore-fo.ojiyvn-ina.aon.aliyun-inc.com
aliyun.com
update-inner2.aegis.aliyun.com
api.aliyun.com
autobuild.aliyun.com
bi.aliyun.com
bswyts.aliyun.com
channel.cbbs.aliyun.com
eci-inner.cn-huhehaote.aliyun.com
ecs-cn-huhehaote.console.aliyun.com
ecs4service-cn-guangzhou.console.aliyun.com
edas-internal.console.aliyun.com
hojostvdio-an-hongzhov.doto.aliyun.com
dsw-gateway.aliyun.com
eco.aliyun.com
fourier.aliyun.com
havanalogin.aliyun.com
hsf.aliyun.com
jmcp.aliyun.com
kl-core.aliyun.com
lel-eagle.aliyun.com
metrichub-cn-hangzhou.aliyun.com
metrics-collection.aliyun.com
ogjvs.aliyun.com
origin-e72dd8c-trendyolbotak-status.aliyun.com
qr.aliyun.com
rsgolf.aliyun.com
saint2.aliyun.com
shop3509n881244h5.aliyun.com
shop36326713.aliyun.com
shop36346889.aliyun.com
survey.aliyun.com
svrvey.aliyun.com
vone.aliyun.com
vseraenter2.aliyun.com
www.aliyun.com
dataworks-inner-share.aliyuncs.com
devejogerojiyvnaon.aliyuncs.com
eai-vga.og-sovtheost-1.aliyuncs.com
eai-inner.og-sovtheost-2.aliyuncs.com
cn-qingdao.oss.aliyuncs.com
adiu.amap.com
ios.source.amap.com
dayin.cainiao.com
track-manage.gfn.cainiao.com
zb-aliyun-devops.iot.cainiao.com
ttac.tmsx.cainiao.com
valley.cainiao.com
bxsys1.capinfo.com.cn
c2.cnzz.com
wwwnode.daxue.dingtalk.com
space.dingtalk.com
app122159.eapps.dingtalkcloud.com
app43923.eapps.dingtalkcloud.com
app48514.eapps.dingtalkcloud.com
app75554.eapps.dingtalkcloud.com
wwwdocker.faas.ele.me
wwwcube.fusion.design
appeal.goofish.com
passport3.hemaapi.cn
rexmedia.hemaos.com
acs.m.koubei.com
m-sg.lazada-seller.cn
809f0bfe59f68379.lazada.co.id
pdpdesc.lazada.co.id
pre-ifs.lazada.co.id
pre-workbench.lazada.com
affiliate.lazada.com.my
ali.lazada.com.my
c.lazada.com.my
ms.adsense.lazada.vn
media.lazada.vn
0f5c5da9.lex.co.id
unitedkingdom.lex.in.th
client-jyh.maitix.com
dbs.mashangfangxin.com
mail.morningstarnet.com
mail.npy.cn
access-open.quark.cn
vt.quark.cn
acs-wapa.rmlogistics.sg
wangdian.sto.cn
0898bhj.taobao.com
aodng.taobao.com
shog370498961.dorjd.taobao.com
duomeiti.taobao.com
fin.taobao.com
gnarn.taobao.com
jsdj.taobao.com
login.taobao.com
agoo-api-sg.m.taobao.com
oovth.taobao.com
qing.taobao.com
qnlogin.taobao.com
rosechina.taobao.com
shog36284229.taobao.com
shog36284243.taobao.com
shog36357430.taobao.com
shog36525871.taobao.com
shog36854541.taobao.com
shog381618524.taobao.com
shop36193895.taobao.com
shop36207187.taobao.com
shop365682614.taobao.com
shop37014536.taobao.com
shop37105204.taobao.com
alpha.daily.taobao.net
idns.vip.tbsite.net
11285521401250.tmall.com
dornhoje-ins-id.tmall.com
gre-ogenshog.tmall.com
itib.tmall.com
qxyh.tmall.com
sjbzfs.tmall.com
yingxiao.tmall.com
yjyjjj.tmall.com
www1.4g.xixikf.cn
Domains 1688.com alibaba-inc.com alibaba.com alibaba.net aliexpress.com alitrip.com aliwork.com aliyun-inc.com aliyun.com aliyuncs.com amap.com cainiao.com capinfo.com.cn cnzz.com dingtalk.com dingtalkcloud.com ele.me fusion.design goofish.com hemaapi.cn hemaos.com koubei.com lazada-seller.cn lazada.co.id lazada.com lazada.com.my lazada.vn lex.co.id lex.in.th maitix.com mashangfangxin.com morningstarnet.com npy.cn quark.cn rmlogistics.sg sto.cn taobao.com taobao.net tbsite.net tmall.com xixikf.cn 
Country China
City Qingdao
Organization Aliyun Computing Co., LTD
ISP Hangzhou Alibaba Advertising Co.,Ltd.
ASN AS37963

