11 /
tcp
-747911285 | 2025-02-28T23:32:41.453020
15 /
tcp
104385780 | 2025-02-27T12:31:58.459187
19 /
tcp
751496153 | 2025-03-18T17:34:19.752963
* OK TeamXchange IMAP4rev1 server (otyUg) ready.
23 /
tcp
-23362551 | 2025-03-18T10:44:24.287020
\xff\xfb\x01\xff\xfb\x03\xff\xfd\x18
26 /
tcp
-1476017887 | 2025-03-12T15:28:48.221742
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
37 /
tcp
-253878554 | 2025-03-15T16:05:24.693291
43 /
tcp
1212921144 | 2025-03-16T06:25:14.547572
-1056270173 | 2025-02-27T13:00:06.919693
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
53 /
tcp
-1511422614 | 2025-03-03T20:14:32.871602
9
\x81\x80\x00\x01\x00\x02\x00\x00\x00\x00\x08clients1\x06google\x03com\x00\x00\x01\x00\x01\xc0\x00\x05\x00\x01\x00\x00\x00U\x00\x07clients\x01l\xc0\x15\xc01\x00\x01\x00\x01\x00\x00\x00\x9d\x00\x04\x8e\xfb*\xee
\x00\x06\x85\x00\x00\x01\x00\x01\x00\x00\
-972699072 | 2025-03-18T01:39:10.124971
HTTP/1.0 200 OK
Content-type: text/html
Server: uc-httpd 1.0.0
Expires: 0
Vulnerabilities
0 | 2025-03-11T10:10:27.825550
HTTP/1.1 408 Request Timeout
Content-Length: 0
87 /
tcp
819727972 | 2025-03-12T00:34:56.611984
SSH-2.0-OpenSSH_7.4
Vulnerabilities
97 /
tcp
-1888448627 | 2025-03-17T21:57:07.670960
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
100 /
tcp
1911457608 | 2025-02-27T13:48:05.858756
\x00[\x00\x00\x00\x00\x00\x00
102 /
tcp
819727972 | 2025-03-20T19:43:43.828557
SSH-2.0-OpenSSH_7.4
Vulnerabilities
104 /
tcp
921225407 | 2025-03-13T05:03:17.100208
\x00\x00\x00\x04\x00\x00\x00\x00\x00
111 /
tcp
1187188851 | 2025-02-20T16:19:42.314386
Portmap
Program Version Protocol Port
-414819019 | 2025-03-17T12:04:46.748333
HTTP/1.1 200 OK
Content-type: text/html
Connection: close
141730637 | 2025-03-15T07:27:11.457331
HTTP/1.0 200 OK
Server: Proxy
122 /
tcp
-1189269828 | 2025-02-24T06:44:41.905820
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
131 /
tcp
1574088840 | 2025-03-19T18:01:03.992514
">Application and Content Networking Software 3.9</a>)\n</BODY><
135 /
tcp
-1729522695 | 2025-02-28T14:22:49.406718
\\x05\\x00\r\\x03\\x10\\x00\\x00\\x00\\x18\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x04\\x00\\x01\\x05\\x00\\x00\\x00\\x00\n\nServerAlive2: \n IP1: DESKTOP-BFAHJ06\n IP2: 192.168.3.8\n IP3: 172.29.96.1\n IP4: 172.19.80.1\n\nNTLMSSP:\nTarget_Name: DESKTOP-BFAHJ06\nProduct_Version: 10.0.19041 Ntlm 15\nOS: Windows 10, Version 2004/Windows Server, Version 2004\nNetBIOS_Domain_Name: DESKTOP-BFAHJ06\nNetBIOS_Computer_Name: DESKTOP-BFAHJ06\nDNS_Domain_Name: DESKTOP-BFAHJ06\nDNS_Computer_Name: DESKTOP-BFAHJ06\nSystem_Time: 2024-01-22 04:05:47 +0000 UTC\n\nDCERP
139 /
tcp
1067489153 | 2025-03-04T20:24:51.172840
Version: 6.1Build 0\nTarget Name : LYM-NAS\n
175 /
tcp
-1888448627 | 2025-03-10T16:50:47.374687
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
179 /
tcp
-399606100 | 2025-03-20T15:22:05.646382
BGP Message\nType: 3\nMajor error Code: 6\nMinor error Code: 5\n
221 /
tcp
-1399940268 | 2025-02-24T23:49:26.173629
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
264 /
tcp
-1707068558 | 2025-03-17T21:15:52.205754
67948279 | 2025-03-16T22:46:54.446597
HTTP/1.1 200 OK
Content-Type: text/html
Accept-Ranges: bytes
Server: Microsoft-IIS/8.5
X-Powered-By: ASP.NET
389 /
tcp
-1907080992 | 2025-02-27T06:10:56.604375
0\x0c\\x02\\x01\\x01a\\x07\n\\x01\\x00\\x04\\x00\\x04\\x00
427 /
tcp
1388449297 | 2025-03-19T13:39:21.003495
SAAdvert Response:\nVersion: 2\nFunction: SA Advertisement (11)\nURL: service:service-agent://*.*.*.*\nScopeList: default\nAttrributeList: \n\n\nserviceTypes:\nservice:ipmi\nservice:uartmirrorlog\nservice:lighttpd\nservice:redfish\nservice:management-hardware.ThinkBMC\nservice:cdserver\nservice:hdserver\nservice:adviser\nservice:MCTPMain\nB://l:87/x\n\nResponse of service:ipmi SrvReq:\nVersion: 2\nFunction: Service Reply (2)\nErrorCode: SUCCESS (0)\nURL Entries:\n Lifetime: 65535\n URL: service:ipmi://LNV-7D53-J6001R60:623\n\n\nRespo
444 /
tcp
1690634669 | 2025-02-20T23:58:21.857876
488 /
tcp
165188539 | 2025-02-28T08:07:24.452409
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
502 /
tcp
-454087041 | 2025-03-15T08:09:09.923010
\x1e\xc3\x80\x010\x02\x00\xc2\xa8\xc3\xa3\x00\x00\x00\x00
503 /
tcp
1911457608 | 2025-03-17T22:03:46.195615
\x00[\x00\x00\x00\x00\x00\x00
513 /
tcp
165188539 | 2025-03-12T19:02:19.538681
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
515 /
tcp
-21576419 | 2025-03-15T17:27:26.500526
ÿûUDo you want ANSI color? (Y/n)
541 /
tcp
-820381412 | 2025-03-17T15:26:20.972131
\\x16\\x03\\x01\\x01[\\x01\\x00\\x01W\\x03\\x03\\xf8\\x9dqe\\xf3\\x02\xd0\xa0\\x8c.M\x0bR\\xc9\\xeex\\x9d\\xb1)\\x07\\xe3\\x94\\x13z\\xfb\\x83xM\\x9a\\xcf9\\xad \r\\xb0%\\x01\\xb2\\xdb\\xf9%K7\\x99:\\xd9G\\xd2)\\xa7\\xab:\\x80\\xfd\\xfc\\x01\\x96BK\\xa1\\x83\\x0e\\xe8\\xa2b\\x002\\x13\\x02\\x13\\x03\\x13\\x01\\x009\\x0
554 /
tcp
285770450 | 2025-02-27T00:06:16.506179
RTSP/1.0 401 Unauthorized
CSeq: 1
555 /
tcp
-1059554316 | 2025-03-04T22:30:18.647656
\xc2\xa5A\x00\x01\x00\x00\x00,\x00\x00\x00\x02\x00\x00\x00L\x00\x00\x00\x08Connect\x00\x00\x00\x00x\x00\x00\x00\x0857222\x00\x00\x00
602 /
tcp
819727972 | 2025-03-06T11:52:30.530355
SSH-2.0-OpenSSH_7.4
Vulnerabilities
632 /
tcp
1011407350 | 2025-02-27T06:50:46.133427
* OK GroupWise IMAP4rev1 Server Ready\r\n
685 /
tcp
-1399940268 | 2025-03-10T13:16:28.075956
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
771 /
tcp
493955023 | 2025-03-13T03:31:45.385220
\x00\x00\x0c\x04\x00\x00\x00\x00\x00\x00\x04\x00\x10\x00\x00\x00\n0\x05\x00\x00@\x00
789 /
tcp
-1399940268 | 2025-03-04T07:25:53.686622
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1166978945 | 2025-03-17T04:41:05.790389
HTTP/1.1 407 Proxy Authentication Required
Server: Proxy
Proxy-Authenticate: Basic realm="CCProxy Authorization"
Connection: Close
Proxy-Connection: Close
832 /
tcp
-1189269828 | 2025-03-14T09:47:41.415145
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
873 /
tcp
2128189041 | 2025-03-13T11:48:14.629090
@RSYNCD: 31.0\n\n@RSYNCD: EXIT\n
887 /
tcp
1911457608 | 2025-03-20T23:03:08.409487
\x00[\x00\x00\x00\x00\x00\x00
902 /
tcp
1956828827 | 2025-02-28T19:47:27.911541
220 VMware Authentication Daemon Version 1.10: SSL Required, Se
rverDaemonProtocol:SOAP, MKSDisplayProtocol:VNC , , NFCSSL supported/t
-936692830 | 2025-03-19T00:15:14.499077
HTTP/1.1 202 OK
Connection: Keep-Alive
Content-Type: text/html
Keep-Alive: timeout=15; max=19
993 /
tcp
677934968 | 2025-02-26T17:52:14.160195
995 /
tcp
-740312032 | 2025-03-20T00:45:11.746665
+OK Dovecot (Ubuntu) ready.\r\n
1013 /
tcp
2098371729 | 2025-02-23T17:30:08.280187
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
1282941221 | 2025-03-12T21:30:47.058968
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
1080 /
tcp
1362344524 | 2025-03-21T00:12:16.693038
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.7
1099 /
tcp
504717326 | 2025-02-26T00:31:29.133755
SSH-2.0-OpenSSH_8.6
Vulnerabilities
1177 /
tcp
808560482 | 2025-03-17T19:59:02.637490
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP
: USERID : UNIX : Cr8
-1013082686 | 2025-03-06T23:08:30.004335
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
1234 /
tcp
1213931722 | 2025-03-19T06:15:39.002059
ICAP/1.0 501 Other\r\nServer: Traffic Spicer 7788179225\r\n
1283 /
tcp
-1399940268 | 2025-03-07T07:02:37.751748
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1291 /
tcp
321971019 | 2025-03-17T17:46:07.986636
-ERR client ip is not in whitelist\r
1343 /
tcp
-274082663 | 2025-03-17T07:48:32.336404
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
1365 /
tcp
-1947777893 | 2025-03-18T16:57:36.655602
"Broadband Router"\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
-2118655245 | 2025-03-19T19:16:45.263133
HTTP/1.0 500 Internal Server Error
Content-Length: 20
1414 /
tcp
1543809371 | 2025-03-19T07:11:29.502275
220 corpease.net Anti-spam GT for Coremail System (icmhosting[2\n0181212])
1433 /
tcp
49107754 | 2025-03-19T11:46:37.251808
MSSQL Server\nVersion: 134219767 (0x80007f7)\nSub-Build: 0\nEncryption:Not available\n\nMSSQL NTLM Info:\nProduct_Version: 5.2.3790 Ntlm 15\nOS: Windows Server 2003/Windows Server 2003 R2/Windows Server 2003, Service Pack 2\n
1446 /
tcp
-2140303521 | 2025-03-03T18:51:41.460282
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected\n
1515 /
tcp
1842524259 | 2025-03-19T12:04:49.280502
-186520940 | 2025-03-20T21:00:23.445187
1588 /
tcp
-1648456501 | 2025-03-20T14:41:02.184551
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
1599 /
tcp
-971970408 | 2025-03-16T22:27:37.965817
1604 /
tcp
-321444299 | 2025-03-15T10:36:03.453798
:dircproxy NOTICE AUTH :Looking up your hostname...
