47.106.6.23

Regular View Raw Data
Last Seen: 2024-06-14

GeneralInformation

Hostnames oggs.1688.com
shog1301373o611i7.1688.com
shog3509n881244h5.1688.com
zsdxad.1688.com
oogi.o2.ojibobo-ina.aon.alibaba-inc.com
ide-jog-ogent.oone.ojibobo-ina.aon.alibaba-inc.com
sjender.ojibobo-ina.aon.alibaba-inc.com
dlc-gateway.pai-damo.alibaba-inc.com
laoken.en.alibaba.com
www22.aliexpress.com
090826.aliyun.com
sjs4serviae.aonsoje.aliyun.com
api.aliyun.com
biaoju.aliyun.com
cbu-xiaoer.aliyun.com
code-ssr.fc.aliyun.com
hcwms.aliyun.com
shop1429527762715.aliyun.com
shop36322980.aliyun.com
ticket.aliyun.com
yiwuzy.aliyun.com
eai-vga.an-ahengdv.aliyuncs.com
edsoggavstoner-vga.an-ahengdv.aliyuncs.com
mse-vpc.ap-southeast-5.aliyuncs.com
oss-cn-shenzhen.aliyuncs.com
print.gfn.cainiao.com
cicef.org.cn
api-xspace.daraz.com
oa.dingtalk.com
app73960.eapps.dingtalkcloud.com
fbi.lazada.com
web.lazada.com
unpm-upaas.quark.cn
shog36415005.taobao.com
shog413558627.taobao.com
shop497241465.taobao.com
hvoyijiojv.tmall.com
insvronae.tmall.com
www9.buntleben.xixikf.cn
security-nash-web.zhangjiakou.zone
Domains 1688.com alibaba-inc.com alibaba.com aliexpress.com aliyun.com aliyuncs.com cainiao.com cicef.org.cn daraz.com dingtalk.com dingtalkcloud.com lazada.com quark.cn taobao.com tmall.com xixikf.cn zhangjiakou.zone 
Country China
City Shenzhen
Organization Aliyun Computing Co., LTD
ISP Hangzhou Alibaba Advertising Co.,Ltd.
ASN AS37963

WebTechnologies

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

OpenPorts

111315192123242537434953707980818384901021041101111131191351431751791952212643113894274434444474654915035155225485545875936366667717898739929939951023102510801099111111531167117712001234131113371355143314711515152115991604172317411800180118831911192619622000200220062008202020482067208120822083208721212126215421812220222122222323233223452376240424552560256825692628276127622985300130503051305530563063307630953099311831193260326832693301330633073310331133883400340535413551368937803790392240004002402240404064415741904242424342824321436944304433443445004505450645454664478247864840489949495001500550065007500950105025517252015222540054325435554255605592560856725673585859005907593859845985598660006001600260806264636363796443658866336650665366666667666866976748699870017003700470057010701470717171741574347443744475477548763476577989800180098012801380178022802880468057806080698081808380858086808780908091809880998105810681078110811881238126814081818236823882518291833383838406841384438448850085458553855485758585864986638728873387668767880388098810882088218829883488388839884888528863886988798880888188899000900190029006900890149023902490409042904390519091909290959097909991009136915191609189919192059213921692189222929593029304930593069308941894439500952795309600960696339663968297619765980098619869989899439944999799991000010001101341025010443105541090910911110001111211210113001137112000123451357914147142651434416010160301699318081182451900019200200002025620547210252137922067230232342425001270152701727210280153000230003313373276433060377774180044158448184799050000500505010051106512355413855000554425544355553555546001060129616136161662078
1327134490 | 2024-05-22T04:13:48.626411
  