WebTechnologies

JavaScript frameworks
JavaScript libraries

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2024-23897 7.5Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
CVE-2023-51767 OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
CVE-2023-51385 In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
CVE-2023-51384 In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.
CVE-2023-48795 The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
CVE-2023-44487 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CVE-2023-38408 The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
CVE-2023-26049 Jetty is a java based web server and servlet engine. Nonstandard cookie parsing in Jetty may allow an attacker to smuggle cookies within other cookies, or otherwise perform unintended behavior by tampering with the cookie parsing mechanism. If Jetty sees a cookie VALUE that starts with `"` (double quote), it will continue to read the cookie string until it sees a closing quote -- even if a semicolon is encountered. So, a cookie header such as: `DISPLAY_LANGUAGE="b; JSESSIONID=1337; c=d"` will be parsed as one cookie, with the name DISPLAY_LANGUAGE and a value of b; JSESSIONID=1337; c=d instead of 3 separate cookies. This has security implications because if, say, JSESSIONID is an HttpOnly cookie, and the DISPLAY_LANGUAGE cookie value is rendered on the page, an attacker can smuggle the JSESSIONID cookie into the DISPLAY_LANGUAGE cookie and thereby exfiltrate it. This is significant when an intermediary is enacting some policy based on cookies, so a smuggled cookie can bypass that policy yet still be seen by the Jetty server or its logging system. This issue has been addressed in versions 9.4.51, 10.0.14, 11.0.14, and 12.0.0.beta0 and users are advised to upgrade. There are no known workarounds for this issue.
CVE-2023-26048 Jetty is a java based web server and servlet engine. In affected versions servlets with multipart support (e.g. annotated with `@MultipartConfig`) that call `HttpServletRequest.getParameter()` or `HttpServletRequest.getParts()` may cause `OutOfMemoryError` when the client sends a multipart request with a part that has a name but no filename and very large content. This happens even with the default settings of `fileSizeThreshold=0` which should stream the whole part content to disk. An attacker client may send a large multipart request and cause the server to throw `OutOfMemoryError`. However, the server may be able to recover after the `OutOfMemoryError` and continue its service -- although it may take some time. This issue has been patched in versions 9.4.51, 10.0.14, and 11.0.14. Users are advised to upgrade. Users unable to upgrade may set the multipart parameter `maxRequestSize` which must be set to a non-negative value, so the whole multipart content is limited (although still read into memory).
CVE-2022-31629 In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables network and same-site attackers to set a standard insecure cookie in the victim's browser which is treated as a `__Host-` or `__Secure-` cookie by PHP applications.
CVE-2022-31628 In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the phar uncompressor code would recursively uncompress "quines" gzip files, resulting in an infinite loop.
CVE-2022-2048 5.0In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.
CVE-2022-2047 4.0In Eclipse Jetty versions 9.4.0 thru 9.4.46, and 10.0.0 thru 10.0.9, and 11.0.0 thru 11.0.9 versions, the parsing of the authority segment of an http scheme URI, the Jetty HttpURI class improperly detects an invalid input as a hostname. This can lead to failures in a Proxy scenario.
CVE-2021-41617 4.4sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
CVE-2021-36368 2.6An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass, since nothing is being bypassed.
CVE-2021-34428 3.6For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in.
CVE-2021-28169 5.0For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, it is possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory. For example a request to `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
CVE-2020-27216 4.4In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. If the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications, including their WEB-INF/lib jar files and JSP files. If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability.
CVE-2020-15778 6.8scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
CVE-2020-14145 4.3The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
CVE-2020-11579 5.0An issue was discovered in Chadha PHPKB 9.0 Enterprise Edition. installer/test-connection.php (part of the installation process) allows a remote unauthenticated attacker to disclose local files on hosts running PHP before 7.2.16, or on hosts where the MySQL ALLOW LOCAL DATA INFILE option is enabled.
CVE-2019-9641 7.5An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_TIFF.
CVE-2019-9639 5.0An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the data_len variable.
CVE-2019-9638 5.0An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the maker_note->offset relationship to value_len.
CVE-2019-9637 5.0An issue was discovered in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. Due to the way rename() across filesystems is implemented, it is possible that file being renamed is briefly available with wrong permissions while the rename is ongoing, thus enabling unauthorized users to access the data.
CVE-2019-6111 5.8An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
CVE-2019-6110 4.0In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
CVE-2019-6109 4.0An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
CVE-2019-16905 4.4OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
CVE-2018-20685 2.6In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
CVE-2018-19396 5.0ext/standard/var_unserializer.c in PHP 5.x through 7.1.24 allows attackers to cause a denial of service (application crash) via an unserialize call for the com, dotnet, or variant class.
CVE-2018-19395 5.0ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attackers to cause a denial of service (NULL pointer dereference and application crash) because com and com_safearray_proxy return NULL in com_properties_get in ext/com_dotnet/com_handlers.c, as demonstrated by a serialize call on COM("WScript.Shell").
CVE-2018-15919 5.0Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
CVE-2018-15473 5.0OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
CVE-2017-9735 5.0Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.
CVE-2017-8923 7.5The zend_string_extend function in Zend/zend_string.h in PHP through 7.1.5 does not prevent changes to string objects that result in a negative length, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact by leveraging a script's use of .= with a long string.
CVE-2017-7963 5.0The GNU Multiple Precision Arithmetic Library (GMP) interfaces for PHP through 7.1.4 allow attackers to cause a denial of service (memory consumption and application crash) via operations on long strings. NOTE: the vendor disputes this, stating "There is no security issue here, because GMP safely aborts in case of an OOM condition. The only attack vector here is denial of service. However, if you allow attacker-controlled, unbounded allocations you have a DoS vector regardless of GMP's OOM behavior.
CVE-2017-7658 7.5In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization.
CVE-2017-7657 7.5In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), transfer-encoding chunks are handled poorly. The chunk length parsing was vulnerable to an integer overflow. Thus a large chunk size could be interpreted as a smaller chunk size and content sent as chunk body could be interpreted as a pipelined request. If Jetty was deployed behind an intermediary that imposed some authorization and that intermediary allowed arbitrarily large chunks to be passed on unchanged, then this flaw could be used to bypass the authorization imposed by the intermediary as the fake pipelined request would not be interpreted by the intermediary as a request.
CVE-2017-7656 5.0In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), HTTP/0.9 is handled poorly. An HTTP/1 style request line (i.e. method space URI space version) that declares a version of HTTP/0.9 was accepted and treated as a 0.9 request. If deployed behind an intermediary that also accepted and passed through the 0.9 version (but did not act on it), then the response sent could be interpreted by the intermediary as HTTP/1 headers. This could be used to poison the cache if the server allowed the origin client to generate arbitrary content in the response.
CVE-2017-7272 5.8PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.
CVE-2017-15906 5.0The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
CVE-2016-9244 5.0A BIG-IP virtual server configured with a Client SSL profile that has the non-default Session Tickets option enabled may leak up to 31 bytes of uninitialized memory. A remote attacker may exploit this vulnerability to obtain Secure Sockets Layer (SSL) session IDs from other sessions. It is possible that other data from uninitialized memory may be returned as well.
CVE-2016-3115 5.5Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
CVE-2016-20012 4.3OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
CVE-2016-1908 7.5The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
CVE-2016-10708 5.0sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
CVE-2016-10012 7.2The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
CVE-2016-10011 2.1authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
CVE-2016-10010 6.9sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
CVE-2016-10009 7.5Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
CVE-2016-0777 4.0The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
CVE-2015-9253 6.8An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility.
CVE-2015-6564 6.9Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
CVE-2015-6563 1.9The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
CVE-2015-5600 8.5The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
CVE-2015-5352 4.3The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
CVE-2014-2653 5.8The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
CVE-2014-2532 5.8sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
CVE-2014-1692 7.5The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.
CVE-2013-2220 7.5Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
CVE-2012-0814 3.5The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
CVE-2011-5000 3.5The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
CVE-2011-4327 2.1ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.
CVE-2010-5107 5.0The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
CVE-2010-4755 4.0The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
CVE-2010-4478 7.5OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
CVE-2008-3844 9.3Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
CVE-2007-3205 5.0The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.
CVE-2007-2768 4.3OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.

