8.134.41.196

Regular View Raw Data
Last Seen: 2024-06-03

GeneralInformation

Hostnames cn-heyuan.oss.aliyuncs.com
Domains aliyuncs.com 
Cloud Provider Alibaba Cloud
Country China
City Guangzhou
Organization Aliyun Computing Co.LTD
ISP Hangzhou Alibaba Advertising Co.,Ltd.
ASN AS37963

WebTechnologies

JavaScript frameworks
JavaScript libraries

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2024-23897 7.5Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
CVE-2023-51767 OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
CVE-2023-51385 In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
CVE-2023-51384 In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.
CVE-2023-48795 The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
CVE-2023-38408 The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
CVE-2021-41617 4.4sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
CVE-2021-36368 2.6An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass, since nothing is being bypassed.
CVE-2020-15778 6.8scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
CVE-2020-14145 4.3The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
CVE-2019-6111 5.8An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
CVE-2019-6110 4.0In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
CVE-2019-6109 4.0An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
CVE-2019-16905 4.4OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
CVE-2018-20685 2.6In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
CVE-2018-15919 5.0Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
CVE-2018-15473 5.0OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
CVE-2017-15906 5.0The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
CVE-2016-20012 4.3OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
CVE-2008-3844 9.3Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
CVE-2007-2768 4.3OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.

OpenPorts

11131517192021232537434953707980818284858990102104110111113119122135143179195199221222225264311389427443444448449465502503515548554593631636666771772777789806843873902992993995102310251028109911531167117712001234131113371366138814331515152115991604166017231741180018011830188319111926196220002002200820102018202220302065206920702081208320862087209521212126215421812221222222592332234523762382240424552506254925532559256825722598262827092761276230013002305030513060306730753078308030843091309530993107311831193120326032683269330133063310338833893408341234433523354235503551356035663567356837803790379139223951395240004022404040634064410041574190424242824321436944334443445145004506464347864808484048484899491149495002500550065007500950105025507050805201522252695432543555605591559555965606560756725858590059065938598459866000600160026036608063086379644365036543658866506653666666676668669767487001701070717081717172187415743474437444747475487634797979998001800780098010802280358036804780608069807180808081808380858086808780898090809180978099810981238126813981408200823782498291833383348406840984148500855385548575864986888728877987848805880688158819882088248829883188348837884088418842885988608863886488768880888188878888888989698990900090019002900390089012901390189026903390359042904790519084908990919092909591009109915191609213921692179220929593069418944395309595960096339704976197659800994399449981999799989999100001000110134102501044310554109091091111000111121121011211113001200012345135791414714265143441601016030169921699318081182451900020000202562054721025213792302325001270152701728015280172808030002300033133732400327643306035000372153777741800441584481847990491524915350000500505007050100512355413855443555535555460010601296161662078
-1304843095 | 2024-05-24T02:55:49.090293
  
