47.110.23.82

Regular View Raw Data
Last Seen: 2024-04-18

GeneralInformation

Hostnames cn-hangzhou.oss.aliyuncs.com
Domains aliyuncs.com 
Country China
City Hangzhou
Organization Aliyun Computing Co., LTD
ISP Hangzhou Alibaba Advertising Co.,Ltd.
ASN AS37963

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-51767 OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
CVE-2023-51385 In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
CVE-2023-51384 In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.
CVE-2023-48795 The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
CVE-2023-38408 The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
CVE-2022-37454 The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.
CVE-2022-31629 In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables network and same-site attackers to set a standard insecure cookie in the victim's browser which is treated as a `__Host-` or `__Secure-` cookie by PHP applications.
CVE-2022-31628 In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the phar uncompressor code would recursively uncompress "quines" gzip files, resulting in an infinite loop.
CVE-2021-41617 4.4sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
CVE-2021-36368 2.6An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass, since nothing is being bypassed.
CVE-2021-21707 5.0In PHP versions 7.3.x below 7.3.33, 7.4.x below 7.4.26 and 8.0.x below 8.0.13, certain XML parsing functions, like simplexml_load_file(), URL-decode the filename passed to them. If that filename contains URL-encoded NUL character, this may cause the function to interpret this as the end of the filename, thus interpreting the filename differently from what the user intended, which may lead it to reading a different file than intended.
CVE-2021-21706 4.3In PHP versions 7.3.x below 7.3.31, 7.4.x below 7.4.24 and 8.0.x below 8.0.11, in Microsoft Windows environment, ZipArchive::extractTo may be tricked into writing a file outside target directory when extracting a ZIP file, thus potentially causing files to be created or overwritten, subject to OS permissions.
CVE-2021-21705 5.0In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.
CVE-2021-21704 4.3In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using Firebird PDO driver extension, a malicious database server could cause crashes in various database functions, such as getAttribute(), execute(), fetch() and others by returning invalid response data that is not parsed correctly by the driver. This can result in crashes, denial of service or potentially memory corruption.
CVE-2021-21703 6.9In PHP versions 7.3.x up to and including 7.3.31, 7.4.x below 7.4.25 and 8.0.x below 8.0.12, when running PHP FPM SAPI with main FPM daemon process running as root and child worker processes running as lower-privileged users, it is possible for the child processes to access memory shared with the main process and write to it, modifying it in a way that would cause the root process to conduct invalid memory reads and writes, which can be used to escalate privileges from local unprivileged user to the root user.
CVE-2020-15778 6.8scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
CVE-2020-14145 4.3The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
CVE-2019-6111 5.8An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
CVE-2019-6110 4.0In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
CVE-2019-6109 4.0An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
CVE-2019-16905 7.8OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
CVE-2018-20685 2.6In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
CVE-2018-15919 5.0Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
CVE-2018-15473 5.0OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
CVE-2017-8923 7.5The zend_string_extend function in Zend/zend_string.h in PHP through 7.1.5 does not prevent changes to string objects that result in a negative length, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact by leveraging a script's use of .= with a long string.
CVE-2017-15906 5.0The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
CVE-2016-20012 4.3OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
CVE-2013-2220 7.5Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
CVE-2008-3844 9.3Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
CVE-2007-3205 5.0The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.
CVE-2007-2768 4.3OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.
1193556399 | 2024-04-05T03:59:20.632898
  
