11 /
tcp
660175493 | 2025-04-18T00:15:59.214308
13 /
tcp
-1770051369 | 2025-04-06T16:14:23.031331
15 /
tcp
-1399940268 | 2025-04-17T18:34:41.997767
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
17 /
tcp
2063576847 | 2025-04-23T01:44:48.701180
"My spelling is Wobbly. It\'s good spelling but it Wobbles, and the letters\r\n get in the wrong places." A. A. Milne (1882-1958)\r\n
19 /
tcp
751496153 | 2025-04-07T08:50:06.126345
* OK TeamXchange IMAP4rev1 server (otyUg) ready.
20 /
tcp
-2089734047 | 2025-04-18T09:09:50.048417
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
21 /
tcp
-1248408558 | 2025-04-20T02:37:06.324908
220 MikroTik FTP server (MikroTik 6.44.3) ready
23 /
tcp
-1288412979 | 2025-04-09T00:07:29.815775
43 /
tcp
539065883 | 2025-04-03T00:59:58.258973
49 /
tcp
-1620040646 | 2025-04-19T10:42:15.268439
\xc3\xbf\xc3\xbb\\x01\r\nWelcome to NetLinx v94 Copyright AMX Corp. 34395-49007\r\n>
53 /
tcp
-626196604 | 2025-03-28T12:02:06.594407
9
\x81\x80\x00\x01\x00\x02\x00\x00\x00\x00\x08clients1\x06google\x03com\x00\x00\x01\x00\x01\xc0\x00\x05\x00\x01\x00\x00\x00\xca\x00\x07clients\x01l\xc0\x15\xc01\x00\x01\x00\x01\x00\x00\x00\x83\x00\x04\xac٠n
\x00\x06\x81\x85\x00\x01\x00\x00\x00\x00\x00
66 /
tcp
165188539 | 2025-04-04T00:24:03.883378
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
857710896 | 2025-03-28T22:43:50.699524
HTTP/1.1 200 OK
Server:
X-Frame-Options: SAMEORIGIN
Content-type: text/html; charset=UTF-8
Last-modified: Mon, 27 Nov 2023 21:45:42 GMT
Accept-Ranges: bytes
Content-length: 580
Vary: Accept-Encoding
X-XSS-Protection: 1; mode=block
Strict-Transport-Security: max-age=0
X-Content-Type-Options: nosniff
79 /
tcp
1732483321 | 2025-04-22T07:53:05.728858
421 too many connections\r\n
0 | 2025-04-19T09:07:31.392623
HTTP/1.1 408 Request Timeout
content-length: 0
0 | 2025-04-17T15:17:00.262677
HTTP/1.1 408 Request Timeout
content-length: 0
94 /
tcp
1911457608 | 2025-04-10T22:55:03.437808
\x00[\x00\x00\x00\x00\x00\x00
102 /
tcp
-1888448627 | 2025-04-26T03:27:49.659643
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
104 /
tcp
1919228981 | 2025-04-08T05:40:41.748729
\x00\x1e\x00\x06\xc2\x81\xc2\x85\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
110 /
tcp
1911457608 | 2025-04-25T18:47:43.789962
\x00[\x00\x00\x00\x00\x00\x00
111 /
tcp
-971970408 | 2025-03-31T17:14:40.163661
135 /
tcp
1483120365 | 2025-04-26T19:39:23.507644
\\x05\\x00\r\\x03\\x10\\x00\\x00\\x00\\x18\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x04\\x00\\x01\\x05\\x00\\x00\\x00\\x00\n\nServerAlive2: \n IP1: OP2\n IP2: 192.168.0.20\n IP3: 61.230.135.142\n IP4: 2001:b011:2006:c3ef:18c0:9e02:ef7:84c8\n\nNTLMSSP:\nTarget_Name: OP2\nProduct_Version: 6.1.7601 Ntlm 15\nOS: Windows 7, Service Pack 1/Windows Server 2008 R2, Service Pack 1\nNetBIOS_Domain_Name: OP2\nNetBIOS_Computer_Name: OP2\nDNS_Domain_Name: OP2\nDNS_Computer_Name: OP2\nSystem_Time: 2024-01-22 07:10:42 +0000 UTC\n\nDCERPC Dump:\n4b112204-0e19-11d3-b42b-
175 /
tcp
103159425 | 2025-04-20T04:52:16.348494
177 /
tcp
-1399940268 | 2025-04-23T23:26:33.681137
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
179 /
tcp
-399606100 | 2025-04-24T02:03:33.839733
BGP Message\nType: 3\nMajor error Code: 6\nMinor error Code: 5\n
189 /
tcp
921225407 | 2025-04-18T23:00:38.550115
\x00\x00\x00\x04\x00\x00\x00\x00\x00
192 /
tcp
-1611764932 | 2025-04-26T11:26:48.827788
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
195 /
tcp
2087396567 | 2025-04-18T04:23:27.421448
kjnkjabhbanc283ubcsbhdc72
264 /
tcp
-1547821026 | 2025-04-14T21:00:20.306203
CheckPoint\nFirewall Host: CPFWVSX1A_Audi_ODP_S2S_vsfw\nSmartCenter Host: admin..afx8nn\\x00\n
67948279 | 2025-03-28T09:35:30.911780
HTTP/1.1 200 OK
Content-Type: text/html
Accept-Ranges: bytes
Server: Microsoft-IIS/8.5
X-Powered-By: ASP.NET
340 /
tcp
-1678345660 | 2025-04-12T02:48:04.291373
!\\x07version\\x04bind7 t{RPowerDNS Recursor 410
971933601 | 2025-04-09T16:48:37.512771
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
389 /
tcp
-1743283776 | 2025-04-26T21:23:11.644406
0\x0c\\x02\\x01\\x01a\\x07\n\\x01\\x04\\x04
427 /
tcp
1530390632 | 2025-04-17T21:14:00.513457
SAAdvert Response:\nVersion: 2\nFunction: SA Advertisement (11)\nURL: service:service-agent://127.0.0.1\nScopeList: default\nAttrributeList: \n\n\nserviceTypes:\nservice:ipmi\nservice:cdserver\nservice:fdserver\nservice:hdserver\nservice:adviser\nservice:lighttpd\nB://l:87/x\n\nResponse of service:ipmi SrvReq:\nVersion: 2\nFunction: Service Reply (2)\nErrorCode: SUCCESS (0)\nURL Entries:\n Lifetime: 65535\n URL: service:ipmi://(none):623\n Lifetime: 65535\n URL: service:ipmi://IEI9CC2C4135A27:623\n\n\nResponse of service:ipmi Attr
440 /
tcp
-2033111675 | 2025-04-18T21:35:54.385094
441 /
tcp
819727972 | 2025-04-04T22:22:20.620674
SSH-2.0-OpenSSH_7.4
Vulnerabilities
442 /
tcp
1381121983 | 2025-04-16T16:38:19.248097
449 /
tcp
321971019 | 2025-03-31T21:20:36.911285
-ERR client ip is not in whitelist\r
450 /
tcp
321971019 | 2025-04-02T06:29:39.698843
-ERR client ip is not in whitelist\r
465 /
tcp
897328069 | 2025-04-15T18:26:32.008849
220 mail.scott000.com ESMTP
503 /
tcp
-1795027372 | 2025-04-20T06:31:26.995516
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
513 /
tcp
-1399940268 | 2025-04-02T05:27:43.726253
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
515 /
tcp
321971019 | 2025-04-23T03:46:12.914683
-ERR client ip is not in whitelist\r
522 /
tcp
-2096652808 | 2025-04-05T11:44:42.724627
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
541 /
tcp
1497273505 | 2025-04-12T16:05:35.653891
\\x16\\x03\\x01\\x01P\\x01\\x00\\x01L\\x03\\x03\\x84L\\xcf\\x00\\x0e\xc4\x96Q\\xf3\\xb1\\x9f\\x88\\x08\\x92\\xd7S\\xf1\\xb7\\xc9\\xc79\\xcc\\xf6Tk\\x1dj\\xc6`\\x89\\x86\\xeb \\xbc\\xef\\xc3<\\xe5g\\x96\\xa4L\\x1c\\x1b]ea\\x81$D\\x99\\x92eH\\x85\\x82\\x1b*\\xc2*\\xaeb9n9\\x002\\x13\\x02\\x13\\x03\\x13\\x01\\x009\\x0
554 /
tcp
1060450357 | 2025-04-18T18:25:48.632932
RTSP/1.0 200 OK
CSeq: 1
Keep-Alive: timeout=10, max=1000
Public: DESCRIBE, SETUP, TEARDOWN, PLAY, PAUSE, SET_PARAMETER, GET_PARAMETER
Connection: Keep-Alive
556 /
tcp
-122096153 | 2025-04-10T20:50:19.234714
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
587 /
tcp
-1890071674 | 2025-04-22T17:01:26.335228
220 JH0PR01CA0066.outlook.office365.com Microsoft ESMTP MAIL Service ready at Mon, 22 Jan 2024 06:32:01 +0000\r\n250-JH0PR01CA0066.outlook.office365.com Hello [*.*.*.*]\r\n250-SIZE 157286400\r\n250-PIPELINING\r\n250-DSN\r\n250-ENHANCEDSTATUSCODES\r\n250-STARTTLS\r\n250-8BITMIME\r\n250-BINARYMIME\r\n250-CHUNKING\r\n250 SMTPUTF8\r\n214-This server supports the following commands:\r\n214 HELO EHLO STARTTLS RCPT DATA RSET MAIL QUIT HELP AUTH BDAT\r\n
-1261053701 | 2025-04-20T07:40:07.098644
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html; charset="UTF-8"
Transfer-Encoding: chunked
Connection: keep-alive
Keep-Alive: timeout=20
Cache-control: no-store
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
632 /
tcp
1911457608 | 2025-04-09T23:00:17.907818
\x00[\x00\x00\x00\x00\x00\x00
1239199743 | 2025-04-23T11:51:38.442857
HTTP/1.1 400 Bad Request
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 9-24676686-0 0NNN RT(1705910221170 116) q(-1 -1 -1 -1) r(0 -1) b1
646 /
tcp
-1600864159 | 2025-04-02T19:05:08.501266
\\x00\\x01\\x00\\x1c\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x01\\x00\\x12\\x00<\xce\x89\\x03\\x00\\x00\n\\x80\\x00\\x00\\x03\\x00\\x00\\x00\\x00\\x00\\x00
1300162323 | 2025-04-16T13:04:06.595956
HTTP/1.1 404 Not Found
Content-Type: text/plain; charset=utf-8
X-Content-Type-Options: nosniff
-2021756999 | 2025-04-12T21:36:56.805638
HTTP/1.1 302 Moved Temporarily
Content-Type: text/html
Connection: close
Server: Nginx
Expires: 0
Pragma: no-cache
Cache-Control: no-cache
Location: https://portal.ikuai8-wifi.com/templates/default/index.html?timestamp=1705576118&router_ver=3.2.0&firmware=IK-RouterOS&template=default&gwid=12d4c28d07674103aaf242ea477f8666&user_ip=*.*.*.*
771 /
tcp
819727972 | 2025-04-26T02:51:34.385439
SSH-2.0-OpenSSH_7.4
Vulnerabilities
782 /
tcp
819727972 | 2025-04-04T14:48:28.078545
SSH-2.0-OpenSSH_7.4
Vulnerabilities
801 /
tcp
819727972 | 2025-04-19T00:20:32.178556
SSH-2.0-OpenSSH_7.4
Vulnerabilities
811 /
tcp
2098371729 | 2025-04-25T10:53:07.215512
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
-1839934832 | 2025-04-18T15:10:34.807254
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
873 /
tcp
-1970692834 | 2025-04-02T06:50:26.103533
@RSYNCD: 31.0\n@RSYNCD: EXIT\n
886 /
tcp
-1730858130 | 2025-04-04T01:29:47.154964
RFB 003.008
VNC:
Protocol Version: 3.8
887 /
tcp
2063598737 | 2025-03-29T03:00:39.811552
902 /
tcp
693973426 | 2025-03-29T03:14:37.430008
220 VMware Authentication Daemon Version 1.10: SSL Required, Se\nrverDaemonProtocol:SOAP, MKSDisplayProtocol:VNC , , NFCSSL supported/t
947 /
tcp
-441419608 | 2025-04-07T09:55:01.622265
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
-936692830 | 2025-04-25T09:29:22.207972
HTTP/1.1 202 OK
Connection: Keep-Alive
Content-Type: text/html
Keep-Alive: timeout=15; max=19
995 /
tcp
-2113068813 | 2025-04-16T01:04:52.832140
1022 /
tcp
819727972 | 2025-04-15T23:02:17.652659
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1023 /
tcp
1632932802 | 2025-04-21T03:43:41.709753
1025 /
tcp
1991883981 | 2025-03-31T18:43:28.290739
B\x00\x00\x00\xc3\xbfn\x04Too many connections
1153 /
tcp
-1327660293 | 2025-04-23T18:35:39.298805