11 / tcp
-1770051369 | 2024-05-22T16:40:20.533078
  
13 / tcp
-792826324 | 2024-05-29T16:55:57.180116
  
15 / tcp
366084633 | 2024-06-02T21:26:48.806198
  
17 / tcp
-1760806421 | 2024-05-26T20:28:46.060634
  
19 / tcp
1504401647 | 2024-05-29T19:26:42.019402
  
20 / tcp
-731285715 | 2024-05-31T17:46:18.681974
  
21 / tcp
676675086 | 2024-05-27T09:00:19.845675
  
23 / tcp
1308377066 | 2024-05-29T10:11:01.116492
  
25 / tcp
1463575233 | 2024-05-16T18:46:20.893750
  
37 / tcp
2087396567 | 2024-05-15T13:59:27.157127
  
43 / tcp
1160472910 | 2024-06-01T15:14:23.844311
  
49 / tcp
1252359125 | 2024-05-31T10:17:32.802441
  
53 / tcp
1738069263 | 2024-06-02T22:43:11.670952
  
70 / tcp
-1846450790 | 2024-06-02T01:01:09.006169
  
79 / tcp
-1339650014 | 2024-06-01T01:55:34.430201
  
80 / tcp
808560482 | 2024-06-02T04:42:12.519556
  
81 / tcp
751496153 | 2024-05-12T07:18:42.515504
  
82 / tcp
-119996482 | 2024-06-02T07:08:46.683135
  
84 / tcp
-1279886438 | 2024-05-24T00:28:23.566075
  
85 / tcp
1620329124 | 2024-05-19T23:26:17.925004
  
89 / tcp
819727972 | 2024-05-15T13:01:44.980621
  
90 / tcp
819727972 | 2024-05-18T12:22:28.837898
  
102 / tcp
-1399940268 | 2024-06-01T12:11:40.371388
  
104 / tcp
1911457608 | 2024-06-02T19:07:06.696076
  
110 / tcp
2087396567 | 2024-05-30T21:28:44.820741
  
111 / tcp
-1678345660 | 2024-05-09T23:25:02.774095
  
113 / tcp
-1958992631 | 2024-05-27T18:55:11.413649
  
119 / tcp
51259122 | 2024-05-11T10:08:30.182569
  
122 / tcp
1302177452 | 2024-05-20T13:21:03.585124
  
135 / tcp
-1939513550 | 2024-06-02T05:27:10.028841
  
143 / tcp
-399606100 | 2024-05-31T08:17:22.217354
  
179 / tcp
-321444299 | 2024-05-11T05:41:20.887698
  
195 / tcp
639175818 | 2024-05-16T04:21:35.161859
  
199 / tcp
1308377066 | 2024-05-25T07:38:08.710487
  
221 / tcp
426649460 | 2024-05-18T17:38:45.116572
  
222 / tcp
599074451 | 2024-05-31T10:04:44.270774
  
225 / tcp
-1547821026 | 2024-05-14T21:11:17.637756
  
264 / tcp
-1547976805 | 2024-05-12T07:55:38.014620
  
311 / tcp
811247330 | 2024-05-25T14:11:10.166098
  
389 / tcp
1530390632 | 2024-05-21T17:40:14.523915
  
427 / tcp
-1037553719 | 2024-05-25T06:47:54.496580
  
443 / tcp
1690634669 | 2024-06-01T23:31:15.154592
  
444 / tcp
-2089734047 | 2024-05-17T02:56:33.023717
  
448 / tcp
165188539 | 2024-05-09T20:30:21.666034
  
449 / tcp
897328069 | 2024-05-29T14:41:37.491543
  
465 / tcp
1492413928 | 2024-06-01T09:04:34.674812
  
502 / tcp
-1399940268 | 2024-05-30T17:00:14.380970
  
503 / tcp
-1231966337 | 2024-06-01T07:09:29.001365
  
515 / tcp
155249582 | 2024-05-22T03:04:59.546475
  
548 / tcp
448214121 | 2024-05-23T08:46:16.314829
  
554 / tcp
1308377066 | 2024-05-31T11:38:25.171739
  
593 / tcp
233634112 | 2024-05-06T12:24:25.598648
  
631 / tcp
4146400 | 2024-05-26T07:03:05.025483
  
636 / tcp
1300162323 | 2024-05-17T23:30:02.873478
  
666 / tcp
-1399940268 | 2024-05-31T10:05:41.416092
  
771 / tcp
-1114821551 | 2024-05-16T14:54:48.486367
  
772 / tcp
-163829257 | 2024-05-29T05:50:48.893900
  
777 / tcp
45131230 | 2024-05-19T12:16:43.218564
  
789 / tcp
-585940771 | 2024-05-28T13:36:42.962058
  
806 / tcp
-2004989248 | 2024-05-21T16:05:29.883741
  
843 / tcp
-1598265216 | 2024-05-26T17:36:54.149073
  
873 / tcp
1956828827 | 2024-05-23T19:30:57.986387
  
902 / tcp
-936692830 | 2024-05-20T21:26:00.074907
  
992 / tcp
-2089734047 | 2024-06-02T14:42:58.283294
  
993 / tcp
-1489591880 | 2024-05-26T17:54:24.451802
  