11 / tcp
-1296032851 | 2024-06-10T13:08:52.257694
  
13 / tcp
1282941221 | 2024-05-19T11:51:42.816646
  
15 / tcp
829384519 | 2024-06-11T23:55:38.531166
  
19 / tcp
1564456597 | 2024-05-30T20:37:59.974884
  
21 / tcp
-1816600103 | 2024-06-07T15:03:01.036783
  
23 / tcp
819727972 | 2024-06-10T19:39:31.526715
  
24 / tcp
1911457608 | 2024-06-11T10:10:14.942313
  
25 / tcp
1288534451 | 2024-06-13T01:56:11.374511
  
37 / tcp
-314039103 | 2024-06-12T07:24:59.046178
  
43 / tcp
1160472910 | 2024-05-18T12:09:46.608854
  
49 / tcp
-42462918 | 2024-06-04T12:15:50.421858
  
53 / tcp
-1967791998 | 2024-06-10T05:17:37.789850
  
70 / tcp
627290832 | 2024-06-04T14:38:24.639772
  
79 / tcp
-676700956 | 2024-06-13T23:13:55.229979
  
80 / tcp
1261582754 | 2024-06-14T05:57:08.461803
  
81 / tcp
770016595 | 2024-06-12T05:15:56.893785
  
83 / tcp
676476721 | 2024-06-12T19:37:13.688753
  
84 / tcp
165188539 | 2024-05-17T06:12:00.015609
  
90 / tcp
-1099385124 | 2024-06-13T05:29:29.162107
  
102 / tcp
819727972 | 2024-06-09T01:39:41.487685
  
104 / tcp
-1279886438 | 2024-06-06T23:12:42.190290
  
110 / tcp
-971970408 | 2024-06-07T13:38:26.805557
  
111 / tcp
-527005584 | 2024-05-27T04:29:26.840948
  
113 / tcp
-1958992631 | 2024-05-30T19:36:39.045552
  
119 / tcp
-646274631 | 2024-06-09T04:56:06.297098
  
135 / tcp
-382990917 | 2024-06-08T15:25:06.992495
  
143 / tcp
1911457608 | 2024-06-13T08:55:27.686078
  
175 / tcp
-399606100 | 2024-05-30T23:04:11.589100
  
179 / tcp
2087396567 | 2024-06-07T03:03:57.754636
  
195 / tcp
-1399940268 | 2024-06-07T17:52:35.505253
  
221 / tcp
-1180827859 | 2024-06-11T01:56:33.892141
  
264 / tcp
676753056 | 2024-06-03T18:15:22.538760
  
311 / tcp
-1639129386 | 2024-05-25T11:48:10.510289
  
389 / tcp
-826599962 | 2024-05-26T23:26:45.096805
  
427 / tcp
-729286345 | 2024-06-02T12:13:21.566674
  
443 / tcp
-1258116338 | 2024-06-10T17:23:57.859380
  
444 / tcp
-784071826 | 2024-05-27T09:44:50.651224
  
447 / tcp
897328069 | 2024-06-06T23:01:10.593189
  
465 / tcp
-339084706 | 2024-05-21T04:07:34.298246
  
491 / tcp
-1399940268 | 2024-06-11T17:19:56.889588
  
503 / tcp
-1559123399 | 2024-06-07T12:33:59.974297
  
515 / tcp
-1648456501 | 2024-05-23T03:47:51.773262
  
522 / tcp
-2035415184 | 2024-06-08T19:19:54.495986
  
548 / tcp
448214121 | 2024-06-13T09:49:17.784862
  
554 / tcp
745343730 | 2024-06-07T05:22:41.229385
  
587 / tcp
1308377066 | 2024-06-14T01:50:12.708742
  
593 / tcp
-2023550675 | 2024-06-06T00:05:59.944145
  
636 / tcp
1300162323 | 2024-06-04T04:47:03.432174
  
666 / tcp
-2017887953 | 2024-06-10T23:19:56.003172
  
771 / tcp
-653033013 | 2024-06-12T12:11:26.529440
  
789 / tcp
2128189041 | 2024-06-02T13:42:29.364730
  
873 / tcp
1814656027 | 2024-06-13T17:11:38.945759
  
992 / tcp
-784071826 | 2024-05-30T09:13:27.223480
  
993 / tcp
1685649979 | 2024-05-31T05:25:06.091173
  
995 / tcp
1261582754 | 2024-06-08T15:26:17.890207
  
1023 / tcp
-445721795 | 2024-06-12T08:22:40.703323
  
1025 / tcp
1362344524 | 2024-05-31T15:25:33.276168
  
1080 / tcp
1911457608 | 2024-06-10T02:41:49.873120
  
1099 / tcp
-358801646 | 2024-06-05T18:48:45.893599
  
1111 / tcp
-1399940268 | 2024-06-10T21:19:33.317405
  
1153 / tcp
-180163620 | 2024-06-06T09:21:11.961107
  
1167 / tcp
1690634669 | 2024-06-01T00:20:20.003574
  
1177 / tcp
-971970408 | 2024-06-10T16:46:26.858396
  
1200 / tcp
-2096652808 | 2024-05-24T12:51:59.821473
  
1234 / tcp
104385780 | 2024-06-12T17:02:18.227606
  
1311 / tcp
-971970408 | 2024-06-10T11:49:19.631278
  
1337 / tcp
-2089734047 | 2024-06-03T16:47:57.529715
  
1355 / tcp
-271790512 | 2024-05-30T11:10:07.018809
  
1433 / tcp
1212921144 | 2024-06-07T13:34:16.194011
  
