8.131.208.180

Regular View Raw Data
Last Seen: 2024-05-27

GeneralInformation

Hostnames cn-beijing.oss.aliyuncs.com
Domains aliyuncs.com 
Cloud Provider Alibaba Cloud
Country China
City Beijing
Organization Aliyun Computing Co.LTD
ISP Hangzhou Alibaba Advertising Co.,Ltd.
ASN AS37963

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2023-51767 OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
CVE-2023-51385 In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
CVE-2023-51384 In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.
CVE-2023-48795 The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
CVE-2023-44487 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
CVE-2023-38408 The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
CVE-2023-26049 Jetty is a java based web server and servlet engine. Nonstandard cookie parsing in Jetty may allow an attacker to smuggle cookies within other cookies, or otherwise perform unintended behavior by tampering with the cookie parsing mechanism. If Jetty sees a cookie VALUE that starts with `"` (double quote), it will continue to read the cookie string until it sees a closing quote -- even if a semicolon is encountered. So, a cookie header such as: `DISPLAY_LANGUAGE="b; JSESSIONID=1337; c=d"` will be parsed as one cookie, with the name DISPLAY_LANGUAGE and a value of b; JSESSIONID=1337; c=d instead of 3 separate cookies. This has security implications because if, say, JSESSIONID is an HttpOnly cookie, and the DISPLAY_LANGUAGE cookie value is rendered on the page, an attacker can smuggle the JSESSIONID cookie into the DISPLAY_LANGUAGE cookie and thereby exfiltrate it. This is significant when an intermediary is enacting some policy based on cookies, so a smuggled cookie can bypass that policy yet still be seen by the Jetty server or its logging system. This issue has been addressed in versions 9.4.51, 10.0.14, 11.0.14, and 12.0.0.beta0 and users are advised to upgrade. There are no known workarounds for this issue.
CVE-2023-26048 Jetty is a java based web server and servlet engine. In affected versions servlets with multipart support (e.g. annotated with `@MultipartConfig`) that call `HttpServletRequest.getParameter()` or `HttpServletRequest.getParts()` may cause `OutOfMemoryError` when the client sends a multipart request with a part that has a name but no filename and very large content. This happens even with the default settings of `fileSizeThreshold=0` which should stream the whole part content to disk. An attacker client may send a large multipart request and cause the server to throw `OutOfMemoryError`. However, the server may be able to recover after the `OutOfMemoryError` and continue its service -- although it may take some time. This issue has been patched in versions 9.4.51, 10.0.14, and 11.0.14. Users are advised to upgrade. Users unable to upgrade may set the multipart parameter `maxRequestSize` which must be set to a non-negative value, so the whole multipart content is limited (although still read into memory).
CVE-2022-2048 5.0In Eclipse Jetty HTTP/2 server implementation, when encountering an invalid HTTP/2 request, the error handling has a bug that can wind up not properly cleaning up the active connections and associated resources. This can lead to a Denial of Service scenario where there are no enough resources left to process good requests.
CVE-2022-2047 4.0In Eclipse Jetty versions 9.4.0 thru 9.4.46, and 10.0.0 thru 10.0.9, and 11.0.0 thru 11.0.9 versions, the parsing of the authority segment of an http scheme URI, the Jetty HttpURI class improperly detects an invalid input as a hostname. This can lead to failures in a Proxy scenario.
CVE-2021-41617 4.4sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
CVE-2021-36368 2.6An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass, since nothing is being bypassed.
CVE-2021-34428 3.6For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, if an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated. This can result in an application used on a shared computer being left logged in.
CVE-2021-28169 5.0For Eclipse Jetty versions <= 9.4.40, <= 10.0.2, <= 11.0.2, it is possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory. For example a request to `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
CVE-2020-7656 4.3jquery prior to 1.9.0 allows Cross-site Scripting attacks via the load method. The load method fails to recognize and remove "<script>" HTML tags that contain a whitespace character, i.e: "</script >", which results in the enclosed script logic to be executed.
CVE-2020-27216 4.4In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. If the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications, including their WEB-INF/lib jar files and JSP files. If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability.
CVE-2020-15778 6.8scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
CVE-2020-14145 4.3The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
CVE-2020-11023 4.3In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2020-11022 4.3In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
CVE-2019-6111 5.8An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
CVE-2019-6110 4.0In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
CVE-2019-6109 4.0An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
CVE-2019-16905 4.4OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
CVE-2019-11358 4.3jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
CVE-2018-20685 2.6In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
CVE-2018-15919 5.0Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
CVE-2018-15473 5.0OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
CVE-2017-9735 5.0Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.
CVE-2017-7658 7.5In Eclipse Jetty Server, versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization.
CVE-2017-7657 7.5In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), transfer-encoding chunks are handled poorly. The chunk length parsing was vulnerable to an integer overflow. Thus a large chunk size could be interpreted as a smaller chunk size and content sent as chunk body could be interpreted as a pipelined request. If Jetty was deployed behind an intermediary that imposed some authorization and that intermediary allowed arbitrarily large chunks to be passed on unchanged, then this flaw could be used to bypass the authorization imposed by the intermediary as the fake pipelined request would not be interpreted by the intermediary as a request.
CVE-2017-7656 5.0In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.x (non-default configuration with RFC2616 compliance enabled), HTTP/0.9 is handled poorly. An HTTP/1 style request line (i.e. method space URI space version) that declares a version of HTTP/0.9 was accepted and treated as a 0.9 request. If deployed behind an intermediary that also accepted and passed through the 0.9 version (but did not act on it), then the response sent could be interpreted by the intermediary as HTTP/1 headers. This could be used to poison the cache if the server allowed the origin client to generate arbitrary content in the response.
CVE-2017-15906 5.0The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
CVE-2016-3115 5.5Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
CVE-2016-20012 4.3OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
CVE-2016-1908 7.5The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
CVE-2016-10708 5.0sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
CVE-2016-10012 7.2The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
CVE-2016-10011 2.1authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
CVE-2016-10010 6.9sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
CVE-2016-10009 7.5Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
CVE-2016-0777 4.0The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
CVE-2015-9251 4.3jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
CVE-2015-6564 6.9Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
CVE-2015-6563 1.9The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
CVE-2015-5600 8.5The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
CVE-2015-5352 4.3The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
CVE-2014-2653 5.8The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
CVE-2014-2532 5.8sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
CVE-2014-1692 7.5The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.
CVE-2012-6708 4.3jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '<' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.
CVE-2012-0814 3.5The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
CVE-2011-5000 3.5The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
CVE-2011-4327 2.1ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.
CVE-2010-5107 5.0The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
CVE-2010-4755 4.0The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
CVE-2010-4478 7.5OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
CVE-2008-3844 9.3Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
CVE-2007-2768 4.3OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.