:dircproxy NOTICE AUTH :Got your hostname.
1801 /
tcp
-1299899661 | 2025-02-26T02:59:21.286315
\\x10Z\x0b\\x00LIOR<\\x02\\x00\\x00\\xff\\xff\\xff\\xff\\x00\\x00\\x12\\x00a36a0e421af47074\\x97W\\xcd[\\x98\\xc4\\x1aJ\\xa5\xd1\xbf\\xf9\\xbd\\xc7\\xce\\xfd92d3\\x10\\x01\\x00\\x00ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ
1883 /
tcp
-1810987450 | 2025-03-19T03:37:05.085985
-2066286256 | 2025-03-19T07:43:08.358832
HTTP/1.0 500 Internal Server Error\r\nContent-Length: 20\nD\nConnection: close\r\n\r\nCommand server error
1926 /
tcp
2087396567 | 2025-03-18T04:34:23.294164
kjnkjabhbanc283ubcsbhdc72
1962 /
tcp
-2089734047 | 2025-03-13T13:11:13.383736
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1964 /
tcp
103159425 | 2025-03-04T14:04:12.803659
1966 /
tcp
-805362002 | 2025-02-20T19:28:42.992830
ICAP/1.0 501 Other
Server: Traffic Spicer 7788179225
1981 /
tcp
632542934 | 2025-02-21T18:21:50.277631
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
-1839934832 | 2025-03-14T00:42:12.304578
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
2008 /
tcp
1741579575 | 2025-03-06T07:43:33.119395
2048 /
tcp
1911457608 | 2025-02-24T19:18:38.256952
\x00[\x00\x00\x00\x00\x00\x00
2049 /
tcp
-1598265216 | 2025-02-28T08:29:18.218279
2057 /
tcp
-1598265216 | 2025-03-05T23:03:10.780427
2143387245 | 2025-02-27T00:48:26.495135
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
2067 /
tcp
819727972 | 2025-02-22T20:47:14.393601
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2081 /
tcp
1574088840 | 2025-02-28T14:59:15.252616
">Application and Content Networking Software 3.9</a>)\n</BODY><
2083 /
tcp
-1529979118 | 2025-03-15T05:11:33.941257
2087 /
tcp
1741579575 | 2025-03-17T22:32:46.944737
2091 /
tcp
-1399940268 | 2025-03-16T08:56:50.252392
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2108 /
tcp
-891714208 | 2025-02-24T10:21:17.712361
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
141730637 | 2025-03-10T00:25:05.821341
HTTP/1.0 200 OK
Server: Proxy
2122 /
tcp
-1626979812 | 2025-03-10T10:14:05.848806
220 Service ready for new user.
2154 /
tcp
819727972 | 2025-02-27T14:56:19.407295
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2181 /
tcp
546151771 | 2025-03-13T20:52:01.561693
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC
Clients:
/*.*.*.*:11264[0](queued=0,recved=1,sent=0)
Latency min/avg/max: 0/0.0/0
Received: 8557
Sent: 11410
Connections: 1
Outstanding: 0
Zxid: 0x332907ad3391
Mode: follower
Node count: 104618
2220 /
tcp
-249504111 | 2025-03-06T21:29:25.269899
2222 /
tcp
-1659353189 | 2025-03-18T12:47:08.180174
SSH-2.0-ssh-server\r\n\\x00\\x00\\x02\\x14\x0b\\x14\x0b\\xed\\x16\\xae\\x96\t\\xc5En\\xbd\\x1cgn\\xff\\xad\\xd7\\x00\\x00\\x00\\xbbcurve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group14-sha256,diffie-hellman-gr
2223 /
tcp
321971019 | 2025-03-08T15:40:16.540744
-ERR client ip is not in whitelist\r
2224 /
tcp
321971019 | 2025-03-16T01:23:18.698486
-ERR client ip is not in whitelist\r
2323 /
tcp
-2112953016 | 2025-03-11T21:22:52.851687
There are too many users,please wait a moment to log in!
TELNET Negotiation:
will: Echo, Suppress Go Ahead
do: Echo, Negotiate About Window Size, Remote Flow Control
2327 /
tcp
-1399940268 | 2025-02-25T20:25:19.534818
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2345 /
tcp
-407828767 | 2025-03-09T05:53:38.439286
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
2352 /
tcp
-1888448627 | 2025-03-21T10:58:52.316789
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
2353 /
tcp
-2089734047 | 2025-03-05T23:19:57.537918
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
2404 /
tcp
1761482307 | 2025-03-17T21:28:39.830511
\x00[\xc2\xa5\t\xc2\xbe\x7f\x00\x00
2433 /
tcp
-1428621233 | 2025-03-01T00:11:27.538688
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
2455 /
tcp
1327134490 | 2025-03-16T12:27:35.600798
2552 /
tcp
-1099385124 | 2025-03-06T22:03:07.383042
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
2555 /
tcp
1726594447 | 2025-03-17T12:59:55.045572
\r\n\nLantronix MSS100 Version V118/523(045538937)\n\r\nType HELP at the \'Local_61349> \' prompt for assistance.\n\r\n\r\n\nUsername>
2761 /
tcp
-1888448627 | 2025-03-12T03:35:58.166603
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
2762 /
tcp
693973426 | 2025-03-20T15:33:52.444225
220 VMware Authentication Daemon Version 1.10: SSL Required, Se\nrverDaemonProtocol:SOAP, MKSDisplayProtocol:VNC , , NFCSSL supported/t
3001 /
tcp
1426971893 | 2025-03-17T03:45:45.482147
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
3002 /
tcp
-1032713145 | 2025-02-25T18:53:20.089590
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
3022 /
tcp
1278527606 | 2025-03-11T19:51:34.281589
3050 /
tcp
-1399940268 | 2025-02-27T07:15:21.640136
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3057 /
tcp
1543809371 | 2025-02-25T22:05:35.900757
220 corpease.net Anti-spam GT for Coremail System (icmhosting[2\n0181212])
3067 /
tcp
1911457608 | 2025-03-12T16:21:06.954947
\x00[\x00\x00\x00\x00\x00\x00
3069 /
tcp
-1399940268 | 2025-02-21T10:11:58.094149
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3075 /
tcp
1911457608 | 2025-03-10T18:01:31.791942
\x00[\x00\x00\x00\x00\x00\x00
3095 /
tcp
1911457608 | 2025-03-19T18:21:54.611743
\x00[\x00\x00\x00\x00\x00\x00
3097 /
tcp
-2089734047 | 2025-03-06T18:05:17.700374
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3100 /
tcp
-653033013 | 2025-03-17T15:18:09.675285
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
3106 /
tcp
819727972 | 2025-02-27T17:28:08.766005
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3111 /
tcp
-1399940268 | 2025-03-17T12:36:07.557254
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3123 /
tcp
575925250 | 2025-03-17T11:34:24.058017
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
3124 /
tcp
819727972 | 2025-02-19T22:35:41.692086
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3136 /
tcp
921225407 | 2025-03-10T23:43:06.187508
\x00\x00\x00\x04\x00\x00\x00\x00\x00
3138 /
tcp
50497985 | 2025-02-23T21:17:40.065365
\x00[\xc3\x88\xc3\x9dS\x7f\x00\x00
3143 /
tcp
819727972 | 2025-02-19T17:02:55.538716
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3159 /
tcp
-2096652808 | 2025-02-24T06:39:06.564446
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
3163 /
tcp
819727972 | 2025-03-17T12:29:41.080000
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1453516345 | 2025-03-19T04:28:44.900634