1471 / tcp
2087396567 | 2024-06-09T16:48:00.743489
  
1515 / tcp
-805164506 | 2024-05-29T07:18:28.996696
  
1521 / tcp
1741579575 | 2024-06-13T07:23:54.424240
  
1599 / tcp
1545917845 | 2024-05-17T12:49:04.383939
  
1604 / tcp
1103582599 | 2024-05-20T02:21:52.401308
  
1723 / tcp
1072892569 | 2024-05-19T19:08:15.143803
  
1741 / tcp
1126993057 | 2024-06-11T19:06:58.163559
  
1800 / tcp
-833635452 | 2024-06-13T22:28:56.890594
  
1801 / tcp
50497985 | 2024-06-11T14:48:58.198643
  
1883 / tcp
-1032713145 | 2024-06-03T13:06:38.695151
  
1911 / tcp
1690634669 | 2024-06-10T15:54:31.594472
  
1926 / tcp
-2096652808 | 2024-05-27T22:29:53.225823
  
1962 / tcp
1911457608 | 2024-06-08T20:32:19.203694
  
2000 / tcp
1231376952 | 2024-06-10T01:09:20.874860
  
2002 / tcp
-1399940268 | 2024-05-23T05:18:42.089076
  
2006 / tcp
819727972 | 2024-06-12T19:41:47.602258
  
2008 / tcp
-1511780827 | 2024-05-27T14:53:30.092468
  
2020 / tcp
-653033013 | 2024-06-13T12:37:20.870189
  
2048 / tcp
-2107996212 | 2024-05-27T07:41:33.935230
  
2067 / tcp
307999478 | 2024-06-06T22:46:22.370798
  
2081 / tcp
-1990350878 | 2024-05-30T02:29:46.621542
  
2082 / tcp
-903067560 | 2024-06-13T23:52:33.300134
  
2083 / tcp
539065883 | 2024-05-30T19:52:09.525180
  
2087 / tcp
141730637 | 2024-06-13T18:32:16.030825
  
2121 / tcp
-2060002556 | 2024-05-17T19:16:08.466084
  
2126 / tcp
1632932802 | 2024-06-11T19:02:37.551957
  
2154 / tcp
546151771 | 2024-06-13T18:53:04.346714
  
2181 / tcp
-1399940268 | 2024-06-03T15:29:23.817293
  
2220 / tcp
1975288991 | 2024-05-18T04:24:14.569451
  
2221 / tcp
372433470 | 2024-06-08T09:15:29.888471
  
2222 / tcp
1051421500 | 2024-06-05T19:09:25.292079
  
2323 / tcp
1887224352 | 2024-06-03T09:39:48.429734
  
2332 / tcp
410249975 | 2024-06-14T02:23:52.859272
  
2345 / tcp
-375604792 | 2024-06-13T10:41:07.961860
  
2376 / tcp
-1399940268 | 2024-06-13T12:12:05.158394
  
2404 / tcp
863754335 | 2024-05-25T07:13:23.805336
  
2455 / tcp
-1399940268 | 2024-06-03T22:47:19.691425
  
2560 / tcp
-1327660293 | 2024-05-31T21:59:22.401694
  
2568 / tcp
401555314 | 2024-06-09T10:24:40.123741
  
2569 / tcp
104385780 | 2024-06-01T06:15:01.656677
  
2628 / tcp
1761482307 | 2024-06-10T14:06:22.680191
  
2761 / tcp
-904840257 | 2024-06-06T16:23:07.698901
  
2762 / tcp
-1399940268 | 2024-06-01T18:09:29.700213
  
2985 / tcp
-2096652808 | 2024-06-05T10:20:11.768532
  
3001 / tcp
165188539 | 2024-06-11T13:02:50.955491
  
3050 / tcp
1426971893 | 2024-06-12T03:03:24.559880
  
3051 / tcp
103159425 | 2024-06-05T08:54:47.365073
  
3055 / tcp
-1327660293 | 2024-06-04T15:38:01.196406
  
3056 / tcp
-1888448627 | 2024-05-29T10:17:07.803817
  
3063 / tcp
-146605374 | 2024-06-10T23:56:07.715553
  
3076 / tcp
-1888448627 | 2024-06-04T03:47:53.777011
  
3095 / tcp
165188539 | 2024-05-24T09:20:25.065941
  
3099 / tcp
1426971893 | 2024-06-04T17:30:50.260936
  
3118 / tcp
921225407 | 2024-06-11T14:40:19.606435
  
3119 / tcp
-1914158197 | 2024-05-29T12:40:38.114566
  
3260 / tcp
247702477 | 2024-06-10T08:03:07.427925
  
3268 / tcp
819727972 | 2024-06-11T14:22:12.892127
  
3269 / tcp
-1737707071 | 2024-05-20T18:58:57.087846
  
3301 / tcp
292351399 | 2024-06-13T14:29:27.315326
  
3306 / tcp
819727972 | 2024-05-29T05:41:21.350160
  
3307 / tcp
-1888448627 | 2024-06-01T23:13:05.010673
  
3310 / tcp
1911457608 | 2024-05-19T15:20:11.015080
  
3311 / tcp
-303199180 | 2024-05-21T12:28:20.375681
  
3388 / tcp
-1839934832 | 2024-06-07T07:24:20.981317
  
3400 / tcp
971933601 | 2024-05-22T16:05:52.775267
  
3405 / tcp
-1461540015 | 2024-05-26T20:21:51.938217
  
3541 / tcp
198844676 | 2024-06-04T01:50:50.649295
  