OpenPorts

11131517192123253743495370798082838489981021041101111131191351431751791952212222643113894274434444654915025035155485545936316366667717898008738809929939959991023102410251050109911531177120012341311136613881433151515211604172317411800180118831911192619622000200220082012201820482049205020542063208120822083208620872121215421812222225023322345235223752376240424552480255325562560256225632566257026282761276230013049306030743080311031153260329933013306331033883389340834603498350335233524354235483549355135663780379038384000402240634064415742004242424342824321436944304433444344444445450045064524456747824848489949495001500650075009501050255050517252015222526954325435544655605602560456725858593859845985598660006001600260056006600960806379644365106590663366536662666666676668695570017071717172187415743374347443754775487634770077767989800180038004800980118020802480578060806980728081808580868087808880898091809880998107811081118126813981438200823782438291833384048408840984178426842784308443844584488500854585548575860286228649866687288788879188068807881088158825883088348841884288438849886488718880888988999000900190029003900790159021903190359038903990419042904390509051909090919092909490959100915192009202921292959306931094189433944395009530960096339704976198009869987699439944998899939998999910000100011013410250104431055410909110001111211210112111130012345141471426514344160101603016993170001808118245185531900020000202562054721025213792222223023234242500125105255652801528080300023000331337327643306035000377774180044158448184799049152491535000050070501005123552869541385500055442554435555355554600106003060129616136207865522
2087396567 | 2024-05-22T07:07:34.328924
  