OpenPorts

11131517192123253743495370798081828410210411011111311912213114315417517919519922122226431138942744344446551554863163666677178980080687399299399599910231025105010991153117712001234131113371433147114941515159916041723174118001801188319111926196219812000200220082010202120532060206720682069207020802081208220832086208720962111212121262154218122222223223322902323233223452351237623822404245525522554255825602562260226282650270927612762300130503058307630803082308330843088309230933102310331073109311131143117311931203260326932993301330633103311338833893400340835233541354235493551355435553556355935603570368937493780379037943950395240004022404040634064411741574242428243214369443344434506478247864840489949114949499950015005500650075009501050255122517252015222526954325435556055675592559555995602560856725822585859005938598459855986600060016002600760106080637964436511651265506633665366646666666766686697700170057010707171717218741574347443749375477548765777787989799879998001800780098010802280238036804080438049805580608066808080818082808380858087808880898092809780988099810681108111811281238126813981408181820082388249828282918333833484068409841984438500854585548637864987288805881388198827883488378847885288558860886288768880888588898988899990009001900290189020902590279029904290449050905190709091909290959100911191369151916091899191919992059209921192129215921792229301930694189443952795309600963397619800986198699943994499509991999899991000010001101341025010443105541090911000111121121011211113001137112000123451414714265143441699216993180811824519000190712000020256205472102521379230232342425565270152701728015280803000331337324003276433060377774180044158448184799049152500005005050100512355286954138550005544255443555535555460001601296161662078
2087396567 | 2024-05-16T22:33:14.596886
  
