92.44.44.170

Regular View Raw Data
Last Seen: 2024-05-27

GeneralInformation

Hostnames host-92-44-44-170.reverse.superonline.net
istanbul.tsevimli.xyz
Domains superonline.net tsevimli.xyz 
Country Turkey
City Ataşehir
Organization Superonline Iletisim Hizmetleri A.S.
ISP Superonline Iletisim Hizmetleri A.S.
ASN AS34984

WebTechnologies

Development
JavaScript frameworks
Programming languages

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

CVE-2022-41556 A resource leak in gw_backend.c in lighttpd 1.4.56 through 1.4.66 could lead to a denial of service (connection-slot exhaustion) after a large amount of anomalous TCP behavior by clients. It is related to RDHUP mishandling in certain HTTP/1.1 chunked situations. Use of mod_fastcgi is, for example, affected. This is fixed in 1.4.67.
CVE-2022-22707 4.3In lighttpd 1.4.46 through 1.4.63, the mod_extforward_Forwarded function of the mod_extforward plugin has a stack-based buffer overflow (4 bytes representing -1), as demonstrated by remote denial of service (daemon crash) in a non-default configuration. The non-default configuration requires handling of the Forwarded header in a somewhat unusual manner. Also, a 32-bit system is much more likely to be affected than a 64-bit system.
1507458929 | 2024-05-26T08:09:45.690554
  
53 / tcp
1507458929 | 2024-05-23T13:30:55.072605
  
53 / udp
-2032178354 | 2024-04-30T06:43:29.051890
  
80 / tcp
541745962 | 2024-05-24T11:04:41.403104
  
81 / tcp
2064315042 | 2024-04-29T21:53:11.354106
  
83 / tcp
-1188773197 | 2024-04-29T11:28:38.978473
  
104 / tcp
-1241509918 | 2024-04-29T10:51:02.524859
  
111 / tcp
-931764150 | 2024-04-30T00:00:56.524641
  
143 / tcp
1533804123 | 2024-04-30T07:05:52.023958
  
175 / tcp
1326801314 | 2024-05-27T10:41:45.996741
  
443 / tcp
-1659693401 | 2024-04-30T08:36:57.191295
  
444 / tcp
916138547 | 2024-04-29T11:43:52.508480
  
593 / tcp
523623438 | 2024-04-29T15:27:25.439367
  
873 / tcp
-1358865409 | 2024-04-29T15:00:43.925540
  
1433 / tcp
592578113 | 2024-04-29T22:59:18.794567
  
1604 / tcp
-892801213 | 2024-04-30T05:10:30.616082
  
2000 / tcp
1875237721 | 2024-04-29T12:57:52.502920
  
2059 / tcp
1198219077 | 2024-04-30T02:04:28.516262
  
2087 / tcp
2037583408 | 2024-04-29T20:50:21.715374
  
2222 / tcp
-1297397476 | 2024-04-30T05:13:55.785359
  
2345 / tcp
1810665946 | 2024-04-30T04:50:11.672670
  
2376 / tcp
-1663997029 | 2024-04-29T19:44:10.675509
  
2480 / tcp
-287123546 | 2024-05-20T18:29:57.425220
  
3000 / tcp
-1246004407 | 2024-05-22T00:38:44.201213
  
3001 / tcp
-1110936983 | 2024-04-30T06:16:47.257990
  
3087 / tcp
-845297953 | 2024-04-29T12:58:46.437756
  
3099 / tcp
1185508125 | 2024-04-29T21:27:12.023110
  
3333 / tcp
-1385938783 | 2024-04-29T23:40:56.871631
  
3389 / tcp
1317530328 | 2024-04-30T06:17:52.465548
  
3838 / tcp
-1246004407 | 2024-05-06T01:13:34.775028
  
4000 / tcp
1810665946 | 2024-04-29T20:11:08.956369
  
4433 / tcp
1810665946 | 2024-04-29T18:50:48.181808
  
4443 / tcp
1712604568 | 2024-04-30T04:15:23.594711
  
4700 / tcp
856525015 | 2024-04-29T18:36:35.997852
  
4840 / tcp
-1576426065 | 2024-04-30T09:47:13.386741
  
5005 / tcp
1810665946 | 2024-04-29T15:26:18.931097
  
5006 / tcp
-211425466 | 2024-04-29T14:27:31.549267
  
6000 / tcp
-147475503 | 2024-04-29T20:30:45.073432
  
6379 / tcp
-1691332125 | 2024-04-30T07:28:58.189543
  
7474 / tcp
574130828 | 2024-05-05T20:30:38.657390
  
8000 / tcp
-949720558 | 2024-05-27T09:53:47.913684
  
8001 / tcp
1212680812 | 2024-05-26T18:30:20.823379
  
9443 / tcp



Contact Us

Shodan ® - All rights reserved