11 / tcp
1412519768 | 2024-05-20T15:42:10.294868
  
13 / tcp
660175493 | 2024-05-22T20:50:26.690583
  
15 / tcp
-1316491703 | 2024-05-22T11:34:17.829767
  
17 / tcp
829384519 | 2024-05-24T01:07:08.475101
  
19 / tcp
-731285715 | 2024-05-27T03:49:50.384590
  
21 / tcp
-23362551 | 2024-05-19T17:42:25.029108
  
23 / tcp
1911457608 | 2024-05-21T06:01:39.708304
  
25 / tcp
-394428255 | 2024-05-07T22:37:14.324972
  
37 / tcp
841014058 | 2024-05-11T17:46:27.794294
  
43 / tcp
588096080 | 2024-05-04T22:38:39.031058
  
49 / tcp
-1370420049 | 2024-05-21T00:52:42.463415
  
53 / tcp
175081126 | 2024-05-25T03:55:41.724401
  
70 / tcp
-746345752 | 2024-05-24T07:55:52.733825
  
79 / tcp
1890179043 | 2024-05-19T12:01:41.893861
  
80 / tcp
104385780 | 2024-05-26T16:51:23.203693
  
82 / tcp
-1760806421 | 2024-04-28T22:29:53.765018
  
83 / tcp
-1023516719 | 2024-05-26T19:42:40.185194
  
84 / tcp
-1888448627 | 2024-05-20T21:51:39.790189
  
89 / tcp
51259122 | 2024-05-12T21:05:50.967592
  
98 / tcp
1189133115 | 2024-05-22T09:27:34.069683
  
102 / tcp
117101543 | 2024-05-23T12:06:20.572534
  
104 / tcp
1911457608 | 2024-05-21T09:41:31.019802
  
110 / tcp
1640807223 | 2024-05-17T10:25:36.885196
  
111 / tcp
60948681 | 2024-05-19T05:17:06.564773
  
113 / tcp
141730637 | 2024-04-28T18:51:44.042776
  
119 / tcp
1040118286 | 2024-05-16T21:47:25.379663
  
135 / tcp
-829824006 | 2024-05-06T17:40:46.725542
  
143 / tcp
597764502 | 2024-05-21T08:40:20.775852
  
175 / tcp
-399606100 | 2024-05-13T18:42:19.145202
  
179 / tcp
1741579575 | 2024-05-16T05:07:44.998901
  
195 / tcp
-1399940268 | 2024-05-25T10:41:26.609487
  
221 / tcp
-926139304 | 2024-05-20T05:42:59.104537
  
222 / tcp
-162623513 | 2024-05-25T16:39:10.987202
  
264 / tcp
-1547976805 | 2024-05-26T10:07:18.224518
  
311 / tcp
-1743283776 | 2024-05-18T00:40:17.475741
  
389 / tcp
-661950041 | 2024-05-26T15:11:58.855066
  
427 / tcp
1045727448 | 2024-05-25T02:37:30.018412
  
443 / tcp
291723434 | 2024-05-22T12:01:01.407959
  
444 / tcp
897328069 | 2024-05-23T22:10:18.897548
  
465 / tcp
-1399940268 | 2024-05-17T11:24:19.535837
  
491 / tcp
1308377066 | 2024-05-12T17:11:19.187800
  
502 / tcp
-445721795 | 2024-05-03T12:32:02.463978
  
503 / tcp
1690634669 | 2024-05-10T01:38:00.435951
  
515 / tcp
1801869778 | 2024-05-14T10:45:34.810424
  
548 / tcp
1060450357 | 2024-05-26T15:28:38.968047
  
554 / tcp
-1261053701 | 2024-05-24T08:46:12.780312
  
593 / tcp
1412519768 | 2024-05-21T09:17:28.929058
  
631 / tcp
1650594030 | 2024-05-18T19:17:47.277556
  
636 / tcp
1300162323 | 2024-05-11T18:19:51.962219
  
666 / tcp
-801484042 | 2024-05-21T11:25:49.763223
  
771 / tcp
-1888448627 | 2024-05-25T19:24:05.390012
  
789 / tcp
-1592058715 | 2024-05-20T22:32:55.254420
  
800 / tcp
-1970692834 | 2024-05-22T08:17:05.433969
  
873 / tcp
-1256415508 | 2024-04-28T20:03:13.980841
  
880 / tcp
2121220663 | 2024-05-24T18:01:14.512451
  
992 / tcp
1370263973 | 2024-05-17T00:09:06.581218
  
993 / tcp
-1489591880 | 2024-05-27T02:26:44.183619
  
995 / tcp
-1216336508 | 2024-05-19T15:59:48.399061
  
999 / tcp
-1694458451 | 2024-05-26T11:27:27.890816
  
1023 / tcp
233634112 | 2024-05-13T16:38:37.646187
  
1024 / tcp
1504401647 | 2024-05-25T02:10:57.165148
  
1025 / tcp
921225407 | 2024-05-21T09:36:50.441910
  
1050 / tcp
-1435414831 | 2024-05-17T16:05:04.833706
  
1099 / tcp
-1032713145 | 2024-05-23T16:05:23.448757
  
1153 / tcp
2087396567 | 2024-05-22T09:35:35.866728
  
1177 / tcp
2087396567 | 2024-05-18T02:21:25.980116
  
1200 / tcp
-1399940268 | 2024-05-21T17:24:00.246411
  
1234 / tcp
1978059005 | 2024-05-10T02:44:05.367967
  
1311 / tcp
-1399940268 | 2024-04-29T15:17:45.331389
  
1366 / tcp
-2096652808 | 2024-05-15T13:37:12.466803
  