11 / tcp
1100205395 | 2024-05-28T04:13:14.524070
  
13 / tcp
2087396567 | 2024-05-26T10:38:53.642361
  
15 / tcp
-1296032851 | 2024-05-27T01:48:00.892150
  
17 / tcp
829384519 | 2024-05-15T20:55:11.147888
  
19 / tcp
1564456597 | 2024-05-07T08:28:40.012419
  
21 / tcp
164764193 | 2024-05-29T00:11:17.304928
  
23 / tcp
1911457608 | 2024-05-11T18:31:48.155588
  
25 / tcp
1443000738 | 2024-05-28T02:09:43.273031
  
37 / tcp
1741579575 | 2024-05-07T15:24:35.524359
  
43 / tcp
-1867457549 | 2024-05-23T05:29:02.431167
  
49 / tcp
1024248778 | 2024-05-28T08:41:59.319314
  
53 / tcp
-833941849 | 2024-05-26T14:38:08.840515
  
70 / tcp
268196945 | 2024-05-22T20:13:03.857014
  
79 / tcp
-342986239 | 2024-05-24T00:09:55.368555
  
80 / tcp
1978059005 | 2024-05-28T09:55:55.212541
  
81 / tcp
842535728 | 2024-05-03T21:32:03.588410
  
82 / tcp
1119512965 | 2024-05-25T02:39:13.192075
  
84 / tcp
-2080784861 | 2024-05-16T16:03:03.567115
  
102 / tcp
-1032713145 | 2024-05-09T06:34:38.589041
  
104 / tcp
1911457608 | 2024-05-24T11:48:51.589289
  
110 / tcp
660175493 | 2024-05-16T12:31:08.414421
  
111 / tcp
-414819019 | 2024-05-09T16:33:33.506340
  
113 / tcp
141730637 | 2024-05-28T23:22:58.940826
  
119 / tcp
1504401647 | 2024-05-01T18:36:59.142428
  
122 / tcp
-1036370807 | 2024-05-12T17:10:59.572879
  
131 / tcp
219070077 | 2024-05-07T21:08:31.154435
  
143 / tcp
740837454 | 2024-05-04T01:44:22.824758
  
154 / tcp
320677201 | 2024-05-29T08:59:53.375422
  
175 / tcp
-399606100 | 2024-05-22T05:55:48.433363
  
179 / tcp
171352214 | 2024-05-29T03:28:41.648872
  
195 / tcp
-314039103 | 2024-05-06T07:35:14.440993
  
199 / tcp
819727972 | 2024-05-16T15:12:49.507822
  
221 / tcp
836184120 | 2024-05-15T12:48:51.157083
  
222 / tcp
-1547821026 | 2024-05-14T07:17:07.966863
  
264 / tcp
676753056 | 2024-05-26T22:07:56.390310
  
311 / tcp
-1907080992 | 2024-05-24T07:17:14.146635
  
389 / tcp
1388449297 | 2024-05-19T14:29:15.800499
  
427 / tcp
1157058823 | 2024-05-19T22:44:52.328975
  
443 / tcp
1308377066 | 2024-05-24T10:27:46.238788
  
444 / tcp
897328069 | 2024-05-18T23:55:46.080429
  
465 / tcp
842535728 | 2024-05-17T01:39:16.860180
  
515 / tcp
155249582 | 2024-05-29T02:46:04.171369
  
548 / tcp
178736976 | 2024-05-14T00:09:29.101016
  
631 / tcp
-779815868 | 2024-05-27T10:01:40.037277
  
636 / tcp
1300162323 | 2024-05-23T06:13:43.495865
  
666 / tcp
-1399940268 | 2024-05-28T02:50:27.263987
  
771 / tcp
-1399940268 | 2024-05-20T01:19:32.480507
  
789 / tcp
-29892444 | 2024-05-03T18:44:38.868501
  
800 / tcp
-274082663 | 2024-05-25T01:57:45.453062
  
806 / tcp
-1970692834 | 2024-05-25T22:05:43.569867
  
873 / tcp
1814656027 | 2024-05-25T22:05:17.873916
  
992 / tcp
103159425 | 2024-05-25T23:20:59.100388
  
993 / tcp
1685649979 | 2024-05-08T01:29:24.659813
  
995 / tcp
-1093031919 | 2024-05-26T06:10:29.992404
  
999 / tcp
1632932802 | 2024-05-24T00:40:27.786488
  
1023 / tcp
1911457608 | 2024-05-26T06:31:06.080965
  
1025 / tcp
1615193817 | 2024-05-19T23:50:56.964963
  
1050 / tcp
-358801646 | 2024-05-28T15:33:54.737750
  
1099 / tcp
-1399940268 | 2024-05-16T02:47:36.391722
  
1153 / tcp
1282941221 | 2024-05-03T20:04:00.226343
  
1177 / tcp
104385780 | 2024-05-15T20:46:11.285363
  
1200 / tcp
819727972 | 2024-05-26T00:59:04.939511
  
1234 / tcp
1767345577 | 2024-05-05T07:04:35.956553
  
1311 / tcp
2087396567 | 2024-05-17T14:06:34.256342
  
1337 / tcp
-186520940 | 2024-05-23T20:18:17.485894
  
1433 / tcp
-1665643483 | 2024-04-30T00:58:32.864954
  
1471 / tcp
-42767839 | 2024-05-04T10:25:28.930933
  
1494 / tcp
-10442315 | 2024-05-29T03:56:21.105345
  
1515 / tcp
2087396567 | 2024-05-14T13:22:58.747203
  
1599 / tcp
-1026951088 | 2024-05-28T10:38:09.757319
  
1604 / tcp
1103582599 | 2024-05-19T04:20:54.581072
  
1723 / tcp
-2081419599 | 2024-05-25T07:26:06.692860
  
1741 / tcp
1975288991 | 2024-05-08T12:28:02.447716
  
1800 / tcp
1692069329 | 2024-05-26T16:08:11.950234
  
1801 / tcp
1615193817 | 2024-05-16T08:56:14.276434
  
1883 / tcp
1615193817 | 2024-05-27T13:14:56.104991
  
1911 / tcp
2087396567 | 2024-05-27T03:29:35.598217
  
1926 / tcp
-2033111675 | 2024-05-10T02:30:04.348551
  
1962 / tcp
-2089734047 | 2024-05-04T13:25:53.923461
  
1981 / tcp
1911457608 | 2024-05-12T09:09:21.971276
  
2000 / tcp
1070373525 | 2024-05-28T14:04:51.587400
  
2002 / tcp
1370263973 | 2024-05-22T09:07:50.665336
  
2008 / tcp
-1399940268 | 2024-05-08T17:17:47.733288
  
2010 / tcp
321971019 | 2024-05-08T12:19:32.292805
  
2021 / tcp
-1986594217 | 2024-05-15T09:31:34.411868
  
2053 / tcp
-784071826 | 2024-05-09T23:18:14.950110
  
2060 / tcp
550048729 | 2024-05-25T17:47:07.512066
  
2067 / tcp
-42767839 | 2024-05-06T22:43:46.666146
  
2068 / tcp
1911457608 | 2024-05-08T07:54:50.688022
  
2069 / tcp