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
1177 /
tcp
1093576587 | 2025-04-26T19:29:04.537268
1195 /
tcp
-1737707071 | 2025-04-20T09:55:07.759031
\x00b\x00\x01\x00\x00\x00\x00x\x0b\x00\x00\x00\x00z\x00437
1234 /
tcp
-653033013 | 2025-04-25T20:26:35.813938
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
1290 /
tcp
819727972 | 2025-04-23T19:47:49.379511
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1337 /
tcp
1741579575 | 2025-04-16T00:18:23.391932
1365 /
tcp
1911457608 | 2025-04-21T04:22:32.737391
\x00[\x00\x00\x00\x00\x00\x00
1414 /
tcp
-1428621233 | 2025-04-22T13:02:47.241267
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
1433 /
tcp
-325802316 | 2025-04-04T00:20:01.284290
MSSQL Server\nVersion: 134219767 (0x80007f7)\nSub-Build: 0\nEncryption:Not available\n\nMSSQL NTLM Info:\nTarget_Name: PC-20150816MQOM\nProduct_Version: 6.1.7601 Ntlm 15\nOS: Windows 7, Service Pack 1/Windows Server 2008 R2, Service Pack 1\nNetBIOS_Domain_Name: PC-20150816MQOM\nNetBIOS_Computer_Name: PC-20150816MQOM\nDNS_Domain_Name: PC-20150816MQOM\nDNS_Computer_Name: PC-20150816MQOM\nMsvAvFlags: 01000000\nSystem_Time: 2024-01-22 04:03:26 +0000 UTC\n\n
1451 /
tcp
-980525298 | 2025-04-02T04:17:15.496211
\x01\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
1453 /
tcp
-375604792 | 2025-04-14T20:11:37.518193
220 Microsoft FTP Service
1456 /
tcp
119860953 | 2025-03-31T09:45:30.847982
* OK ArGoSoft Mail Server IMAP Module v.YW at
1458 /
tcp
1911457608 | 2025-03-28T12:18:45.035291
\x00[\x00\x00\x00\x00\x00\x00
1521 /
tcp
-1337747449 | 2025-04-15T19:52:32.139167
Version:12.2.0.1.0\n"\\x00\\x00Y(DESCRIPTION=(TMP=)(VSNNUM=203424000)(ERR=1189)(ERROR_STACK=(ERROR=(CODE=1189)(EMFI=4))))
1599 /
tcp
842535728 | 2025-03-28T02:53:00.379008
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>
A<!DOCTYPE GANGLIA_XML [
<!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...
1604 /
tcp
-971970408 | 2025-03-28T14:52:19.334915
1723 /
tcp
-1608241410 | 2025-04-20T19:47:47.571212
Firmware: 1\nHostname: local\nVendor: linux\n
1883 /
tcp
-1559123399 | 2025-04-16T17:38:16.962533
500 Permission denied - closing connection.
1955 /
tcp
321971019 | 2025-04-15T19:46:51.154964
-ERR client ip is not in whitelist\r
1959 /
tcp
165188539 | 2025-04-01T09:31:41.576267
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
1962 /
tcp
-1105333987 | 2025-04-22T16:33:48.613409
-1839934832 | 2025-04-15T23:05:09.317632
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
1970 /
tcp
165188539 | 2025-04-14T22:27:49.854558
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
-1547976805 | 2025-04-03T21:34:06.123431
HTTP/1.1 403 Forbidden
Server: nginx
Content-Type: text/html
Connection: close
1979 /
tcp
1208318993 | 2025-04-12T18:53:13.876191
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
2000 /
tcp
-904840257 | 2025-04-23T09:52:49.742602
572 Relay not authorized\r\n
2001 /
tcp
1911457608 | 2025-04-03T16:20:45.549481
\x00[\x00\x00\x00\x00\x00\x00
2003 /
tcp
1911457608 | 2025-04-16T20:56:11.759862
\x00[\x00\x00\x00\x00\x00\x00
2006 /
tcp
-2089734047 | 2025-04-07T22:33:31.775724
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
-1453516345 | 2025-04-24T23:59:11.032315
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
2010 /
tcp
-375604792 | 2025-04-22T13:10:23.253350
220 Microsoft FTP Service
2016 /
tcp
1911457608 | 2025-04-23T00:55:28.977109
\x00[\x00\x00\x00\x00\x00\x00
2021 /
tcp
1911457608 | 2025-04-12T05:02:58.208241
\x00[\x00\x00\x00\x00\x00\x00
2048 /
tcp
-1399940268 | 2025-04-09T12:59:51.051263
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2053 /
tcp
1911457608 | 2025-04-06T19:59:28.494718
\x00[\x00\x00\x00\x00\x00\x00
2055 /
tcp
819727972 | 2025-03-31T22:53:21.679598
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2059 /
tcp
1492413928 | 2025-04-17T15:22:32.698162
SSH-2.0-OpenSSH_7.5
Vulnerabilities
2067 /
tcp
539065883 | 2025-04-02T20:08:36.198092
2069 /
tcp
-345718689 | 2025-04-10T22:54:02.096130
2081 /
tcp
1189133115 | 2025-04-22T14:53:21.313233
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
1282941221 | 2025-04-17T15:29:44.179343
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
2087 /
tcp
1911457608 | 2025-04-20T16:28:06.435289
\x00[\x00\x00\x00\x00\x00\x00
-2107996212 | 2025-04-22T17:50:20.730654
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
2096 /
tcp
321971019 | 2025-04-19T00:57:58.549009
-ERR client ip is not in whitelist\r
2107 /
tcp
-2031152423 | 2025-04-12T19:51:37.720017
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
2122 /
tcp
-1626979812 | 2025-04-06T14:05:01.448725
220 Service ready for new user.
-2060002556 | 2025-04-02T15:19:49.035555
HTTP/1.1 404
Content-Type: text/html;charset=utf-8
Content-Language: en
2181 /
tcp
546151771 | 2025-04-20T16:59:50.790625
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC
Clients:
/*.*.*.*:11264[0](queued=0,recved=1,sent=0)
Latency min/avg/max: 0/0.0/0
Received: 8557
Sent: 11410
Connections: 1
Outstanding: 0
Zxid: 0x332907ad3391
Mode: follower
Node count: 104618
2196 /
tcp
819727972 | 2025-04-18T07:24:34.206949
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1023953321 | 2025-04-19T17:26:47.206601
HTTP/1.0 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm="proxy"
Connection: close
Content-type: text/html; charset=utf-8
372433470 | 2025-04-24T05:40:24.845445
HTTP/1.1 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm=""
1662205251 | 2025-04-25T21:35:20.806081
HTTP/1.0 404 FAIL
Content-length:5
Connection:Close
2345 /
tcp
819727972 | 2025-04-23T22:50:22.884232
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2376 /
tcp
-971970408 | 2025-03-31T21:14:21.178018
-1230049476 | 2025-04-21T16:42:53.064042
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
-1839934832 | 2025-04-04T14:35:55.304255
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
2455 /
tcp
1327134490 | 2025-04-27T01:35:28.169764
2567 /
tcp
-1327660293 | 2025-03-31T06:02:24.727322
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
2626 /
tcp
819727972 | 2025-04-22T03:35:03.020816
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2628 /
tcp
-971970408 | 2025-04-23T14:27:41.164657
2709 /
tcp
819727972 | 2025-04-03T11:50:32.665799
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2761 /
tcp
1911457608 | 2025-04-08T11:00:11.018778
\x00[\x00\x00\x00\x00\x00\x00
2762 /
tcp
401555314 | 2025-04-16T02:11:35.672917
3001 /
tcp
819727972 | 2025-04-22T18:16:55.854234
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3005 /
tcp
624004002 | 2025-04-02T16:26:45.937139
3006 /
tcp
1911457608 | 2025-04-03T20:28:57.201063
\x00[\x00\x00\x00\x00\x00\x00
3009 /
tcp
-1399940268 | 2025-04-11T13:19:10.974753
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1227409554 | 2025-04-23T17:16:10.638455
HTTP/1.1 500 Internal Server Error
Server: Zope/(2.13.23, python 1.7.18, linux2) ZServer/1.1
Content-Type: text/plain; charset=utf-8
Connection: close
3019 /
tcp
401555314 | 2025-04-24T05:50:06.505418
3021 /
tcp
1911457608 | 2025-04-17T05:54:00.814162
\x00[\x00\x00\x00\x00\x00\x00
3048 /
tcp
-1032713145 | 2025-04-12T11:23:52.013206
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
3050 /
tcp
-1399940268 | 2025-04-16T19:49:34.637405
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3051 /
tcp
1911457608 | 2025-04-12T01:22:47.326645
\x00[\x00\x00\x00\x00\x00\x00
-159371303 | 2025-04-22T08:54:41.172687
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae0811_zhyd34_13884-62039
3053 /
tcp
1615193817 | 2025-03-28T23:55:20.017554
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
3057 /
tcp
1615193817 | 2025-04-05T11:18:59.160258
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
3061 /
tcp
-1730858130 | 2025-04-17T12:05:57.210584
RFB 003.008
VNC:
Protocol Version: 3.8
3067 /
tcp
1911457608 | 2025-04-07T00:41:50.476133
\x00[\x00\x00\x00\x00\x00\x00
198844676 | 2025-04-23T10:52:34.851866
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3072 /
tcp
580340387 | 2025-04-26T11:18:43.575119
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
3075 /
tcp
-1399940268 | 2025-04-12T14:42:08.830986
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
198844676 | 2025-04-23T02:55:37.716474
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3085 /
tcp
-2089734047 | 2025-04-16T23:13:17.796787
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
-1013082686 | 2025-04-25T14:47:13.203156
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
3096 /
tcp
1363464823 | 2025-04-19T06:03:00.369265
3103 /
tcp
-1399940268 | 2025-04-02T06:25:31.496303
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3106 /
tcp
-1399940268 | 2025-04-20T21:16:50.235703
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3127 /
tcp
-1399940268 | 2025-04-09T05:05:53.846580
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3139 /
tcp
-747911285 | 2025-04-07T14:04:20.938812
3140 /
tcp
165188539 | 2025-04-19T00:07:25.395044
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
3146 /
tcp
-653033013 | 2025-04-16T11:36:03.914243
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
3155 /
tcp
-1327660293 | 2025-04-06T10:23:38.246250
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
3159 /
tcp
1624217396 | 2025-04-16T09:27:07.639301
HELO:10.3.6.0.false\nAS:2048\nHL:19
3161 /
tcp
-1730858130 | 2025-04-24T04:36:08.992089
RFB 003.008
VNC:
Protocol Version: 3.8
3172 /
tcp
165188539 | 2025-04-16T10:56:30.641745