3551 / tcp
1921398876 | 2024-05-17T16:50:32.158685
  
3689 / tcp
957278843 | 2024-06-06T20:00:48.588225
  
3780 / tcp
1741579575 | 2024-06-06T17:52:59.503696
  
3790 / tcp
-1032713145 | 2024-05-29T10:47:19.935389
  
3922 / tcp
1300162323 | 2024-06-14T04:49:25.738451
  
4000 / tcp
819727972 | 2024-05-30T20:50:11.256934
  
4002 / tcp
1911457608 | 2024-06-12T22:34:25.142823
  
4022 / tcp
585675468 | 2024-05-25T15:24:10.409680
  
4040 / tcp
632542934 | 2024-05-28T22:32:28.709245
  
4064 / tcp
1741579575 | 2024-06-07T23:42:13.030512
  
4157 / tcp
1282941221 | 2024-06-05T13:47:18.577864
  
4190 / tcp
-1341662640 | 2024-05-28T20:53:03.720539
  
4242 / tcp
1011407350 | 2024-05-31T00:52:47.434903
  
4243 / tcp
-1013082686 | 2024-06-05T22:51:01.575396
  
4282 / tcp
-1250504565 | 2024-05-30T16:09:18.820911
  
4321 / tcp
-274082663 | 2024-06-07T16:46:09.173769
  
4369 / tcp
-2031152423 | 2024-06-04T11:46:32.059502
  
4430 / tcp
1308377066 | 2024-06-09T23:30:40.588874
  
4433 / tcp
2087396567 | 2024-06-04T09:31:05.280521
  
4434 / tcp
-784071826 | 2024-06-07T01:03:25.696200
  
4500 / tcp
-1399940268 | 2024-06-02T03:38:53.596074
  
4505 / tcp
550048729 | 2024-05-30T18:25:46.088935
  
4506 / tcp
-1139539254 | 2024-06-01T07:55:31.884806
  
4545 / tcp
-2081419599 | 2024-06-01T15:29:25.647944
  
4664 / tcp
-786044033 | 2024-06-13T23:46:06.860501
  
4782 / tcp
2143387245 | 2024-06-13T08:24:05.318290
  
4786 / tcp
-1327660293 | 2024-06-09T19:46:57.523441
  
4840 / tcp
996960436 | 2024-05-26T04:05:06.978680
  
4899 / tcp
-2017887953 | 2024-06-12T17:56:20.972919
  
4949 / tcp
-971970408 | 2024-06-12T06:50:27.299615
  
5001 / tcp
1082732927 | 2024-05-24T07:37:04.917002
  
5005 / tcp
114471724 | 2024-06-07T14:03:36.567152
  
5006 / tcp
-2089734047 | 2024-06-12T20:56:08.240416
  
5007 / tcp
567505242 | 2024-06-01T09:16:50.863459
  
5009 / tcp
819727972 | 2024-06-11T00:51:44.325962
  
5010 / tcp
671605376 | 2024-06-05T14:52:52.513209
  
5025 / tcp
-1142844482 | 2024-06-05T16:18:35.433889
  
5172 / tcp
-1839934832 | 2024-06-13T16:08:49.817445
  
5201 / tcp
-10442315 | 2024-05-31T01:40:14.053447
  
5222 / tcp
1911457608 | 2024-06-03T07:51:59.176469
  
5400 / tcp
-1097188123 | 2024-06-13T21:17:53.605539
  
5432 / tcp
1911457608 | 2024-06-06T15:35:58.804367
  
5435 / tcp
165188539 | 2024-06-06T08:26:56.348238
  
5542 / tcp
-409020351 | 2024-05-26T04:02:15.362469
  
5560 / tcp
-1713437100 | 2024-05-28T17:25:03.478788
  
5592 / tcp
-1399940268 | 2024-05-26T01:51:20.017199
  
5608 / tcp
575925250 | 2024-06-13T02:57:07.976834
  
5672 / tcp
165188539 | 2024-05-24T06:23:00.251240
  
5673 / tcp
1282941221 | 2024-06-03T01:47:58.218596
  
5858 / tcp
497968563 | 2024-05-31T20:33:06.902598
  
5900 / tcp
321971019 | 2024-05-30T19:03:35.575500
  
5907 / tcp
103159425 | 2024-06-11T07:47:38.034505
  
5938 / tcp
1999272906 | 2024-05-22T08:28:08.582855
  
5984 / tcp
-2118655245 | 2024-05-26T05:44:47.551907
  
5985 / tcp
-319440554 | 2024-05-17T12:13:24.506115
  
5986 / tcp
-1399940268 | 2024-06-05T19:30:50.386023
  
6000 / tcp
2063598737 | 2024-06-06T21:29:19.812332
  
6001 / tcp
-358801646 | 2024-06-13T20:30:23.074926
  
6002 / tcp
770016595 | 2024-06-11T01:20:15.612743
  
6080 / tcp
-616720387 | 2024-05-18T08:26:36.172559
  
6264 / tcp
921225407 | 2024-06-11T13:14:58.632307
  
6363 / tcp
1813977069 | 2024-06-03T07:43:08.859170
  
6379 / tcp
-905685638 | 2024-06-07T06:47:15.630752
  
6443 / tcp
321971019 | 2024-05-23T19:32:24.466082
  
6588 / tcp
-2033111675 | 2024-06-10T06:58:59.851636
  
6633 / tcp
-2089734047 | 2024-06-08T06:21:19.678573
  
6650 / tcp
-1399940268 | 2024-05-29T02:03:25.895465
  
6653 / tcp