1948301213 | 2024-05-13T08:33:42.217427
  
2070 / tcp
-1399940268 | 2024-05-01T08:39:26.849992
  
2080 / tcp
1911457608 | 2024-05-09T02:07:55.273252
  
2081 / tcp
-1559123399 | 2024-05-25T00:35:28.114916
  
2082 / tcp
-786044033 | 2024-05-25T15:54:19.519290
  
2083 / tcp
1778988322 | 2024-05-19T11:11:27.102678
  
2086 / tcp
1850902677 | 2024-05-14T16:20:39.603143
  
2087 / tcp
709622286 | 2024-05-20T18:29:32.349185
  
2096 / tcp
372433470 | 2024-05-05T18:17:24.028593
  
2111 / tcp
-459998123 | 2024-05-26T01:22:15.749841
  
2121 / tcp
-2080368173 | 2024-05-10T11:50:59.933564
  
2126 / tcp
2087396567 | 2024-05-28T16:19:31.781652
  
2154 / tcp
546151771 | 2024-05-21T01:22:43.280424
  
2181 / tcp
58083962 | 2024-05-25T18:44:12.973605
  
2222 / tcp
-358801646 | 2024-05-08T15:55:32.462892
  
2223 / tcp
671605376 | 2024-05-16T02:48:43.046963
  
2233 / tcp
472902042 | 2024-05-16T12:39:06.169543
  
2290 / tcp
1051421500 | 2024-05-17T12:59:58.060370
  
2323 / tcp
1308377066 | 2024-05-28T15:46:17.193166
  
2332 / tcp
-2096652808 | 2024-05-11T13:56:58.646341
  
2345 / tcp
-1261090339 | 2024-05-25T08:49:00.299329
  
2351 / tcp
2087396567 | 2024-05-12T04:40:32.631510
  
2376 / tcp
1911457608 | 2024-05-02T06:55:06.905799
  
2382 / tcp
-1399940268 | 2024-05-29T14:32:54.090719
  
2404 / tcp
291723434 | 2024-05-27T04:25:56.796297
  
2455 / tcp
-1730858130 | 2024-05-16T01:47:02.820004
  
2552 / tcp
1396488228 | 2024-05-09T07:27:26.021089
  
2554 / tcp
-1399940268 | 2024-05-02T05:07:00.445801
  
2558 / tcp
819727972 | 2024-05-15T14:43:07.893256
  
2560 / tcp
-1835475271 | 2024-05-06T02:12:40.211304
  
2562 / tcp
-1839934832 | 2024-05-04T18:46:58.012528
  
2602 / tcp
2033888749 | 2024-05-25T23:01:05.941766
  
2628 / tcp
-1399940268 | 2024-05-28T04:15:27.924266
  
2650 / tcp
1911457608 | 2024-05-25T16:52:14.296743
  
2709 / tcp
-1399940268 | 2024-05-27T11:20:29.579727
  
2761 / tcp
-992671574 | 2024-04-30T02:45:38.413457
  
2762 / tcp
1690634669 | 2024-05-25T21:11:35.341236
  
3001 / tcp
320677201 | 2024-05-28T09:30:54.741149
  
3050 / tcp
-1399940268 | 2024-05-14T17:56:56.741900
  
3058 / tcp
921225407 | 2024-05-13T16:53:11.783766
  
3076 / tcp
-2031152423 | 2024-05-19T14:24:58.526444
  
3080 / tcp
-1839934832 | 2024-05-19T16:17:00.330746
  
3082 / tcp
1919228981 | 2024-05-25T19:09:28.547007
  
3083 / tcp
921225407 | 2024-05-16T02:55:00.659641
  
3084 / tcp
-1248408558 | 2024-05-13T05:52:01.721631
  
3088 / tcp
-2031152423 | 2024-05-15T18:26:22.138599
  
3092 / tcp
-1105333987 | 2024-05-18T21:14:05.844468
  
3093 / tcp
-1399940268 | 2024-05-08T09:57:53.131292
  
3102 / tcp
2143387245 | 2024-05-23T23:36:53.151197
  
3103 / tcp
-1487943323 | 2024-05-15T17:14:31.943890
  
3107 / tcp
1911457608 | 2024-05-19T13:55:06.971532
  
3109 / tcp
597764502 | 2024-04-29T20:56:01.018914
  
3111 / tcp
1655023012 | 2024-05-21T11:37:24.841377
  
3114 / tcp
-441419608 | 2024-05-18T20:56:58.351679
  
3117 / tcp
-1399940268 | 2024-05-01T00:09:00.844825
  
3119 / tcp
1126993057 | 2024-05-04T10:44:17.509200
  
3120 / tcp
-1341662640 | 2024-05-28T16:26:49.418342
  
3260 / tcp
1126993057 | 2024-05-05T05:13:43.166454
  
3269 / tcp
321971019 | 2024-05-10T23:18:13.466389
  
3299 / tcp
-1327660293 | 2024-05-04T23:32:16.884893
  
3301 / tcp
292351399 | 2024-05-25T16:01:43.136249
  
3306 / tcp
819727972 | 2024-05-26T23:17:18.361735
  
3310 / tcp
1911457608 | 2024-05-08T18:12:32.583433
  
3311 / tcp
1767345577 | 2024-05-28T22:37:45.308871
  
3388 / tcp
623170236 | 2024-05-16T22:15:55.677503
  
3389 / tcp
-358801646 | 2024-05-03T14:47:22.264432
  
3400 / tcp
819727972 | 2024-05-07T01:20:25.735532
  
3408 / tcp
1911457608 | 2024-05-02T18:23:20.843294
  
3523 / tcp
104385780 | 2024-05-27T03:42:26.756837
  
3541 / tcp
-2118655245 | 2024-05-04T13:21:17.276636
  
3542 / tcp
1948301213 | 2024-05-20T09:46:13.140876
  
3549 / tcp
198844676 | 2024-05-23T16:51:55.187949
  
3551 / tcp
819727972 | 2024-05-27T04:04:03.489252
  
3554 / tcp
819727972 | 2024-05-18T07:18:36.481636
  
3555 / tcp
-1036370807 | 2024-05-02T11:08:58.249433
  
3556 / tcp
-2096652808 | 2024-05-19T20:26:44.676412
  
3559 / tcp
119860953 | 2024-05-26T03:38:23.711412
  
3560 / tcp
-1399940268 | 2024-05-23T22:49:28.973070
  
3570 / tcp
459162008 | 2024-05-16T01:29:23.402785
  
3689 / tcp
2033888749 | 2024-05-05T12:22:26.535704
  
3749 / tcp
-971970408 | 2024-05-18T06:25:01.496654
  
3780 / tcp
2087396567 | 2024-05-28T17:37:44.893941
  
3790 / tcp
-1730858130 | 2024-05-03T07:51:09.034236
  
3794 / tcp
2103111368 | 2024-05-05T10:18:59.165362
  
3950 / tcp
-1399940268 | 2024-05-07T14:03:28.595614
  
3952 / tcp
141533638 | 2024-05-24T21:47:59.137373
  
4000 / tcp
-1399940268 | 2024-05-26T07:50:18.067832
  
4022 / tcp
-1023516719 | 2024-05-19T15:17:29.899232
  