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
3177 /
tcp
-2096652808 | 2025-04-03T05:54:54.922465
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
3178 /
tcp
-2096652808 | 2025-04-07T03:14:27.775219
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
3182 /
tcp
-1399940268 | 2025-04-26T00:39:34.826558
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3186 /
tcp
1911457608 | 2025-04-15T09:11:24.839535
\x00[\x00\x00\x00\x00\x00\x00
-1914158197 | 2025-04-18T05:12:16.502803
HTTP/1.1 500 Internal Server Error
Server: nginx/1.18.11011 (Ubuntu)
Content-Type: text/plain; charset=utf-8
Connection: close
3268 /
tcp
-805362002 | 2025-04-26T08:26:06.299610
ICAP/1.0 501 Other
Server: Traffic Spicer 7788179225
3299 /
tcp
2087396567 | 2025-04-18T08:54:54.725838
kjnkjabhbanc283ubcsbhdc72
3301 /
tcp
117101543 | 2025-03-31T19:33:44.678768
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
3306 /
tcp
849822411 | 2025-04-21T22:01:48.041370
Mysql Version: 5.7.44-log \r\nN\\x00\\x00\\x00\n5.7.44-log\\x00s/\\x06\\x00(o>\\x1c`\\x18*a\\x00\\xff\\xff-\\x02\\x00\\xff\\xc1\\x15\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00fFU\\x07_\\x1ay\\x14i}\\x02E\\x00mysql_native_password\\x00
1077013874 | 2025-04-22T01:04:06.453710
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
3388 /
tcp
-457235091 | 2025-04-17T13:40:12.431283
audio 0 RTP/AVP 18 4 3 8 0 101\r\na
3405 /
tcp
-2089734047 | 2025-04-02T19:10:01.874965
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3503 /
tcp
-1399940268 | 2025-04-10T16:12:30.825435
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3510 /
tcp
1308377066 | 2025-04-16T16:52:22.410699
3531 /
tcp
1911457608 | 2025-04-07T07:27:18.764205
\x00[\x00\x00\x00\x00\x00\x00
198844676 | 2025-04-09T11:31:19.747794
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3555 /
tcp
-1399940268 | 2025-04-05T21:47:28.498729
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3559 /
tcp
-438503381 | 2025-04-05T20:40:23.445192
WORLD OF WARCRAFT CONNECTION - SERVER TO CLIENT - V2
3562 /
tcp
-1648456501 | 2025-04-21T15:38:58.031424
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
3563 /
tcp
-1399940268 | 2025-04-25T00:56:21.323056
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3590 /
tcp
165188539 | 2025-04-05T21:20:58.933269
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
3622 /
tcp
-180163620 | 2025-04-01T19:31:54.393677
NPC Telnet permit one connection.\r\n But One connection() already keep alive.\r\nGood Bye !! \r\n
3780 /
tcp
-971970408 | 2025-04-22T22:12:14.726692
3790 /
tcp
539065883 | 2025-04-23T19:45:55.355305
3838 /
tcp
819727972 | 2025-04-09T11:34:08.701424
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3841 /
tcp
-2080784861 | 2025-04-03T08:32:57.989746
GBPK\xc3\xbb\xc3\xb7n\xc2\x93W\xc2\xaf\xc2\x86\xc2\x93x@\xc2\xa9\x0e\xc3\x8a*\xc2\x9bS\x00
3954 /
tcp
-358801646 | 2025-04-06T14:11:12.891328
141533638 | 2025-04-19T11:56:55.292364
HTTP/1.1 302 Found
Location: /index.html
4010 /
tcp
165188539 | 2025-03-28T11:10:30.512868
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
4022 /
tcp
1332894250 | 2025-04-24T07:54:16.204185
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
4063 /
tcp
-1471513798 | 2025-04-25T17:23:03.168660
4064 /
tcp
897328069 | 2025-03-29T19:27:13.556874
220 mail.scott000.com ESMTP
-1013082686 | 2025-04-07T20:51:42.727305
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
4100 /
tcp
-1611764932 | 2025-04-19T07:20:18.221862
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
4150 /
tcp
671605376 | 2025-04-11T01:29:30.037692
4155 /
tcp
-585940771 | 2025-04-23T04:53:24.141775
4157 /
tcp
1778988322 | 2025-04-20T00:15:42.340877
* OK GroupWise IMAP4rev1 Server Ready
4282 /
tcp
416263569 | 2025-04-21T19:36:31.484085
4321 /
tcp
-1250504565 | 2025-04-20T03:36:49.780485
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x80\x00\x04\x00\x01\x00\x00\x00\x05\x00\xff\xff\xff\x00\x00\x04\x08\x00\x00\x00\x00\x00\x7f\xff\x00\x00\x00\x00\x08\x07\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01
4369 /
tcp
-801484042 | 2025-04-01T12:51:37.744499
4430 /
tcp
819727972 | 2025-04-24T18:03:28.170897
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4434 /
tcp
-1641514916 | 2025-04-09T11:36:26.962723
* OK Merak 1dFUa2 IMAP4rev1
4435 /
tcp
-1399940268 | 2025-04-22T22:03:48.915575
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4436 /
tcp
599074451 | 2025-04-09T09:01:06.851524
2069201278 | 2025-04-23T16:35:06.001259
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html
Connection: keep-alive
Set-Cookie: login_err_num=0; path=/; secure=true; httponly=true
Set-Cookie: topsecsvportalstyle=style1; path=/; secure=true; httponly=true
Set-Cookie: topsecsvportallogodir=default; path=/; secure=true; httponly=true
Set-Cookie: topsecsvportalname=default; path=/; secure=true; httponly=true
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
Strict-Transport-Security: max-age=31536000; includeSubDomains
X-XSS-Protectio
1282941221 | 2025-04-21T18:56:59.680971
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
4500 /
tcp
1278527606 | 2025-04-20T17:11:30.335583
4506 /
tcp
1741579575 | 2025-04-05T20:33:47.583244
4523 /
tcp
-1713437100 | 2025-04-10T06:02:27.308144
\xc3\xbf\xc3\xbb\x01\r\nWelcome to NetLinx v94 Copyright AMX Corp. 34395-49007\r\n>
4524 /
tcp
-2096652808 | 2025-04-08T23:03:36.465693
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
2143387245 | 2025-03-29T00:33:04.579195
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
4700 /
tcp
401555314 | 2025-04-10T20:49:22.729032
4899 /
tcp
819727972 | 2025-04-18T09:30:00.502254
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4911 /
tcp
-1476017887 | 2025-04-19T20:35:33.728215
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
4949 /
tcp
2087396567 | 2025-04-17T19:53:26.773255
kjnkjabhbanc283ubcsbhdc72
5001 /
tcp
-971970408 | 2025-04-23T05:56:30.560662
5006 /
tcp
1426971893 | 2025-04-11T14:55:55.611157
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
5007 /
tcp
117101543 | 2025-04-15T02:41:09.758793
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
5010 /
tcp
-1746074029 | 2025-04-20T22:43:04.825888
5093 /
tcp
632542934 | 2025-04-08T09:59:04.304167
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
5100 /
tcp
-2096652808 | 2025-04-20T01:54:57.555459
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
114471724 | 2025-04-14T16:35:06.391544
HTTP/1.1 302
X-Frame-Options: SAMEORIGIN
Server: NSX
5209 /
tcp
819727972 | 2025-04-24T15:52:40.869506
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5222 /
tcp
819727972 | 2025-04-14T19:08:59.238141
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5231 /
tcp
819727972 | 2025-04-01T00:29:43.381760
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5238 /
tcp
-1779118422 | 2025-04-25T05:13:30.728270
\x00[\xc2\xae\xc2\x8d{\x7f\x00\x00
5251 /
tcp
-805362002 | 2025-04-07T19:14:10.377673
ICAP/1.0 501 Other
Server: Traffic Spicer 7788179225
5256 /
tcp
921225407 | 2025-04-17T16:06:39.662049
\x00\x00\x00\x04\x00\x00\x00\x00\x00
-981921233 | 2025-04-03T07:34:35.493541
HTTP/1.1 404 Not Found
DATE: Fri, 19 Jan 2024 11:56:43 GMT
Connection: Keep-Alive
Server: LINUX/2.4 UPnP/1.0 BRCM400/1.0
Content-Type: text/xml; charset="utf-8"
EXT:
5432 /
tcp
-1399940268 | 2025-04-23T10:57:49.828962
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5435 /
tcp
-136006866 | 2025-04-09T10:52:06.948952
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
5444 /
tcp
-2096652808 | 2025-04-06T13:25:41.797692
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
5503 /
tcp
504717326 | 2025-04-20T17:54:25.273414
SSH-2.0-OpenSSH_8.6
Vulnerabilities
5568 /
tcp
-1899074860 | 2025-04-04T11:55:00.414170
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00\x00\x00\n03\x00\x00\x00d\x00\x04\x00\x01\x00\x00\x00\x00\x04\x08\x00\x00\x00\n
5590 /
tcp
-1279886438 | 2025-04-20T23:12:52.898371
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
5591 /
tcp
1975288991 | 2025-04-05T00:26:14.311298
-1013082686 | 2025-04-11T02:26:33.642336
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
5600 /
tcp
-249504111 | 2025-04-06T20:32:22.195430
5606 /
tcp
671605376 | 2025-04-24T20:29:11.493465
5620 /
tcp
-904840257 | 2025-04-06T01:07:14.527585
572 Relay not authorized\r\n
5630 /
tcp
-1399940268 | 2025-04-03T18:04:57.772128
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5853 /
tcp
-1399940268 | 2025-04-03T18:42:49.749054
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5858 /
tcp
1093576587 | 2025-04-19T08:25:10.449496
5902 /
tcp
-1730858130 | 2025-04-20T23:24:19.759280
RFB 003.008
VNC:
Protocol Version: 3.8
5904 /
tcp
-441419608 | 2025-04-03T12:59:43.254815
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
5911 /
tcp
632542934 | 2025-04-19T07:30:41.284641
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
1999272906 | 2025-04-06T11:59:43.903366
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
5993 /
tcp
-1032713145 | 2025-04-08T08:19:30.816252
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
5997 /
tcp
321971019 | 2025-04-25T06:32:26.993258
-ERR client ip is not in whitelist\r
6000 /
tcp
-146605374 | 2025-04-08T01:28:51.595920
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
1282941221 | 2025-04-22T07:25:25.634906
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
6002 /
tcp
-737567094 | 2025-04-14T20:32:43.238652
N
5.6.40-logÅTUNEgVX2
¢!xlB...