13 / tcp
-1230049476 | 2024-04-16T20:01:21.867860
  
15 / tcp
2115448635 | 2024-04-08T06:53:59.436389
  
17 / tcp
2116898107 | 2024-04-13T20:57:47.776021
  
21 / tcp
-1288412979 | 2024-04-16T22:55:28.898032
  
23 / tcp
-1327660293 | 2024-04-09T01:11:43.573249
  
25 / tcp
1288534451 | 2024-04-10T07:07:29.850712
  
37 / tcp
-1026951088 | 2024-03-22T23:24:45.532828
  
38 / tcp
-142686627 | 2024-04-02T21:21:16.862699
  
43 / tcp
-1620040646 | 2024-04-17T07:21:11.455431
  
49 / tcp
671605376 | 2024-04-03T03:30:01.894834
  
51 / tcp
1369632081 | 2024-03-27T12:37:23.512682
  
53 / tcp
857710896 | 2024-03-22T07:27:52.190784
  
70 / tcp
-1846450790 | 2024-04-15T00:15:13.417812
  
79 / tcp
-2066797492 | 2024-04-13T10:36:55.158709
  
80 / tcp
-119996482 | 2024-03-27T14:49:47.131948
  
82 / tcp
677934968 | 2024-03-29T18:23:14.197222
  
90 / tcp
1991883981 | 2024-04-13T22:07:22.706483
  
102 / tcp
165188539 | 2024-04-02T13:49:45.915067
  
104 / tcp
-438503381 | 2024-03-30T17:13:16.486894
  
110 / tcp
1308377066 | 2024-04-13T20:36:04.719217
  
111 / tcp
455076604 | 2024-03-28T23:25:39.482560
  
113 / tcp
141730637 | 2024-04-09T04:53:55.891253
  
119 / tcp
632542934 | 2024-04-03T07:08:34.671582
  
175 / tcp
-399606100 | 2024-04-05T03:59:25.307485
  
179 / tcp
2087396567 | 2024-03-29T18:20:39.172982
  
195 / tcp
1134517380 | 2024-04-17T23:50:45.207183
  
221 / tcp
-654288545 | 2024-04-01T06:50:34.646235
  
264 / tcp
676753056 | 2024-03-31T18:48:38.813968
  
311 / tcp
-661950041 | 2024-04-17T14:29:57.533402
  
427 / tcp
-465106308 | 2024-04-17T13:22:11.753131
  
443 / tcp
2087396567 | 2024-04-10T16:54:20.277132
  
444 / tcp
-445721795 | 2024-04-09T23:39:02.833764
  
503 / tcp
-2033111675 | 2024-04-02T19:08:53.620404
  
515 / tcp
-2035415184 | 2024-04-13T14:35:49.757026
  
548 / tcp
1255568492 | 2024-04-09T05:34:34.843150
  
636 / tcp
2098053533 | 2024-04-09T00:06:29.791294
  
666 / tcp
-1399940268 | 2024-04-04T01:32:12.551496
  
771 / tcp
-1399940268 | 2024-04-16T02:48:40.467492
  
789 / tcp
-1598265216 | 2024-04-14T02:44:53.390335
  
873 / tcp
-936692830 | 2024-04-10T04:27:53.801811
  
992 / tcp
-1139539254 | 2024-04-09T22:37:18.876004
  
993 / tcp
-2113068813 | 2024-04-17T11:48:38.677676
  
995 / tcp
819727972 | 2024-03-31T12:47:49.105004
  
1022 / tcp
-358801646 | 2024-03-30T11:13:39.954302
  
1023 / tcp
51259122 | 2024-03-31T22:27:45.158372
  
1025 / tcp
-1888448627 | 2024-04-16T20:40:54.328110
  
1027 / tcp
819727972 | 2024-04-14T11:02:07.891621
  
1099 / tcp
1426971893 | 2024-03-29T23:21:51.685882
  
1153 / tcp
-1477838366 | 2024-04-17T10:41:54.336095
  
1177 / tcp
-527005584 | 2024-04-18T13:53:47.879349
  
1200 / tcp
-1839934832 | 2024-04-08T04:54:41.428642
  
1234 / tcp
550048729 | 2024-04-15T07:07:57.416152
  
1311 / tcp
-971970408 | 2024-03-30T23:39:37.122306
  
1337 / tcp
419886129 | 2024-04-18T11:26:56.786465
  
1433 / tcp
104385780 | 2024-04-18T13:40:25.359346
  
1471 / tcp