995 / tcp
-1839934832 | 2024-05-27T05:43:10.387275
  
1023 / tcp
-1730858130 | 2024-05-22T22:07:59.476393
  
1025 / tcp
-1399940268 | 2024-05-09T07:14:48.993440
  
1028 / tcp
1615193817 | 2024-05-14T12:48:10.404547
  
1099 / tcp
-1996280214 | 2024-05-18T18:42:58.457760
  
1153 / tcp
-303199180 | 2024-05-07T08:34:47.247261
  
1167 / tcp
1794594071 | 2024-05-26T07:52:28.189080
  
1177 / tcp
-826610984 | 2024-06-01T07:37:03.162031
  
1200 / tcp
819727972 | 2024-05-30T08:17:09.322966
  
1234 / tcp
1375509841 | 2024-06-03T03:47:51.524880
  
1311 / tcp
1741579575 | 2024-06-02T05:06:44.723873
  
1337 / tcp
-1699556818 | 2024-05-20T19:44:55.942391
  
1366 / tcp
819727972 | 2024-05-31T06:54:29.229994
  
1388 / tcp
-1279739995 | 2024-05-26T10:02:53.473372
  
1433 / tcp
1978059005 | 2024-06-02T08:35:11.301969
  
1515 / tcp
-186520940 | 2024-06-02T19:43:03.160350
  
1521 / tcp
-375604792 | 2024-05-25T05:51:33.426012
  
1599 / tcp
-971970408 | 2024-06-01T08:43:22.918289
  
1604 / tcp
51259122 | 2024-05-28T01:25:54.992045
  
1660 / tcp
1103582599 | 2024-05-26T17:04:05.109583
  
1723 / tcp
290819026 | 2024-05-29T14:41:54.352546
  
1741 / tcp
-585940771 | 2024-05-30T19:10:58.147467
  
1800 / tcp
1692069329 | 2024-06-02T22:50:58.115817
  
1801 / tcp
-438503381 | 2024-05-28T07:51:58.411109
  
1830 / tcp
957278843 | 2024-05-20T09:10:38.797413
  
1883 / tcp
1911457608 | 2024-05-24T20:44:34.581884
  
1911 / tcp
2087396567 | 2024-05-29T07:32:08.561976
  
1926 / tcp
307999478 | 2024-05-22T05:41:26.910132
  
1962 / tcp
1396488228 | 2024-05-31T01:33:34.008618
  
2000 / tcp
546151771 | 2024-06-02T23:10:58.502530
  
2002 / tcp
-1453516345 | 2024-05-25T18:10:35.889229
  
2008 / tcp
745343730 | 2024-05-21T18:40:05.059129
  
2010 / tcp
945910976 | 2024-05-27T08:52:48.560553
  
2018 / tcp
819727972 | 2024-05-05T05:36:00.070216
  
2022 / tcp
372433470 | 2024-05-14T09:22:50.344146
  
2030 / tcp
-42767839 | 2024-05-08T10:06:52.214928
  
2065 / tcp
1011407350 | 2024-05-17T10:22:17.509420
  
2069 / tcp
-2031152423 | 2024-05-24T10:22:17.258648
  
2070 / tcp
-2089734047 | 2024-05-14T19:45:38.222507
  
2081 / tcp
-653033013 | 2024-05-21T01:57:00.399636
  
2083 / tcp
-1729629024 | 2024-05-21T23:03:10.536397
  
2086 / tcp
1778988322 | 2024-06-01T21:32:25.658048
  
2087 / tcp
709622286 | 2024-05-09T00:51:05.477846
  
2095 / tcp
2047379038 | 2024-06-02T12:15:15.610896
  
2121 / tcp
2115448635 | 2024-05-29T02:07:26.469863
  
2126 / tcp
119860953 | 2024-05-13T03:31:39.208896
  
2154 / tcp
546151771 | 2024-05-26T08:45:43.627298
  
2181 / tcp
-1036370807 | 2024-05-23T16:32:45.110175
  
2221 / tcp
372433470 | 2024-05-27T14:14:03.158023
  
2222 / tcp
921225407 | 2024-05-18T13:10:41.281161
  
2259 / tcp
1887224352 | 2024-05-26T09:53:27.119815
  
2332 / tcp
1126993057 | 2024-05-26T14:51:13.673596
  
2345 / tcp
-971970408 | 2024-05-10T02:04:07.049863
  
2376 / tcp
1911457608 | 2024-05-19T08:45:52.849549
  
2382 / tcp
1278527606 | 2024-05-30T12:07:47.153793
  
2404 / tcp
-971970408 | 2024-06-03T00:59:45.272588
  
2455 / tcp
-2089734047 | 2024-05-09T18:37:33.772825
  
2506 / tcp
1911457608 | 2024-05-07T08:31:53.234096
  
2549 / tcp
-1399940268 | 2024-05-11T23:12:45.299592
  
2553 / tcp
1308377066 | 2024-05-29T22:23:58.277321
  
2559 / tcp
1642597142 | 2024-05-04T18:18:40.561539
  
2568 / tcp
1492413928 | 2024-05-21T04:22:27.288465
  
2572 / tcp
-2096652808 | 2024-05-05T20:22:26.754169
  