6007 /
tcp
1761482307 | 2025-04-20T20:54:59.619276
\x00[\xc2\xa5\t\xc2\xbe\x7f\x00\x00
6022 /
tcp
819727972 | 2025-04-04T20:32:10.724463
SSH-2.0-OpenSSH_7.4
Vulnerabilities
6161 /
tcp
632542934 | 2025-04-07T14:49:08.291242
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
6262 /
tcp
165188539 | 2025-04-04T06:39:32.856812
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
6264 /
tcp
-1399940268 | 2025-03-28T09:02:42.128007
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6352 /
tcp
-1626979812 | 2025-04-15T14:16:12.242794
220 Service ready for new user.
6488 /
tcp
1213931722 | 2025-04-07T12:17:18.956894
ICAP/1.0 501 Other\r\nServer: Traffic Spicer 7788179225\r\n
6601 /
tcp
-2089734047 | 2025-04-16T00:35:25.163588
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
6622 /
tcp
-1888448627 | 2025-04-21T04:12:36.722066
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
6633 /
tcp
1911457608 | 2025-04-25T11:06:42.439413
\x00[\x00\x00\x00\x00\x00\x00
6653 /
tcp
-1730858130 | 2025-04-26T21:04:38.234010
RFB 003.008
VNC:
Protocol Version: 3.8
4935895 | 2025-04-18T15:23:27.220694
HTTP/1.1 400 Bad Request
Server: CloudWAF
6667 /
tcp
-1399940268 | 2025-04-26T04:46:26.159954
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6668 /
tcp
-891714208 | 2025-04-19T18:34:02.753700
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
-288825733 | 2025-04-03T15:09:43.318830
HTTP/1.1 200 OK
Connection: close
Content-Length: 2619
Accept-Ranges: bytes
Access-Control-Allow-Credentials: true
Access-Control-Allow-Headers: authorization,Content-Type
Access-Control-Allow-Methods: POST, GET, OPTIONS, PUT, HEAD, DELETE
Content-Type: text/html
Server: Jetty(9.4.14.v20181114)
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1
6748 /
tcp
-1626979812 | 2025-03-31T09:21:49.726386
220 Service ready for new user.
6955 /
tcp
-1032713145 | 2025-04-24T03:25:23.686592
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
-274925451 | 2025-04-10T19:29:05.820797
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae2914_PSzqstdxnz35_3380-26211
7002 /
tcp
-1399940268 | 2025-04-19T23:15:42.527856
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7018 /
tcp
-1399940268 | 2025-03-31T16:47:18.017123
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7050 /
tcp
-1399940268 | 2025-04-06T23:36:33.409842
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7085 /
tcp
321971019 | 2025-04-10T14:08:49.181804
-ERR client ip is not in whitelist\r
7171 /
tcp
-1032713145 | 2025-04-24T03:52:28.762315
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
7172 /
tcp
-1375131644 | 2025-03-29T13:40:32.067864
\x00[v\xc3\xbdC\x7f\x00\x00
7173 /
tcp
671605376 | 2025-03-31T23:46:39.936191
7218 /
tcp
1887224352 | 2025-04-18T08:26:49.359417
7283 /
tcp
1911457608 | 2025-04-24T11:37:06.147724
\x00[\x00\x00\x00\x00\x00\x00
7401 /
tcp
-1114821551 | 2025-04-06T23:16:44.788646
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
7415 /
tcp
-1399940268 | 2025-04-24T05:49:49.283073
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7434 /
tcp
2087396567 | 2025-04-11T02:09:25.452438
kjnkjabhbanc283ubcsbhdc72
7480 /
tcp
366084633 | 2025-04-21T13:27:27.132273
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
7535 /
tcp
-2046514463 | 2025-04-01T21:47:06.171713
7548 /
tcp
2087396567 | 2025-04-12T10:03:35.831618
kjnkjabhbanc283ubcsbhdc72
7601 /
tcp
819727972 | 2025-04-07T07:21:21.692627
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2103111368 | 2025-04-23T12:28:33.377264
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
7782 /
tcp
-136006866 | 2025-04-01T10:49:29.635596
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
7900 /
tcp
-2096652808 | 2025-04-27T00:32:46.716095
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
7979 /
tcp
103159425 | 2025-04-03T19:38:10.620550
8002 /
tcp
1911457608 | 2025-04-18T22:33:00.597725
\x00[\x00\x00\x00\x00\x00\x00
8009 /
tcp
1426971893 | 2025-04-12T06:09:29.581845
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
8011 /
tcp
-1140468363 | 2025-03-28T05:34:59.129826
8017 /
tcp
-1996280214 | 2025-04-23T03:57:53.112309
8022 /
tcp
819727972 | 2025-04-05T17:34:56.514660
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1839934832 | 2025-04-18T15:07:25.925407
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
8037 /
tcp
-2089734047 | 2025-04-20T22:42:51.376612
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8039 /
tcp
-1399940268 | 2025-03-31T13:23:45.858603
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8042 /
tcp
2049274725 | 2025-04-17T14:08:04.269197
8046 /
tcp
398077695 | 2025-04-06T18:28:46.557425
8081 /
tcp
-801484042 | 2025-04-10T07:44:03.138969
8083 /
tcp
-441419608 | 2025-04-23T03:32:04.816254
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
8085 /
tcp
841014058 | 2025-04-17T16:05:13.166690
Hello, this is FRRouting (version 4.0).
Copyright 19
96-2005 Kunihiro Ishiguro, et al.
Use...
8087 /
tcp
-2089734047 | 2025-04-12T03:53:44.879493
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8089 /
tcp
-321444299 | 2025-04-10T15:49:42.416362
:dircproxy NOTICE AUTH :Looking up your hostname...
:dircproxy NOTICE AUTH :Got your hostname.
1282941221 | 2025-04-08T07:49:21.580220
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
623236583 | 2025-04-14T20:53:13.899942
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae293a_dedxin34_19677-349
8116 /
tcp
-1746074029 | 2025-04-16T20:54:05.371686
8126 /
tcp
-527005584 | 2025-04-18T07:28:27.885001
8135 /
tcp
819727972 | 2025-04-18T14:39:11.642724
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8136 /
tcp
1911457608 | 2025-04-04T06:39:33.853114
\x00[\x00\x00\x00\x00\x00\x00
8139 /
tcp
2087396567 | 2025-04-17T21:43:06.363408
kjnkjabhbanc283ubcsbhdc72
8140 /
tcp
-616720387 | 2025-04-18T00:11:46.412764
8156 /
tcp
819727972 | 2025-04-10T21:13:41.590657
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8157 /
tcp
-1139539254 | 2025-04-08T19:16:49.619090
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
8169 /
tcp
1911457608 | 2025-04-19T03:31:33.729752
\x00[\x00\x00\x00\x00\x00\x00
8172 /
tcp
1308377066 | 2025-04-26T19:35:41.440408
8174 /
tcp
119860953 | 2025-04-05T05:39:45.088533
* OK ArGoSoft Mail Server IMAP Module v.YW at
8181 /
tcp
819727972 | 2025-04-08T23:15:06.709581
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8185 /
tcp
1308377066 | 2025-04-20T18:41:10.515810
8190 /
tcp
1911457608 | 2025-04-05T12:12:27.226670
\x00[\x00\x00\x00\x00\x00\x00
-2050145619 | 2025-04-12T06:22:40.236102
1320285193 | 2025-04-21T10:19:25.839766
HTTP/1.1 404 Not Found
Server: CloudWAF
Content-Type: text/html
Connection: keep-alive
8203 /
tcp
410249975 | 2025-04-17T21:26:21.560842
8251 /
tcp
-1888448627 | 2025-04-23T03:59:36.333831
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8280 /
tcp
1911457608 | 2025-04-05T15:55:49.266240
\x00[\x00\x00\x00\x00\x00\x00
8282 /
tcp
740837454 | 2025-04-05T12:30:20.134665
SSH-2.0-OpenSSH_5.3
Vulnerabilities
8291 /
tcp
819727972 | 2025-04-15T23:07:52.099319
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8322 /
tcp
-1899074860 | 2025-04-06T08:04:14.126387
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00\x00\x00\n03\x00\x00\x00d\x00\x04\x00\x01\x00\x00\x00\x00\x04\x08\x00\x00\x00\n
-1713467553 | 2025-04-09T18:28:16.107029
HTTP/1.1 400 Bad Request
Content-Type: text/html; charset=us-ascii
Server: Microsoft-HTTPAPI/2.0
Connection: close
8410 /
tcp
-1730858130 | 2025-04-24T00:44:11.954478
RFB 003.008
VNC:
Protocol Version: 3.8
8412 /
tcp
1189133115 | 2025-04-01T09:47:39.862086
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
8413 /
tcp
-1399940268 | 2025-04-23T16:57:02.397295
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1013082686 | 2025-04-11T20:45:44.812424
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
1096654864 | 2025-04-02T04:45:06.524591
HTTP/1.0 200 OK
Server: httpd/2.0
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
Content-Type: text/html
Connection: close
1830697416 | 2025-04-02T21:56:44.229158
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
8446 /
tcp
819727972 | 2025-04-02T18:39:52.971411
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8462 /
tcp
632542934 | 2025-04-17T10:12:41.594836
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
8465 /
tcp
693973426 | 2025-04-25T23:53:18.408546
220 VMware Authentication Daemon Version 1.10: SSL Required, Se\nrverDaemonProtocol:SOAP, MKSDisplayProtocol:VNC , , NFCSSL supported/t
8467 /
tcp
-303199180 | 2025-04-25T03:57:46.615767
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
8480 /
tcp
1975288991 | 2025-04-22T19:00:17.498627
8500 /
tcp
-684625978 | 2025-04-18T16:55:26.983227
{Datacenter:dc1 NodeName:consul-dev NodeID:e61aec6b-e338-67fa-3b08-f8185bd5b528 Revision:db839f18b Server:true Version:1.10.1}