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
3172 /
tcp
-653033013 | 2025-03-14T15:44:28.371762
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
3174 /
tcp
-1399940268 | 2025-03-09T23:13:41.021597
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3177 /
tcp
-1399940268 | 2025-03-16T19:29:42.930186
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3182 /
tcp
-1626979812 | 2025-03-11T00:25:30.012960
220 Service ready for new user.
3256 /
tcp
808560482 | 2025-03-14T18:21:42.172456
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP
: USERID : UNIX : Cr8
-1547976805 | 2025-03-18T03:53:59.576329
HTTP/1.1 403 Forbidden
Server: nginx
Content-Type: text/html
Connection: close
3269 /
tcp
-616720387 | 2025-02-25T09:28:09.145948
3299 /
tcp
-1681927087 | 2025-03-11T13:53:32.080717
kjnkjabhbanc283ubcsbhdc72
3306 /
tcp
-1036944024 | 2025-03-06T21:49:24.378955
F\\x00\\x00\\x00\\xffj\\x04Host \'*.*.*.*\' is not allowed to connect to this MySQL server
3310 /
tcp
-303199180 | 2025-02-26T14:58:11.325274
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
3389 /
tcp
848680996 | 2025-03-13T03:02:38.046159
Remote Desktop Protocol\n\\x03\\x00\\x00\\x13\\x0e\\xd0\\x00\\x00\\x124\\x00\\x02\t\\x08\\x00\\x02\\x00\\x00\\x00\n\nFlag: PROTOCOL_HYBRID\nTarget_Name: WINCTYU-KTI28LG\nProduct_Version: 6.1.7601 Ntlm 15\nOS: Windows 7, Service Pack 1/Windows Server 2008 R2, Service Pack 1\nNetBIOS_Domain_Name: WINCTYU-KTI28LG\nNetBIOS_Computer_Name: WINCTYU-KTI28LG\nDNS_Domain_Name: WINCTYU-KTI28LG\nDNS_Computer_Name: WINCTYU-KTI28LG\nSystem_Time: 2024-01-22 08:43:05 +0000 UTC\n\n
3402 /
tcp
819727972 | 2025-02-28T18:40:05.106421
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1830697416 | 2025-03-05T03:34:52.658841
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
1282941221 | 2025-02-26T15:16:22.156086
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
3500 /
tcp
-1888448627 | 2025-02-25T22:58:13.274503
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
3522 /
tcp
205347087 | 2025-03-05T06:18:49.764329
SSH-25453-Cisco-3524665.35\n
198844676 | 2025-02-21T21:20:12.677143
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3560 /
tcp
-339084706 | 2025-02-23T16:36:08.632736
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
3562 /
tcp
-2089734047 | 2025-03-19T18:38:06.677461
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3568 /
tcp
-339084706 | 2025-02-20T18:14:34.438274
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
3622 /
tcp
-1399940268 | 2025-03-19T11:15:59.125725
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3780 /
tcp
-971970408 | 2025-03-16T21:05:06.862348
3790 /
tcp
1636811864 | 2025-03-05T22:43:53.121804
141533638 | 2025-03-14T16:35:26.209720
HTTP/1.1 302 Found
Location: /index.html
4021 /
tcp
-2017887953 | 2025-02-21T10:10:36.081612
SSH-2.0-OpenSSH_7.9
Vulnerabilities
4022 /
tcp
-1099385124 | 2025-02-24T09:43:30.815228
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
4063 /
tcp
2087396567 | 2025-03-04T09:55:03.670989
kjnkjabhbanc283ubcsbhdc72
4064 /
tcp
-2089734047 | 2025-03-20T11:22:26.425358
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
4147 /
tcp
2098371729 | 2025-03-05T22:16:25.784979
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
4150 /
tcp
-1399940268 | 2025-03-18T09:05:13.103345
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4157 /
tcp
104385780 | 2025-03-21T14:16:02.463039
4160 /
tcp
307999478 | 2025-03-12T21:56:45.253707
unknown command \r\nunknown command \r\n
302222687 | 2025-02-26T01:10:46.690422
HTTP/1.1 301 Moved Permanently
Server: Apache/2.4.41 (Unix) OpenSSL/1.1.1d TST PHP/7.3.11
Content-Type: text/plain; charset=utf-8
Connection: close
4321 /
tcp
-1250504565 | 2025-03-19T20:14:57.367189
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x80\x00\x04\x00\x01\x00\x00\x00\x05\x00\xff\xff\xff\x00\x00\x04\x08\x00\x00\x00\x00\x00\x7f\xff\x00\x00\x00\x00\x08\x07\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01
4369 /
tcp
1763259671 | 2025-03-05T20:50:58.223486
{\n"Version": "3.4.18",\n"VersionArray": [\n3,\n4,\n18,\n0\n],\n"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",\n"OpenSSLVersion": "",\n"SysInfo": "",\n"Bits": 64,\n"Debug": false,\n"MaxObjectSize": 16777216\n}\n\n
4430 /
tcp
819727972 | 2025-03-08T13:34:20.432328
SSH-2.0-OpenSSH_7.4
Vulnerabilities
141533638 | 2025-03-11T19:16:08.315095
HTTP/1.1 302 Found
Location: /index.html
4444 /
tcp
-1399940268 | 2025-03-21T12:52:07.233446
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4466 /
tcp
-1746074029 | 2025-02-19T21:33:41.145910
4488 /
tcp
819727972 | 2025-02-28T23:38:10.541767
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1282941221 | 2025-03-17T17:47:10.822626
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
4506 /
tcp
1690634669 | 2025-03-08T15:36:32.621790
4520 /
tcp
1665283070 | 2025-02-25T18:34:49.146351
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x01\x00\x00\x10\x00\x00\n0\x03\x00\x00\x00\x01\x00\x05\x00\x00@\x00\x00\x06\x00\x00\x1f@
4643 /
tcp
1126993057 | 2025-02-20T18:12:53.360183
* OK [CAPABILITY a2,M\\] nBwXk2pPP IMAP4rev1 20qx at
4700 /
tcp
669849225 | 2025-02-21T22:05:28.964610
SSH-98.60-SysaxSSH_81885..42\r\n
4840 /
tcp
-1327660293 | 2025-03-20T18:32:21.259404
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
4899 /
tcp
539065883 | 2025-03-10T07:31:30.180089
4911 /
tcp
-1279886438 | 2025-02-20T19:08:15.209686
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
4949 /
tcp
550048729 | 2025-03-14T12:24:00.294778
5001 /
tcp
1308377066 | 2025-03-04T16:47:53.344655
5006 /
tcp
171352214 | 2025-03-18T21:48:50.555782
-ERR client ip is not in whitelist
5025 /
tcp
1741579575 | 2025-02-21T13:53:50.332546
5140 /
tcp
165188539 | 2025-03-19T08:54:30.798673
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
5180 /
tcp
-1399940268 | 2025-02-21T20:56:51.636091
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5222 /
tcp
-956469251 | 2025-02-24T05:12:13.367694
5239 /
tcp
-1399940268 | 2025-02-25T23:55:28.941587
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5242 /
tcp
165188539 | 2025-03-10T19:36:39.353389
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
5247 /
tcp
-1097188123 | 2025-03-09T11:45:12.907847
-1045760528 | 2025-02-22T22:01:39.308465
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
5257 /
tcp
1189133115 | 2025-03-05T11:05:40.785108
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
5258 /
tcp
1189133115 | 2025-03-12T11:42:13.969953
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
5260 /
tcp
-1835475271 | 2025-02-23T03:20:26.484567
200 NOD32SS 99 (3318497116)\r\n
5266 /
tcp
-1019343788 | 2025-02-23T09:37:10.930755
-241300778 | 2025-02-21T06:46:21.101492
HTTP/1.1 400 Bad Request
Server: CWAP-waf
Content-Type: text/html
Connection: close
WZWS-RAY: 1249-1705938365.72-w-waf02tjgt
5432 /
tcp
-297128567 | 2025-03-15T07:41:19.821544
\x04\x01\xc3\xb4\x00\x15Internal Server Error\x00\x00\x00AB\x00\x02\x05\x00
5435 /
tcp
-445721795 | 2025-03-16T23:07:34.452023
\x00[\xc3\xaed\x1a\x7f\x00\x00
5456 /
tcp
-1032713145 | 2025-02-24T17:57:44.775243
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
5543 /
tcp
1911457608 | 2025-02-25T13:57:10.929574
\x00[\x00\x00\x00\x00\x00\x00
5544 /
tcp
-879070264 | 2025-03-11T03:54:05.910172
\\xab\xca\xa5]\\x00\\x00\\x00\\x18\\xc0\\x00\\x00\\x01\\xff\\xff\\xff\\xff\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00
5568 /
tcp
-2089734047 | 2025-02-20T13:10:00.662328
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
5595 /
tcp
1363464823 | 2025-03-06T23:19:19.365390
5630 /
tcp
677934968 | 2025-02-27T20:28:21.308576
5660 /
tcp
321971019 | 2025-03-18T17:07:14.900938
-ERR client ip is not in whitelist\r
5672 /
tcp
575925250 | 2025-03-20T00:48:12.314382
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
1082973024 | 2025-03-13T21:50:54.488379
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae2a48_PS-NKG-01rxX61_12499-2535
5698 /
tcp
-375604792 | 2025-02-28T20:20:58.496428
220 Microsoft FTP Service
5804 /
tcp
-358801646 | 2025-03-19T17:48:29.091568
5910 /
tcp
-1881410605 | 2025-03-17T08:21:58.716969
<HTML>\r\n<HEAD>\r\n<TITLE>\r\nADAM-6000 Ethernet-Enabled DA&C Modules\r\n</TITLE>\r\n</HEAD>\r\n<BODY>
5913 /
tcp
-2033111675 | 2025-03-09T14:16:49.781745
5914 /
tcp
-407828767 | 2025-03-21T14:47:05.947347
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
-1249500036 | 2025-03-15T21:37:53.853374
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html
Connection: keep-alive
Accept-Ranges: bytes
5938 /
tcp
50497985 | 2025-02-26T19:22:24.735309
\x00[\xc3\x88\xc3\x9dS\x7f\x00\x00
1999272906 | 2025-02-27T22:05:27.572637
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
5992 /
tcp
-1105333987 | 2025-03-15T06:10:39.377899
5993 /
tcp
1665283070 | 2025-03-20T10:42:55.810884
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x01\x00\x00\x10\x00\x00\n0\x03\x00\x00\x00\x01\x00\x05\x00\x00@\x00\x00\x06\x00\x00\x1f@
5999 /
tcp
-1399940268 | 2025-02-22T19:58:27.324420
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6000 /
tcp
-1399940268 | 2025-03-17T06:33:06.169264
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6001 /
tcp
-1399940268 | 2025-03-18T12:44:06.410064
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6002 /
tcp
1911457608 | 2025-03-16T20:03:47.672655
\x00[\x00\x00\x00\x00\x00\x00
6005 /
tcp
-801484042 | 2025-02-26T21:58:32.060159
6100 /
tcp
718699400 | 2025-03-10T11:01:31.477825
\x0c\\x05\\x01\\x00\\x1c\\x00\\x00\\x00\\x04\\x00\\xfa\xd2\xa8a\\x00\\x00\\x01\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00
6380 /
tcp
321971019 | 2025-03-19T15:19:19.725650
-ERR client ip is not in whitelist\r
6500 /
tcp
921225407 | 2025-03-05T19:54:56.895912
\x00\x00\x00\x04\x00\x00\x00\x00\x00
6561 /
tcp
1624217396 | 2025-03-19T23:37:32.314438
HELO:10.3.6.0.false\nAS:2048\nHL:19
6633 /
tcp
45131230 | 2025-03-05T16:25:06.496821
inv2W\x04\x0f\x00\x00\x00\x01\x00\t\x00\x00\x00
4935895 | 2025-03-20T12:01:20.515767
HTTP/1.1 400 Bad Request
Server: CloudWAF
6667 /
tcp
-1713437100 | 2025-03-09T08:17:17.352342
\xc3\xbf\xc3\xbb\x01\r\nWelcome to NetLinx v94 Copyright AMX Corp. 34395-49007\r\n>
6668 /
tcp
-2089734047 | 2025-03-19T20:06:46.845962
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
6697 /
tcp
-1730858130 | 2025-02-23T07:27:39.959092
RFB 003.008
VNC:
Protocol Version: 3.8
6789 /
tcp
-2089734047 | 2025-03-17T22:25:32.173191
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1827807483 | 2025-03-20T18:00:22.177777
HTTP/1.1 401 Unauthorized
Server:
Cache-Control: no-cache,no-store
Content-Type: text/html; charset=%s
Connection: close
7012 /
tcp
-1399940268 | 2025-03-10T14:29:35.073217
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7020 /
tcp
-375604792 | 2025-02-26T10:27:56.682273
220 Microsoft FTP Service
7071 /
tcp
2087396567 | 2025-03-20T22:15:04.580031
kjnkjabhbanc283ubcsbhdc72
7081 /
tcp
-2096652808 | 2025-02-25T20:46:19.993271
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
7171 /
tcp
1948301213 | 2025-03-01T01:11:10.230889
RFB 003.003
VNC:
Protocol Version: 3.3
7172 /
tcp
-1399940268 | 2025-03-01T01:34:33.901573
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7218 /
tcp
-1142844482 | 2025-03-19T21:54:19.053110
ÿûSOYO_SIP VBNQyQSKc settings
Password:
7302 /
tcp
-747911285 | 2025-03-19T07:29:31.588806
7434 /
tcp
819727972 | 2025-03-19T23:37:15.259036
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1006110807 | 2025-03-18T16:31:23.443611
HTTP/1.1 403 Forbidden
Server: openresty
Content-Type: text/html
Connection: keep-alive
via: CHN-GDdongguan-GLOBAL1-CACHE20[3]
X-CCDN-ERRCODE-SRC: 01
X-CCDN-FORBID-CODE: 040001
7465 /
tcp
1911457608 | 2025-03-04T00:47:13.325957
\x00[\x00\x00\x00\x00\x00\x00
7535 /
tcp
1278527606 | 2025-03-18T02:33:56.435940
7634 /
tcp
819727972 | 2025-03-12T15:55:33.578062
SSH-2.0-OpenSSH_7.4
Vulnerabilities
7654 /
tcp
-1399940268 | 2025-03-09T20:33:32.995959