-1373985444 | 2024-03-30T12:44:26.849620
  
1500 / tcp
2087396567 | 2024-04-18T03:58:26.573925
  
1515 / tcp
-1337747449 | 2024-04-10T00:25:41.769120
  
1521 / tcp
321971019 | 2024-03-25T22:43:29.152352
  
1554 / tcp
-784071826 | 2024-04-16T19:58:18.221626
  
1599 / tcp
550048729 | 2024-04-02T02:06:31.269895
  
1604 / tcp
2064046231 | 2024-03-24T02:22:07.250604
  
1723 / tcp
660175493 | 2024-04-08T10:02:59.764061
  
1741 / tcp
-1399940268 | 2024-03-27T11:38:15.592364
  
1800 / tcp
1692069329 | 2024-04-01T10:06:17.749487
  
1801 / tcp
-2017887953 | 2024-04-05T23:38:40.577152
  
1883 / tcp
632542934 | 2024-04-10T04:37:21.445154
  
1901 / tcp
1134517380 | 2024-04-18T14:37:16.137079
  
1911 / tcp
2087396567 | 2024-04-17T10:16:49.654742
  
1926 / tcp
-130294253 | 2024-03-25T13:54:17.976700
  
1947 / tcp
15018106 | 2024-04-04T07:16:22.737135
  
1962 / tcp
-1598265216 | 2024-04-04T00:40:52.711172
  
1990 / tcp
-441419608 | 2024-04-03T23:52:13.946788
  
2000 / tcp
1574088840 | 2024-04-13T12:35:39.008394
  
2002 / tcp
1453929220 | 2024-04-11T18:54:48.566212
  
2008 / tcp
-358801646 | 2024-03-23T01:48:16.352129
  
2021 / tcp
-1559123399 | 2024-04-14T20:54:43.689581
  
2067 / tcp
1975288991 | 2024-04-15T18:44:31.476456
  
2083 / tcp
89282912 | 2024-03-31T01:45:02.847868
  
2086 / tcp
1741579575 | 2024-04-16T17:28:33.782205
  
2087 / tcp
2087396567 | 2024-04-03T20:06:17.329960
  
2154 / tcp
546151771 | 2024-04-17T04:54:40.842146
  
2181 / tcp
2051656595 | 2024-04-15T18:50:30.976825
  
2222 / tcp
-1230049476 | 2024-03-25T16:17:32.164237
  
2232 / tcp
-1399940268 | 2024-04-03T05:07:28.070923
  
2250 / tcp
819727972 | 2024-04-05T11:43:57.689401
  
2320 / tcp
979705126 | 2024-04-18T02:29:04.834392
  
2323 / tcp
-1839934832 | 2024-04-05T08:20:11.350105
  
2332 / tcp
1911457608 | 2024-04-15T01:03:46.970048
  
2345 / tcp
-1097188123 | 2024-04-09T01:13:35.580261
  
2376 / tcp
-1399940268 | 2024-04-11T21:42:58.471085
  
2404 / tcp
1282941221 | 2024-04-10T02:16:28.382414
  
2455 / tcp
504717326 | 2024-04-17T00:47:42.231842
  
2558 / tcp
-1261090339 | 2024-03-25T02:59:52.548442
  
2560 / tcp
2087396567 | 2024-04-16T18:52:07.692186
  
2628 / tcp
-1428621233 | 2024-03-26T00:08:47.884918
  
2761 / tcp
-1248408558 | 2024-04-08T10:29:50.810293
  
2762 / tcp
1911457608 | 2024-04-11T14:25:42.819888
  
3001 / tcp
819727972 | 2024-04-17T22:30:00.460202
  
3050 / tcp
2098371729 | 2024-04-17T06:50:17.061164
  
3068 / tcp
1991883981 | 2024-04-08T18:40:17.399039
  
3074 / tcp
1135752610 | 2024-04-10T12:00:50.169203
  
3260 / tcp
-561021273 | 2024-04-02T21:53:03.551418
  
3268 / tcp
165188539 | 2024-03-28T00:40:17.821879
  
3269 / tcp
1047846045 | 2024-04-15T21:56:37.602961
  
3306 / tcp
-1399940268 | 2024-04-01T23:07:59.471996
  
3310 / tcp
2143387245 | 2024-04-09T13:04:34.380874
  
3311 / tcp
-1888448627 | 2024-04-16T21:15:50.015409
  
3388 / tcp
521595461 | 2024-03-28T22:54:45.670280
  
3389 / tcp