1388 / tcp
-1279739995 | 2024-05-09T06:53:54.043771
  
1433 / tcp
1220320909 | 2024-05-01T19:11:38.030610
  
1515 / tcp
1975288991 | 2024-05-12T17:58:22.190161
  
1521 / tcp
1975288991 | 2024-05-20T19:20:09.452308
  
1604 / tcp
1103582599 | 2024-05-13T18:58:15.991966
  
1723 / tcp
585675468 | 2024-05-07T18:25:39.069829
  
1741 / tcp
2063598737 | 2024-05-21T23:01:31.732372
  
1800 / tcp
367914955 | 2024-05-25T22:41:56.802652
  
1801 / tcp
2087396567 | 2024-05-02T22:16:53.829871
  
1883 / tcp
-136006866 | 2024-05-03T16:19:36.444599
  
1911 / tcp
2087396567 | 2024-05-26T20:39:23.949043
  
1926 / tcp
-1733106930 | 2024-05-27T03:55:39.327338
  
1962 / tcp
-2089734047 | 2024-05-26T01:41:18.661168
  
2000 / tcp
-1681927087 | 2024-05-16T06:16:01.590714
  
2002 / tcp
1975288991 | 2024-05-22T20:30:12.202931
  
2008 / tcp
117101543 | 2024-05-23T20:26:04.849654
  
2012 / tcp
819727972 | 2024-04-28T22:04:26.609110
  
2018 / tcp
-303199180 | 2024-05-08T15:16:06.407547
  
2048 / tcp
-1399940268 | 2024-05-18T12:55:07.777769
  
2049 / tcp
-1329831334 | 2024-05-17T11:19:48.720766
  
2050 / tcp
819727972 | 2024-04-29T11:25:16.903550
  
2054 / tcp
921225407 | 2024-04-28T14:47:54.413897
  
2063 / tcp
-1036370807 | 2024-05-10T21:03:17.346068
  
2081 / tcp
-1392039491 | 2024-05-14T14:52:20.097395
  
2082 / tcp
-2031152423 | 2024-05-19T02:20:57.070739
  
2083 / tcp
178736976 | 2024-05-10T02:36:14.252559
  
2086 / tcp
660175493 | 2024-05-22T13:31:30.490751
  
2087 / tcp
141730637 | 2024-05-02T20:39:48.241581
  
2121 / tcp
2087396567 | 2024-05-13T22:53:11.932195
  
2154 / tcp
546151771 | 2024-05-24T19:10:25.065927
  
2181 / tcp
-1152923582 | 2024-05-11T00:47:44.145156
  
2222 / tcp
1911457608 | 2024-05-17T15:08:35.274117
  
2250 / tcp
-1914935523 | 2024-05-26T22:14:02.165056
  
2332 / tcp
575925250 | 2024-05-15T08:14:35.008818
  
2345 / tcp
-1399940268 | 2024-04-28T02:34:32.485386
  
2352 / tcp
1212921144 | 2024-05-05T11:14:00.179944
  
2375 / tcp
-971970408 | 2024-05-20T13:58:13.038736
  
2376 / tcp
-180163620 | 2024-05-24T19:23:22.306760
  
2404 / tcp
-527005584 | 2024-05-22T23:07:53.822246
  
2455 / tcp
1212921144 | 2024-05-18T20:11:31.213165
  
2480 / tcp
1911457608 | 2024-05-25T00:42:39.605743
  
2553 / tcp
-1097188123 | 2024-05-06T03:40:05.975058
  
2556 / tcp
165188539 | 2024-05-15T03:49:20.227545
  
2560 / tcp
-375604792 | 2024-05-19T12:00:07.651051
  
2562 / tcp
-1399940268 | 2024-05-15T23:36:04.683589
  
2563 / tcp
-2089734047 | 2024-05-11T06:01:09.431000
  
2566 / tcp
1830697416 | 2024-05-25T21:16:27.754794
  
2570 / tcp
-1248408558 | 2024-05-08T04:22:36.216442
  
2628 / tcp
-1013082686 | 2024-05-19T07:16:57.684549
  
2761 / tcp
-2046514463 | 2024-05-26T11:06:24.850365
  
2762 / tcp
1363464823 | 2024-05-27T11:45:26.163599
  
3001 / tcp
-303199180 | 2024-05-05T17:32:31.218978
  
3049 / tcp
819727972 | 2024-05-03T15:35:24.098050
  
3060 / tcp
1332894250 | 2024-05-08T08:36:51.314530
  
3074 / tcp
-1019343788 | 2024-05-24T04:22:49.009416
  
3080 / tcp
-454087041 | 2024-05-25T17:57:20.225786
  
3110 / tcp
455076604 | 2024-05-07T00:36:38.470248
  
3115 / tcp
-1341662640 | 2024-05-26T21:22:12.935188
  
3260 / tcp
1741579575 | 2024-05-18T18:57:40.804466
  
3299 / tcp
-358801646 | 2024-05-21T15:09:52.170045
  
3301 / tcp
369808347 | 2024-05-21T00:07:42.703639
  
3306 / tcp
1308377066 | 2024-05-07T19:42:53.824449
  
3310 / tcp
-1399940268 | 2024-05-27T11:09:47.326162
  
3388 / tcp
1908555143 | 2024-05-21T09:27:36.005915
  
3389 / tcp
-1148066627 | 2024-05-27T10:36:16.721705
  
3408 / tcp
332363548 | 2024-05-19T00:36:48.970394
  
3460 / tcp
-1399940268 | 2024-05-09T07:55:43.174437
  
3498 / tcp
-1986594217 | 2024-05-21T23:25:40.119945
  