-696112747 | 2024-05-22T13:31:38.856977
  
6666 / tcp
104385780 | 2024-06-10T06:25:56.842420
  
6667 / tcp
1911457608 | 2024-06-07T13:51:08.528994
  
6668 / tcp
-1888448627 | 2024-06-10T14:39:55.448982
  
6697 / tcp
1308377066 | 2024-05-29T03:08:56.860509
  
6748 / tcp
669849225 | 2024-06-02T02:17:27.714716
  
6998 / tcp
-1325031830 | 2024-06-09T15:09:35.872817
  
7001 / tcp
-1019343788 | 2024-06-13T09:42:23.426269
  
7003 / tcp
1320285193 | 2024-06-08T03:20:41.897876
  
7004 / tcp
-358801646 | 2024-05-22T07:27:58.106307
  
7005 / tcp
921225407 | 2024-05-23T02:29:45.801606
  
7010 / tcp
897328069 | 2024-05-20T12:46:39.831161
  
7014 / tcp
2087396567 | 2024-06-01T15:05:27.068683
  
7071 / tcp
-585940771 | 2024-06-11T18:30:30.809746
  
7171 / tcp
1282941221 | 2024-06-10T22:43:32.559972
  
7415 / tcp
-2033111675 | 2024-05-17T23:20:49.774709
  
7434 / tcp
1612309769 | 2024-06-11T15:06:49.215626
  
7443 / tcp
1624217396 | 2024-05-25T11:10:17.857859
  
7444 / tcp
89282912 | 2024-05-25T01:08:23.984277
  
7547 / tcp
-1810987450 | 2024-06-10T13:24:31.117270
  
7548 / tcp
1542849631 | 2024-06-08T11:27:57.291137
  
7634 / tcp
546151771 | 2024-05-31T10:49:57.150906
  
7657 / tcp
-1969169410 | 2024-06-13T16:31:48.217717
  
7989 / tcp
1072892569 | 2024-06-05T10:02:25.103530
  
8001 / tcp
290819026 | 2024-06-04T00:34:38.858231
  
8009 / tcp
504717326 | 2024-05-31T04:13:10.181601
  
8012 / tcp
-1399940268 | 2024-06-13T23:29:22.094044
  
8013 / tcp
-1399940268 | 2024-06-09T23:40:47.784829
  
8017 / tcp
819727972 | 2024-05-25T19:14:36.585953
  
8022 / tcp
-2089734047 | 2024-06-01T01:42:25.055727
  
8028 / tcp
-2096652808 | 2024-06-12T09:53:40.745031
  
8046 / tcp
-1399940268 | 2024-06-08T10:08:11.490167
  
8057 / tcp
-1559123399 | 2024-06-11T01:57:54.125258
  
8060 / tcp
-1142844482 | 2024-05-31T14:20:30.298851
  
8069 / tcp
-1611764932 | 2024-05-30T10:34:29.796878
  
8081 / tcp
539065883 | 2024-06-11T00:51:32.706381
  
8083 / tcp
2087396567 | 2024-06-07T05:45:47.190675
  
8085 / tcp
550048729 | 2024-06-10T22:33:44.285671
  
8086 / tcp
165188539 | 2024-05-27T16:49:03.205850
  
8087 / tcp
-1900404274 | 2024-05-21T14:50:29.742410
  
8090 / tcp
-1839934832 | 2024-06-02T20:58:35.595400
  
8091 / tcp
1544300041 | 2024-06-13T02:19:18.792711
  
8098 / tcp
-1416565584 | 2024-06-06T01:45:32.054942
  
8099 / tcp
321971019 | 2024-05-20T10:41:15.444577
  
8105 / tcp
-441419608 | 2024-06-03T14:30:51.971397
  
8106 / tcp
-2096652808 | 2024-06-09T01:26:25.909235
  
8107 / tcp
-1261090339 | 2024-05-16T21:23:03.334896
  
8110 / tcp
1948301213 | 2024-06-02T22:19:49.641615
  
8118 / tcp
-984990168 | 2024-06-12T23:36:33.868259
  
8123 / tcp
-358801646 | 2024-06-04T07:14:31.357124
  
8126 / tcp
-2096652808 | 2024-06-02T06:14:41.879418
  
8140 / tcp
-2017887953 | 2024-06-01T07:20:24.453767
  
8181 / tcp
51259122 | 2024-06-05T01:50:53.451353
  
8236 / tcp
-1248408558 | 2024-05-17T12:59:25.747781
  
8238 / tcp
-1399940268 | 2024-05-24T22:14:00.290338
  
8251 / tcp
-445721795 | 2024-05-25T01:15:08.397460
  
8291 / tcp
-1487943323 | 2024-06-04T22:02:44.163255
  
8333 / tcp
-42767839 | 2024-06-11T02:22:55.873960
  
8383 / tcp
599074451 | 2024-05-27T14:12:25.322318
  
8406 / tcp
1911457608 | 2024-06-01T08:33:44.392252
  
8413 / tcp
1753236315 | 2024-06-08T10:06:26.046780
  
8443 / tcp
-1487943323 | 2024-05-28T22:58:02.298991
  
8448 / tcp
-918002969 | 2024-05-31T15:58:26.684875
  
8500 / tcp
1989907056 | 2024-06-13T13:26:58.517253
  
8545 / tcp
165188539 | 2024-06-03T07:52:13.307281
  
8553 / tcp
819727972 | 2024-06-07T19:59:04.288270
  
8554 / tcp
-1327660293 | 2024-06-10T11:42:30.552039
  
8575 / tcp
-358801646 | 2024-05-29T11:45:49.722245
  