2598 / tcp
819727972 | 2024-05-18T18:59:18.082828
  
2628 / tcp
1189133115 | 2024-05-17T06:44:34.535581
  
2709 / tcp
205347087 | 2024-05-30T02:40:07.705782
  
2761 / tcp
-1261090339 | 2024-06-02T04:30:47.968401
  
2762 / tcp
2087396567 | 2024-06-02T10:36:42.427845
  
3001 / tcp
921225407 | 2024-05-16T23:56:51.018041
  
3002 / tcp
-1746074029 | 2024-06-02T21:12:05.614563
  
3050 / tcp
1370263973 | 2024-05-26T07:16:01.434720
  
3051 / tcp
320677201 | 2024-05-21T14:56:55.879616
  
3060 / tcp
119860953 | 2024-05-28T04:59:30.233340
  
3067 / tcp
398077695 | 2024-05-28T17:26:34.221138
  
3075 / tcp
819727972 | 2024-05-20T11:20:15.306676
  
3078 / tcp
-142686627 | 2024-05-15T18:29:32.554522
  
3080 / tcp
-2046514463 | 2024-05-04T12:01:33.477622
  
3084 / tcp
819727972 | 2024-05-11T20:43:01.863989
  
3091 / tcp
819727972 | 2024-05-24T17:15:29.949056
  
3095 / tcp
-146605374 | 2024-05-28T09:20:48.117652
  
3099 / tcp
819727972 | 2024-06-01T15:35:31.148365
  
3107 / tcp
921225407 | 2024-05-21T06:52:08.923119
  
3118 / tcp
-1399940268 | 2024-05-19T14:37:31.476279
  
3119 / tcp
-1297953727 | 2024-05-14T07:57:23.822560
  
3120 / tcp
1655023012 | 2024-05-08T05:14:12.934507
  
3260 / tcp
-1547976805 | 2024-05-19T01:28:24.081814
  
3268 / tcp
-1399940268 | 2024-05-28T21:02:04.387173
  
3269 / tcp
-375604792 | 2024-05-25T00:14:45.390298
  
3301 / tcp
-1230509234 | 2024-05-24T10:45:27.303569
  
3306 / tcp
-1810987450 | 2024-05-29T13:50:59.749751
  
3310 / tcp
165188539 | 2024-05-28T02:56:47.673263
  
3388 / tcp
1131713579 | 2024-05-31T20:20:49.581446
  
3389 / tcp
307999478 | 2024-05-31T21:08:10.399049
  
3408 / tcp
-1230049476 | 2024-05-10T10:57:25.356847
  
3412 / tcp
-653033013 | 2024-05-11T13:25:10.676858
  
3443 / tcp
1208318993 | 2024-05-27T00:04:23.606438
  
3523 / tcp
-2118655245 | 2024-05-11T18:18:58.026643
  
3542 / tcp
819727972 | 2024-05-13T10:53:19.938872
  
3550 / tcp
198844676 | 2024-05-29T04:47:14.894291
  
3551 / tcp
-1399940268 | 2024-06-02T01:41:29.625526
  
3560 / tcp
-1477838366 | 2024-06-02T08:11:06.513390
  
3566 / tcp
-1399940268 | 2024-05-24T23:23:48.560933
  
3567 / tcp
1911457608 | 2024-05-06T13:38:52.012722
  
3568 / tcp
671605376 | 2024-05-26T15:31:14.214175
  
3780 / tcp
819727972 | 2024-05-13T04:00:07.571627
  
3790 / tcp
-1399940268 | 2024-05-10T11:17:09.089645
  
3791 / tcp
819727972 | 2024-05-05T15:22:12.696801
  
3922 / tcp
-1399940268 | 2024-05-29T01:57:16.477630
  
3951 / tcp
1911457608 | 2024-05-15T07:43:41.230808
  
3952 / tcp
-1101712668 | 2024-05-27T23:50:39.762764
  
4000 / tcp
-2096652808 | 2024-05-07T02:25:38.475656
  
4022 / tcp
550048729 | 2024-05-23T05:16:33.156674
  
4040 / tcp
165188539 | 2024-06-03T02:08:18.634920
  
4063 / tcp
819727972 | 2024-05-28T15:48:31.155898
  
4064 / tcp
51259122 | 2024-05-11T23:35:23.259409
  
4100 / tcp
89282912 | 2024-05-31T08:12:59.345072
  
4157 / tcp
493955023 | 2024-05-29T05:43:24.700304
  
4190 / tcp
-1914158197 | 2024-05-28T10:34:37.333060
  
4242 / tcp
819727972 | 2024-05-30T23:42:20.153266
  
4282 / tcp
-1250504565 | 2024-05-21T01:44:48.659024
  
4321 / tcp
819727972 | 2024-05-17T18:33:08.659759
  
4369 / tcp
996960436 | 2024-06-02T14:36:51.205999
  
4433 / tcp
594761768 | 2024-05-05T05:38:33.465762
  
4443 / tcp
996960436 | 2024-05-16T10:30:56.166244
  
4451 / tcp
-1399940268 | 2024-06-02T21:40:44.704090
  
4500 / tcp
2087396567 | 2024-05-13T21:03:00.094246
  