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1391945995 | 2025-03-15T10:01:24.677619
HTTP/1.1 403 Forbidden
Content-Type: text/plain; charset=utf-8
Proxy-Authenticate: Basic realm=""
7799 /
tcp
-980525298 | 2025-02-21T00:45:47.872222
\x01\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
-1259524839 | 2025-03-13T21:53:38.682658
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=UTF-8
Server: Microsoft-HTTPAPI/2.0
8009 /
tcp
2087396567 | 2025-03-20T16:28:28.187977
kjnkjabhbanc283ubcsbhdc72
8027 /
tcp
-122096153 | 2025-03-07T11:12:17.844073
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
8033 /
tcp
-1248408558 | 2025-03-20T20:57:11.754218
220 MikroTik FTP server (MikroTik 6.44.3) ready
8053 /
tcp
-1399940268 | 2025-03-16T10:42:42.017380
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8063 /
tcp
-1248408558 | 2025-03-20T05:29:42.837683
220 MikroTik FTP server (MikroTik 6.44.3) ready
8075 /
tcp
-2033111675 | 2025-03-18T00:30:35.941673
8078 /
tcp
-2089734047 | 2025-03-11T13:12:00.583460
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8089 /
tcp
-2031152423 | 2025-03-14T17:10:23.218162
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
438715403 | 2025-03-09T18:44:22.011979
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae2874_pingwangtong53_24882-28622
8101 /
tcp
-1399940268 | 2025-03-20T23:40:56.796549
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1839934832 | 2025-03-05T05:44:46.614309
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
8108 /
tcp
-1032713145 | 2025-03-11T08:21:19.090981
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
8110 /
tcp
632542934 | 2025-02-28T18:13:28.271757
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
8125 /
tcp
165188539 | 2025-02-28T11:28:46.159664
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8133 /
tcp
-1888448627 | 2025-03-17T11:00:01.958572
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8138 /
tcp
1126993057 | 2025-02-28T00:15:14.133442
* OK [CAPABILITY a2,M\\] nBwXk2pPP IMAP4rev1 20qx at
8140 /
tcp
1690634669 | 2025-02-24T22:17:31.186970
8153 /
tcp
-1733645023 | 2025-03-18T12:35:39.015618
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
8163 /
tcp
-274082663 | 2025-02-27T18:07:11.432189
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
8165 /
tcp
-1399940268 | 2025-03-06T14:09:36.159305
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8171 /
tcp
-1888448627 | 2025-03-04T07:36:59.784831
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8179 /
tcp
-1888448627 | 2025-03-05T20:29:47.267879
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8193 /
tcp
-1327660293 | 2025-03-15T14:22:08.195661
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
8197 /
tcp
1278527606 | 2025-02-28T02:32:47.768680
8241 /
tcp
-1737707071 | 2025-02-25T14:20:53.042373
\x00b\x00\x01\x00\x00\x00\x00x\x0b\x00\x00\x00\x00z\x00437
8248 /
tcp
-2089734047 | 2025-03-13T16:10:48.783423
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8285 /
tcp
-1399940268 | 2025-03-20T15:45:14.730166
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8291 /
tcp
1213931722 | 2025-03-06T20:54:35.603558
ICAP/1.0 501 Other\r\nServer: Traffic Spicer 7788179225\r\n
8319 /
tcp
-1399940268 | 2025-03-10T15:09:52.781840
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8350 /
tcp
-2089734047 | 2025-03-04T03:27:32.034758
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8382 /
tcp
1911457608 | 2025-03-12T17:45:01.345157
\x00[\x00\x00\x00\x00\x00\x00
1077013874 | 2025-03-16T03:49:56.854119
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
8445 /
tcp
1911457608 | 2025-03-20T10:11:48.757241
\x00[\x00\x00\x00\x00\x00\x00
8456 /
tcp
-375604792 | 2025-03-06T12:16:50.912555
220 Microsoft FTP Service
8466 /
tcp
819727972 | 2025-03-18T00:07:28.476078
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8475 /
tcp
-891714208 | 2025-02-28T06:57:26.766154
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
8493 /
tcp
-136006866 | 2025-03-12T10:54:21.391994
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
1529351907 | 2025-03-21T10:01:45.766468
HTTP/1.1 407 OK
Content-Type: text/plain; charset=utf-8
Connection: keep-alive
please add white ip *.*.*.*
-1839934832 | 2025-03-06T07:02:06.373759
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
8514 /
tcp
-1399940268 | 2025-03-18T13:04:32.531432
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8519 /
tcp
-1399940268 | 2025-03-21T01:53:27.389545
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1282941221 | 2025-03-18T19:40:57.384945
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
8545 /
tcp
104385780 | 2025-03-19T05:14:09.104656
8554 /
tcp
-971970408 | 2025-03-09T09:48:09.696001
8567 /
tcp
165188539 | 2025-03-16T01:26:29.030995
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8577 /
tcp
165188539 | 2025-03-11T16:38:49.234903
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8591 /
tcp
-1996280214 | 2025-03-15T18:18:09.249252
8592 /
tcp
-1261090339 | 2025-03-10T05:39:07.888901
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
8597 /
tcp
820958131 | 2025-02-27T16:56:36.787538
kjnkjabhbanc283ubcsbhdc72\x02
667987101 | 2025-03-11T04:19:28.434610
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
WZWS-RAY: 1249-1705938726.319-w-waf01shgt2
8601 /
tcp
820958131 | 2025-03-05T16:14:20.407018
kjnkjabhbanc283ubcsbhdc72\x02
8607 /
tcp
410249975 | 2025-02-27T18:11:38.046706
8663 /
tcp
-1399940268 | 2025-02-23T22:34:01.786178
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1282941221 | 2025-03-10T00:00:44.707139
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
8700 /
tcp
1975288991 | 2025-02-22T11:32:25.789878
8728 /
tcp
-2089734047 | 2025-03-18T15:43:12.066216
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8732 /
tcp
-1399940268 | 2025-03-19T05:39:40.830507
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8808 /
tcp
-441419608 | 2025-03-10T00:37:46.660201
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
8811 /
tcp
819727972 | 2025-03-17T17:53:56.667999
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8816 /
tcp
321971019 | 2025-02-20T22:33:06.623435
-ERR client ip is not in whitelist\r
8822 /
tcp
819727972 | 2025-02-24T13:41:20.435334
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8834 /
tcp
1761482307 | 2025-03-01T01:44:31.000297
\x00[\xc2\xa5\t\xc2\xbe\x7f\x00\x00
8846 /
tcp
-1327660293 | 2025-03-06T10:11:47.798770
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
8851 /
tcp
1911457608 | 2025-03-13T20:19:35.837890
\x00[\x00\x00\x00\x00\x00\x00
8854 /
tcp
-1026951088 | 2025-02-20T20:11:35.651790
8880 /
tcp
1690634669 | 2025-03-04T23:48:07.543891
8889 /
tcp
-971970408 | 2025-03-15T22:28:13.766254
8899 /
tcp
-1885525731 | 2025-03-15T17:07:46.594298
\\xab\xca\xa5]\\x00\\x00\\x00\\x18\\xc0\\x00\\x00\\x01\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\xab\xca\xa5]\\x00\\x00\\x00\\x18\\xc0\\x00\\x00\\x04\\xff\\xff\\xff\\xb9\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00
8906 /
tcp
-1375131644 | 2025-03-11T15:16:56.080048
\x00[v\xc3\xbdC\x7f\x00\x00
9000 /
tcp
-2067028711 | 2025-03-18T09:22:14.259339
\x15\x03\x01\x00\x02\x02F
9001 /
tcp
-1026951088 | 2025-03-12T11:31:54.598792
9002 /
tcp
1842524259 | 2025-03-18T04:41:30.756122
9007 /
tcp
709622286 | 2025-03-16T14:36:29.731594
OK Welcome <299685> on DirectUpdate server 7286\r\n
9011 /
tcp
-1648456501 | 2025-02-25T15:15:40.096276
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
9013 /
tcp
632542934 | 2025-02-21T19:54:44.697950
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
-2106107121 | 2025-03-13T02:11:20.493695
HTTP/1.1 404 Not Found
Connection: close
Content-Type: text/html
Server: CloudWAF
9027 /
tcp
-339084706 | 2025-02-23T20:55:21.341456
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
9033 /
tcp
-1399940268 | 2025-02-26T01:27:17.021982
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1489954473 | 2025-03-06T14:46:16.003106
HTTP/1.1 410 Gone
Server: openresty
Transfer-Encoding: chunked
Connection: keep-alive
Via: 1.1 google
9042 /
tcp
171352214 | 2025-03-17T23:41:16.554454
-ERR client ip is not in whitelist
9045 /
tcp
639175818 | 2025-03-20T02:33:48.981869
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
9048 /
tcp
408230060 | 2025-03-21T11:24:57.201196
\r\nSorry, that nickname format is invalid.\r\n
9057 /
tcp
1370263973 | 2025-03-18T22:28:53.851456
9068 /
tcp
1911457608 | 2025-03-20T07:56:48.525800
\x00[\x00\x00\x00\x00\x00\x00
9072 /
tcp
1911457608 | 2025-03-14T08:45:51.413825
\x00[\x00\x00\x00\x00\x00\x00
9076 /
tcp
-1888448627 | 2025-03-13T16:38:55.825339
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9078 /
tcp
-1888448627 | 2025-03-01T01:50:53.928053
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9088 /
tcp
-1810987450 | 2025-03-13T20:19:01.497685
9091 /
tcp
819727972 | 2025-02-25T04:08:13.091903
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9092 /
tcp
1011407350 | 2025-03-19T21:30:41.683313
* OK GroupWise IMAP4rev1 Server Ready\r\n
9100 /
tcp
-1105333987 | 2025-03-15T11:48:10.408581
9117 /
tcp
-2089734047 | 2025-02-21T06:53:23.333677
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9118 /
tcp
575925250 | 2025-02-24T07:03:09.856675
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
9130 /
tcp
410249975 | 2025-03-09T06:34:13.811469
9131 /
tcp
-2089734047 | 2025-03-05T11:39:03.350746
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9144 /
tcp
819727972 | 2025-03-13T00:31:36.998188
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9151 /
tcp
-971970408 | 2025-03-19T12:48:31.523655
9160 /
tcp
-1699556818 | 2025-03-14T12:18:23.681104
\x01remshd: Kerberos Authentication not enabled.\n
9165 /
tcp
-2031152423 | 2025-02-23T13:14:56.669455
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
9207 /
tcp
937756010 | 2025-03-04T21:49:57.756705
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x01\x00\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
9208 /
tcp
-1265999252 | 2025-02-25T04:48:44.997997
220 VMware Authentication Daemon Version 1.0, ServerDaemonProto\ncol:SOAP, MKSDisplayProtocol:VNC , ,
9209 /
tcp
-1399940268 | 2025-03-06T07:57:30.083291
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9248 /
tcp
-2089734047 | 2025-03-06T20:14:46.207191
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9249 /
tcp
1504401647 | 2025-03-10T09:08:12.778181
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
9253 /
tcp
165188539 | 2025-03-19T18:58:54.288869
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
9291 /
tcp
-1399940268 | 2025-03-14T17:25:22.769212
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9292 /
tcp
707919486 | 2025-03-19T22:51:28.916386
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
9299 /
tcp
-1888448627 | 2025-02-28T10:28:13.787804
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9300 /
tcp
-441419608 | 2025-02-22T19:38:46.694883
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
-1453516345 | 2025-02-27T06:12:03.540447
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
9306 /
tcp
1615193817 | 2025-02-20T04:36:45.492089
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
9308 /
tcp
165188539 | 2025-02-28T04:18:39.099453
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
9309 /
tcp
819727972 | 2025-02-26T22:06:14.905437
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9311 /
tcp
1632932802 | 2025-03-18T05:09:51.664754
9333 /
tcp
-1888448627 | 2025-03-09T12:18:20.130625
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9350 /
tcp
-358801646 | 2025-03-04T15:38:21.498973
9353 /
tcp
-454087041 | 2025-03-16T14:38:50.493292
\x1e\xc3\x80\x010\x02\x00\xc2\xa8\xc3\xa3\x00\x00\x00\x00
-1839934832 | 2025-02-23T11:16:21.920103
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
9398 /
tcp
-154107716 | 2025-03-13T12:24:38.705175
220 Microsoft FTP Service
530 User cannot log in.
214-The following commands are recognized (* ==>'s unimplemented).