8585 / tcp
842535728 | 2024-06-09T17:09:35.383658
  
8649 / tcp
-2096652808 | 2024-06-13T07:05:54.480280
  
8663 / tcp
-1399940268 | 2024-06-13T17:25:58.573607
  
8728 / tcp
1911457608 | 2024-06-02T22:22:11.762601
  
8733 / tcp
1911457608 | 2024-06-07T09:26:32.386015
  
8766 / tcp
455076604 | 2024-05-23T17:57:19.166908
  
8767 / tcp
-904840257 | 2024-06-09T22:32:04.383393
  
8803 / tcp
-1399940268 | 2024-05-27T07:44:59.831831
  
8809 / tcp
1911457608 | 2024-05-31T19:04:14.481323
  
8810 / tcp
-1888448627 | 2024-06-13T12:44:27.205772
  
8820 / tcp
-1399940268 | 2024-06-10T14:14:15.808718
  
8821 / tcp
580340387 | 2024-05-24T09:04:29.276446
  
8829 / tcp
-971970408 | 2024-06-03T23:43:29.712037
  
8834 / tcp
1948301213 | 2024-06-08T22:55:17.553289
  
8838 / tcp
1911457608 | 2024-05-30T20:21:36.154707
  
8839 / tcp
-510322557 | 2024-05-24T03:17:43.688544
  
8848 / tcp
-2089734047 | 2024-06-06T18:52:01.238541
  
8852 / tcp
-1795027372 | 2024-05-22T16:02:18.795932
  
8863 / tcp
1911457608 | 2024-05-29T19:16:21.615311
  
8869 / tcp
-2080784861 | 2024-05-20T13:50:20.673875
  
8879 / tcp
-2096652808 | 2024-06-09T06:19:48.302438
  
8880 / tcp
1911457608 | 2024-06-01T04:21:07.359280
  
8881 / tcp
1308377066 | 2024-06-01T15:47:14.884045
  
8889 / tcp
-2067028711 | 2024-06-05T18:21:05.656331
  
9000 / tcp
-1026951088 | 2024-06-06T12:02:21.620223
  
9001 / tcp
-321444299 | 2024-05-23T09:04:52.780367
  
9002 / tcp
-1399940268 | 2024-06-01T15:55:13.802967
  
9006 / tcp
-358801646 | 2024-05-27T05:11:56.027089
  
9008 / tcp
-2089734047 | 2024-05-27T11:56:02.061535
  
9014 / tcp
-1139539254 | 2024-06-08T11:07:33.372801
  
9023 / tcp
-1399940268 | 2024-05-17T01:56:48.115355
  
9024 / tcp
621209529 | 2024-05-20T15:15:46.156920
  
9040 / tcp
819727972 | 2024-06-10T09:35:53.846298
  
9042 / tcp
632542934 | 2024-06-04T05:11:22.728343
  
9043 / tcp
-1626979812 | 2024-06-10T17:02:08.518677
  
9051 / tcp
117101543 | 2024-05-30T10:25:17.533494
  
9091 / tcp
-1888448627 | 2024-05-30T10:40:18.390763
  
9092 / tcp
-971970408 | 2024-06-07T12:40:48.232174
  
9095 / tcp
1363464823 | 2024-06-11T04:31:48.042243
  
9097 / tcp
-1935084432 | 2024-06-06T20:05:25.318178
  
9099 / tcp
-1399940268 | 2024-06-04T21:26:06.831203
  
9100 / tcp
-1839934832 | 2024-06-01T01:15:23.899450
  
9136 / tcp
1996932384 | 2024-06-08T04:53:03.649071
  
9151 / tcp
-1888448627 | 2024-06-09T04:28:36.620737
  
9160 / tcp
-1399940268 | 2024-06-01T11:01:36.383451
  
9189 / tcp
104385780 | 2024-06-12T10:14:18.623918
  
9191 / tcp
-1032713145 | 2024-06-03T00:29:43.403185
  
9205 / tcp
-441419608 | 2024-06-01T05:14:17.322328
  
9213 / tcp
-1399940268 | 2024-06-01T10:32:22.388112
  
9216 / tcp
1615193817 | 2024-06-08T17:39:53.747788
  
9218 / tcp
819727972 | 2024-05-29T01:51:58.794553
  
9222 / tcp
104385780 | 2024-05-23T17:39:58.680530
  
9295 / tcp
-1810987450 | 2024-05-28T13:31:22.547512
  
9302 / tcp
-375604792 | 2024-05-21T14:40:51.842770
  
9304 / tcp
-1888448627 | 2024-06-09T05:36:56.383933
  
9305 / tcp
-1399940268 | 2024-05-22T14:20:53.969586
  
9306 / tcp
1189133115 | 2024-06-02T11:08:19.621133
  
9308 / tcp
1529351907 | 2024-06-01T01:10:44.206096
  
9418 / tcp
-786044033 | 2024-06-13T11:25:14.658393
  
9443 / tcp
-1991224470 | 2024-06-04T04:53:09.501454
  
9500 / tcp
819727972 | 2024-06-11T00:37:28.426828
  
9527 / tcp
1911457608 | 2024-06-08T10:27:41.248885
  
9530 / tcp
-2080784861 | 2024-06-12T13:51:42.282651
  
9600 / tcp
632542934 | 2024-05-20T22:11:47.712802
  
9606 / tcp
641705735 | 2024-06-08T12:14:02.214726
  
9633 / tcp
1911457608 | 2024-05-27T19:21:43.144598
  
9663 / tcp
1767345577 | 2024-05-17T00:36:29.998003
  