4506 / tcp
820958131 | 2024-05-05T19:47:54.642640
  
4643 / tcp
-1888448627 | 2024-05-29T07:34:38.427767
  
4786 / tcp
-2096652808 | 2024-05-17T20:52:21.498843
  
4808 / tcp
-1399940268 | 2024-06-01T23:02:16.422586
  
4840 / tcp
-138733098 | 2024-05-26T05:32:57.319427
  
4848 / tcp
-971970408 | 2024-06-02T20:38:55.094959
  
4899 / tcp
321971019 | 2024-05-29T00:29:32.126049
  
4911 / tcp
2087396567 | 2024-06-01T07:22:46.165609
  
4949 / tcp
-1947777893 | 2024-05-09T23:04:45.364767
  
5002 / tcp
-1142844482 | 2024-06-02T11:10:46.010288
  
5005 / tcp
-2017887953 | 2024-06-02T16:24:19.620635
  
5006 / tcp
1632932802 | 2024-05-14T05:31:00.539337
  
5007 / tcp
-1338936697 | 2024-05-31T11:47:37.342228
  
5009 / tcp
-1428621233 | 2024-05-31T10:14:10.163962
  
5010 / tcp
539065883 | 2024-06-01T07:11:24.472732
  
5025 / tcp
1911457608 | 2024-05-31T14:04:44.308523
  
5070 / tcp
1943147786 | 2024-05-10T19:42:42.422302
  
5080 / tcp
-438503381 | 2024-05-20T20:15:48.966045
  
5201 / tcp
1321679546 | 2024-06-02T05:32:39.983354
  
5222 / tcp
-1074907534 | 2024-05-22T21:12:27.813057
  
5269 / tcp
1189133115 | 2024-05-31T17:34:29.704328
  
5432 / tcp
165188539 | 2024-05-29T02:24:31.394847
  
5435 / tcp
-409020351 | 2024-05-15T18:47:43.781181
  
5560 / tcp
-2096652808 | 2024-05-27T04:22:45.348753
  
5591 / tcp
1911457608 | 2024-05-15T04:11:40.288290
  
5595 / tcp
-1399940268 | 2024-05-11T07:52:29.964674
  
5596 / tcp
-1746074029 | 2024-05-29T22:57:39.494537
  
5606 / tcp
1911457608 | 2024-05-20T18:40:35.219756
  
5607 / tcp
575925250 | 2024-06-01T10:04:37.970542
  
5672 / tcp
-971970408 | 2024-05-29T01:33:43.881242
  
5858 / tcp
-42767839 | 2024-05-20T16:15:24.928671
  
5900 / tcp
-1249500036 | 2024-05-09T15:47:03.798883
  
5906 / tcp
-1399940268 | 2024-05-16T14:11:21.233908
  
5938 / tcp
1999272906 | 2024-05-22T17:05:56.891538
  
5984 / tcp
546151771 | 2024-05-31T03:09:46.681189
  
5986 / tcp
120534451 | 2024-05-31T18:56:40.187681
  
6000 / tcp
1948301213 | 2024-05-31T01:04:36.782925
  
6001 / tcp
128380719 | 2024-05-30T07:21:29.991340
  
6002 / tcp
1919228981 | 2024-05-19T12:01:39.045879
  
6036 / tcp
2067064333 | 2024-05-27T06:46:28.564809
  
6080 / tcp
632542934 | 2024-05-31T05:25:22.275013
  
6308 / tcp
1813977069 | 2024-05-18T01:03:14.792054
  
6379 / tcp
-641479109 | 2024-05-30T22:34:09.998538
  
6443 / tcp
1989907056 | 2024-05-09T08:02:31.367645
  
6503 / tcp
-193136767 | 2024-05-06T03:22:26.240162
  
6543 / tcp
-1114821551 | 2024-05-11T22:29:40.631733
  
6588 / tcp
-1399940268 | 2024-05-25T08:16:49.312510
  
6650 / tcp
1911457608 | 2024-05-19T13:52:25.154852
  
6653 / tcp
4935895 | 2024-06-02T13:09:28.674209
  
6666 / tcp
2087396567 | 2024-05-30T11:12:13.556660
  
6667 / tcp
-2089734047 | 2024-05-29T21:06:03.954622
  
6668 / tcp
-1248408558 | 2024-05-19T00:48:40.964230
  
6697 / tcp
1911457608 | 2024-05-31T01:26:02.676838
  
6748 / tcp
-829704895 | 2024-05-30T21:45:12.814000
  
7001 / tcp
819727972 | 2024-06-02T09:39:32.982850
  
7010 / tcp
-1681927087 | 2024-05-18T03:07:17.581151
  
7071 / tcp
-1399940268 | 2024-05-12T04:58:10.377817
  
7081 / tcp
-2096652808 | 2024-05-18T09:53:33.084118
  
7171 / tcp
1070373525 | 2024-05-25T10:24:59.963497
  
7218 / tcp
-1428621233 | 2024-06-01T22:37:54.479090
  
7415 / tcp
-971970408 | 2024-05-31T18:16:07.766705
  
7434 / tcp
1612309769 | 2024-05-30T13:20:49.458632
  
7443 / tcp
1208318993 | 2024-05-07T22:06:04.643414
  