198844676 | 2024-04-15T23:31:45.925702
  
3551 / tcp
-1316491703 | 2024-03-30T22:45:29.914621
  
3749 / tcp
-2033111675 | 2024-03-28T15:59:36.385347
  
3780 / tcp
141533638 | 2024-04-15T01:18:54.369007
  
4000 / tcp
1911457608 | 2024-04-17T21:26:51.620441
  
4022 / tcp
1286504516 | 2024-04-08T21:09:18.991589
  
4063 / tcp
165188539 | 2024-04-15T16:28:44.904580
  
4064 / tcp
1723769361 | 2024-03-21T06:32:33.804959
  
4100 / tcp
539065883 | 2024-04-16T00:53:46.509261
  
4157 / tcp
-1914158197 | 2024-04-11T19:38:16.718936
  
4242 / tcp
842535728 | 2024-04-03T07:55:10.355835
  
4282 / tcp
-1250504565 | 2024-04-10T22:38:33.946476
  
4321 / tcp
819727972 | 2024-04-09T17:14:32.101467
  
4433 / tcp
-1060562267 | 2024-04-18T12:28:57.726230
  
4443 / tcp
1911457608 | 2024-04-10T04:07:01.678465
  
4444 / tcp
-1059554316 | 2024-04-03T07:02:48.299274
  
4500 / tcp
1975288991 | 2024-04-17T04:21:15.167529
  
4506 / tcp
-119996482 | 2024-03-24T06:56:21.337121
  
4664 / tcp
-1099385124 | 2024-04-05T19:05:31.923976
  
4786 / tcp
819727972 | 2024-03-27T16:31:17.653776
  
4840 / tcp
-1839934832 | 2024-04-10T13:12:17.115162
  
4899 / tcp
671605376 | 2024-04-02T09:30:12.449577
  
4911 / tcp
539065883 | 2024-04-08T11:03:04.330073
  
4949 / tcp
-1399940268 | 2024-03-30T18:44:10.767252
  
4999 / tcp
1830697416 | 2024-03-23T14:49:03.469908
  
5001 / tcp
819727972 | 2024-04-13T21:38:12.196599
  
5004 / tcp
-1059554316 | 2024-04-18T08:06:28.403278
  
5006 / tcp
-1810987450 | 2024-03-30T19:45:28.145593
  
5007 / tcp
1578202979 | 2024-04-04T02:55:06.750478
  
5009 / tcp
1543809371 | 2024-04-18T14:42:52.312668
  
5010 / tcp
550048729 | 2024-04-18T07:44:25.367759
  
5025 / tcp
819727972 | 2024-04-08T22:31:41.462149
  
5172 / tcp
-375604792 | 2024-04-01T20:33:43.974474
  
5201 / tcp
-826610984 | 2024-04-01T08:45:13.423783
  
5209 / tcp
1741579575 | 2024-04-14T09:28:21.318270
  
5222 / tcp
-1854630806 | 2024-04-15T11:42:44.940503
  
5269 / tcp
1213931722 | 2024-04-09T17:24:16.991865
  
5432 / tcp
1023953321 | 2024-03-25T12:23:44.886694
  
5500 / tcp
-747911285 | 2024-03-25T09:21:32.062417
  
5600 / tcp
-1019343788 | 2024-04-14T08:42:55.548776
  
5606 / tcp
575925250 | 2024-04-09T08:37:00.389641
  
5672 / tcp
-138733098 | 2024-04-14T05:45:58.478485
  
5801 / tcp
-1547976805 | 2024-04-05T12:14:31.972750
  
5822 / tcp
-358801646 | 2024-04-02T16:35:33.895337
  
5858 / tcp
-1730858130 | 2024-04-05T05:14:24.313318
  
5900 / tcp
-1399940268 | 2024-04-01T06:00:49.904177
  
5908 / tcp
-801484042 | 2024-04-14T03:50:11.772578
  
5938 / tcp
1999272906 | 2024-04-15T03:27:04.426070
  
5984 / tcp
660175493 | 2024-04-14T00:06:13.767167
  
5985 / tcp
1741579575 | 2024-04-16T01:31:41.966902
  
5986 / tcp
120534451 | 2024-04-10T14:55:17.251183
  
6001 / tcp
-1399940268 | 2024-03-20T22:46:04.685717
  
6007 / tcp
-1729629024 | 2024-03-29T01:32:50.874661
  
6080 / tcp
-1399940268 | 2024-04-16T00:50:25.366533
  
6102 / tcp