9682 / tcp
1126993057 | 2024-05-31T21:30:32.162852
  
9761 / tcp
-1598265216 | 2024-06-07T23:25:54.860755
  
9765 / tcp
104385780 | 2024-06-14T01:41:46.831362
  
9800 / tcp
2121220663 | 2024-05-25T06:49:43.652842
  
9861 / tcp
1261582754 | 2024-05-18T23:06:47.451283
  
9869 / tcp
1304012963 | 2024-06-14T05:30:52.752044
  
9898 / tcp
-659335736 | 2024-06-11T14:28:14.733037
  
9943 / tcp
104385780 | 2024-06-12T13:39:28.839924
  
9944 / tcp
401555314 | 2024-06-02T03:32:08.279305
  
9997 / tcp
1161309183 | 2024-05-26T10:41:19.206827
  
9999 / tcp
-971970408 | 2024-06-13T15:30:00.175663
  
10000 / tcp
1492413928 | 2024-05-28T21:51:01.621050
  
10001 / tcp
819727972 | 2024-06-07T23:19:39.111415
  
10134 / tcp
2087396567 | 2024-06-08T21:15:13.424682
  
10250 / tcp
-770335520 | 2024-06-12T21:28:24.748879
  
10443 / tcp
-1023516719 | 2024-06-13T02:31:39.632189
  
10554 / tcp
819727972 | 2024-06-09T20:49:21.886708
  
10909 / tcp
-1265999252 | 2024-06-08T23:54:22.657597
  
10911 / tcp
-1327660293 | 2024-06-10T17:32:41.345747
  
11000 / tcp
921225407 | 2024-05-22T23:22:57.077987
  
11112 / tcp
1911457608 | 2024-06-08T23:01:46.321388
  
11210 / tcp
-303199180 | 2024-06-01T07:10:00.287383
  
11300 / tcp
660175493 | 2024-06-13T01:08:09.097752
  
11371 / tcp
-2046909074 | 2024-06-09T03:57:49.153404
  
12000 / tcp
1748152518 | 2024-06-13T06:28:02.204277
  
12345 / tcp
-1872120160 | 2024-06-09T15:54:24.008495
  
13579 / tcp
1134517380 | 2024-06-10T17:52:47.413360
  
14147 / tcp
-934659477 | 2024-06-13T11:07:16.412212
  
14265 / tcp
1059192566 | 2024-06-11T21:05:49.475892
  
14344 / tcp
770016595 | 2024-05-17T08:15:58.185280
  
16010 / tcp
1119512965 | 2024-06-12T02:36:35.089288
  
16030 / tcp
-971970408 | 2024-06-07T03:53:59.813185
  
16993 / tcp
-1399940268 | 2024-06-09T12:19:06.565234
  
18081 / tcp
-1428621233 | 2024-06-12T21:41:20.882981
  
18245 / tcp
669849225 | 2024-06-05T07:22:15.723807
  
19000 / tcp
-1729629024 | 2024-06-10T21:40:49.820724
  
19200 / tcp
1900503736 | 2024-06-03T20:20:06.223159
  
20000 / tcp
1911457608 | 2024-06-13T12:36:13.906268
  
20256 / tcp
819727972 | 2024-06-02T14:14:48.496495
  
20547 / tcp
2087396567 | 2024-06-08T18:21:30.445223
  
21025 / tcp
-1641514916 | 2024-05-29T02:30:15.516617
  
21379 / tcp
-1399940268 | 2024-06-10T18:49:04.161508
  
22067 / tcp
819727972 | 2024-06-11T15:37:53.627447
  
23023 / tcp
2009276894 | 2024-06-04T19:21:33.298403
  
23424 / tcp
1911457608 | 2024-05-19T14:35:00.529375
  
25001 / tcp
-1886454902 | 2024-06-06T09:22:51.840462
  
27015 / tcp
1763259671 | 2024-06-13T13:36:34.370568
  
27017 / tcp
1767345577 | 2024-06-13T11:35:12.902559
  
27210 / tcp
819727972 | 2024-06-12T22:14:42.676635
  
28015 / tcp
2033888749 | 2024-05-31T06:14:18.985563
  
30002 / tcp
-1142844482 | 2024-06-09T07:03:14.141665
  
30003 / tcp
1024374118 | 2024-06-11T18:23:00.904711
  
31337 / tcp
2087396567 | 2024-06-03T11:20:59.016292
  
32764 / tcp
2087396567 | 2024-06-13T11:53:07.270755
  
33060 / tcp
599074451 | 2024-05-24T21:04:23.838147
  
37777 / tcp
165188539 | 2024-06-10T13:24:57.266006
  
41800 / tcp
-433302150 | 2024-06-11T13:44:01.152482
  
44158 / tcp
-375604792 | 2024-05-29T10:47:18.715876
  
44818 / tcp
-971970408 | 2024-05-31T16:59:32.844043
  
47990 / tcp
-971970408 | 2024-06-08T03:21:03.008553
  
50000 / tcp
660175493 | 2024-06-14T04:46:42.380468
  
50050 / tcp
-1681927087 | 2024-05-31T11:59:52.295476
  
50100 / tcp
472902042 | 2024-05-30T18:06:52.280615
  
51106 / tcp
-1248408558 | 2024-06-09T09:00:33.400021
  
51235 / tcp
819727972 | 2024-06-13T16:23:24.653495
  
54138 / tcp
321971019 | 2024-06-13T03:09:02.061949
  
55000 / tcp