3503 / tcp
1919228981 | 2024-05-12T07:59:52.042817
  
3523 / tcp
921225407 | 2024-05-25T18:02:26.116893
  
3524 / tcp
-154107716 | 2024-05-25T20:15:31.822689
  
3542 / tcp
-122096153 | 2024-05-19T01:04:49.058142
  
3548 / tcp
1011407350 | 2024-05-20T02:16:30.772209
  
3549 / tcp
198844676 | 2024-05-08T23:11:05.839132
  
3551 / tcp
-1795027372 | 2024-05-22T00:03:25.543764
  
3566 / tcp
1741579575 | 2024-05-20T08:01:54.936746
  
3780 / tcp
539065883 | 2024-05-16T07:32:52.361479
  
3790 / tcp
-1399940268 | 2024-05-23T15:20:53.927895
  
3838 / tcp
1170207731 | 2024-05-26T00:20:11.001300
  
4000 / tcp
632542934 | 2024-05-25T19:16:02.851828
  
4022 / tcp
-971970408 | 2024-05-27T09:47:35.218810
  
4063 / tcp
-1399940268 | 2024-05-07T07:40:44.845750
  
4064 / tcp
2087396567 | 2024-05-23T06:59:55.517643
  
4157 / tcp
2103111368 | 2024-05-08T10:20:40.038884
  
4200 / tcp
-1914158197 | 2024-05-27T06:58:14.883907
  
4242 / tcp
-1013082686 | 2024-05-01T14:20:34.922461
  
4243 / tcp
539065883 | 2024-05-15T22:38:11.631630
  
4282 / tcp
-1250504565 | 2024-05-22T06:31:46.671331
  
4321 / tcp
-1888448627 | 2024-05-17T14:08:52.242280
  
4369 / tcp
-445721795 | 2024-05-07T03:23:19.711356
  
4430 / tcp
104385780 | 2024-05-18T15:20:36.496866
  
4433 / tcp
2069201278 | 2024-05-21T02:22:53.986356
  
4443 / tcp
-2096652808 | 2024-05-15T23:20:14.361571
  
4444 / tcp
-2089734047 | 2024-04-29T17:47:18.249105
  
4445 / tcp
307999478 | 2024-05-26T17:06:40.365108
  
4500 / tcp
819727972 | 2024-05-10T21:48:13.184783
  
4506 / tcp
1308377066 | 2024-05-04T15:24:59.025150
  
4524 / tcp
1087086197 | 2024-05-18T19:18:56.452408
  
4567 / tcp
546151771 | 2024-05-08T05:57:27.132585
  
4782 / tcp
-138733098 | 2024-05-11T19:39:04.760524
  
4848 / tcp
1778988322 | 2024-05-25T22:52:24.883809
  
4899 / tcp
1332894250 | 2024-05-13T23:40:48.207137
  
4949 / tcp
171352214 | 2024-05-20T13:20:59.763015
  
5001 / tcp
-314039103 | 2024-05-11T23:47:03.340331
  
5006 / tcp
-2140303521 | 2024-05-19T16:01:24.228635
  
5007 / tcp
1578202979 | 2024-05-21T19:01:43.681808
  
5009 / tcp
921225407 | 2024-05-27T08:39:29.449277
  
5010 / tcp
114471724 | 2024-05-27T12:19:46.661551
  
5025 / tcp
-475051963 | 2024-05-08T01:03:32.058539
  
5050 / tcp
819727972 | 2024-05-18T11:54:27.590299
  
5172 / tcp
1426971893 | 2024-05-16T22:01:52.012350
  
5201 / tcp
233634112 | 2024-05-10T22:25:48.334151
  
5222 / tcp
1359734371 | 2024-05-23T19:16:39.113792
  
5269 / tcp
819727972 | 2024-05-16T13:17:21.950499
  
5432 / tcp
1911457608 | 2024-05-26T04:34:34.134899
  
5435 / tcp
1911457608 | 2024-05-08T09:26:27.759568
  
5446 / tcp
-409020351 | 2024-05-09T10:22:01.386253
  
5560 / tcp
-1140468363 | 2024-04-28T21:22:40.833165
  
5602 / tcp
-345718689 | 2024-04-28T05:22:59.667088
  
5604 / tcp
575925250 | 2024-05-25T08:12:31.135213
  
5672 / tcp
-971970408 | 2024-05-26T18:00:17.830035
  
5858 / tcp
1911457608 | 2024-05-20T02:13:29.356864
  
5938 / tcp
1999272906 | 2024-05-23T23:49:38.014693
  
5984 / tcp
-321444299 | 2024-04-30T13:59:34.256475
  
5985 / tcp
2087396567 | 2024-05-27T04:20:41.044736
  
5986 / tcp
819727972 | 2024-05-09T15:19:50.195288
  
6000 / tcp
-904840257 | 2024-05-25T22:46:51.021925
  
6001 / tcp
1632932802 | 2024-05-22T05:40:33.074228
  
6002 / tcp
-1013082686 | 2024-05-13T22:18:55.363999
  
6005 / tcp
-1399940268 | 2024-05-19T20:26:38.249434
  
6006 / tcp
1958349741 | 2024-05-12T09:05:53.912122
  
6009 / tcp
641705735 | 2024-05-20T01:10:21.634209
  
6080 / tcp
321971019 | 2024-05-23T12:41:57.799956
  
6379 / tcp
539065883 | 2024-05-22T08:38:34.642670
  
6443 / tcp
-1126612439 | 2024-05-06T20:49:40.971936
  
6510 / tcp
-1399940268 | 2024-04-28T19:36:23.697653
  
6590 / tcp