2103111368 | 2025-04-19T00:34:24.867838
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
8505 /
tcp
-1399940268 | 2025-04-04T23:43:55.750131
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8510 /
tcp
-1399940268 | 2025-04-25T11:11:59.739587
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8519 /
tcp
-2033111675 | 2025-04-06T22:18:51.937377
8545 /
tcp
819727972 | 2025-04-07T23:51:53.913745
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8551 /
tcp
-1399940268 | 2025-04-01T08:01:16.339986
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8554 /
tcp
660175493 | 2025-04-04T13:36:27.025679
8557 /
tcp
1911457608 | 2025-04-03T07:38:24.716342
\x00[\x00\x00\x00\x00\x00\x00
8564 /
tcp
921225407 | 2025-04-19T13:49:11.819313
\x00\x00\x00\x04\x00\x00\x00\x00\x00
8565 /
tcp
709622286 | 2025-04-06T20:52:24.104351
OK Welcome <299685> on DirectUpdate server 7286\r\n
8575 /
tcp
921225407 | 2025-04-23T12:32:49.502435
\x00\x00\x00\x04\x00\x00\x00\x00\x00
8580 /
tcp
819727972 | 2025-04-05T12:56:12.029830
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8583 /
tcp
165188539 | 2025-04-21T16:47:57.938775
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8587 /
tcp
-1399940268 | 2025-04-17T13:34:37.560177
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8588 /
tcp
-2017887953 | 2025-04-22T20:23:16.054871
SSH-2.0-OpenSSH_7.9
Vulnerabilities
8590 /
tcp
1655023012 | 2025-04-22T14:29:19.335114
athinfod: invalid query.\n
8700 /
tcp
1991883981 | 2025-04-11T03:26:32.161791
B\x00\x00\x00\xc3\xbfn\x04Too many connections
8706 /
tcp
632542934 | 2025-04-21T00:03:59.925687
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
8708 /
tcp
-1795027372 | 2025-04-25T05:54:38.608175
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
-802143704 | 2025-04-19T22:16:15.836842
HTTP/1.0 500 Internal Server Error
D
Connection: close
Command server error
8733 /
tcp
-2089734047 | 2025-04-21T15:51:36.340531
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8764 /
tcp
321971019 | 2025-04-17T10:06:24.005096
-ERR client ip is not in whitelist\r
-2118655245 | 2025-04-17T18:34:30.354170
HTTP/1.0 500 Internal Server Error
Content-Length: 20
8791 /
tcp
1911457608 | 2025-03-28T23:02:25.220361
\x00[\x00\x00\x00\x00\x00\x00
8818 /
tcp
-784071826 | 2025-04-18T20:23:29.575955
SSH-2.0-OpenSSH_8.0
Vulnerabilities
8824 /
tcp
117101543 | 2025-04-21T13:21:38.188836
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
-2107996212 | 2025-04-10T08:24:19.708353
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
8839 /
tcp
321971019 | 2025-04-24T03:04:37.312568
-ERR client ip is not in whitelist\r
8860 /
tcp
-1399940268 | 2025-04-12T14:40:26.789863
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8869 /
tcp
321971019 | 2025-03-29T10:39:27.981546
-ERR client ip is not in whitelist\r
8883 /
tcp
165188539 | 2025-04-24T11:27:16.042997
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8884 /
tcp
-1399940268 | 2025-04-21T21:48:09.824584
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8889 /
tcp
-1681927087 | 2025-04-18T14:20:49.567633
kjnkjabhbanc283ubcsbhdc72
8891 /
tcp
-1265999252 | 2025-04-04T20:11:47.734101
220 VMware Authentication Daemon Version 1.0, ServerDaemonProto\ncol:SOAP, MKSDisplayProtocol:VNC , ,
8899 /
tcp
474736340 | 2025-04-08T08:25:21.366748
431 Unable to negotiate secure command connection.
8900 /
tcp
-1099385124 | 2025-04-03T07:21:46.003271
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
8902 /
tcp
-1099385124 | 2025-04-19T22:13:31.306064
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
8908 /
tcp
1911457608 | 2025-04-09T08:03:49.573283
\x00[\x00\x00\x00\x00\x00\x00
8916 /
tcp
819727972 | 2025-03-28T10:55:59.545743
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9003 /
tcp
921225407 | 2025-04-02T13:43:14.034982
\x00\x00\x00\x04\x00\x00\x00\x00\x00
9015 /
tcp
1996932384 | 2025-03-29T08:04:32.739891
9020 /
tcp
2063598737 | 2025-04-25T15:20:56.230690
9021 /
tcp
819727972 | 2025-04-24T13:36:05.286018
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9024 /
tcp
-2089734047 | 2025-04-06T08:52:03.857919
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9027 /
tcp
205347087 | 2025-04-12T05:18:21.057008
SSH-25453-Cisco-3524665.35\n
9030 /
tcp
819727972 | 2025-04-16T02:09:08.096039
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9039 /
tcp
-1399940268 | 2025-04-17T06:16:21.057911
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9042 /
tcp
539065883 | 2025-04-25T17:32:29.052488
9044 /
tcp
205347087 | 2025-04-09T06:40:40.449360
SSH-25453-Cisco-3524665.35\n
9046 /
tcp
398077695 | 2025-04-08T06:14:41.133094
9048 /
tcp
1911457608 | 2025-04-01T20:10:56.151535
\x00[\x00\x00\x00\x00\x00\x00
9051 /
tcp
1842524259 | 2025-04-25T11:42:04.246997
9057 /
tcp
-1399940268 | 2025-03-28T20:21:58.255255
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9060 /
tcp
1574088840 | 2025-04-03T18:09:52.291745
">Application and Content Networking Software 3.9</a>)\n</BODY><
9061 /
tcp
-1737707071 | 2025-04-11T06:29:13.251248
\x00b\x00\x01\x00\x00\x00\x00x\x0b\x00\x00\x00\x00z\x00437
9065 /
tcp
-1399940268 | 2025-04-02T05:38:25.092355
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9072 /
tcp
-1648456501 | 2025-04-15T22:32:51.092021
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
9074 /
tcp
819727972 | 2025-04-21T03:35:37.590704
SSH-2.0-OpenSSH_7.4
Vulnerabilities
114471724 | 2025-04-25T17:40:37.555441
HTTP/1.1 302
X-Frame-Options: SAMEORIGIN
Server: NSX
1282941221 | 2025-03-31T20:30:15.716856
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
9092 /
tcp
1911457608 | 2025-04-22T15:10:06.863062
\x00[\x00\x00\x00\x00\x00\x00
9095 /
tcp
819727972 | 2025-04-26T22:31:08.435638
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1282941221 | 2025-04-07T06:24:54.354790
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
638001051 | 2025-04-18T13:18:19.587593
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae2311_PS-000-013Ry57_7584-47162
9100 /
tcp
-358801646 | 2025-04-25T05:09:32.974871
9103 /
tcp
1353260875 | 2025-04-21T09:26:18.951367
\x00[g\xc2\x95N\x7f\x00\x00
9109 /
tcp
165188539 | 2025-04-06T16:57:58.684108
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
9114 /
tcp
693973426 | 2025-04-10T06:34:37.909314
220 VMware Authentication Daemon Version 1.10: SSL Required, Se\nrverDaemonProtocol:SOAP, MKSDisplayProtocol:VNC , , NFCSSL supported/t
9124 /
tcp
1011407350 | 2025-04-11T04:56:27.733244
* OK GroupWise IMAP4rev1 Server Ready\r\n
9131 /
tcp
1278527606 | 2025-04-25T21:40:44.701080
9134 /
tcp
-1399940268 | 2025-04-22T05:20:39.885424
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9135 /
tcp
-1737707071 | 2025-04-23T07:45:51.490396
\x00b\x00\x01\x00\x00\x00\x00x\x0b\x00\x00\x00\x00z\x00437
9146 /
tcp
1011407350 | 2025-04-11T03:29:58.913130
* OK GroupWise IMAP4rev1 Server Ready\r\n
9148 /
tcp
819727972 | 2025-04-25T01:55:40.603842
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9151 /
tcp
819727972 | 2025-04-17T14:14:25.423011
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9156 /
tcp
1763259671 | 2025-04-05T15:24:29.623582
{\n"Version": "3.4.18",\n"VersionArray": [\n3,\n4,\n18,\n0\n],\n"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",\n"OpenSSLVersion": "",\n"SysInfo": "",\n"Bits": 64,\n"Debug": false,\n"MaxObjectSize": 16777216\n}\n\n
9160 /
tcp
-1399940268 | 2025-04-25T22:07:28.417178
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9173 /
tcp
-358801646 | 2025-04-05T12:24:50.664344
9194 /
tcp
819727972 | 2025-04-19T09:55:21.767013
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9209 /
tcp
-805362002 | 2025-03-28T04:38:40.026781
ICAP/1.0 501 Other
Server: Traffic Spicer 7788179225
9220 /
tcp
1911457608 | 2025-04-05T18:15:44.927378
\x00[\x00\x00\x00\x00\x00\x00
9222 /
tcp
-1888448627 | 2025-04-11T19:39:23.563269
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9247 /
tcp
1642597142 | 2025-04-06T21:52:19.026602
\x00y\xc3\x90\x02\xc3\xbf\xc3\xbf\x00s\x12L\x00\x06\x11I\x00\x08\x00N\x11S\x00\xc3\x93
9250 /
tcp
1911457608 | 2025-04-14T16:17:18.379217
\x00[\x00\x00\x00\x00\x00\x00
9299 /
tcp
-1810987450 | 2025-04-01T10:19:21.186213
9303 /
tcp
-2089734047 | 2025-04-03T14:26:22.397959
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9306 /
tcp
1911457608 | 2025-04-23T16:07:35.078620
\x00[\x00\x00\x00\x00\x00\x00
9307 /
tcp
-1399940268 | 2025-04-23T03:34:02.751281
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9315 /
tcp
-1428621233 | 2025-04-08T01:40:39.563818
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
9333 /
tcp
-1746074029 | 2025-04-26T06:23:59.986014
-1839934832 | 2025-04-09T00:03:40.806972
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
-1453516345 | 2025-03-31T14:45:38.986134
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
9454 /
tcp
1504401647 | 2025-04-18T22:08:29.595092
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
9513 /
tcp
-1140468363 | 2025-04-06T07:03:09.207432
9633 /
tcp
1824169301 | 2025-04-22T17:46:41.577643
HÿjHost '101.133.140.114' is not allowed to
connect to this MySQL server
9682 /
tcp
-445721795 | 2025-04-19T05:00:22.237204
\x00[\xc3\xaed\x1a\x7f\x00\x00
9711 /
tcp
-1730858130 | 2025-04-17T16:09:30.098937
RFB 003.008
VNC:
Protocol Version: 3.8
9761 /
tcp
1620329124 | 2025-04-22T09:38:15.860865
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\x01\xc3\xbf\xc3\xbb\x03\xc3\xbf\xc3\xbd\x01\xc3\xbf\xc3\xbe\x01Username:
-1451615933 | 2025-04-02T11:37:05.780234
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
WZWS-RAY: 1249-1705941912.469-s5jhg
1830697416 | 2025-04-17T19:57:37.014528
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
9930 /
tcp
1911457608 | 2025-04-24T05:40:34.362027
\x00[\x00\x00\x00\x00\x00\x00
9939 /
tcp
-2140303521 | 2025-04-26T21:44:27.668894
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected\n
1712606111 | 2025-04-16T20:00:02.981006
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae1282_PSzqstdxyw34_8689-21922
9944 /
tcp
2087396567 | 2025-04-08T07:46:21.268285
kjnkjabhbanc283ubcsbhdc72
9966 /
tcp
-2096652808 | 2025-04-26T17:14:31.853834
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
9977 /
tcp
-249504111 | 2025-04-20T08:58:06.553356
9994 /
tcp
1911457608 | 2025-03-29T17:14:25.625451
\x00[\x00\x00\x00\x00\x00\x00
-1223770960 | 2025-04-24T05:16:46.325716
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae28e5_PS-PEK-01Whk40_31773-63705
9999 /
tcp
1161309183 | 2025-04-23T18:38:33.699982
10000 /
tcp
2087396567 | 2025-04-11T20:33:18.470981
kjnkjabhbanc283ubcsbhdc72
10002 /
tcp
-1327660293 | 2025-04-07T09:27:48.468876
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
971933601 | 2025-04-02T18:28:27.856699
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
10011 /
tcp
-1248408558 | 2025-04-09T16:49:01.716104
220 MikroTik FTP server (MikroTik 6.44.3) ready
10017 /
tcp
-1476017887 | 2025-04-22T16:59:09.467073
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
2143387245 | 2025-04-10T17:31:57.228823
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
10035 /
tcp
-2033111675 | 2025-04-18T14:23:06.513264
10041 /
tcp
-2017887953 | 2025-04-24T21:49:54.913247