321971019 | 2024-03-24T23:34:05.404543
  
6379 / tcp
-345718689 | 2024-04-08T03:46:08.319061
  
6443 / tcp
-1399940268 | 2024-04-18T04:45:09.551701
  
6512 / tcp
-930644848 | 2024-03-27T08:11:33.852870
  
6543 / tcp
-1888448627 | 2024-04-15T18:51:03.215458
  
6653 / tcp
104385780 | 2024-04-04T23:03:33.944183
  
6664 / tcp
4935895 | 2024-04-10T07:30:18.811196
  
6666 / tcp
-971970408 | 2024-04-10T16:47:00.149667
  
6667 / tcp
-616720387 | 2024-04-10T07:53:01.465986
  
6668 / tcp
-1795027372 | 2024-03-22T14:19:01.533648
  
6697 / tcp
-1399940268 | 2024-04-04T15:37:44.369331
  
6998 / tcp
1265582946 | 2024-04-14T02:14:57.831671
  
7001 / tcp
572436013 | 2024-04-13T12:35:53.097095
  
7070 / tcp
660175493 | 2024-03-22T02:57:38.917260
  
7071 / tcp
1911457608 | 2024-04-09T13:54:49.874510
  
7170 / tcp
-1730858130 | 2024-03-27T21:14:26.862022
  
7171 / tcp
103159425 | 2024-04-14T09:14:11.829153
  
7218 / tcp
677934968 | 2024-04-17T10:49:13.421688
  
7415 / tcp
-971970408 | 2024-04-17T05:12:18.717478
  
7434 / tcp
-584993230 | 2024-04-05T19:53:20.132241
  
7443 / tcp
-1316491703 | 2024-04-11T02:30:17.374570
  
7547 / tcp
104385780 | 2024-04-15T12:09:17.729136
  
7548 / tcp
819727972 | 2024-04-05T14:09:56.524392
  
7979 / tcp
104385780 | 2024-04-14T14:44:16.354287
  
7989 / tcp
1072892569 | 2024-04-14T16:49:59.681215
  
8001 / tcp
1911457608 | 2024-03-26T04:51:19.673028
  
8005 / tcp
-136006866 | 2024-03-27T02:03:23.097076
  
8015 / tcp
-1297953727 | 2024-04-02T00:12:55.876791
  
8020 / tcp
-1888448627 | 2024-03-31T01:33:29.006629
  
8025 / tcp
-1329831334 | 2024-04-17T00:23:21.674133
  
8043 / tcp
-1399940268 | 2024-04-04T22:50:46.853688
  
8044 / tcp
-1399940268 | 2024-04-15T07:33:13.828495
  
8054 / tcp
-79865617 | 2024-04-18T08:33:46.765880
  
8060 / tcp
104385780 | 2024-04-13T12:46:08.786632
  
8083 / tcp
-1105333987 | 2024-04-16T07:43:53.624692
  
8085 / tcp
1504401647 | 2024-04-17T05:03:36.648293
  
8087 / tcp
-1476017887 | 2024-03-23T14:15:17.686636
  
8088 / tcp
-1461540015 | 2024-04-01T14:28:26.949545
  
8112 / tcp
2087396567 | 2024-04-10T22:19:17.743611
  
8126 / tcp
-1795027372 | 2024-03-29T13:57:56.134962
  
8139 / tcp
1741579575 | 2024-04-01T23:17:11.028623
  
8140 / tcp
171352214 | 2024-04-05T08:04:18.054308
  
8181 / tcp
-1264324149 | 2024-04-11T08:55:40.346838
  
8200 / tcp
165188539 | 2024-03-23T05:15:41.665174
  
8239 / tcp
819727972 | 2024-04-18T09:07:07.431921
  
8291 / tcp
-1729028106 | 2024-04-02T01:52:06.219635
  
8333 / tcp
-119996482 | 2024-04-13T23:51:33.906327
  
8334 / tcp
1911457608 | 2024-04-04T12:47:42.285650
  
8407 / tcp
-1399940268 | 2024-03-29T05:09:48.570226
  
8422 / tcp
1911457608 | 2024-03-25T21:57:38.158538
  
8423 / tcp
1735450406 | 2024-04-14T06:49:30.205839
  
8443 / tcp
1763259671 | 2024-04-03T10:55:17.166959
  
8447 / tcp
1652191202 | 2024-04-15T05:15:22.153330
  
8500 / tcp
-1399940268 | 2024-04-05T21:28:29.818947
  
8545 / tcp