7444 / tcp
-2118655245 | 2024-05-19T15:30:53.036635
  
7474 / tcp
-971970408 | 2024-05-30T16:00:33.468200
  
7548 / tcp
2087396567 | 2024-05-30T14:34:27.379017
  
7634 / tcp
-2089734047 | 2024-05-11T22:24:10.155828
  
7979 / tcp
-1259524839 | 2024-05-12T22:35:50.455569
  
7999 / tcp
1072892569 | 2024-05-11T19:15:22.490763
  
8001 / tcp
-445955279 | 2024-05-26T16:21:46.780651
  
8007 / tcp
-1641514916 | 2024-06-02T18:18:09.742239
  
8009 / tcp
2033888749 | 2024-05-15T03:51:22.620705
  
8010 / tcp
819727972 | 2024-05-29T21:37:11.967585
  
8022 / tcp
-903067560 | 2024-05-21T12:21:18.188761
  
8035 / tcp
-1888448627 | 2024-05-28T12:47:04.020343
  
8036 / tcp
205347087 | 2024-05-17T20:43:33.529165
  
8047 / tcp
1261582754 | 2024-05-31T16:14:45.608843
  
8060 / tcp
104385780 | 2024-05-24T20:22:11.065808
  
8069 / tcp
1911457608 | 2024-06-02T13:51:56.630979
  
8071 / tcp
-2049694699 | 2024-05-29T21:13:59.868577
  
8080 / tcp
62061918 | 2024-05-28T02:06:51.239020
  
8081 / tcp
-1248408558 | 2024-06-01T11:11:08.271102
  
8083 / tcp
-1114821551 | 2024-05-28T15:07:33.713590
  
8085 / tcp
751496153 | 2024-05-15T11:16:22.878105
  
8086 / tcp
-2140303521 | 2024-06-02T21:47:04.225465
  
8087 / tcp
-1032713145 | 2024-06-03T05:43:55.915302
  
8089 / tcp
660175493 | 2024-05-11T09:22:33.030670
  
8090 / tcp
-1839934832 | 2024-05-31T21:00:12.392069
  
8091 / tcp
1189133115 | 2024-05-22T04:38:38.622107
  
8097 / tcp
438715403 | 2024-05-27T11:06:44.835342
  
8099 / tcp
-1327660293 | 2024-05-08T23:30:39.340083
  
8109 / tcp
550048729 | 2024-05-26T21:35:44.951965
  
8123 / tcp
2087396567 | 2024-05-30T11:09:54.272989
  
8126 / tcp
-786044033 | 2024-05-15T23:59:13.327041
  
8139 / tcp
2087396567 | 2024-05-29T04:00:53.420552
  
8140 / tcp
1320285193 | 2024-05-31T02:38:43.973458
  
8200 / tcp
-2089734047 | 2024-06-01T06:57:45.948257
  
8237 / tcp
-2089734047 | 2024-05-11T01:48:48.853380
  
8249 / tcp
707919486 | 2024-05-27T01:45:43.372446
  
8291 / tcp
-1729028106 | 2024-05-27T04:52:30.909100
  
8333 / tcp
-1729629024 | 2024-06-02T11:16:24.500993
  
8334 / tcp
669849225 | 2024-05-08T13:54:02.650867
  
8406 / tcp
-2031152423 | 2024-05-16T22:49:51.270392
  
8409 / tcp
-1399940268 | 2024-05-20T06:59:02.138005
  
8414 / tcp
1529351907 | 2024-05-15T22:31:12.368173
  
8500 / tcp
-1810987450 | 2024-05-24T16:18:01.043608
  
8553 / tcp
1220320909 | 2024-06-01T06:55:54.296476
  
8554 / tcp
1492413928 | 2024-05-24T02:17:37.843073
  
8575 / tcp
842535728 | 2024-05-30T21:58:34.333520
  
8649 / tcp
1011407350 | 2024-05-20T15:01:34.526126
  
8688 / tcp
1911457608 | 2024-05-06T07:07:03.239626
  
8728 / tcp
-1327660293 | 2024-05-16T05:13:38.717664
  
8779 / tcp
-1730858130 | 2024-05-15T14:01:53.562549
  
8784 / tcp
-249504111 | 2024-05-30T00:56:16.382932
  
8805 / tcp
493955023 | 2024-06-03T06:25:43.665721
  
8806 / tcp
-1399940268 | 2024-05-14T00:27:11.915214
  
8815 / tcp
-1399940268 | 2024-06-01T01:00:39.732001
  
8819 / tcp
-1327660293 | 2024-05-25T07:53:42.772650
  
8820 / tcp
321971019 | 2024-05-16T20:35:10.596347
  
8824 / tcp
-1399940268 | 2024-05-08T07:33:17.542929
  
8829 / tcp
51259122 | 2024-06-01T23:04:59.115365
  
8831 / tcp
-1795027372 | 2024-06-02T08:04:51.972882
  
8834 / tcp
-1538260461 | 2024-05-11T22:39:30.735372
  
8837 / tcp
-1730858130 | 2024-05-25T23:15:17.832329
  
8840 / tcp
-1399940268 | 2024-05-28T22:06:35.199536
  
8841 / tcp