ABOR
ACCT
ADAT *
ALLO
APPE
AUTH
CCC
CDUP
CWD
DELE
ENC *
EPRT
EPSV
FEAT
HELP
HOST
LANG
LIST ...
1529351907 | 2025-03-08T19:44:33.193106
HTTP/1.1 407 OK
Content-Type: text/plain; charset=utf-8
Connection: keep-alive
please add white ip *.*.*.*
1830697416 | 2025-02-28T18:11:00.648000
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
9444 /
tcp
1911457608 | 2025-02-25T18:50:14.920188
\x00[\x00\x00\x00\x00\x00\x00
9455 /
tcp
-1399940268 | 2025-03-05T14:05:36.467567
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9488 /
tcp
45131230 | 2025-03-11T16:35:43.675533
inv2W\x04\x0f\x00\x00\x00\x01\x00\t\x00\x00\x00
9530 /
tcp
-274082663 | 2025-03-16T10:15:09.376547
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
9600 /
tcp
921225407 | 2025-03-12T07:47:40.126129
\x00\x00\x00\x04\x00\x00\x00\x00\x00
9611 /
tcp
1975288991 | 2025-03-04T17:24:10.740193
9633 /
tcp
740837454 | 2025-03-03T22:14:47.204886
SSH-2.0-OpenSSH_5.3
Vulnerabilities
9704 /
tcp
1911457608 | 2025-03-14T19:31:32.800345
\x00[\x00\x00\x00\x00\x00\x00
9734 /
tcp
165188539 | 2025-03-04T20:52:34.070553
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
9761 /
tcp
-2089734047 | 2025-03-12T20:19:35.118180
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1977569953 | 2025-03-05T15:46:09.997470
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae2987_PS-SHA-01Jtm19_12756-43634
1320285193 | 2025-03-05T16:32:34.213041
HTTP/1.1 404 Not Found
Server: CloudWAF
Content-Type: text/html
Connection: keep-alive
9902 /
tcp
1615193817 | 2025-03-04T17:13:17.844421
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
1712606111 | 2025-03-17T14:45:22.041585
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae1282_PSzqstdxyw34_8689-21922
1637038794 | 2025-03-19T04:36:53.578348
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae2521_PS-PEK-015Wj25_25111-50596
9999 /
tcp
1161309183 | 2025-03-19T02:49:14.243332
10000 /
tcp
-1248408558 | 2025-02-26T19:31:54.856547
220 MikroTik FTP server (MikroTik 6.44.3) ready
10005 /
tcp
-358801646 | 2025-03-12T04:20:05.016565
10009 /
tcp
-709267009 | 2025-03-13T22:58:26.268156
\\x00[\'\\x19\\xc0\\xa8X\\xfd
10024 /
tcp
-234408721 | 2025-03-16T02:23:29.117201
\\x00[\'(\\xc0\\xa8Y\\xfd
10030 /
tcp
1620329124 | 2025-02-28T19:37:47.230560
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\x01\xc3\xbf\xc3\xbb\x03\xc3\xbf\xc3\xbd\x01\xc3\xbf\xc3\xbe\x01Username:
10031 /
tcp
-1733106930 | 2025-03-05T22:24:49.138872
Mysql Version: 5.6.50-log\nN\n5.6.50-log\x14(\nG5se"tGE\xc3\xbf\xc3\xb7-\x02\x7f\xc2\x80\x15cB^3$Zwh$wM[mysql_native_password
10043 /
tcp
320677201 | 2025-02-22T13:19:50.549672
H\x00\x00\x00\xc3\xbfj\x04Host \'101.133.140.114\' is not allowed to \nconnect to this MySQL server
10050 /
tcp
1544300041 | 2025-03-12T13:20:57.186489
SSH-25453-Cisco-3524665.35
10080 /
tcp
-801484042 | 2025-03-04T08:43:15.602016
10082 /
tcp
1683672699 | 2025-03-04T22:08:47.921553
\\x00[\'b\\xc0\\xa8X\\xfd
10086 /
tcp
819727972 | 2025-03-17T19:28:10.838322
SSH-2.0-OpenSSH_7.4
Vulnerabilities
10093 /
tcp
819727972 | 2025-03-20T08:12:30.952775
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1282941221 | 2025-02-22T20:06:58.096267
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
10101 /
tcp
-1399940268 | 2025-03-08T22:43:31.596333
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10123 /
tcp
599074451 | 2025-02-27T00:56:26.510098
10134 /
tcp
921225407 | 2025-03-14T21:45:47.662529
\x00\x00\x00\x04\x00\x00\x00\x00\x00
10181 /
tcp
-2089734047 | 2025-03-04T18:51:59.378120
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
10201 /
tcp
-585940771 | 2025-02-26T17:14:08.719567
10250 /
tcp
2087396567 | 2025-03-18T20:39:55.163966
kjnkjabhbanc283ubcsbhdc72
10443 /
tcp
2087396567 | 2025-03-07T11:47:36.271289
kjnkjabhbanc283ubcsbhdc72
10554 /
tcp
171352214 | 2025-03-13T08:14:37.227257
-ERR client ip is not in whitelist
10810 /
tcp
-1399940268 | 2025-03-09T16:16:01.194048
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10892 /
tcp
2098371729 | 2025-03-15T22:18:37.925938
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
10909 /
tcp
-1476017887 | 2025-03-10T17:48:14.959252
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
10911 /
tcp
1278527606 | 2025-03-15T04:53:25.874616
11000 /
tcp
1911457608 | 2025-02-23T19:44:33.932293
\x00[\x00\x00\x00\x00\x00\x00
11075 /
tcp
-980525298 | 2025-02-21T20:34:31.858560
\x01\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
11111 /
tcp
819727972 | 2025-03-15T09:50:11.327089
SSH-2.0-OpenSSH_7.4
Vulnerabilities
11112 /
tcp
-2089734047 | 2025-03-16T05:20:06.325614
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
11288 /
tcp
1911457608 | 2025-03-21T10:05:43.260226
\x00[\x00\x00\x00\x00\x00\x00
11300 /
tcp
15018106 | 2025-03-21T08:52:23.384389
\x00\x19\x02\x00\x02\x00\x07\x00Protocol version mismatch\x00
11602 /
tcp
-1327660293 | 2025-02-27T19:29:16.676836
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
11680 /
tcp
-1399940268 | 2025-02-26T22:07:27.772523
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
11681 /
tcp
-438503381 | 2025-02-23T20:46:52.606198
WORLD OF WARCRAFT CONNECTION - SERVER TO CLIENT - V2
-2046909074 | 2025-03-11T03:16:39.048346
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae217c_PS-000-01mL925_24271-10054
12001 /
tcp
-616720387 | 2025-03-17T04:13:50.513986
12109 /
tcp
1911457608 | 2025-02-28T10:59:56.633318
\x00[\x00\x00\x00\x00\x00\x00
12115 /
tcp
575925250 | 2025-03-15T00:21:15.550748
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
12123 /
tcp
1911457608 | 2025-03-21T00:39:30.646177
\x00[\x00\x00\x00\x00\x00\x00
12125 /
tcp
321971019 | 2025-02-21T20:45:53.335806
-ERR client ip is not in whitelist\r
12131 /
tcp
-1810987450 | 2025-03-15T03:48:58.843362
12133 /
tcp
819727972 | 2025-02-26T03:24:12.430410
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12144 /
tcp
321971019 | 2025-03-08T20:24:08.044253
-ERR client ip is not in whitelist\r
12156 /
tcp
1726594447 | 2025-03-09T07:07:17.722604
\r\n\nLantronix MSS100 Version V118/523(045538937)\n\r\nType HELP at the \'Local_61349> \' prompt for assistance.\n\r\n\r\n\nUsername>
12160 /
tcp
165188539 | 2025-03-12T02:01:51.687474
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12175 /
tcp
-2089734047 | 2025-03-14T00:20:48.961455
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12177 /
tcp
1208318993 | 2025-03-11T23:10:17.517089
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
12186 /
tcp
51259122 | 2025-03-06T04:24:05.962578
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
12188 /
tcp
1492413928 | 2025-02-21T11:00:54.814820
SSH-2.0-OpenSSH_7.5
Vulnerabilities
12198 /
tcp
-1032713145 | 2025-03-16T04:26:45.551065
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
12207 /
tcp
-1297953727 | 2025-03-06T07:41:50.021539
\x02\x00\x00\x00\x00\x00\x06\x04\x00\x00\x00\x00\x00\x0c\x00\x00\n0\x00\x1c
12221 /
tcp
-2140303521 | 2025-03-19T06:50:19.126984
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected\n
12229 /
tcp
321971019 | 2025-03-11T05:29:53.278524
-ERR client ip is not in whitelist\r
-1013082686 | 2025-02-23T02:15:40.212568
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
-1230049476 | 2025-03-10T05:06:33.359759
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
12250 /
tcp
-784071826 | 2025-03-16T22:19:57.957271
SSH-2.0-OpenSSH_8.0
Vulnerabilities
12252 /
tcp
-1399940268 | 2025-03-13T20:59:02.398760
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12257 /
tcp
1911457608 | 2025-03-05T09:18:39.507038
\x00[\x00\x00\x00\x00\x00\x00
-147424911 | 2025-02-25T18:46:02.586058
HTTP/1.1 404 Not Found
Content Length: 0
12269 /
tcp
1134517380 | 2025-03-06T23:12:10.371169
welcome to Pandora console!\r\n----------------------------\n-------------------------\n| Login Time | 2021-12-08 1...\n
12272 /
tcp
-1810987450 | 2025-03-11T13:24:42.559506
12274 /
tcp
-2140303521 | 2025-02-26T22:30:54.987311
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected\n
12277 /
tcp
1911457608 | 2025-03-14T13:18:04.528584
\x00[\x00\x00\x00\x00\x00\x00
12278 /
tcp
-1399940268 | 2025-03-21T04:45:25.897509
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2103111368 | 2025-02-25T00:28:34.277777
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
12283 /
tcp
205347087 | 2025-03-05T04:15:08.666336
SSH-25453-Cisco-3524665.35\n
12303 /
tcp
-2089734047 | 2025-03-12T05:41:26.821755
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12328 /
tcp
307999478 | 2025-03-11T04:16:24.185372
unknown command \r\nunknown command \r\n
12332 /
tcp
819727972 | 2025-03-12T12:57:00.450729
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2103111368 | 2025-03-19T09:12:19.436490
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
265065882 | 2025-03-19T09:25:01.774710
HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
12356 /
tcp
632542934 | 2025-03-12T22:12:10.747260
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
114471724 | 2025-03-19T22:07:58.692840
HTTP/1.1 302
X-Frame-Options: SAMEORIGIN
Server: NSX
12370 /