SSH-2.0-OpenSSH_7.9
Vulnerabilities
10049 /
tcp
632542934 | 2025-04-01T06:53:22.503473
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
10200 /
tcp
597764502 | 2025-04-12T17:30:36.083451
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
971933601 | 2025-04-12T22:04:50.584351
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
10443 /
tcp
1741579575 | 2025-04-15T10:01:23.604495
10477 /
tcp
-1737707071 | 2025-04-03T08:42:36.496641
\x00b\x00\x01\x00\x00\x00\x00x\x0b\x00\x00\x00\x00z\x00437
10892 /
tcp
-2089734047 | 2025-03-28T08:44:54.530395
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
10911 /
tcp
-1032713145 | 2025-04-25T14:56:35.551529
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
11000 /
tcp
-358801646 | 2025-04-06T20:42:42.758281
11065 /
tcp
-1399940268 | 2025-04-20T10:13:53.180170
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-147424911 | 2025-04-08T12:00:01.614282
HTTP/1.1 404 Not Found
Content Length: 0
11111 /
tcp
401555314 | 2025-04-03T19:54:58.328073
11180 /
tcp
89142341 | 2025-04-19T18:26:55.534511
\x05\x00\x00\x00\x0b\x08\x05\x1a\x00
-1013082686 | 2025-04-18T15:32:35.084667
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
11288 /
tcp
-2089734047 | 2025-04-25T20:44:42.520235
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
11300 /
tcp
-441419608 | 2025-04-24T18:07:08.649322
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
11701 /
tcp
819727972 | 2025-04-21T02:27:51.567324
SSH-2.0-OpenSSH_7.4
Vulnerabilities
368820174 | 2025-04-19T23:37:32.509445
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae1d94_PS-TNA-01jC465_21028-55111
12019 /
tcp
1308377066 | 2025-04-02T14:57:26.390496
12056 /
tcp
1632932802 | 2025-04-02T10:42:42.319873
12082 /
tcp
-1036370807 | 2025-04-23T17:12:36.879221
12109 /
tcp
580340387 | 2025-04-02T21:50:31.633484
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
12112 /
tcp
-904840257 | 2025-04-22T16:42:47.569384
572 Relay not authorized\r\n
12114 /
tcp
-904840257 | 2025-04-15T13:24:08.323707
572 Relay not authorized\r\n
12125 /
tcp
165188539 | 2025-04-25T22:23:57.806381
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12135 /
tcp
165188539 | 2025-04-15T09:42:04.070217
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12138 /
tcp
-1399940268 | 2025-04-07T15:35:40.297426
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1839934832 | 2025-03-31T05:38:52.733399
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
-1839934832 | 2025-04-05T10:49:17.279751
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
12150 /
tcp
-339084706 | 2025-03-31T20:09:47.515539
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
12157 /
tcp
-2096652808 | 2025-03-31T09:53:10.062530
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12161 /
tcp
-146605374 | 2025-04-15T22:06:00.209127
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
891314996 | 2025-04-23T00:41:00.858916
HTTP/1.1 200 OK
Server: openresty/1.21.4.1
Content-Type: text/html
Connection: keep-alive
Accept-Ranges: bytes
12175 /
tcp
-2096652808 | 2025-04-09T07:25:07.947721
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12181 /
tcp
-2089734047 | 2025-04-01T18:00:52.110309
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12182 /
tcp
-146605374 | 2025-04-25T18:04:28.474060
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
12188 /
tcp
819727972 | 2025-04-04T05:32:28.656866
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12196 /
tcp
504717326 | 2025-04-22T17:01:51.343567
SSH-2.0-OpenSSH_8.6
Vulnerabilities
12198 /
tcp
-358801646 | 2025-04-24T10:02:41.826560
12199 /
tcp
677934968 | 2025-04-26T09:02:14.638478
12200 /
tcp
1543809371 | 2025-04-20T07:42:00.920311
220 corpease.net Anti-spam GT for Coremail System (icmhosting[2\n0181212])
12201 /
tcp
1134517380 | 2025-04-12T00:31:35.530677
welcome to Pandora console!\r\n----------------------------\n-------------------------\n| Login Time | 2021-12-08 1...\n
-1839934832 | 2025-04-14T22:35:46.143593
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
12229 /
tcp
-784071826 | 2025-04-17T03:49:36.827696
SSH-2.0-OpenSSH_8.0
Vulnerabilities
12232 /
tcp
320677201 | 2025-04-23T05:27:45.526167
H\x00\x00\x00\xc3\xbfj\x04Host \'101.133.140.114\' is not allowed to \nconnect to this MySQL server
12236 /
tcp
165188539 | 2025-04-05T02:02:55.409402
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12245 /
tcp
-2096652808 | 2025-04-09T18:15:20.535815
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12250 /
tcp
-784071826 | 2025-04-14T17:12:50.127619
SSH-2.0-OpenSSH_8.0
Vulnerabilities
12260 /
tcp
1911457608 | 2025-04-09T02:10:18.020930
\x00[\x00\x00\x00\x00\x00\x00
12263 /
tcp
-1733106930 | 2025-04-20T07:02:29.099310
Mysql Version: 5.6.50-log\nN\n5.6.50-log\x14(\nG5se"tGE\xc3\xbf\xc3\xb7-\x02\x7f\xc2\x80\x15cB^3$Zwh$wM[mysql_native_password
12267 /
tcp
-358801646 | 2025-04-24T14:58:52.705891
12274 /
tcp
-1373613804 | 2025-04-07T13:50:18.517125
00970795:d7:smethod,6:shello,8:soptions,80:d10:shttp_port,368696:i1082,5:sname,5:sL_x,10:ssync_port,5:i00469,10:stimestamp,3190459:f920.7251553166,8:sversion,6262522:sl4X,
12278 /
tcp
-1399940268 | 2025-03-28T06:06:06.948813
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12302 /
tcp
-904840257 | 2025-04-06T22:17:26.448211
572 Relay not authorized\r\n
12315 /
tcp
-1399940268 | 2025-04-25T04:32:26.552420
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12317 /
tcp
-1746074029 | 2025-04-05T11:54:31.742293
12322 /
tcp
-345718689 | 2025-04-03T07:50:09.459091
12329 /
tcp
707919486 | 2025-04-19T04:37:53.569565
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
12333 /
tcp
819727972 | 2025-04-06T23:03:33.208048
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12339 /
tcp
-1996280214 | 2025-04-18T04:43:59.033059
296364507 | 2025-04-24T19:42:01.809942
HTTP/1.1 500 Internal Server Error
SERVER: Trend Chip UPnP/1.0 DMS
CONNECTION: close
CONTENT-LENGTH: 60
CONTENT-TYPE: text/html
12351 /
tcp
819727972 | 2025-04-20T21:14:15.232340
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12352 /
tcp
-1730858130 | 2025-04-21T14:30:59.143014
RFB 003.008
VNC:
Protocol Version: 3.8
12382 /
tcp
-1399940268 | 2025-04-07T03:33:06.181604
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12387 /
tcp
-1399940268 | 2025-04-16T06:38:46.976637
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12390 /
tcp
921225407 | 2025-04-21T18:15:41.108323
\x00\x00\x00\x04\x00\x00\x00\x00\x00
12403 /
tcp
-1888448627 | 2025-04-04T14:40:02.051313
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12409 /
tcp
-1399940268 | 2025-04-02T13:12:06.848018
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12411 /
tcp
-2089734047 | 2025-04-18T09:28:09.907616
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12414 /
tcp
-146605374 | 2025-04-22T03:18:57.958716
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
12419 /
tcp
-792826324 | 2025-04-22T07:11:08.112381
220 FTP server ready - login please
12425 /
tcp
-1399940268 | 2025-04-05T15:22:21.078623
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12435 /
tcp
-1399940268 | 2025-04-18T02:04:59.794462
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12437 /
tcp
580340387 | 2025-03-28T14:16:56.217006
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
12444 /
tcp
-358801646 | 2025-04-03T01:10:28.303232
12447 /
tcp
-653033013 | 2025-04-01T08:15:04.757682
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
12452 /
tcp
-891714208 | 2025-04-24T07:28:55.545682
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
12454 /
tcp
-358801646 | 2025-04-26T14:35:53.092761
12481 /
tcp
-1888448627 | 2025-04-06T03:58:17.804849
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12485 /
tcp
1911457608 | 2025-04-02T06:31:55.581417
\x00[\x00\x00\x00\x00\x00\x00
12491 /
tcp
-457235091 | 2025-04-03T22:16:50.133405
audio 0 RTP/AVP 18 4 3 8 0 101\r\na
12494 /
tcp
-1399940268 | 2025-04-02T22:24:11.366522
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12497 /
tcp
-1428621233 | 2025-04-16T19:29:30.699139
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
12499 /
tcp
1911457608 | 2025-04-02T13:44:53.823782
\x00[\x00\x00\x00\x00\x00\x00
12502 /
tcp
-1730858130 | 2025-04-06T17:39:45.641163
RFB 003.008
VNC:
Protocol Version: 3.8
12503 /
tcp
-1399940268 | 2025-04-03T18:40:22.422875
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12505 /
tcp
1975288991 | 2025-04-13T00:20:21.735144
12506 /
tcp
-653033013 | 2025-04-23T14:39:42.648769
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
12517 /
tcp
-1399940268 | 2025-04-03T20:28:10.488589
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12521 /
tcp
-1375131644 | 2025-04-21T07:32:53.604835
\x00[v\xc3\xbdC\x7f\x00\x00
12525 /
tcp
-1399940268 | 2025-04-08T14:32:00.471680
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12533 /
tcp
921225407 | 2025-04-22T18:00:42.839906
\x00\x00\x00\x04\x00\x00\x00\x00\x00
12543 /
tcp
-2096652808 | 2025-04-17T23:22:16.377028
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12552 /
tcp
1126993057 | 2025-03-28T23:58:33.393733
* OK [CAPABILITY a2,M\\] nBwXk2pPP IMAP4rev1 20qx at
12555 /
tcp
1911457608 | 2025-04-17T08:08:54.193167
\x00[\x00\x00\x00\x00\x00\x00
12567 /
tcp
321971019 | 2025-04-10T21:28:12.041107
-ERR client ip is not in whitelist\r
12569 /
tcp
-2096652808 | 2025-04-20T03:33:34.407731
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12571 /
tcp
307999478 | 2025-04-24T16:22:16.319410
unknown command \r\nunknown command \r\n
12572 /
tcp
-1032713145 | 2025-04-26T21:43:54.889592
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
0 | 2025-04-22T00:39:39.300185
HTTP/1.1 408 Request Timeout
Content-Length: 0
12584 /
tcp
-1279886438 | 2025-04-05T23:03:49.586992
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
12587 /
tcp
-303199180 | 2025-04-15T09:54:12.409967
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
12590 /
tcp
-2096652808 | 2025-03-31T14:15:15.701358
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
13082 /
tcp
1911457608 | 2025-03-29T20:47:45.964507
\x00[\x00\x00\x00\x00\x00\x00
13084 /
tcp
321971019 | 2025-04-26T20:32:40.466279
-ERR client ip is not in whitelist\r
-1839934832 | 2025-04-23T00:05:46.226918
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
14147 /
tcp
-1795027372 | 2025-04-23T08:58:33.652580
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
14265 /
tcp
-616720387 | 2025-04-26T07:53:59.125546
14344 /
tcp
819727972 | 2025-04-22T01:00:19.868437
SSH-2.0-OpenSSH_7.4
Vulnerabilities
14403 /
tcp
-358801646 | 2025-04-21T18:37:48.692139
14406 /
tcp
-1399940268 | 2025-04-17T15:59:41.952660
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
14523 /
tcp
-1730858130 | 2025-04-24T20:42:17.881682
RFB 003.008
VNC:
Protocol Version: 3.8
14896 /
tcp
-1428621233 | 2025-04-22T04:37:35.844017
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
15018 /
tcp
632542934 | 2025-04-06T18:22:54.321447
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
15151 /
tcp
-2031152423 | 2025-03-31T22:57:25.802581
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
15443 /
tcp
1911457608 | 2025-04-16T17:24:25.868287
\x00[\x00\x00\x00\x00\x00\x00
15555 /
tcp