4040 / tcp
2087396567 | 2024-05-26T05:36:54.610728
  
4063 / tcp
669849225 | 2024-05-12T22:23:37.182658
  
4064 / tcp
-1730858130 | 2024-05-27T15:49:19.800879
  
4117 / tcp
585675468 | 2024-05-15T16:51:36.826571
  
4157 / tcp
-1879056922 | 2024-05-23T04:19:27.896561
  
4242 / tcp
539065883 | 2024-05-29T16:04:19.823882
  
4282 / tcp
-1250504565 | 2024-05-29T02:24:14.330595
  
4321 / tcp
165188539 | 2024-05-11T23:15:54.113635
  
4369 / tcp
-1453516345 | 2024-05-17T23:16:04.974085
  
4433 / tcp
1140068775 | 2024-05-15T19:43:54.296072
  
4443 / tcp
-1248408558 | 2024-05-22T18:06:06.591242
  
4506 / tcp
-1311598826 | 2024-05-23T16:13:53.233535
  
4782 / tcp
-358801646 | 2024-05-06T07:59:30.466818
  
4786 / tcp
-1839934832 | 2024-05-07T11:33:47.401450
  
4840 / tcp
819727972 | 2024-05-29T04:25:20.413106
  
4899 / tcp
-1810987450 | 2024-05-28T15:03:43.904179
  
4911 / tcp
-784071826 | 2024-05-21T05:43:20.138994
  
4949 / tcp
398077695 | 2024-05-27T11:37:59.095729
  
4999 / tcp
1282941221 | 2024-05-21T05:09:00.986444
  
5001 / tcp
550048729 | 2024-05-21T05:38:52.693113
  
5005 / tcp
1282941221 | 2024-05-21T19:38:36.546203
  
5006 / tcp
921225407 | 2024-05-12T03:24:49.559577
  
5007 / tcp
1472866667 | 2024-05-28T10:38:40.036697
  
5009 / tcp
-1399940268 | 2024-05-19T03:20:28.892696
  
5010 / tcp
2087396567 | 2024-05-25T10:45:13.368419
  
5025 / tcp
-1105333987 | 2024-05-22T09:53:38.086968
  
5122 / tcp
2087396567 | 2024-05-28T09:56:05.544278
  
5172 / tcp
1278527606 | 2024-05-27T11:44:31.465937
  
5201 / tcp
-1729629024 | 2024-05-24T05:46:10.571182
  
5222 / tcp
-1165098486 | 2024-05-05T20:45:20.133568
  
5269 / tcp
819727972 | 2024-05-27T01:47:34.508643
  
5432 / tcp
1208318993 | 2024-05-20T23:18:12.044952
  
5435 / tcp
-409020351 | 2024-05-24T16:39:52.242177
  
5560 / tcp
-1399940268 | 2024-05-14T00:11:13.091521
  
5567 / tcp
1126993057 | 2024-05-28T08:16:17.720998
  
5592 / tcp
-1476017887 | 2024-05-02T04:52:04.798843
  
5595 / tcp
-1248408558 | 2024-05-09T00:19:16.968394
  
5599 / tcp
819727972 | 2024-04-30T13:27:29.507816
  
5602 / tcp
639175818 | 2024-05-16T07:54:39.802619
  
5608 / tcp
575925250 | 2024-05-24T11:25:27.364959
  
5672 / tcp
620041552 | 2024-05-05T09:24:15.791107
  
5822 / tcp
2087396567 | 2024-05-14T13:51:58.023596
  
5858 / tcp
-670840277 | 2024-05-23T16:37:15.846768
  
5900 / tcp
-1327660293 | 2024-05-15T19:18:09.389596
  
5938 / tcp
1999272906 | 2024-05-07T16:16:49.286975
  
5984 / tcp
-154107716 | 2024-05-03T17:14:45.032309
  
5985 / tcp
474736340 | 2024-05-13T08:10:42.447718
  
5986 / tcp
1282941221 | 2024-05-27T23:12:18.323410
  
6000 / tcp
-1399940268 | 2024-05-23T11:55:59.103794
  
6001 / tcp
819727972 | 2024-05-14T11:32:27.241373
  
6002 / tcp
-1399940268 | 2024-05-11T09:53:36.240241
  
6007 / tcp
820958131 | 2024-05-03T09:46:40.111513
  
6010 / tcp
-1023516719 | 2024-05-12T07:02:30.768143
  
6080 / tcp
1813977069 | 2024-05-25T09:04:15.386049
  
6379 / tcp
-138543878 | 2024-05-26T09:51:46.750853
  
6443 / tcp
89142341 | 2024-05-03T00:20:25.408390
  
6511 / tcp
1308377066 | 2024-05-16T16:49:40.389684
  
6512 / tcp
-358801646 | 2024-05-02T02:55:04.326350
  
6550 / tcp
-1329831334 | 2024-05-14T01:33:32.826967
  
6633 / tcp
-1399940268 | 2024-05-26T17:58:20.714728
  
6653 / tcp
-1453516345 | 2024-05-23T18:10:19.222904
  
6664 / tcp
-1327849035 | 2024-05-29T08:27:04.064233
  
6666 / tcp
-971970408 | 2024-05-08T22:40:08.538709
  
6667 / tcp
-1611764932 | 2024-05-27T19:27:40.154962
  
6668 / tcp
-2096652808 | 2024-05-14T19:54:22.035887
  
6697 / tcp
1220127183 | 2024-05-28T13:12:13.948814
  
7001 / tcp
-358801646 | 2024-05-18T13:05:15.844322
  
7005 / tcp
1830187220 | 2024-05-15T06:20:33.758355
  
7010 / tcp
842535728 | 2024-05-25T04:11:33.600297
  
7071 / tcp
1911457608 | 2024-05-15T05:14:25.029923
  
7171 / tcp
819727972 | 2024-05-13T17:17:22.620972
  
7218 / tcp
-1265999252 | 2024-05-10T01:37:54.238986
  
7415 / tcp
2087396567 | 2024-05-29T06:53:34.491700
  
7434 / tcp
1320285193 | 2024-05-29T13:05:27.210771
  
7443 / tcp
819727972 | 2024-05-18T03:05:05.884126
  
7493 / tcp
472902042 | 2024-04-30T23:32:02.052731
  
7547 / tcp
-1810987450 | 2024-05-17T23:59:32.806150
  
7548 / tcp
-1559123399 | 2024-05-24T22:19:16.562457
  
7657 / tcp
-1139539254 | 2024-04-30T13:30:56.610978
  
7778 / tcp
550048729 | 2024-05-14T09:23:00.714054
  
7989 / tcp
599074451 | 2024-05-13T07:25:57.779632
  
7998 / tcp
-1259524839 | 2024-05-17T16:26:58.443373
  
7999 / tcp
1072892569 | 2024-05-22T05:52:13.426881
  
8001 / tcp
1052024882 | 2024-05-05T11:14:18.063602
  
8007 / tcp
539065883 | 2024-05-27T11:02:35.571466
  
8009 / tcp
1286504516 | 2024-05-08T13:40:15.576924
  
8010 / tcp
819727972 | 2024-05-15T13:06:57.837498
  
8022 / tcp
945910976 | 2024-04-30T18:39:48.405623
  