tcp
2098371729 | 2025-03-18T02:13:55.665751
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
12383 /
tcp
117101543 | 2025-02-25T17:27:21.568384
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
12400 /
tcp
819727972 | 2025-03-15T23:38:55.615178
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12411 /
tcp
639175818 | 2025-02-20T23:18:45.791328
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
12412 /
tcp
-2089734047 | 2025-02-26T03:48:30.161628
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12416 /
tcp
1504401647 | 2025-03-08T21:55:28.066956
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
12422 /
tcp
-1297953727 | 2025-02-24T04:10:55.764228
\x02\x00\x00\x00\x00\x00\x06\x04\x00\x00\x00\x00\x00\x0c\x00\x00\n0\x00\x1c
12447 /
tcp
-375604792 | 2025-03-15T17:16:44.458829
220 Microsoft FTP Service
12448 /
tcp
1911457608 | 2025-03-04T14:28:15.774707
\x00[\x00\x00\x00\x00\x00\x00
12461 /
tcp
-2089734047 | 2025-03-04T14:23:30.358113
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12465 /
tcp
-1399940268 | 2025-03-09T18:02:41.801205
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12485 /
tcp
2098371729 | 2025-03-18T08:51:15.726817
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
12488 /
tcp
-2046514463 | 2025-03-19T13:35:20.087752
12491 /
tcp
-2089734047 | 2025-02-20T18:26:00.641570
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12493 /
tcp
-345718689 | 2025-02-25T19:05:14.299375
12514 /
tcp
-1428621233 | 2025-03-14T22:04:35.628265
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
12516 /
tcp
-303199180 | 2025-03-21T02:00:25.117136
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
12534 /
tcp
-1399940268 | 2025-03-15T20:07:59.405496
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12540 /
tcp
580340387 | 2025-03-18T22:19:29.687139
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
12548 /
tcp
1911457608 | 2025-03-15T12:17:18.038980
\x00[\x00\x00\x00\x00\x00\x00
12558 /
tcp
819727972 | 2025-02-27T09:12:06.875103
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12560 /
tcp
-891714208 | 2025-03-05T12:58:43.522131
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
12574 /
tcp
740837454 | 2025-02-26T05:27:58.817548
SSH-2.0-OpenSSH_5.3
Vulnerabilities
12581 /
tcp
-2089734047 | 2025-03-12T11:27:24.781950
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12588 /
tcp
-146605374 | 2025-03-09T11:32:24.091533
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
13000 /
tcp
-1810987450 | 2025-03-20T03:07:56.019567
13047 /
tcp
233634112 | 2025-03-12T00:58:10.891894
SSH-98.60-SysaxSSH_81885..42
13380 /
tcp
-2096652808 | 2025-03-11T04:51:39.859087
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
14265 /
tcp
380146262 | 2025-03-20T20:49:24.633804
14401 /
tcp
-1399940268 | 2025-03-06T14:48:33.062377
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
15044 /
tcp
1911457608 | 2025-03-17T16:26:26.604006
\x00[\x00\x00\x00\x00\x00\x00
15443 /
tcp
2087396567 | 2025-03-14T05:57:30.213532
kjnkjabhbanc283ubcsbhdc72
15503 /
tcp
819727972 | 2025-02-26T12:01:52.188420
SSH-2.0-OpenSSH_7.4
Vulnerabilities
15588 /
tcp
1911457608 | 2025-03-19T22:50:24.142623
\x00[\x00\x00\x00\x00\x00\x00
16024 /
tcp
-1746074029 | 2025-03-19T23:04:32.865624
16026 /
tcp
-1888448627 | 2025-02-19T21:14:55.665200
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
16042 /
tcp
-1399940268 | 2025-03-13T04:17:47.985204
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16048 /
tcp
-1733106930 | 2025-02-19T23:46:27.006253
Mysql Version: 5.6.50-log\nN\n5.6.50-log\x14(\nG5se"tGE\xc3\xbf\xc3\xb7-\x02\x7f\xc2\x80\x15cB^3$Zwh$wM[mysql_native_password
16054 /
tcp
-1399940268 | 2025-03-14T18:28:03.976481
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16057 /
tcp
-339084706 | 2025-03-10T02:36:24.047203
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
16073 /
tcp
-1699556818 | 2025-03-08T22:34:43.394174
\x01remshd: Kerberos Authentication not enabled.\n
16082 /
tcp
-1019343788 | 2025-03-18T05:48:20.221840
16101 /
tcp
119860953 | 2025-02-20T08:13:40.439010
* OK ArGoSoft Mail Server IMAP Module v.YW at
16104 /
tcp
45131230 | 2025-02-26T01:38:18.581900
inv2W\x04\x0f\x00\x00\x00\x01\x00\t\x00\x00\x00
16464 /
tcp
2087396567 | 2025-03-21T00:45:19.376921
kjnkjabhbanc283ubcsbhdc72
16993 /
tcp
-2017887953 | 2025-02-24T10:29:12.609335
SSH-2.0-OpenSSH_7.9
Vulnerabilities
17001 /
tcp
-1810987450 | 2025-02-22T16:11:24.808916
17082 /
tcp
117101543 | 2025-02-20T07:29:46.023480
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
17102 /
tcp
-2089734047 | 2025-03-16T08:59:09.856082
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
17779 /
tcp
321971019 | 2025-02-24T19:56:59.878624
-ERR client ip is not in whitelist\r
18004 /
tcp
-1733645023 | 2025-02-22T19:44:32.596418
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
18006 /
tcp
819727972 | 2025-03-06T16:33:39.647487
SSH-2.0-OpenSSH_7.4
Vulnerabilities
18028 /
tcp
-441419608 | 2025-03-19T09:05:15.590287
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
18029 /
tcp
-1428621233 | 2025-02-21T14:01:29.585576
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
18055 /
tcp
1911457608 | 2025-03-20T02:34:35.424048
\x00[\x00\x00\x00\x00\x00\x00
18062 /
tcp
-136006866 | 2025-03-16T16:50:24.895145
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
18063 /
tcp
-1399940268 | 2025-03-05T02:29:32.549280
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18064 /
tcp
-1746074029 | 2025-02-25T20:16:18.681419
18069 /
tcp
-2089734047 | 2025-03-18T13:21:26.686462
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
18081 /
tcp
-358801646 | 2025-03-19T23:00:57.133740
18082 /
tcp
-1888448627 | 2025-03-04T06:47:04.480538
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
18091 /
tcp
819727972 | 2025-02-28T11:15:16.705852
SSH-2.0-OpenSSH_7.4
Vulnerabilities
18094 /
tcp
597764502 | 2025-03-15T21:59:13.279249
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
18102 /
tcp
2098371729 | 2025-03-21T06:30:01.903533
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
18105 /
tcp
819727972 | 2025-03-06T07:48:58.136817
SSH-2.0-OpenSSH_7.4
Vulnerabilities
18113 /
tcp
-1399940268 | 2025-03-17T20:22:13.109118
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18181 /
tcp
-1399940268 | 2025-02-25T23:02:26.632280
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18245 /
tcp
1911457608 | 2025-03-09T23:49:08.421299
\x00[\x00\x00\x00\x00\x00\x00
18443 /
tcp
-2096652808 | 2025-03-15T11:04:40.461557
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
2143387245 | 2025-03-01T01:26:51.645428
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
19016 /
tcp
-1399940268 | 2025-03-19T08:42:06.078861
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
19017 /
tcp
-1888448627 | 2025-03-15T14:42:31.093249
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
19082 /
tcp
819727972 | 2025-03-11T11:25:24.604648
SSH-2.0-OpenSSH_7.4
Vulnerabilities
19930 /
tcp
1852418385 | 2025-03-14T11:12:10.022967
RTSP/1.0 453 Not Enough Bandwidth
Server: AirTunes/7l_wZ
20040 /
tcp
-1888448627 | 2025-03-03T19:33:31.583955
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
1282941221 | 2025-02-25T21:22:34.280758
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
20202 /
tcp
740837454 | 2025-03-09T12:03:43.125697
SSH-2.0-OpenSSH_5.3
Vulnerabilities
20256 /
tcp
921225407 | 2025-03-16T23:05:01.403044
\x00\x00\x00\x04\x00\x00\x00\x00\x00
20440 /
tcp
671605376 | 2025-03-15T03:02:50.306605
20512 /
tcp
1763259671 | 2025-03-20T02:30:25.421114
{\n"Version": "3.4.18",\n"VersionArray": [\n3,\n4,\n18,\n0\n],\n"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",\n"OpenSSLVersion": "",\n"SysInfo": "",\n"Bits": 64,\n"Debug": false,\n"MaxObjectSize": 16777216\n}\n\n
20547 /
tcp
-2046514463 | 2025-03-20T14:11:38.920029
20880 /
tcp
1370263973 | 2025-03-11T03:17:02.901021
-1839934832 | 2025-02-24T21:02:39.996522
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
21001 /
tcp
2098371729 | 2025-03-09T23:47:24.356929
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
21025 /
tcp
-1888448627 | 2025-03-16T18:45:28.216966
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
21084 /
tcp
937756010 | 2025-02-23T00:35:55.792112
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x01\x00\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
21238 /
tcp
-122096153 | 2025-03-11T20:03:12.904709
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
21241 /
tcp
-2096652808 | 2025-02-27T23:25:36.284003
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
21249 /
tcp
-1399940268 | 2025-02-28T18:52:30.327524
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21256 /
tcp
-1105333987 | 2025-03-19T21:27:53.759204
21260 /
tcp
819727972 | 2025-03-07T10:23:58.004675
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21262 /
tcp
819727972 | 2025-02-26T21:50:59.194516
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21263 /
tcp
1615193817 | 2025-03-18T09:19:24.891900
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