-1265999252 | 2025-04-11T12:20:24.041855
220 VMware Authentication Daemon Version 1.0, ServerDaemonProto\ncol:SOAP, MKSDisplayProtocol:VNC , ,
15673 /
tcp
15018106 | 2025-04-15T19:49:47.047904
\x00\x19\x02\x00\x02\x00\x07\x00Protocol version mismatch\x00
15831 /
tcp
2098371729 | 2025-04-07T16:00:45.596782
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
16010 /
tcp
-2096652808 | 2025-04-01T01:04:30.474137
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
16015 /
tcp
-2096652808 | 2025-04-06T11:23:14.825254
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
-147424911 | 2025-04-10T21:03:53.035698
HTTP/1.1 404 Not Found
Content Length: 0
16023 /
tcp
-1737707071 | 2025-04-15T04:06:24.416356
\x00b\x00\x01\x00\x00\x00\x00x\x0b\x00\x00\x00\x00z\x00437
16027 /
tcp
-1399940268 | 2025-04-25T04:41:19.843994
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16031 /
tcp
165188539 | 2025-04-10T23:34:04.677042
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
16038 /
tcp
819727972 | 2025-04-25T04:06:30.940391
SSH-2.0-OpenSSH_7.4
Vulnerabilities
16064 /
tcp
-1399940268 | 2025-04-21T11:29:31.664471
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16065 /
tcp
1519486042 | 2025-04-04T22:32:00.565730
<KU_goodbye>Protocol Error: XML data is not well-formed.</KU_goodbye>
16066 /
tcp
-1428621233 | 2025-04-04T03:47:11.511156
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
16068 /
tcp
1911457608 | 2025-04-05T23:45:43.501312
\x00[\x00\x00\x00\x00\x00\x00
16084 /
tcp
-1399940268 | 2025-04-24T23:15:22.535062
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16088 /
tcp
1615193817 | 2025-04-04T10:00:57.033661
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
16094 /
tcp
-1399940268 | 2025-04-24T06:02:01.806371
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16099 /
tcp
-2096652808 | 2025-04-06T02:28:43.455805
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
16103 /
tcp
1665283070 | 2025-04-08T02:30:09.359471
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x01\x00\x00\x10\x00\x00\n0\x03\x00\x00\x00\x01\x00\x05\x00\x00@\x00\x00\x06\x00\x00\x1f@
-2107996212 | 2025-04-03T07:15:04.866782
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
16443 /
tcp
1011407350 | 2025-04-24T23:39:38.736824
* OK GroupWise IMAP4rev1 Server Ready\r\n
16464 /
tcp
1690634669 | 2025-04-02T08:38:11.874438
16667 /
tcp
-1399940268 | 2025-03-28T21:10:38.940525
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16831 /
tcp
1911457608 | 2025-04-15T18:34:00.142118
\x00[\x00\x00\x00\x00\x00\x00
16992 /
tcp
-1840324437 | 2025-03-31T07:16:56.726059
17010 /
tcp
-1279886438 | 2025-04-20T22:45:02.368377
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
17070 /
tcp
-1733645023 | 2025-04-24T19:42:30.187108
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
17773 /
tcp
-616720387 | 2025-04-24T04:33:44.021352
17775 /
tcp
165188539 | 2025-04-18T18:54:56.777535
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
18004 /
tcp
-1947777893 | 2025-04-22T21:34:00.837407
"Broadband Router"\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
18010 /
tcp
-904840257 | 2025-03-29T20:33:01.614945
572 Relay not authorized\r\n
18013 /
tcp
632542934 | 2025-04-09T15:18:17.392146
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
18017 /
tcp
-2096652808 | 2025-04-08T17:36:59.133642
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
18030 /
tcp
-1996280214 | 2025-04-09T02:49:15.519219
18033 /
tcp
820958131 | 2025-04-22T23:52:11.463390
kjnkjabhbanc283ubcsbhdc72\x02
18043 /
tcp
1208318993 | 2025-04-19T20:32:34.174670
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
18046 /
tcp
-1730858130 | 2025-03-29T05:21:33.882582
RFB 003.008
VNC:
Protocol Version: 3.8
18049 /
tcp
-1248408558 | 2025-04-04T21:11:46.704906
220 MikroTik FTP server (MikroTik 6.44.3) ready
18070 /
tcp
-2096652808 | 2025-04-17T19:26:25.141907
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
18077 /
tcp
-1399940268 | 2025-04-26T03:55:34.223987
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18078 /
tcp
1492413928 | 2025-04-22T09:00:56.745586
SSH-2.0-OpenSSH_7.5
Vulnerabilities
18080 /
tcp
2087396567 | 2025-04-08T15:48:11.669817
kjnkjabhbanc283ubcsbhdc72
18081 /
tcp
-138733098 | 2025-04-09T07:43:03.809251
18086 /
tcp
740837454 | 2025-04-10T02:37:19.292006
SSH-2.0-OpenSSH_5.3
Vulnerabilities
18087 /
tcp
1911457608 | 2025-04-10T16:39:41.500779
\x00[\x00\x00\x00\x00\x00\x00
18099 /
tcp
-146605374 | 2025-04-15T08:23:45.615803
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
18102 /
tcp
1762042191 | 2025-04-01T09:21:55.231312
18182 /
tcp
-1059554316 | 2025-04-21T18:32:34.505112
\xc2\xa5A\x00\x01\x00\x00\x00,\x00\x00\x00\x02\x00\x00\x00L\x00\x00\x00\x08Connect\x00\x00\x00\x00x\x00\x00\x00\x0857222\x00\x00\x00
18245 /
tcp
1690634669 | 2025-04-03T22:34:19.715535
18443 /
tcp
-971970408 | 2025-03-28T19:32:52.454208
18553 /
tcp
1636811864 | 2025-04-06T19:24:19.991750
19084 /
tcp
-2089734047 | 2025-04-25T03:57:06.215709
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
19100 /
tcp
165188539 | 2025-04-21T03:20:34.199715
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
19200 /
tcp
1852418385 | 2025-04-04T02:28:39.724662
RTSP/1.0 453 Not Enough Bandwidth
Server: AirTunes/7l_wZ
19776 /
tcp
819727972 | 2025-04-12T06:55:26.711554
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1045760528 | 2025-04-06T14:12:13.554336
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
1900503736 | 2025-04-23T11:19:39.256268
HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-HTTPAPI/2.0
20001 /
tcp
-345718689 | 2025-04-17T07:54:36.708611
20060 /
tcp
-653033013 | 2025-04-15T19:01:47.523544
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
20084 /
tcp
366084633 | 2025-04-18T01:17:02.956876
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
20087 /
tcp
2087396567 | 2025-04-02T23:29:09.892837
kjnkjabhbanc283ubcsbhdc72
20107 /
tcp
1911457608 | 2025-03-31T22:51:25.120690
\x00[\x00\x00\x00\x00\x00\x00
20182 /
tcp
117101543 | 2025-04-18T20:29:25.669629
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
20201 /
tcp
597764502 | 2025-04-23T01:02:05.348545
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
20202 /
tcp
-1399940268 | 2025-04-02T02:23:31.630734
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
20547 /
tcp
-457235091 | 2025-04-22T15:21:59.168184
audio 0 RTP/AVP 18 4 3 8 0 101\r\na
20880 /
tcp
1370263973 | 2025-04-08T16:57:53.041497
20900 /
tcp
-303199180 | 2025-04-18T04:50:43.903043
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
21002 /
tcp
819727972 | 2025-04-25T04:33:55.168043
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21025 /
tcp
-441419608 | 2025-04-12T23:09:53.240895
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
21083 /
tcp
-1733645023 | 2025-04-07T09:48:58.824771
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
21231 /
tcp
-1105333987 | 2025-04-22T11:10:03.164085
21249 /
tcp
165188539 | 2025-04-24T02:00:18.382278
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
21251 /
tcp
-1399940268 | 2025-04-09T10:12:35.091913
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21263 /
tcp
-1810987450 | 2025-04-23T21:08:48.522948
21267 /
tcp
-1399940268 | 2025-04-20T21:27:35.635191
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21273 /
tcp
-1648456501 | 2025-04-21T05:28:37.897922
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
21279 /
tcp
819727972 | 2025-04-12T22:06:13.490043
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21280 /
tcp
-653033013 | 2025-04-02T17:16:15.626656
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
21288 /
tcp
-441419608 | 2025-03-31T15:41:27.444898
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
21299 /
tcp
-1399940268 | 2025-04-06T06:38:24.881490
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21302 /
tcp
1911457608 | 2025-04-17T15:54:56.892682
\x00[\x00\x00\x00\x00\x00\x00
21307 /
tcp
321971019 | 2025-04-20T17:48:06.271158
-ERR client ip is not in whitelist\r
21309 /
tcp
-1399940268 | 2025-04-17T08:57:37.717648
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21312 /
tcp
1911457608 | 2025-04-11T17:57:34.571247
\x00[\x00\x00\x00\x00\x00\x00
21313 /
tcp
-1248408558 | 2025-04-08T23:18:59.264720
220 MikroTik FTP server (MikroTik 6.44.3) ready
21315 /
tcp
1308377066 | 2025-04-03T19:33:06.382206
21319 /
tcp
-2089734047 | 2025-04-02T08:12:37.178511
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
21329 /
tcp
575925250 | 2025-04-01T15:20:25.783820
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
21379 /
tcp
320677201 | 2025-04-24T23:08:30.714145
H\x00\x00\x00\xc3\xbfj\x04Host \'101.133.140.114\' is not allowed to \nconnect to this MySQL server
22067 /
tcp
2087396567 | 2025-04-02T03:11:39.677817
kjnkjabhbanc283ubcsbhdc72
22070 /
tcp
-653033013 | 2025-04-04T00:24:40.340168
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
22222 /
tcp
-358801646 | 2025-04-12T16:42:13.978564
22556 /
tcp
1911457608 | 2025-04-24T19:54:00.278873
\x00[\x00\x00\x00\x00\x00\x00
23023 /
tcp
-1461540015 | 2025-04-18T18:59:49.777767
audio 0 RTP/AVP 18 4 3 8 0 101
a
23084 /
tcp
-1648456501 | 2025-04-26T15:42:22.747070
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
23182 /
tcp
-2080784861 | 2025-04-23T20:51:32.825306
GBPK\xc3\xbb\xc3\xb7n\xc2\x93W\xc2\xaf\xc2\x86\xc2\x93x@\xc2\xa9\x0e\xc3\x8a*\xc2\x9bS\x00
971933601 | 2025-04-03T06:28:35.819343
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
25001 /
tcp
1911457608 | 2025-04-12T23:25:03.635932
\x00[\x00\x00\x00\x00\x00\x00
25003 /
tcp
1911457608 | 2025-04-08T01:51:54.660856
\x00[\x00\x00\x00\x00\x00\x00
25005 /
tcp
1363464823 | 2025-04-26T07:47:55.813988
25105 /
tcp
-952165951 | 2025-04-12T09:35:20.910420
25565 /
tcp
873425297 | 2025-04-12T14:51:03.968301
200 NOD32SS 99 (3318497116)
-1013082686 | 2025-03-31T11:10:32.289315
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
26656 /
tcp
597764502 | 2025-03-28T23:19:38.259809
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
26657 /
tcp
1842524259 | 2025-04-07T14:39:05.328026
27015 /
tcp
841014058 | 2025-04-12T14:09:35.077832
Hello, this is FRRouting (version 4.0).
Copyright 19
96-2005 Kunihiro Ishiguro, et al.
Use...
27016 /
tcp
-971970408 | 2025-03-29T08:34:17.927828
27017 /
tcp
1763259671 | 2025-04-09T11:31:58.701100
{\n"Version": "3.4.18",\n"VersionArray": [\n3,\n4,\n18,\n0\n],\n"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",\n"OpenSSLVersion": "",\n"SysInfo": "",\n"Bits": 64,\n"Debug": false,\n"MaxObjectSize": 16777216\n}\n\n
28015 /
tcp
819727972 | 2025-04-18T09:43:32.213850
SSH-2.0-OpenSSH_7.4
Vulnerabilities
28017 /
tcp
2087396567 | 2025-04-02T10:21:29.864073
kjnkjabhbanc283ubcsbhdc72
28080 /
tcp
-527005584 | 2025-04-07T08:32:02.712263
28818 /
tcp
740837454 | 2025-04-23T06:07:46.876811
SSH-2.0-OpenSSH_5.3
Vulnerabilities
29798 /
tcp
1426971893 | 2025-04-19T01:31:43.850140
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
29799 /
tcp
408230060 | 2025-04-15T23:55:50.262910
\r\nSorry, that nickname format is invalid.\r\n
30002 /
tcp
178736976 | 2025-04-22T21:01:45.182709
30003 /
tcp
1978059005 | 2025-03-29T14:53:20.617853
Sorry, that nickname format is invalid.