1911457608 | 2024-05-12T05:07:15.076244
  
6633 / tcp
632542934 | 2024-05-25T05:39:20.196421
  
6653 / tcp
819727972 | 2024-05-04T17:42:15.834624
  
6662 / tcp
4935895 | 2024-05-22T18:33:37.604735
  
6666 / tcp
-1760806421 | 2024-05-21T20:12:16.517446
  
6667 / tcp
-1399940268 | 2024-05-18T18:40:34.575169
  
6668 / tcp
2121220663 | 2024-05-10T19:19:16.956292
  
6955 / tcp
-274925451 | 2024-05-15T13:38:03.300192
  
7001 / tcp
-971970408 | 2024-05-07T05:47:52.947254
  
7071 / tcp
1911457608 | 2024-05-22T22:29:51.635132
  
7171 / tcp
1632932802 | 2024-04-30T13:01:58.368630
  
7218 / tcp
2063598737 | 2024-05-24T17:19:21.154540
  
7415 / tcp
1911457608 | 2024-05-21T04:28:33.199440
  
7433 / tcp
-358801646 | 2024-05-17T01:15:49.661149
  
7434 / tcp
1342763855 | 2024-05-04T09:08:48.666881
  
7443 / tcp
770016595 | 2024-05-01T13:28:30.392026
  
7547 / tcp
819727972 | 2024-05-18T05:59:43.252112
  
7548 / tcp
-1453516345 | 2024-05-21T20:50:25.845167
  
7634 / tcp
-345718689 | 2024-05-12T06:37:15.705542
  
7700 / tcp
-1399940268 | 2024-05-07T21:31:17.873785
  
7776 / tcp
1865391109 | 2024-05-10T20:37:20.420246
  
7989 / tcp
1072892569 | 2024-05-22T03:53:44.878847
  
8001 / tcp
819727972 | 2024-05-01T01:02:26.809333
  
8003 / tcp
1642597142 | 2024-05-07T10:35:47.470843
  
8004 / tcp
2087396567 | 2024-05-25T11:26:36.700370
  
8009 / tcp
-1230049476 | 2024-05-22T04:54:43.608093
  
8011 / tcp
321971019 | 2024-05-08T05:15:17.771083
  
8020 / tcp
-136006866 | 2024-05-19T07:08:18.032644
  
8024 / tcp
114471724 | 2024-05-02T01:06:32.702054
  
8057 / tcp
1778988322 | 2024-05-24T21:36:22.431851
  
8060 / tcp
770016595 | 2024-05-03T23:53:40.209633
  
8069 / tcp
-1733106930 | 2024-05-21T20:53:58.783488
  
8072 / tcp
-1975584300 | 2024-05-16T08:34:45.820866
  
8081 / tcp
1984588611 | 2024-05-08T19:38:53.710167
  
8085 / tcp
2067064333 | 2024-05-26T14:29:37.243536
  
8086 / tcp
-2017887953 | 2024-05-22T10:55:10.799322
  
8087 / tcp
-1217944298 | 2024-05-02T16:37:35.863556
  
8088 / tcp
171352214 | 2024-05-26T23:18:27.365170
  
8089 / tcp
-1839934832 | 2024-05-11T18:43:30.844617
  
8091 / tcp
-119996482 | 2024-04-29T08:55:59.025726
  
8098 / tcp
648174097 | 2024-05-18T10:21:54.873467
  
8099 / tcp
1911457608 | 2024-05-13T16:06:19.928403
  
8107 / tcp
1212285915 | 2024-05-19T20:53:41.667879
  
8110 / tcp
819727972 | 2024-05-22T19:22:39.702257
  
8111 / tcp
2087396567 | 2024-05-10T20:20:41.230502
  
8126 / tcp
1984588611 | 2024-05-09T07:07:29.871608
  
8139 / tcp
-2080784861 | 2024-05-16T04:06:10.508315
  
8143 / tcp
1320285193 | 2024-05-12T11:13:58.217643
  
8200 / tcp
1911457608 | 2024-04-28T05:06:20.002180
  
8237 / tcp
-1373613804 | 2024-04-27T16:54:31.101237
  
8243 / tcp
366084633 | 2024-05-17T16:00:27.951012
  
8291 / tcp
1723769361 | 2024-05-26T04:30:00.649771
  
8333 / tcp
119860953 | 2024-05-14T20:46:01.651955
  
8404 / tcp
-1399940268 | 2024-05-18T23:14:00.866925
  
8408 / tcp
819727972 | 2024-05-11T12:38:14.459721
  
8409 / tcp
1282941221 | 2024-05-23T16:20:57.627833
  
8417 / tcp
-358801646 | 2024-05-12T00:49:57.327727
  
8426 / tcp
-2089734047 | 2024-05-01T06:26:30.882615
  
8427 / tcp
-1399940268 | 2024-05-17T20:58:07.465727
  
8430 / tcp
1096654864 | 2024-05-20T14:40:21.451561
  
8443 / tcp
1543809371 | 2024-05-12T21:34:42.382814
  
8445 / tcp
-1648456501 | 2024-05-20T09:26:30.330403
  
8448 / tcp
1662811133 | 2024-05-25T09:30:33.532728
  
8500 / tcp
819727972 | 2024-05-08T00:34:49.552702
  
8545 / tcp
539065883 | 2024-05-25T01:36:31.942715
  
8554 / tcp
1623746877 | 2024-05-19T04:06:15.054617
  
8575 / tcp
165188539 | 2024-05-07T06:34:30.822397
  
8602 / tcp
-1399940268 | 2024-05-16T02:51:43.730074
  
8622 / tcp
-42767839 | 2024-04-29T08:13:46.327994
  