21280 /
tcp
165188539 | 2025-02-23T01:16:21.151564
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
21294 /
tcp
1519486042 | 2025-03-05T03:17:07.396239
<KU_goodbye>Protocol Error: XML data is not well-formed.</KU_goodbye>
21296 /
tcp
1519486042 | 2025-03-21T07:13:26.188728
<KU_goodbye>Protocol Error: XML data is not well-formed.</KU_goodbye>
-2107996212 | 2025-03-18T13:04:23.239592
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
21301 /
tcp
-1888448627 | 2025-03-16T19:48:10.982818
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
21314 /
tcp
-1399940268 | 2025-03-08T18:53:39.748120
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21318 /
tcp
-1399940268 | 2025-03-07T10:45:58.421118
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21320 /
tcp
-1835475271 | 2025-03-08T16:00:30.837975
200 NOD32SS 99 (3318497116)\r\n
21379 /
tcp
1911457608 | 2025-03-12T17:39:16.420193
\x00[\x00\x00\x00\x00\x00\x00
22000 /
tcp
-1611764932 | 2025-03-18T02:55:18.897249
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
22022 /
tcp
-1329831334 | 2025-03-12T15:48:44.285168
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
22103 /
tcp
819727972 | 2025-02-27T21:08:31.531130
SSH-2.0-OpenSSH_7.4
Vulnerabilities
22556 /
tcp
408230060 | 2025-03-19T17:36:57.156106
\r\nSorry, that nickname format is invalid.\r\n
22609 /
tcp
-2096652808 | 2025-02-27T21:33:03.390320
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
23023 /
tcp
171352214 | 2025-03-10T09:27:43.545501
-ERR client ip is not in whitelist
24082 /
tcp
-1399940268 | 2025-03-18T20:22:06.542412
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
24181 /
tcp
-1399940268 | 2025-02-25T22:38:23.603161
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
24245 /
tcp
819727972 | 2025-03-14T14:43:07.314140
SSH-2.0-OpenSSH_7.4
Vulnerabilities
24442 /
tcp
-1399940268 | 2025-02-27T18:03:06.145397
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
25001 /
tcp
-146605374 | 2025-03-07T14:12:55.971208
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
25003 /
tcp
-358801646 | 2025-02-22T11:37:43.368175
25006 /
tcp
1989907056 | 2025-02-23T22:19:45.397219
RTSP/1.0 453 Not Enough Bandwidth\r\nServer: AirTunes/7l_wZ\r\n\r\n
25565 /
tcp
-1888448627 | 2025-03-05T11:45:57.414560
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
26656 /
tcp
819727972 | 2025-03-13T06:53:05.584307
SSH-2.0-OpenSSH_7.4
Vulnerabilities
26657 /
tcp
117101543 | 2025-03-12T03:00:08.246089
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
28015 /
tcp
-2046514463 | 2025-02-23T20:24:09.749898
30002 /
tcp
-1681927087 | 2025-03-09T11:31:16.526099
kjnkjabhbanc283ubcsbhdc72
30003 /
tcp
-1681927087 | 2025-02-25T06:13:49.779042
kjnkjabhbanc283ubcsbhdc72
30007 /
tcp
-1810987450 | 2025-03-14T13:22:55.810465
30008 /
tcp
1911457608 | 2025-02-25T17:43:22.945434
\x00[\x00\x00\x00\x00\x00\x00
30022 /
tcp
1690634669 | 2025-03-18T22:08:14.393473
-1230049476 | 2025-02-22T05:03:30.408297
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
30113 /
tcp
-747911285 | 2025-03-14T14:19:28.485679
-1839934832 | 2025-03-19T22:27:41.027178
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
30222 /
tcp
819727972 | 2025-03-09T07:21:32.987719
SSH-2.0-OpenSSH_7.4
Vulnerabilities
30303 /
tcp
171352214 | 2025-03-20T01:16:24.317396
-ERR client ip is not in whitelist
30322 /
tcp
2087396567 | 2025-03-09T04:39:57.181619
kjnkjabhbanc283ubcsbhdc72
30443 /
tcp
1911457608 | 2025-03-13T10:01:39.786907
\x00[\x00\x00\x00\x00\x00\x00
30468 /
tcp
1911457608 | 2025-03-19T10:48:04.756516
\x00[\x00\x00\x00\x00\x00\x00
30522 /
tcp
819727972 | 2025-03-12T15:02:48.408809
SSH-2.0-OpenSSH_7.4
Vulnerabilities
31122 /
tcp
819727972 | 2025-03-09T13:14:37.289573
SSH-2.0-OpenSSH_7.4
Vulnerabilities
31222 /
tcp
1353260875 | 2025-03-13T05:01:51.283154
\x00[g\xc2\x95N\x7f\x00\x00
-147424911 | 2025-03-08T20:52:06.853852
HTTP/1.1 404 Not Found
Content Length: 0
-1230049476 | 2025-03-13T03:15:53.391750
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
31443 /
tcp
-971970408 | 2025-03-12T19:24:14.663942
31522 /
tcp
2087396567 | 2025-03-13T01:26:45.060084
kjnkjabhbanc283ubcsbhdc72
31722 /
tcp
-971970408 | 2025-03-12T23:10:58.315176
31822 /
tcp
546151771 | 2025-03-20T21:29:32.013547
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC
Clients:
/*.*.*.*:11264[0](queued=0,recved=1,sent=0)
Latency min/avg/max: 0/0.0/0
Received: 8557
Sent: 11410
Connections: 1
Outstanding: 0
Zxid: 0x332907ad3391
Mode: follower
Node count: 104618
31922 /
tcp
-345718689 | 2025-03-11T07:01:17.737279
32122 /
tcp
660175493 | 2025-03-20T03:46:30.875836
32222 /
tcp
472902042 | 2025-03-09T08:09:04.022419
"Magic:ActiveMQ
Version:12
<ActiveMQ*TcpNoDelayEnabledSizePrefixDisabled CacheSizeProviderName ActiveMQStackTraceEnabledPlatformDetails JavaCacheEnabledTightEncodingEnabledMaxFrameSize@MaxInac
32303 /
tcp
-274082663 | 2025-03-09T08:39:27.291848
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
32322 /
tcp
-893477759 | 2025-03-16T15:26:21.211032
!versionbind7 t{RPowerDNS Recursor 410
32522 /
tcp
472902042 | 2025-03-08T16:43:03.347730
"Magic:ActiveMQ
Version:12
<ActiveMQ*TcpNoDelayEnabledSizePrefixDisabled CacheSizeProviderName ActiveMQStackTraceEnabledPlatformDetails JavaCacheEnabledTightEncodingEnabledMaxFrameSize@MaxInac
32622 /
tcp
-905685638 | 2025-03-21T04:45:40.365785
-1230049476 | 2025-03-16T02:47:27.271586
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
33122 /
tcp
2087396567 | 2025-03-04T14:55:20.898404
kjnkjabhbanc283ubcsbhdc72
-1839934832 | 2025-03-20T00:19:55.951825
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
33322 /
tcp
-1477838366 | 2025-02-23T18:02:50.395837
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
33422 /
tcp
-297128567 | 2025-03-09T09:41:13.723899
\x04\x01\xc3\xb4\x00\x15Internal Server Error\x00\x00\x00AB\x00\x02\x05\x00
33622 /
tcp
-893477759 | 2025-03-08T20:08:57.201791
!versionbind7 t{RPowerDNS Recursor 410
33722 /
tcp
-1990350878 | 2025-03-18T04:50:37.646571
33822 /
tcp
-1887823886 | 2025-03-08T13:19:07.034820
K%~)J/\tHjU(IAGENT = (AGENT_VERSION = 2388790170)(RPC_VERSION = 5..722))
33922 /
tcp
1492413928 | 2025-03-18T04:00:53.187861
SSH-2.0-OpenSSH_7.5
Vulnerabilities
34222 /
tcp
-297128567 | 2025-03-20T02:25:29.390348
\x04\x01\xc3\xb4\x00\x15Internal Server Error\x00\x00\x00AB\x00\x02\x05\x00
34322 /
tcp
-2096652808 | 2025-03-19T19:05:19.228202
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
34422 /
tcp
1741579575 | 2025-02-28T05:44:18.721371
34622 /
tcp
-1872120160 | 2025-03-04T18:24:15.492125
">Application and Content Networking Software 3.9</a>)
</BODY><
34722 /
tcp
1996932384 | 2025-03-19T08:36:27.344866
34822 /
tcp
2087396567 | 2025-03-19T06:53:11.474669
kjnkjabhbanc283ubcsbhdc72
35000 /
tcp
-2089734047 | 2025-02-26T13:16:23.945925
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
35022 /
tcp
-653033013 | 2025-03-04T02:54:21.893682
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
35100 /
tcp
1996932384 | 2025-03-17T15:27:29.146232
35122 /
tcp
1842524259 | 2025-03-19T01:42:44.398504
35222 /
tcp
2087396567 | 2025-03-18T10:03:41.137264
kjnkjabhbanc283ubcsbhdc72
35250 /
tcp
-2089734047 | 2025-03-20T19:30:27.346914
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
35422 /
tcp
-971970408 | 2025-03-18T23:51:29.439452
35531 /
tcp
-1779118422 | 2025-02-28T18:06:56.866744
\x00[\xc2\xae\xc2\x8d{\x7f\x00\x00
35622 /
tcp
-1032713145 | 2025-03-04T13:02:40.767558
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
35922 /
tcp
-1461540015 | 2025-03-16T22:02:22.240928
audio 0 RTP/AVP 18 4 3 8 0 101
a
36022 /
tcp
-2033111675 | 2025-03-17T22:19:15.691027
36122 /
tcp
104385780 | 2025-03-13T10:43:30.933927
36322 /
tcp
1308377066 | 2025-03-17T13:03:40.009741
36522 /
tcp
-1729629024 | 2025-03-18T17:45:35.438098
36622 /
tcp
-1729629024 | 2025-02-27T12:20:13.504003
36722 /
tcp
2087396567 | 2025-03-17T05:32:58.378321
kjnkjabhbanc283ubcsbhdc72
36822 /
tcp
677934968 | 2025-03-18T16:20:58.740906
36922 /
tcp
2087396567 | 2025-03-18T13:29:47.738183
kjnkjabhbanc283ubcsbhdc72
37022 /
tcp
1975288991 | 2025-03-16T20:28:08.665700
37122 /
tcp
819727972 | 2025-03-16T23:55:05.461634
SSH-2.0-OpenSSH_7.4
Vulnerabilities
37322 /
tcp
-1428621233 | 2025-03-16T16:15:26.335087
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
37422 /
tcp
1850902677 | 2025-03-15T12:36:01.763689
37522 /
tcp
745343730 | 2025-03-16T10:02:14.200146
220 smtp.qq.com Esmtp QQ Mail Server
37622 /
tcp
-1795027372 | 2025-03-16T02:40:37.126825
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
37822 /
tcp
-527005584 | 2025-03-14T02:56:34.798891
37922 /
tcp
-1032713145 | 2025-03-18T01:37:30.451477
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
38022 /
tcp
2087396567 | 2025-03-17T23:27:30.737970
kjnkjabhbanc283ubcsbhdc72
38080 /
tcp
-616720387 | 2025-03-11T22:08:39.443121
38122 /
tcp
-2096652808 | 2025-03-15T18:01:43.863580
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
38322 /
tcp
1978059005 | 2025-03-15T14:18:27.639841
Sorry, that nickname format is invalid.