30013 /
tcp
921225407 | 2025-04-02T01:44:12.379328
\x00\x00\x00\x04\x00\x00\x00\x00\x00
30022 /
tcp
740837454 | 2025-04-05T23:27:31.083747
SSH-2.0-OpenSSH_5.3
Vulnerabilities
30029 /
tcp
1948301213 | 2025-03-29T01:29:07.370101
RFB 003.003
VNC:
Protocol Version: 3.3
30050 /
tcp
-1399940268 | 2025-04-19T07:40:13.663008
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
30120 /
tcp
1911457608 | 2025-04-09T11:50:44.254669
\x00[\x00\x00\x00\x00\x00\x00
30301 /
tcp
-407828767 | 2025-03-31T17:43:23.526264
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
30303 /
tcp
539065883 | 2025-04-09T12:20:07.333624
30322 /
tcp
841014058 | 2025-04-06T01:12:03.617387
Hello, this is FRRouting (version 4.0).
Copyright 19
96-2005 Kunihiro Ishiguro, et al.
Use...
30452 /
tcp
-1399940268 | 2025-04-15T04:34:50.447868
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
30501 /
tcp
632542934 | 2025-04-17T00:29:38.804831
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
30622 /
tcp
-1611764932 | 2025-04-05T11:22:00.908900
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
30718 /
tcp
-2099439721 | 2025-04-11T19:28:33.883813
LH\xdb\xc6\xdd\xf6g\x10\x19\x00\x00\x00\x18\x00\x01\x02\x00\x10\x00\x04\x00\x00\x00\x01\xbc,\x83p\xb1*^@6;\xf5 \xc8\xf6`H
30922 /
tcp
1332894250 | 2025-04-05T21:44:20.068558
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
31337 /
tcp
-1992519278 | 2025-04-09T04:51:28.807008
\xc3\xbf\xc3\xbb\\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
31422 /
tcp
-1681927087 | 2025-04-05T07:38:49.860542
kjnkjabhbanc283ubcsbhdc72
31443 /
tcp
165188539 | 2025-04-09T17:23:16.118497
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
31522 /
tcp
1919228981 | 2025-04-04T21:21:11.342178
\x00\x1e\x00\x06\xc2\x81\xc2\x85\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
-1839934832 | 2025-04-04T17:40:42.485949
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
32022 /
tcp
1919228981 | 2025-04-05T06:29:58.095792
\x00\x1e\x00\x06\xc2\x81\xc2\x85\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
32080 /
tcp
819727972 | 2025-04-18T20:33:20.885890
SSH-2.0-OpenSSH_7.4
Vulnerabilities
32400 /
tcp
-1900404274 | 2025-04-12T02:54:50.804705
32422 /
tcp
819727972 | 2025-04-04T18:46:45.776185
SSH-2.0-OpenSSH_7.4
Vulnerabilities
33060 /
tcp
677934968 | 2025-04-20T02:32:54.847976
33338 /
tcp
2087396567 | 2025-04-11T13:51:58.060654
kjnkjabhbanc283ubcsbhdc72
35000 /
tcp
-1399940268 | 2025-04-15T07:01:35.580026
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1230049476 | 2025-04-02T14:46:07.951013
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
37777 /
tcp
165188539 | 2025-04-17T23:22:56.728293
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
38333 /
tcp
819727972 | 2025-03-28T17:52:14.379169
SSH-2.0-OpenSSH_7.4
Vulnerabilities
40001 /
tcp
-1399940268 | 2025-04-11T06:31:01.477659
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
0 | 2025-04-17T03:40:29.023919
HTTP/1.1 408 Request Timeout
Content-Length: 0
40894 /
tcp
-1986594217 | 2025-04-17T17:36:31.075765
"AP0F1D85"\r\nConnection: close\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD>\n<BODY BGCOLOR
41443 /
tcp
-154107716 | 2025-03-28T05:34:53.123986
220 Microsoft FTP Service
530 User cannot log in.
214-The following commands are recognized (* ==>'s unimplemented).
ABOR
ACCT
ADAT *
ALLO
APPE
AUTH
CCC
CDUP
CWD
DELE
ENC *
EPRT
EPSV
FEAT
HELP
HOST
LANG
LIST ...
-1839934832 | 2025-04-11T10:26:20.401767
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
41800 /
tcp
-303199180 | 2025-04-15T21:54:45.793601
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
42194 /
tcp
-358801646 | 2025-04-08T16:39:49.265608
42424 /
tcp
-2096652808 | 2025-04-03T06:34:46.216594
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
43200 /
tcp
1991883981 | 2025-04-23T07:47:28.508456
B\x00\x00\x00\xc3\xbfn\x04Too many connections
44158 /
tcp
-433302150 | 2025-04-06T20:19:23.678564
44303 /
tcp
-1399940268 | 2025-04-16T03:23:15.234238
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
44304 /
tcp
921225407 | 2025-04-05T04:41:47.389327
\x00\x00\x00\x04\x00\x00\x00\x00\x00
44309 /
tcp
1353260875 | 2025-04-07T21:58:06.084801
\x00[g\xc2\x95N\x7f\x00\x00
44320 /
tcp
-1329831334 | 2025-04-02T09:08:01.335335
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
44400 /
tcp
401555314 | 2025-04-15T08:08:46.213304
44520 /
tcp
-345718689 | 2025-04-06T12:00:18.547241
44818 /
tcp
-2017887953 | 2025-04-17T05:40:01.213851
SSH-2.0-OpenSSH_7.9
Vulnerabilities
45111 /
tcp
-1733645023 | 2025-04-23T00:32:17.735223
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
45886 /
tcp
819727972 | 2025-04-01T19:43:57.909255
SSH-2.0-OpenSSH_7.4
Vulnerabilities
47001 /
tcp
-1399940268 | 2025-04-20T04:36:12.853311
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
47808 /
tcp
-1779118422 | 2025-04-10T16:46:10.002055
\x00[\xc2\xae\xc2\x8d{\x7f\x00\x00
48001 /
tcp
671605376 | 2025-04-17T22:19:39.880077
48018 /
tcp
1353260875 | 2025-04-18T21:19:28.485818
\x00[g\xc2\x95N\x7f\x00\x00
48889 /
tcp
1911457608 | 2025-04-04T04:11:30.920585
\x00[\x00\x00\x00\x00\x00\x00
48899 /
tcp
-1529979118 | 2025-04-11T05:59:32.574266
1686199642 | 2025-03-31T19:51:01.289038
HTTP/1.1 404
SERVER: Linux/4.9.44, UPnP/1.0, Portable SDK for UPnP devices/1.6.20
CONNECTION: close
CONTENT-LENGTH: 48
Accept-Ranges: bytes
CONTENT-TYPE: text/html
49592 /
tcp
-1059554316 | 2025-04-26T23:07:12.491842
\xc2\xa5A\x00\x01\x00\x00\x00,\x00\x00\x00\x02\x00\x00\x00L\x00\x00\x00\x08Connect\x00\x00\x00\x00x\x00\x00\x00\x0857222\x00\x00\x00
50000 /
tcp
-1316398834 | 2025-04-25T20:33:25.084047
50004 /
tcp
-1598265216 | 2025-04-17T23:26:57.145151
50050 /
tcp
1690634669 | 2025-04-10T22:09:13.262750
50100 /
tcp
-1681927087 | 2025-04-25T19:26:13.435980
kjnkjabhbanc283ubcsbhdc72
50107 /
tcp
1726594447 | 2025-04-15T22:20:35.797482
\r\n\nLantronix MSS100 Version V118/523(045538937)\n\r\nType HELP at the \'Local_61349> \' prompt for assistance.\n\r\n\r\n\nUsername>
51106 /
tcp
2087396567 | 2025-03-29T19:36:34.676922
kjnkjabhbanc283ubcsbhdc72
51235 /
tcp
-1248408558 | 2025-04-01T18:35:02.387146
220 MikroTik FTP server (MikroTik 6.44.3) ready
51443 /
tcp
-971970408 | 2025-04-07T01:45:41.412899
53413 /
tcp
1261582754 | 2025-04-10T07:55:25.059575
unknown command
unknown command
2143387245 | 2025-04-12T11:46:33.841811
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
54138 /
tcp
820958131 | 2025-04-22T21:10:10.541903
kjnkjabhbanc283ubcsbhdc72\x02
54984 /
tcp
1741579575 | 2025-04-10T06:52:32.579998
55000 /
tcp
-249504111 | 2025-04-05T23:55:21.419995
55200 /
tcp
-1399940268 | 2025-04-21T00:27:26.121299
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
55442 /
tcp
841014058 | 2025-04-10T00:35:54.322564
Hello, this is FRRouting (version 4.0).
Copyright 19
96-2005 Kunihiro Ishiguro, et al.
Use...
55443 /
tcp
-1648456501 | 2025-04-01T13:13:27.902430
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
55553 /
tcp
-321444299 | 2025-04-18T10:45:52.501374
:dircproxy NOTICE AUTH :Looking up your hostname...
:dircproxy NOTICE AUTH :Got your hostname.
55554 /
tcp
-21576419 | 2025-04-21T06:25:22.183281
ÿûUDo you want ANSI color? (Y/n)
-147424911 | 2025-04-11T19:19:07.104827
HTTP/1.1 404 Not Found
Content Length: 0
57781 /
tcp
819727972 | 2025-04-18T20:04:15.892826
SSH-2.0-OpenSSH_7.4
Vulnerabilities
57782 /
tcp
165188539 | 2025-04-06T13:32:55.781198
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
57785 /
tcp
1911457608 | 2025-04-01T04:27:30.819883
\x00[\x00\x00\x00\x00\x00\x00
58532 /
tcp
-1428621233 | 2025-04-04T02:11:25.164072
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
60001 /
tcp
-971970408 | 2025-04-09T17:29:36.546001
60129 /
tcp
1975288991 | 2025-04-10T23:40:36.634141
179185434 | 2025-04-18T14:40:25.860669
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
WZWS-RAY: 1249-1705921161.799-w-waf03cqt
1282941221 | 2025-04-20T20:09:04.621859
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
61616 /
tcp
-1399940268 | 2025-04-22T12:23:48.906679
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
62078 /
tcp
-154616015 | 2025-04-12T04:35:07.523406
=\x01À\x06ÿÿ?"<ZDECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x01\x01
62865 /
tcp
-1996280214 | 2025-04-21T00:10:27.771293
63210 /
tcp
1632932802 | 2025-04-17T00:27:44.273126
63256 /
tcp
2087396567 | 2025-04-07T02:44:53.386081
kjnkjabhbanc283ubcsbhdc72
63257 /
tcp
-154107716 | 2025-04-06T21:10:37.335252
220 Microsoft FTP Service
530 User cannot log in.
214-The following commands are recognized (* ==>'s unimplemented).
ABOR
ACCT
ADAT *
ALLO
APPE
AUTH
CCC
CDUP
CWD
DELE
ENC *
EPRT
EPSV
FEAT
HELP
HOST
LANG
LIST ...
63260 /
tcp
-2089734047 | 2025-04-23T07:50:19.038217
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
-1839934832 | 2025-04-04T15:02:02.769234
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
-147424911 | 2025-04-17T21:00:58.412131
HTTP/1.1 404 Not Found
Content Length: 0