8649 / tcp
-2017887953 | 2024-05-25T05:46:13.362305
  
8666 / tcp
103159425 | 2024-05-15T13:49:21.894211
  
8728 / tcp
51259122 | 2024-04-30T17:53:37.600134
  
8788 / tcp
-1013082686 | 2024-05-05T02:19:33.747715
  
8791 / tcp
-1399940268 | 2024-05-23T17:05:13.359178
  
8806 / tcp
-1888448627 | 2024-05-12T19:07:11.274195
  
8807 / tcp
1011407350 | 2024-05-16T19:51:11.512010
  
8810 / tcp
-1435414831 | 2024-05-13T02:27:30.110138
  
8815 / tcp
-1297953727 | 2024-05-10T11:39:07.814185
  
8825 / tcp
-1327660293 | 2024-05-17T22:12:42.341636
  
8830 / tcp
740837454 | 2024-05-12T01:13:21.046919
  
8834 / tcp
-653033013 | 2024-05-12T09:55:17.649327
  
8841 / tcp
1911457608 | 2024-05-20T02:15:38.025613
  
8842 / tcp
-2096652808 | 2024-04-30T22:24:40.764758
  
8843 / tcp
-2089734047 | 2024-05-06T08:09:40.379193
  
8849 / tcp
-805362002 | 2024-05-24T05:59:09.401816
  
8864 / tcp
-1399940268 | 2024-05-21T20:41:55.959909
  
8871 / tcp
1492413928 | 2024-05-10T13:04:15.291596
  
8880 / tcp
-1059554316 | 2024-05-24T01:21:10.250913
  
8889 / tcp
372433470 | 2024-05-02T21:48:11.918392
  
8899 / tcp
-2067028711 | 2024-05-09T19:57:30.730477
  
9000 / tcp
-1026951088 | 2024-05-21T17:29:47.590288
  
9001 / tcp
2087396567 | 2024-05-26T19:57:43.206350
  
9002 / tcp
819727972 | 2024-05-21T04:45:22.905107
  
9003 / tcp
-1099385124 | 2024-05-25T00:50:31.417601
  
9007 / tcp
1134517380 | 2024-05-05T03:09:44.737075
  
9015 / tcp
-904840257 | 2024-05-20T03:27:35.781926
  
9021 / tcp
-1399940268 | 2024-05-23T23:53:40.708161
  
9031 / tcp
1911457608 | 2024-05-15T23:39:31.328169
  
9035 / tcp
-1810987450 | 2024-05-15T08:34:10.135856
  
9038 / tcp
-438503381 | 2024-05-12T17:30:22.554889
  
9039 / tcp
819727972 | 2024-05-13T01:44:53.107576
  
9041 / tcp
-784071826 | 2024-05-24T04:09:15.732586
  
9042 / tcp
-2080784861 | 2024-05-08T18:11:25.029156
  
9043 / tcp
745284817 | 2024-05-17T16:07:22.205110
  
9050 / tcp
-1023516719 | 2024-05-27T03:57:32.973402
  
9051 / tcp
1082239536 | 2024-05-23T07:42:41.680962
  
9090 / tcp
-971970408 | 2024-05-02T13:17:31.753756
  
9091 / tcp
-2107996212 | 2024-05-25T02:21:19.265385
  
9092 / tcp
1208318993 | 2024-04-30T18:24:59.539812
  
9094 / tcp
-893477759 | 2024-05-06T15:34:03.840686
  
9095 / tcp
-1399940268 | 2024-05-25T04:39:48.570274
  
9100 / tcp
819727972 | 2024-05-15T19:20:36.544011
  
9151 / tcp
-1163346640 | 2024-05-25T04:35:39.940312
  
9200 / tcp
-1399940268 | 2024-05-08T02:11:14.652230
  
9202 / tcp
-2107996212 | 2024-05-05T03:43:15.828281
  
9212 / tcp
1852418385 | 2024-05-16T13:26:21.984255
  
9295 / tcp
-1399940268 | 2024-05-15T09:33:05.610901
  
9306 / tcp
-1810987450 | 2024-05-16T05:39:17.636381
  
9310 / tcp
1909672637 | 2024-05-26T13:43:32.706719
  
9418 / tcp
-1399940268 | 2024-04-30T21:09:05.899718
  
9433 / tcp
-2096652808 | 2024-05-17T19:16:48.881576
  
9443 / tcp
-1991224470 | 2024-05-10T11:20:27.231716
  
9500 / tcp
1543809371 | 2024-05-26T06:34:45.484742
  
9530 / tcp
1911457608 | 2024-04-29T03:59:21.083983
  
9600 / tcp
-971970408 | 2024-05-26T19:40:27.707083
  
9633 / tcp
-1399940268 | 2024-05-21T08:40:58.745502
  
9704 / tcp
1492413928 | 2024-05-25T00:49:40.649713
  
9761 / tcp
660175493 | 2024-05-13T02:56:13.379400
  
9800 / tcp
2033888749 | 2024-05-09T11:33:39.510057
  
9869 / tcp
1127011450 | 2024-05-17T07:57:45.669424
  
9876 / tcp
248249138 | 2024-05-25T12:34:57.693168
  
9943 / tcp
-1461540015 | 2024-05-13T22:45:27.758111
  
9944 / tcp
-1839934832 | 2024-05-03T05:26:17.770146
  
9988 / tcp
1911457608 | 2024-05-24T22:46:23.831570
  
9993 / tcp
1637038794 | 2024-05-01T08:41:47.679644
  
9998 / tcp
1161309183 | 2024-05-22T14:18:46.119953
  
9999 / tcp
-138733098 | 2024-05-15T15:24:25.888517
  