-2089734047 | 2024-05-08T03:50:57.470879
  
8842 / tcp
-136006866 | 2024-05-24T07:42:33.699003
  
8859 / tcp
-1399940268 | 2024-05-14T06:20:55.465785
  
8860 / tcp
1161309183 | 2024-05-22T21:58:44.882476
  
8863 / tcp
-142686627 | 2024-05-23T03:07:21.104562
  
8864 / tcp
-1032713145 | 2024-05-22T19:50:36.616550
  
8876 / tcp
-971970408 | 2024-05-28T07:00:53.894464
  
8880 / tcp
632542934 | 2024-05-10T08:25:31.810455
  
8881 / tcp
819727972 | 2024-05-04T18:54:44.877177
  
8887 / tcp
250824264 | 2024-05-11T12:59:05.795046
  
8888 / tcp
1741579575 | 2024-05-24T05:15:21.438331
  
8889 / tcp
-1699556818 | 2024-05-16T23:22:37.863604
  
8969 / tcp
-1839934832 | 2024-05-25T04:37:55.398528
  
8990 / tcp
1966849516 | 2024-06-01T15:11:38.287591
  
9000 / tcp
-1026951088 | 2024-05-16T16:24:03.017181
  
9001 / tcp
-1872120160 | 2024-05-30T11:23:36.238614
  
9002 / tcp
1911457608 | 2024-05-21T03:36:20.863886
  
9003 / tcp
-1399940268 | 2024-05-22T04:50:40.583040
  
9008 / tcp
165188539 | 2024-05-14T20:20:29.005705
  
9012 / tcp
410249975 | 2024-05-13T06:42:51.512966
  
9013 / tcp
-904840257 | 2024-05-16T08:32:54.201391
  
9018 / tcp
1189133115 | 2024-05-20T00:39:02.614305
  
9026 / tcp
-1327660293 | 2024-05-31T05:23:32.074018
  
9033 / tcp
1975288991 | 2024-05-26T01:53:34.239597
  
9035 / tcp
2087396567 | 2024-05-21T03:43:31.880500
  
9042 / tcp
-904840257 | 2024-05-08T07:23:03.492987
  
9047 / tcp
1308377066 | 2024-05-26T14:52:07.190375
  
9051 / tcp
-653033013 | 2024-05-13T07:26:00.083061
  
9084 / tcp
819727972 | 2024-05-10T16:38:38.917941
  
9089 / tcp
171352214 | 2024-05-27T13:13:53.463760
  
9091 / tcp
-1399940268 | 2024-05-13T20:56:58.073263
  
9092 / tcp
1011407350 | 2024-05-29T02:38:48.132267
  
9095 / tcp
1282941221 | 2024-05-21T23:45:14.656715
  
9100 / tcp
-1399940268 | 2024-05-17T02:49:17.926147
  
9109 / tcp
1690634669 | 2024-05-18T15:36:48.571852
  
9151 / tcp
-146605374 | 2024-05-21T12:35:45.181360
  
9160 / tcp
398077695 | 2024-05-16T13:19:29.491587
  
9213 / tcp
-1399940268 | 2024-05-25T01:13:10.868401
  
9216 / tcp
819727972 | 2024-05-17T23:57:53.433685
  
9217 / tcp
1911457608 | 2024-05-28T22:52:13.947943
  
9220 / tcp
641705735 | 2024-05-25T18:18:11.663018
  
9295 / tcp
632542934 | 2024-05-24T10:20:06.892302
  
9306 / tcp
1004056929 | 2024-05-31T10:22:28.565618
  
9418 / tcp
660175493 | 2024-05-31T16:34:27.814555
  
9443 / tcp
165188539 | 2024-05-29T03:54:05.767963
  
9530 / tcp
550048729 | 2024-06-02T13:50:29.817375
  
9595 / tcp
1911457608 | 2024-05-31T07:11:10.170730
  
9600 / tcp
-1316398834 | 2024-05-26T04:14:28.043799
  
9633 / tcp
-1399940268 | 2024-05-12T21:11:23.147726
  
9704 / tcp
-441419608 | 2024-05-25T23:27:24.156464
  
9761 / tcp
165188539 | 2024-05-24T23:44:30.792950
  
9765 / tcp
1072892569 | 2024-05-15T13:46:29.046701
  
9800 / tcp
56005235 | 2024-05-24T21:46:35.395777
  
9943 / tcp
1286504516 | 2024-06-01T08:03:35.301798
  
9944 / tcp
2139670385 | 2024-05-31T07:48:04.037246
  
9981 / tcp
-1713437100 | 2024-05-30T06:35:20.517235
  
9997 / tcp
-1223770960 | 2024-06-02T05:45:40.795758
  
9998 / tcp
1161309183 | 2024-06-01T18:15:02.779916
  
9999 / tcp
1690634669 | 2024-05-31T16:37:22.011986
  
10000 / tcp
1492413928 | 2024-05-31T12:06:01.079168
  
10001 / tcp
819727972 | 2024-05-21T08:10:38.469747
  
10134 / tcp
2087396567 | 2024-05-28T21:14:17.504321
  
10250 / tcp
-747911285 | 2024-05-30T23:02:05.296074
  
10443 / tcp