8023 / tcp
677934968 | 2024-05-10T09:58:01.985066
  
8036 / tcp
1223115691 | 2024-05-07T22:22:24.879144
  
8040 / tcp
-1947777893 | 2024-05-25T02:21:43.706562
  
8043 / tcp
-1888448627 | 2024-05-23T19:28:04.617062
  
8049 / tcp
1911457608 | 2024-05-25T03:23:00.040663
  
8055 / tcp
1082732927 | 2024-05-29T10:16:07.889353
  
8060 / tcp
-1399940268 | 2024-05-25T03:57:09.664455
  
8066 / tcp
-1414624044 | 2024-05-27T10:43:37.951065
  
8080 / tcp
1299988699 | 2024-05-19T14:09:47.257883
  
8081 / tcp
819727972 | 2024-05-03T04:11:00.429255
  
8082 / tcp
-905685638 | 2024-05-22T22:29:53.759144
  
8083 / tcp
-786044033 | 2024-05-29T12:57:03.306658
  
8085 / tcp
1975288991 | 2024-05-27T09:09:48.906961
  
8087 / tcp
1792827405 | 2024-05-05T16:20:56.937595
  
8088 / tcp
539065883 | 2024-05-05T11:29:53.018488
  
8089 / tcp
321971019 | 2024-05-07T01:28:17.108448
  
8092 / tcp
-1435414831 | 2024-05-12T14:16:21.510503
  
8097 / tcp
1544300041 | 2024-05-08T06:18:30.896448
  
8098 / tcp
1115736665 | 2024-05-26T12:18:21.469727
  
8099 / tcp
-345718689 | 2024-05-27T20:41:10.004632
  
8106 / tcp
-180163620 | 2024-05-26T21:14:33.143345
  
8110 / tcp
1919228981 | 2024-05-05T02:35:06.843620
  
8111 / tcp
-1872120160 | 2024-05-17T04:59:45.043222
  
8112 / tcp
808560482 | 2024-05-25T16:57:42.979654
  
8123 / tcp
-1316398834 | 2024-05-13T10:05:25.332322
  
8126 / tcp
-1559123399 | 2024-05-23T13:35:21.858858
  
8139 / tcp
320677201 | 2024-05-19T07:32:01.257158
  
8140 / tcp
539065883 | 2024-05-24T17:49:32.264582
  
8181 / tcp
-877598700 | 2024-05-24T06:19:54.353699
  
8200 / tcp
-1059554316 | 2024-05-08T06:39:22.155644
  
8238 / tcp
-1399940268 | 2024-05-26T05:58:46.931921
  
8249 / tcp
-1399940268 | 2024-05-14T07:06:17.262556
  
8282 / tcp
165188539 | 2024-05-17T21:38:47.650598
  
8291 / tcp
-1261053701 | 2024-05-26T22:10:17.208158
  
8333 / tcp
808560482 | 2024-05-24T17:26:36.739647
  
8334 / tcp
-1399940268 | 2024-05-02T07:45:29.762793
  
8406 / tcp
1911457608 | 2024-05-29T03:31:19.402779
  
8409 / tcp
1665283070 | 2024-05-19T09:17:49.055287
  
8419 / tcp
-8690325 | 2024-05-28T14:01:02.770752
  
8443 / tcp
410249975 | 2024-05-10T20:15:44.602407
  
8500 / tcp
1911457608 | 2024-05-29T07:31:30.626709
  
8545 / tcp
-1453516345 | 2024-05-14T13:29:47.724990
  
8554 / tcp
-2033111675 | 2024-05-15T21:06:05.960583
  
8637 / tcp
842535728 | 2024-05-24T09:47:59.836816
  
8649 / tcp
-1399940268 | 2024-05-09T13:46:39.672123
  
8728 / tcp
1911457608 | 2024-05-18T11:07:33.710038
  
8805 / tcp
-441419608 | 2024-05-23T14:05:43.151285
  
8813 / tcp
-653033013 | 2024-05-01T00:45:27.462006
  
8819 / tcp
632542934 | 2024-05-06T12:06:59.548553
  
8827 / tcp
819727972 | 2024-05-07T23:00:04.239633
  
8834 / tcp
321971019 | 2024-05-03T05:53:39.212102
  
8837 / tcp
-2017887953 | 2024-05-12T12:09:04.237928
  
8847 / tcp
-653033013 | 2024-05-29T03:33:30.753217
  
8852 / tcp
-2089734047 | 2024-05-20T04:00:42.835207
  
8855 / tcp
-1399940268 | 2024-05-20T01:59:53.365983
  
8860 / tcp
-1810987450 | 2024-05-10T13:16:01.937723
  
8862 / tcp
-2031152423 | 2024-05-04T16:48:55.868495
  
8876 / tcp
957278843 | 2024-05-27T03:58:31.532162
  
8880 / tcp
-339084706 | 2024-05-21T06:02:00.093916
  
8885 / tcp
1282941221 | 2024-05-25T19:11:43.908233
  
8889 / tcp
671605376 | 2024-05-29T13:50:52.333820
  
8988 / tcp
-2118655245 | 2024-05-18T22:12:43.604314
  
8999 / tcp
-2067028711 | 2024-05-21T13:00:26.444977
  
9000 / tcp
-1026951088 | 2024-05-28T10:27:17.124100
  
9001 / tcp
-784071826 | 2024-05-17T04:20:35.905268
  
9002 / tcp
-445721795 | 2024-05-16T18:21:59.604450
  
9018 / tcp
165188539 | 2024-05-24T08:01:09.779145
  
9020 / tcp
-1329831334 | 2024-05-05T15:00:06.312782
  
9025 / tcp
-2089734047 | 2024-05-20T02:49:18.045297
  
9027 / tcp
-1045760528 | 2024-05-26T23:56:26.229126
  
9029 / tcp
819727972 | 2024-05-28T20:21:06.324695
  
9042 / tcp
1911457608 | 2024-05-02T03:28:29.757642
  
9044 / tcp
1049989806 | 2024-05-11T18:43:48.524645
  
9050 / tcp
1689518693 | 2024-05-23T02:59:09.864364
  
9051 / tcp
-1399940268 | 2024-05-13T17:43:42.541535
  
9070 / tcp
2087396567 | 2024-05-28T23:49:12.890807
  
9091 / tcp
-1279886438 | 2024-05-28T17:35:11.968522
  
9092 / tcp
819727972 | 2024-05-20T13:18:30.244065
  
9095 / tcp
-303199180 | 2024-05-26T00:03:36.882004
  
9100 / tcp
-1399940268 | 2024-05-05T22:07:55.757689
  
9111 / tcp
-1453516345 | 2024-05-23T22:37:58.704627
  
9136 / tcp
2087396567 | 2024-05-28T01:19:17.530136
  
9151 / tcp
1632932802 | 2024-05-03T16:36:39.015579
  
9160 / tcp
819727972 | 2024-05-18T03:44:54.309255
  
9189 / tcp
1960438949 | 2024-05-12T10:15:36.235333
  
9191 / tcp
-1399940268 | 2024-05-02T13:46:18.702323
  
9199 / tcp
-1996280214 | 2024-05-11T07:23:48.764712
  
9205 / tcp