-2031152423 | 2024-04-14T19:57:20.020752
  
8554 / tcp
1911457608 | 2024-03-26T20:00:22.168935
  
8622 / tcp
842535728 | 2024-04-09T20:26:59.889115
  
8649 / tcp
-2017887953 | 2024-04-08T16:05:00.222025
  
8728 / tcp
-1139539254 | 2024-04-03T04:41:58.671876
  
8733 / tcp
165188539 | 2024-03-25T08:26:08.507740
  
8791 / tcp
-358801646 | 2024-03-20T13:50:02.459622
  
8820 / tcp
597764502 | 2024-03-23T08:19:01.251326
  
8825 / tcp
745343730 | 2024-03-29T16:41:54.698405
  
8834 / tcp
745343730 | 2024-03-27T09:27:06.808647
  
8840 / tcp
307999478 | 2024-03-31T18:40:32.681390
  
8860 / tcp
-249504111 | 2024-04-11T21:29:46.331354
  
8861 / tcp
-1045760528 | 2024-04-09T16:07:43.699348
  
8880 / tcp
-2107996212 | 2024-03-27T00:37:26.898085
  
8889 / tcp
-1032713145 | 2024-04-05T00:04:19.068479
  
8890 / tcp
-2067028711 | 2024-03-24T08:15:26.938020
  
9000 / tcp
-1026951088 | 2024-04-14T11:36:20.565991
  
9001 / tcp
-1441741890 | 2024-03-30T02:52:42.246759
  
9002 / tcp
1911457608 | 2024-04-02T00:14:18.972515
  
9008 / tcp
-1399940268 | 2024-03-25T11:05:29.533390
  
9024 / tcp
-1399940268 | 2024-04-04T21:20:50.844852
  
9037 / tcp
165188539 | 2024-04-16T20:26:19.663973
  
9039 / tcp
873425297 | 2024-04-18T14:32:26.640996
  
9042 / tcp
2087396567 | 2024-04-02T23:40:23.928601
  
9051 / tcp
-1399940268 | 2024-04-05T21:15:49.734123
  
9070 / tcp
2087396567 | 2024-04-14T01:16:21.329098
  
9091 / tcp
921225407 | 2024-03-26T18:38:02.525671
  
9092 / tcp
1308377066 | 2024-04-10T18:04:26.315456
  
9095 / tcp
1911457608 | 2024-04-04T13:30:59.595048
  
9100 / tcp
863754335 | 2024-04-16T03:31:52.274926
  
9151 / tcp
165188539 | 2024-04-05T04:33:01.677997
  
9160 / tcp
-1261090339 | 2024-03-20T20:59:10.409807
  
9214 / tcp
-2096652808 | 2024-04-17T17:09:54.215531
  
9306 / tcp
-833168972 | 2024-03-26T07:03:11.527506
  
9418 / tcp
-971970408 | 2024-04-02T13:25:47.998954
  
9443 / tcp
104385780 | 2024-04-15T03:40:19.858122
  
9595 / tcp
1332894250 | 2024-04-10T06:22:32.414406
  
9600 / tcp
171352214 | 2024-04-11T00:07:16.711904
  
9633 / tcp
1308377066 | 2024-04-17T14:48:33.355532
  
9743 / tcp
-1733645023 | 2024-04-18T00:58:50.863270
  
9761 / tcp
-1867457549 | 2024-03-24T15:44:08.868610
  
9876 / tcp
1304012963 | 2024-03-21T01:21:00.171493
  
9898 / tcp
1833368189 | 2024-04-15T23:40:43.665247
  
9943 / tcp
-119996482 | 2024-04-03T00:44:05.029445
  
9944 / tcp
-2089734047 | 2024-03-29T07:06:18.869627
  
9992 / tcp
1969772007 | 2024-03-27T02:00:57.617726
  
9998 / tcp
1161309183 | 2024-04-08T06:37:54.635225
  
9999 / tcp
1492413928 | 2024-03-22T21:43:42.231216
  
10001 / tcp
1282941221 | 2024-04-16T15:56:51.043264
  
10134 / tcp
89282912 | 2024-04-11T10:37:31.042899
  
10250 / tcp
2087396567 | 2024-04-08T22:20:25.271306
  
10443 / tcp
493955023 | 2024-03-23T17:34:28.717350
  
10909 / tcp
-1399940268 | 2024-03-30T16:02:40.002878
  
10911 / tcp
1726594447 | 2024-04-17T02:00:37.164348
  
11000 / tcp