104385780 | 2024-05-29T08:24:30.868982
  
10554 / tcp
1208318993 | 2024-05-25T03:25:45.765672
  
10909 / tcp
-1888448627 | 2024-05-09T09:09:58.667889
  
10911 / tcp
-1746074029 | 2024-05-27T05:01:36.005655
  
11000 / tcp
-1399940268 | 2024-05-25T04:32:35.719924
  
11112 / tcp
-136006866 | 2024-05-12T01:31:55.649814
  
11210 / tcp
-136006866 | 2024-05-31T02:09:08.545901
  
11211 / tcp
165188539 | 2024-05-11T06:04:41.183981
  
11300 / tcp
1645071342 | 2024-05-27T00:53:51.125808
  
12000 / tcp
265065882 | 2024-06-02T04:09:19.362143
  
12345 / tcp
201984321 | 2024-05-20T16:11:32.381237
  
13579 / tcp
-2089734047 | 2024-05-30T22:25:57.834264
  
14147 / tcp
-1399940268 | 2024-06-02T02:28:14.074805
  
14265 / tcp
-2096652808 | 2024-06-01T01:50:03.276483
  
14344 / tcp
-1344535834 | 2024-05-20T03:18:49.606533
  
16010 / tcp
104385780 | 2024-05-16T03:22:12.018168
  
16030 / tcp
-1840324437 | 2024-05-24T16:18:20.848547
  
16992 / tcp
1282941221 | 2024-05-26T22:58:10.988866
  
16993 / tcp
-1148066627 | 2024-05-28T00:06:43.580006
  
18081 / tcp
-1399940268 | 2024-06-01T00:37:02.200833
  
18245 / tcp
-2089734047 | 2024-06-01T02:17:42.688760
  
19000 / tcp
1900503736 | 2024-05-08T19:30:19.047398
  
20000 / tcp
1632932802 | 2024-05-10T05:22:51.902258
  
20256 / tcp
-142686627 | 2024-05-31T07:07:06.199974
  
20547 / tcp
-1142844482 | 2024-05-29T17:57:42.001181
  
21025 / tcp
-1279886438 | 2024-06-02T21:12:10.669323
  
21379 / tcp
1632932802 | 2024-05-24T01:14:26.173192
  
23023 / tcp
-345718689 | 2024-05-27T05:58:44.242934
  
25001 / tcp
-1588385920 | 2024-05-21T21:27:15.612642
  
27015 / tcp
1763259671 | 2024-05-30T16:09:16.463728
  
27017 / tcp
-2089734047 | 2024-05-23T07:52:59.416721
  
28015 / tcp
1778988322 | 2024-05-19T10:58:29.809196
  
28017 / tcp
-407828767 | 2024-05-23T20:25:02.333956
  
28080 / tcp
1308377066 | 2024-06-02T05:10:35.037519
  
30002 / tcp
-1681927087 | 2024-05-30T21:03:43.551855
  
30003 / tcp
-2133761335 | 2024-05-27T13:32:28.238451
  
31337 / tcp
770016595 | 2024-05-10T21:18:25.191097
  
32400 / tcp
-1810987450 | 2024-05-31T21:15:10.455386
  
32764 / tcp
104385780 | 2024-05-20T19:20:46.923102
  
33060 / tcp
-1399940268 | 2024-05-31T23:37:45.577876
  
35000 / tcp
-2118655245 | 2024-05-22T02:55:17.723945
  
37215 / tcp
1911457608 | 2024-05-27T06:20:03.828277
  
37777 / tcp
-441419608 | 2024-05-23T03:26:17.705738
  
41800 / tcp
-433302150 | 2024-05-31T10:30:05.546949
  
44158 / tcp
-1399940268 | 2024-06-03T03:59:05.435786
  
44818 / tcp
-1810987450 | 2024-05-29T07:09:16.476340
  
47990 / tcp
1758994290 | 2024-05-17T07:01:20.978927
  
49152 / tcp
1865391109 | 2024-05-30T15:05:15.284819
  
49153 / tcp
171352214 | 2024-05-31T20:21:00.054354
  
50000 / tcp
291723434 | 2024-05-26T09:51:50.164964
  
50050 / tcp
2033888749 | 2024-05-26T03:22:52.799304
  
50070 / tcp
819727972 | 2024-06-03T05:48:31.047669
  
50100 / tcp
1911457608 | 2024-06-03T06:00:01.316258
  
51235 / tcp
-1746074029 | 2024-06-01T10:27:06.134750
  
54138 / tcp
-1839934832 | 2024-06-02T18:04:34.039297
  
55443 / tcp
1282941221 | 2024-05-26T22:41:05.722168
  
55553 / tcp
-971970408 | 2024-06-03T06:29:50.373389
  
55554 / tcp
-2118655245 | 2024-05-22T19:31:17.830065
  
60010 / tcp
1082732927 | 2024-05-31T09:28:34.538032
  
60129 / tcp
819727972 | 2024-05-31T04:57:01.851954
  
61616 / tcp
-1113435755 | 2024-05-20T18:37:20.208821
  
62078 / tcp



Contact Us

Shodan ® - All rights reserved