10000 / tcp
1492413928 | 2024-05-22T19:34:56.224110
  
10001 / tcp
820958131 | 2024-05-22T05:59:58.363085
  
10134 / tcp
2087396567 | 2024-05-11T07:05:15.949773
  
10250 / tcp
2087396567 | 2024-05-24T23:37:58.854952
  
10443 / tcp
641705735 | 2024-05-17T12:04:26.672272
  
10554 / tcp
1991883981 | 2024-05-23T12:22:02.298320
  
10909 / tcp
-438503381 | 2024-05-27T00:55:50.042733
  
11000 / tcp
-339084706 | 2024-05-27T04:59:59.395493
  
11112 / tcp
119860953 | 2024-05-05T11:31:35.668745
  
11210 / tcp
-136006866 | 2024-05-17T20:02:06.804886
  
11211 / tcp
-891714208 | 2024-05-22T06:08:41.002138
  
11300 / tcp
142594048 | 2024-05-25T11:34:58.413192
  
12345 / tcp
-2089734047 | 2024-05-27T04:22:13.275305
  
14147 / tcp
-1399940268 | 2024-05-21T14:22:10.061575
  
14265 / tcp
-1399940268 | 2024-05-23T22:39:39.060075
  
14344 / tcp
114471724 | 2024-05-17T03:34:59.684477
  
16010 / tcp
1261582754 | 2024-05-19T01:21:08.424036
  
16030 / tcp
1741579575 | 2024-05-18T13:06:08.053142
  
16993 / tcp
-1810987450 | 2024-05-05T22:35:12.312470
  
17000 / tcp
1504401647 | 2024-05-24T22:31:20.266703
  
18081 / tcp
1911457608 | 2024-05-22T21:58:35.414588
  
18245 / tcp
-786044033 | 2024-05-01T20:42:43.363341
  
18553 / tcp
-1045760528 | 2024-05-25T17:21:00.590190
  
19000 / tcp
1900503736 | 2024-05-15T18:08:52.149897
  
20000 / tcp
459162008 | 2024-05-21T18:58:50.624994
  
20256 / tcp
597764502 | 2024-04-30T05:53:20.935461
  
20547 / tcp
-288825733 | 2024-05-17T12:20:18.353909
  
21025 / tcp
-1399940268 | 2024-05-25T05:42:39.224757
  
21379 / tcp
-358801646 | 2024-05-26T20:48:50.871868
  
22222 / tcp
-1681927087 | 2024-05-21T10:31:37.640322
  
23023 / tcp
-2081419599 | 2024-05-18T20:52:38.295049
  
23424 / tcp
-1730858130 | 2024-05-26T21:57:16.984608
  
25001 / tcp
-1316491703 | 2024-05-23T23:36:54.452805
  
25105 / tcp
-1428621233 | 2024-05-25T10:08:00.463199
  
25565 / tcp
-1713437100 | 2024-05-24T02:28:18.323543
  
28015 / tcp
2087396567 | 2024-05-23T20:20:59.022034
  
28080 / tcp
-1311598826 | 2024-05-20T23:28:35.629667
  
30002 / tcp
-1681927087 | 2024-05-11T01:26:03.775820
  
30003 / tcp
-1992519278 | 2024-05-27T07:52:11.307853
  
31337 / tcp
-546659243 | 2024-05-25T17:16:24.836300
  
32764 / tcp
-754988795 | 2024-05-18T02:49:08.886955
  
33060 / tcp
1519486042 | 2024-05-25T08:03:06.022005
  
35000 / tcp
1911457608 | 2024-05-25T00:17:26.460142
  
37777 / tcp
580340387 | 2024-05-11T06:37:13.417615
  
41800 / tcp
-433302150 | 2024-05-26T00:12:52.789303
  
44158 / tcp
1332894250 | 2024-05-17T23:50:09.146014
  
44818 / tcp
6730431 | 2024-05-21T12:27:06.748351
  
47990 / tcp
-315975075 | 2024-05-02T15:36:10.187691
  
49152 / tcp
-1453516345 | 2024-05-05T19:33:33.382834
  
49153 / tcp
2009276894 | 2024-05-24T14:32:58.130612
  
50000 / tcp
1984588611 | 2024-05-04T04:13:49.464496
  
50070 / tcp
-1681927087 | 2024-05-22T22:27:17.777113
  
50100 / tcp
1919228981 | 2024-05-21T04:53:28.528169
  
51235 / tcp
-1840324437 | 2024-05-22T11:39:57.042995
  
52869 / tcp
-1947777893 | 2024-05-27T12:53:50.982428
  
54138 / tcp
1624217396 | 2024-05-20T23:23:18.750807
  
55000 / tcp
233634112 | 2024-05-11T23:25:45.347195
  
55442 / tcp
1353260875 | 2024-04-29T17:35:38.789546
  
55443 / tcp
1082732927 | 2024-05-22T18:38:50.060587
  
55553 / tcp
474736340 | 2024-05-22T19:37:30.603203
  
55554 / tcp
178736976 | 2024-05-24T13:28:06.002725
  
60010 / tcp
660175493 | 2024-05-24T17:46:13.073724
  
60030 / tcp
-971970408 | 2024-05-21T16:54:27.768657
  
60129 / tcp
-136006866 | 2024-05-06T11:23:41.578038
  
61613 / tcp
-154616015 | 2024-05-14T07:30:59.497333
  
62078 / tcp
-1399940268 | 2024-05-02T19:49:54.602689
  
65522 / tcp



Contact Us

Shodan ® - All rights reserved