1911457608 | 2024-03-29T06:13:44.080684
  
11112 / tcp
-136006866 | 2024-04-17T05:48:23.310569
  
11211 / tcp
-903067560 | 2024-04-04T21:02:09.062451
  
11300 / tcp
-119996482 | 2024-04-08T11:57:28.648899
  
11371 / tcp
-2046909074 | 2024-04-09T20:58:44.265041
  
12000 / tcp
142594048 | 2024-04-11T17:00:56.471856
  
12345 / tcp
-2089734047 | 2024-04-05T16:10:44.358128
  
14147 / tcp
1948301213 | 2024-04-01T01:37:22.903203
  
14265 / tcp
1911457608 | 2024-04-18T13:36:41.837474
  
14344 / tcp
770016595 | 2024-03-19T21:05:42.376274
  
16010 / tcp
-1840324437 | 2024-04-04T14:55:31.060379
  
16992 / tcp
-971970408 | 2024-03-24T09:11:16.853976
  
16993 / tcp
2067064333 | 2024-04-08T18:37:45.000805
  
18553 / tcp
1624217396 | 2024-04-17T18:47:17.786318
  
19000 / tcp
1900503736 | 2024-03-30T16:26:58.707168
  
20000 / tcp
-1399940268 | 2024-04-17T00:22:12.605968
  
20256 / tcp
-1139539254 | 2024-03-24T22:57:34.840099
  
20547 / tcp
-1230049476 | 2024-04-09T19:02:52.709689
  
21025 / tcp
550048729 | 2024-03-26T12:56:31.794866
  
22021 / tcp
-358801646 | 2024-03-22T19:06:41.857068
  
22222 / tcp
2087396567 | 2024-03-21T20:28:18.876230
  
22443 / tcp
1632932802 | 2024-04-08T02:53:44.485967
  
23023 / tcp
819727972 | 2024-03-23T03:21:41.555909
  
25001 / tcp
-2089734047 | 2024-04-14T17:57:30.335954
  
25565 / tcp
921225407 | 2024-03-30T17:00:02.019098
  
27015 / tcp
1763259671 | 2024-03-29T00:22:05.653520
  
27017 / tcp
1723769361 | 2024-04-16T01:50:25.866461
  
28015 / tcp
-1969169410 | 2024-03-26T17:04:13.200111
  
28080 / tcp
-1609150592 | 2024-04-11T23:28:49.767291
  
30002 / tcp
1024374118 | 2024-04-04T22:47:21.777684
  
31337 / tcp
233634112 | 2024-04-14T22:06:50.750749
  
32764 / tcp
-1888448627 | 2024-03-21T19:42:04.137959
  
33060 / tcp
1726594447 | 2024-03-22T10:33:09.143821
  
35000 / tcp
-1598265216 | 2024-03-31T22:59:50.001509
  
37777 / tcp
-801484042 | 2024-04-13T20:50:11.023074
  
41800 / tcp
-433302150 | 2024-04-08T23:35:17.594755
  
44158 / tcp
-1327660293 | 2024-04-02T12:58:23.481488
  
44818 / tcp
-1591825093 | 2024-03-29T03:34:41.381162
  
49152 / tcp
1778988322 | 2024-04-17T22:08:55.301121
  
50000 / tcp
-1023516719 | 2024-04-14T20:32:16.062542
  
50050 / tcp
1632932802 | 2024-04-02T05:16:20.217695
  
50100 / tcp
-1969169410 | 2024-04-09T10:48:27.821486
  
51106 / tcp
1948301213 | 2024-03-19T21:35:25.803984
  
51235 / tcp
-1888448627 | 2024-04-01T23:15:19.986042
  
54138 / tcp
-1399940268 | 2024-03-30T19:55:34.820890
  
55000 / tcp
1690634669 | 2024-04-03T05:15:15.769197
  
55443 / tcp
2087396567 | 2024-04-15T21:41:54.165560
  
55553 / tcp
660175493 | 2024-04-09T05:48:58.994017
  
55554 / tcp
2087396567 | 2024-04-03T00:55:46.864694
  
60129 / tcp
-1399940268 | 2024-04-04T16:21:07.108581
  
61613 / tcp
1545917845 | 2024-04-13T21:19:17.546838
  
61616 / tcp
1842317374 | 2024-04-13T17:58:10.299805
  
62078 / tcp



Contact Us

Shodan ® - All rights reserved