38333 /
tcp
-1375131644 | 2025-03-15T21:26:44.564372
\x00[v\xc3\xbdC\x7f\x00\x00
38622 /
tcp
-2096652808 | 2025-03-14T09:18:40.698610
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
38722 /
tcp
2087396567 | 2025-03-14T01:09:47.369351
kjnkjabhbanc283ubcsbhdc72
38822 /
tcp
233634112 | 2025-03-12T17:02:48.035938
SSH-98.60-SysaxSSH_81885..42
38880 /
tcp
-1097188123 | 2025-02-23T13:20:58.815190
39022 /
tcp
-79865617 | 2025-02-22T06:16:33.541595
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com
mit-revprops depth log-revprops partial-replay ) ) )
39122 /
tcp
1761482307 | 2025-03-13T19:13:13.905509
\x00[\xc2\xa5\t\xc2\xbe\x7f\x00\x00
39222 /
tcp
-971970408 | 2025-03-13T17:29:23.808748
39522 /
tcp
2087396567 | 2025-02-20T15:16:26.290421
kjnkjabhbanc283ubcsbhdc72
39622 /
tcp
-1032713145 | 2025-03-11T08:15:32.946498
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
40000 /
tcp
819727972 | 2025-03-12T16:15:04.346663
SSH-2.0-OpenSSH_7.4
Vulnerabilities
40001 /
tcp
1911457608 | 2025-02-26T01:43:06.802196
\x00[\x00\x00\x00\x00\x00\x00
40005 /
tcp
-1399940268 | 2025-02-26T02:49:10.863651
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
40099 /
tcp
-142686627 | 2025-03-04T09:00:57.157315
\x00[\xc2\xba\x7fs\x7f\x00\x00
40322 /
tcp
-2096652808 | 2025-03-08T21:50:48.624727
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
41522 /
tcp
2087396567 | 2025-03-04T21:53:56.563529
kjnkjabhbanc283ubcsbhdc72
41800 /
tcp
51259122 | 2025-03-07T06:59:13.296846
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
41922 /
tcp
-971970408 | 2025-03-07T17:48:39.881732
42122 /
tcp
1286504516 | 2025-03-05T03:10:08.462360
CP2E Control Console
Connected to Host: gZI
42208 /
tcp
-1399940268 | 2025-02-25T01:41:55.405296
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
971933601 | 2025-03-04T23:39:32.841739
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
42422 /
tcp
1741579575 | 2025-03-04T22:09:21.505806
42901 /
tcp
1492413928 | 2025-03-10T19:27:21.376695
SSH-2.0-OpenSSH_7.5
Vulnerabilities
43009 /
tcp
819727972 | 2025-03-16T17:15:18.634288
SSH-2.0-OpenSSH_7.4
Vulnerabilities
43322 /
tcp
819727972 | 2025-02-23T07:38:56.694890
SSH-2.0-OpenSSH_7.4
Vulnerabilities
43422 /
tcp
-1311598826 | 2025-02-27T20:38:39.373173
AMQP:
cluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local
copyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.
information:Licensed under the MPL 2.0. Website: https://rabbitmq.com
platform:Erlang/OTP 24.1
product:RabbitMQ
version:3.9.7
Capabilities:
publisher_confirms:true
exchange_exchange_bindings:true
basic.nack:true
consumer_cancel_notify:true
connection.blocked:true
consumer_priorities:true
authentication_failure_close:true
per_consumer_qos:true
direct_reply_to:tru
43622 /
tcp
819727972 | 2025-02-27T00:42:48.513081
SSH-2.0-OpenSSH_7.4
Vulnerabilities
43922 /
tcp
-1810987450 | 2025-02-27T10:35:08.750672
44158 /
tcp
-433302150 | 2025-03-18T16:07:50.778735
44322 /
tcp
1741579575 | 2025-02-26T02:32:02.234777
-1839934832 | 2025-02-26T07:34:30.726755
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
45006 /
tcp
580340387 | 2025-02-22T01:07:53.974600
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
45122 /
tcp
819727972 | 2025-02-25T13:22:20.936234
SSH-2.0-OpenSSH_7.4
Vulnerabilities
45222 /
tcp
819727972 | 2025-02-25T19:50:38.224413
SSH-2.0-OpenSSH_7.4
Vulnerabilities
45322 /
tcp
1978059005 | 2025-02-25T18:13:40.123214
Sorry, that nickname format is invalid.
45622 /
tcp
2087396567 | 2025-02-25T15:05:30.985479
kjnkjabhbanc283ubcsbhdc72
45777 /
tcp
-1399940268 | 2025-03-01T01:38:39.887997
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
45922 /
tcp
799468586 | 2025-03-10T15:56:09.202726
1077013874 | 2025-02-25T08:11:51.874016
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
46222 /
tcp
2087396567 | 2025-02-24T23:49:16.880260
kjnkjabhbanc283ubcsbhdc72
46322 /
tcp
1620329124 | 2025-02-25T00:15:20.996766
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\x01\xc3\xbf\xc3\xbb\x03\xc3\xbf\xc3\xbd\x01\xc3\xbf\xc3\xbe\x01Username:
46422 /
tcp
1308377066 | 2025-02-24T10:48:49.682179
46443 /
tcp
321971019 | 2025-03-15T14:01:39.225223
-ERR client ip is not in whitelist\r
46622 /
tcp
1690634669 | 2025-02-24T04:30:45.027645
47222 /
tcp
808560482 | 2025-02-23T21:32:00.834022
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP
: USERID : UNIX : Cr8
47422 /
tcp
-971970408 | 2025-02-25T02:00:32.625376
-1839934832 | 2025-02-25T09:56:50.985496
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
47534 /
tcp
819727972 | 2025-03-13T16:09:41.281933
SSH-2.0-OpenSSH_7.4
Vulnerabilities
47622 /
tcp
1741579575 | 2025-02-23T14:35:08.682294
47722 /
tcp
1212921144 | 2025-03-10T11:54:47.488236
47922 /
tcp
-971970408 | 2025-03-10T08:49:09.072131
47989 /
tcp
1363464823 | 2025-03-05T01:16:28.969022
47990 /
tcp
1231376952 | 2025-03-06T22:25:00.040863
2143387245 | 2025-03-06T01:54:26.263128
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
48222 /
tcp
-616720387 | 2025-03-10T04:55:12.689941
114471724 | 2025-03-10T01:37:53.723596
HTTP/1.1 302
X-Frame-Options: SAMEORIGIN
Server: NSX
48622 /
tcp
-1559123399 | 2025-02-24T20:00:10.616139
500 Permission denied - closing connection.
48722 /
tcp
539065883 | 2025-02-24T16:43:52.322809
48822 /
tcp
-1900404274 | 2025-02-23T10:20:47.219274
48888 /
tcp
165188539 | 2025-02-21T03:18:16.787423
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
48922 /
tcp
1690634669 | 2025-02-19T19:58:33.126888
49522 /
tcp
1261582754 | 2025-02-21T06:01:52.146357
unknown command
unknown command
50000 /
tcp
-653033013 | 2025-03-17T22:06:43.038347
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
50002 /
tcp
-1399940268 | 2025-03-06T01:46:23.457380
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
50014 /
tcp
1210754493 | 2025-03-10T03:29:50.456243
0\x0c\x02\x01\x01a\x07\n\x01\x00\x04\x00\x04\x00
50022 /
tcp
819727972 | 2025-03-19T18:22:54.448296
SSH-2.0-OpenSSH_7.4
Vulnerabilities
50100 /
tcp
671605376 | 2025-03-13T01:40:46.226173
50101 /
tcp
-1626979812 | 2025-03-20T08:41:13.425443
220 Service ready for new user.
50107 /
tcp
1911457608 | 2025-03-18T04:41:47.961235
\x00[\x00\x00\x00\x00\x00\x00
50122 /
tcp
921225407 | 2025-03-15T21:02:55.575167
\x00\x00\x00\x04\x00\x00\x00\x00\x00
50422 /
tcp
1426971893 | 2025-02-22T06:13:21.366066
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
50622 /
tcp
-2081419599 | 2025-02-21T20:17:12.411552
-2107996212 | 2025-02-20T23:58:53.381191
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
50998 /
tcp
-1099385124 | 2025-03-04T23:43:07.773907
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
50999 /
tcp
-1399940268 | 2025-02-24T01:14:29.101514
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
51000 /
tcp
1126993057 | 2025-03-14T05:53:44.613300
* OK [CAPABILITY a2,M\\] nBwXk2pPP IMAP4rev1 20qx at
51003 /
tcp
321971019 | 2025-03-14T04:03:23.087747
-ERR client ip is not in whitelist\r
51007 /
tcp
2063598737 | 2025-03-04T15:17:40.203203
51106 /
tcp
1778988322 | 2025-03-20T10:58:03.201377
* OK GroupWise IMAP4rev1 Server Ready
51222 /
tcp
-445721795 | 2025-02-21T13:28:47.807370
\x00[\xc3\xaed\x1a\x7f\x00\x00
51235 /
tcp
819727972 | 2025-02-22T05:02:18.667177
SSH-2.0-OpenSSH_7.4
Vulnerabilities
51322 /
tcp
-2081419599 | 2025-02-21T11:47:12.747849
51434 /
tcp
1911457608 | 2025-03-15T20:15:55.828284
\x00[\x00\x00\x00\x00\x00\x00
51443 /
tcp
-971970408 | 2025-03-12T01:14:18.892969
52022 /
tcp
401555314 | 2025-03-07T01:18:45.940411
52422 /
tcp
-971970408 | 2025-02-20T03:05:09.193975
114471724 | 2025-02-20T01:16:14.113211
HTTP/1.1 302
X-Frame-Options: SAMEORIGIN
Server: NSX
53484 /
tcp
1911457608 | 2025-03-04T20:16:45.071228
\x00[\x00\x00\x00\x00\x00\x00
54138 /
tcp
-1428621233 | 2025-03-18T03:25:55.987254
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
54857 /
tcp
1665283070 | 2025-03-19T14:33:17.595265
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x01\x00\x00\x10\x00\x00\n0\x03\x00\x00\x00\x01\x00\x05\x00\x00@\x00\x00\x06\x00\x00\x1f@
55000 /
tcp
819727972 | 2025-03-10T18:26:28.205902
SSH-2.0-OpenSSH_7.4
Vulnerabilities
55022 /
tcp
1308377066 | 2025-03-07T04:40:27.610991
55200 /
tcp
-1399940268 | 2025-02-24T12:14:39.670778
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
55443 /
tcp
2087396567 | 2025-03-20T19:57:02.339399
kjnkjabhbanc283ubcsbhdc72
55553 /
tcp
1278527606 | 2025-03-04T14:09:08.887488
55554 /
tcp
104385780 | 2025-03-17T20:11:04.060725
1830697416 | 2025-03-06T16:41:03.735242
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
55722 /
tcp
1690634669 | 2025-03-06T20:20:05.922381
57522 /
tcp
2087396567 | 2025-03-06T14:18:15.918109
kjnkjabhbanc283ubcsbhdc72
57722 /
tcp
2033888749 | 2025-03-06T09:01:54.103171
Content-Type: text/rude-rejection
Content-Length: 24
Access Denied, go away.
Content-Type: text/disconnect-notice
C...
57822 /
tcp
1741579575 | 2025-03-06T06:56:11.721591
58322 /
tcp
2087396567 | 2025-03-06T00:54:49.859319
kjnkjabhbanc283ubcsbhdc72
58532 /
tcp
1911457608 | 2025-03-19T19:43:57.502279
\x00[\x00\x00\x00\x00\x00\x00
59022 /
tcp
-2096652808 | 2025-03-05T13:34:15.492416
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
59222 /
tcp
-971970408 | 2025-03-05T10:07:44.563916
-1453516345 | 2025-03-05T08:23:13.355237
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
60001 /
tcp
-903067560 | 2025-03-15T03:23:45.088697
\x00[\x13)\xc2\x81\x7f\x00\x00
60129 /
tcp
290819026 | 2025-03-20T05:34:19.143921
welcome to Pandora console!
----------------------------
-------------------------
| Login Time | 2021-12-08 1...
61613 /
tcp
119860953 | 2025-03-12T03:00:51.830428
* OK ArGoSoft Mail Server IMAP Module v.YW at
61616 /
tcp
-971970408 | 2025-03-14T05:11:57.397798
62078 /
tcp
-860824904 | 2025-03-09T04:29:29.162918
63045 /
tcp
-146605374 | 2025-03-09T12:35:43.963660
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
63210 /
tcp
597764502 | 2025-03-14T23:39:14.362813
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
63256 /
tcp
-1681927087 | 2025-03-15T05:17:45.932765
kjnkjabhbanc283ubcsbhdc72
63260 /
tcp
597764502 | 2025-03-07T07:44:38.131146
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00