-2118655245 | 2024-06-05T00:40:19.636138
  
55442 / tcp
459162008 | 2024-06-11T04:43:22.052150
  
55443 / tcp
2087396567 | 2024-05-28T00:09:45.603910
  
55553 / tcp
-1559123399 | 2024-06-08T13:20:06.368595
  
55554 / tcp
1852418385 | 2024-05-28T06:31:39.209356
  
60010 / tcp
641705735 | 2024-06-09T06:24:07.627799
  
60129 / tcp
-1399940268 | 2024-06-11T04:07:54.514525
  
61613 / tcp
2009276894 | 2024-06-09T03:58:35.987363
  
61616 / tcp
-1113435755 | 2024-06-07T12:59:06.589574
  
62078 / tcp



Contact Us

Shodan ® - All rights reserved

\", which results in the enclosed script logic to be executed.","verified":false},"CVE-2019-16905":{"cvss":4.4,"ports":[447,771,993,4500,4949,8181],"summary":"OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.","verified":false},"CVE-2019-11358":{"cvss":4.3,"ports":[443],"summary":"jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.","verified":false},"CVE-2019-6111":{"cvss":5.8,"ports":[24,104,771,2008,3269,3307,4002,4949,5010,8022,8181,8554,9042,9222,9527,10001,10134,10909,20547,23023,28015,54138],"summary":"An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).","verified":false},"CVE-2019-6110":{"cvss":4.0,"ports":[24,104,771,2008,3269,3307,4002,4949,5010,8022,8181,8554,9042,9222,9527,10001,10134,10909,20547,23023,28015,54138],"summary":"In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.","verified":false},"CVE-2019-6109":{"cvss":4.0,"ports":[24,104,771,2008,3269,3307,4002,4949,5010,8022,8181,8554,9042,9222,9527,10001,10134,10909,20547,23023,28015,54138],"summary":"An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.","verified":false},"CVE-2018-20685":{"cvss":2.6,"ports":[24,104,771,2008,3269,3307,4002,4949,5010,8022,8181,8554,9042,9222,9527,10001,10134,10909,20547,23023,28015,54138],"summary":"In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.","verified":false},"CVE-2018-15919":{"cvss":5.0,"ports":[24,104,2008,3269,3307,4002,5010,8022,8554,9042,9222,9527,10001,10134,10909,20547,23023,28015,54138],"summary":"Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or \"oracle\") as a vulnerability.'","verified":false},"CVE-2018-15473":{"cvss":5.0,"ports":[24,104,2008,3269,3307,4002,5010,8022,8554,9042,9222,9527,10001,10134,10909,20547,23023,28015,54138],"summary":"OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.","verified":false},"CVE-2017-15906":{"cvss":5.0,"ports":[24,104,2008,3269,3307,4002,5010,8022,8554,9042,9222,9527,10001,10134,10909,20547,23023,28015,54138],"summary":"The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.","verified":false},"CVE-2016-20012":{"cvss":4.3,"ports":[24,104,447,771,993,2008,3269,3307,4002,4500,4949,5010,8012,8022,8181,8554,9042,9222,9527,10001,10134,10909,20547,23023,28015,54138],"summary":"OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product","verified":false},"CVE-2015-9251":{"cvss":4.3,"ports":[443],"summary":"jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.","verified":false},"CVE-2012-6708":{"cvss":4.3,"ports":[443],"summary":"jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.","verified":false},"CVE-2008-3844":{"cvss":9.3,"ports":[24,104,447,771,993,2008,3269,3307,4002,4500,4949,5010,8012,8022,8181,8554,9042,9222,9527,10001,10134,10909,20547,23023,28015,54138],"summary":"Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.","verified":false},"CVE-2007-2768":{"cvss":4.3,"ports":[24,104,447,771,993,2008,3269,3307,4002,4500,4949,5010,8012,8022,8181,8554,9042,9222,9527,10001,10134,10909,20547,23023,28015,54138],"summary":"OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.","verified":false}}; setupBannerCve(); setupVulns(VULNS); })();