1426971893 | 2024-04-30T18:29:01.431525
  
9209 / tcp
-2017887953 | 2024-05-06T13:13:02.532925
  
9211 / tcp
1911457608 | 2024-05-21T22:00:53.482833
  
9212 / tcp
1911457608 | 2024-04-30T07:50:02.906733
  
9215 / tcp
-1399940268 | 2024-05-26T12:23:07.292516
  
9217 / tcp
1208318993 | 2024-05-07T23:05:49.410376
  
9222 / tcp
1282941221 | 2024-05-04T07:29:02.263615
  
9301 / tcp
-1399940268 | 2024-05-22T01:37:06.574903
  
9306 / tcp
-833168972 | 2024-05-02T03:18:39.874219
  
9418 / tcp
1821838739 | 2024-05-26T14:36:59.001593
  
9443 / tcp
-1399940268 | 2024-05-01T03:28:32.696486
  
9527 / tcp
-345718689 | 2024-05-24T06:50:41.328233
  
9530 / tcp
-784071826 | 2024-05-28T14:32:36.381367
  
9600 / tcp
599074451 | 2024-05-22T22:23:06.881858
  
9633 / tcp
1189133115 | 2024-05-24T07:35:17.341502
  
9761 / tcp
-1559123399 | 2024-05-07T18:29:16.047009
  
9800 / tcp
-1737707071 | 2024-05-11T18:59:28.312680
  
9861 / tcp
104385780 | 2024-05-19T03:34:00.167349
  
9869 / tcp
56005235 | 2024-05-21T17:25:50.290424
  
9943 / tcp
-1729629024 | 2024-05-11T11:02:22.530627
  
9944 / tcp
-146605374 | 2024-05-02T21:11:31.539232
  
9950 / tcp
-1261090339 | 2024-05-09T14:28:47.699624
  
9991 / tcp
-347274959 | 2024-05-27T11:08:20.125398
  
9998 / tcp
1161309183 | 2024-05-28T15:15:31.990196
  
9999 / tcp
-1681927087 | 2024-05-15T21:35:24.458933
  
10000 / tcp
1492413928 | 2024-05-21T01:39:25.390887
  
10001 / tcp
709622286 | 2024-05-26T21:30:57.260294
  
10134 / tcp
2087396567 | 2024-05-29T06:49:21.145763
  
10250 / tcp
2087396567 | 2024-05-09T06:54:17.490246
  
10443 / tcp
1842524259 | 2024-05-18T12:30:02.767282
  
10554 / tcp
-1399940268 | 2024-05-18T12:11:02.801297
  
10909 / tcp
-1399940268 | 2024-05-28T01:02:24.142170
  
11000 / tcp
51259122 | 2024-05-24T20:01:20.310087
  
11112 / tcp
819727972 | 2024-05-25T01:21:34.529563
  
11210 / tcp
-136006866 | 2024-05-27T22:57:34.738236
  
11211 / tcp
1911457608 | 2024-05-28T06:32:38.073373
  
11300 / tcp
-2118655245 | 2024-05-24T08:24:52.812528
  
11371 / tcp
-1461540015 | 2024-05-23T01:50:29.618324
  
12000 / tcp
296364507 | 2024-05-29T11:52:44.675087
  
12345 / tcp
-1399940268 | 2024-05-03T05:30:44.604628
  
14147 / tcp
495406742 | 2024-05-27T18:17:17.652817
  
14265 / tcp
165188539 | 2024-05-21T19:56:40.373087
  
14344 / tcp
-1900404274 | 2024-05-15T01:30:35.457985
  
16992 / tcp
-971970408 | 2024-05-28T16:05:07.401581
  
16993 / tcp
1059192566 | 2024-05-22T16:19:26.684455
  
18081 / tcp
1911457608 | 2024-05-27T03:46:05.685189
  
18245 / tcp
-457235091 | 2024-05-27T20:44:46.292648
  
19000 / tcp
-79865617 | 2024-05-15T02:34:11.377902
  
19071 / tcp
1900503736 | 2024-05-19T18:51:15.421378
  
20000 / tcp
677934968 | 2024-05-17T03:14:29.487753
  
20256 / tcp
1948301213 | 2024-05-21T21:15:02.422493
  
20547 / tcp
1741579575 | 2024-05-10T18:45:11.328947
  
21025 / tcp
165188539 | 2024-05-24T03:53:28.016972
  
21379 / tcp
-1399940268 | 2024-05-27T09:48:47.390467
  
23023 / tcp
585675468 | 2024-05-29T12:15:52.833573
  
23424 / tcp
740837454 | 2024-05-26T23:08:44.214681
  
25565 / tcp
-624316856 | 2024-05-26T08:18:08.526959
  
27015 / tcp
1763259671 | 2024-05-02T16:15:10.571102
  
27017 / tcp
1543809371 | 2024-05-26T03:46:28.868624
  
28015 / tcp
320677201 | 2024-05-23T23:37:02.114477
  
28080 / tcp
-1681927087 | 2024-05-10T21:41:32.296607
  
30003 / tcp
-147424911 | 2024-05-27T02:07:33.757684
  
31337 / tcp
-1111515360 | 2024-05-06T14:55:42.176082
  
32400 / tcp
-1261090339 | 2024-05-09T05:38:26.763092
  
32764 / tcp
1741579575 | 2024-05-20T08:48:54.088571
  
33060 / tcp
-1045760528 | 2024-05-23T00:52:49.047937
  
37777 / tcp
819727972 | 2024-05-19T04:55:33.359821
  
41800 / tcp
-433302150 | 2024-05-29T15:27:33.758281
  
44158 / tcp
-1019343788 | 2024-05-26T11:09:51.962173
  
44818 / tcp
2087396567 | 2024-05-23T03:07:47.680350
  
47990 / tcp
602755868 | 2024-05-27T03:45:01.987438
  
49152 / tcp
1741579575 | 2024-05-27T02:00:11.851042
  
50000 / tcp
-154107716 | 2024-05-09T09:48:59.889342
  
50050 / tcp
-154107716 | 2024-05-05T13:37:07.276185
  
50100 / tcp
-1399940268 | 2024-05-18T03:38:05.220807
  
51235 / tcp
-1840324437 | 2024-05-16T06:35:13.682008
  
52869 / tcp
-1399940268 | 2024-05-26T16:48:14.415279
  
54138 / tcp
1620329124 | 2024-05-15T21:20:17.576832
  
55000 / tcp
-1344535834 | 2024-05-13T08:38:14.098672
  
55442 / tcp
-2096652808 | 2024-05-10T15:22:15.088372
  
55443 / tcp
1542849631 | 2024-05-19T11:59:04.078764
  
55553 / tcp
1308377066 | 2024-05-16T10:25:33.377321
  
55554 / tcp
-2118655245 | 2024-05-17T23:51:07.769370
  
60001 / tcp
740837454 | 2024-05-22T12:04:54.675356
  
60129 / tcp
171352214 | 2024-05-23T16:30:46.087854
  
61616 / tcp
1842317374 | 2024-05-14T07:24:50.338464
  
62078 / tcp



Contact Us

Shodan ® - All rights reserved