Last Seen: 2025-04-27

GeneralInformation

OpenPorts

11131517192021234349536670798081941021041101111351751771791891921952643113403853894274404414424494504655035135155225415545565875936326366466667007717828018118538738868879029479929951022102310251153117711951234129013371365141414331451145314561458152115991604172318831955195919621965197019741979200020012003200620082010201620212048205320552059206720692081208320872095209621072122212621812196220022222323234523762404243324552567262626282709276127623001300530063009301130193021304830503051305230533057306130673071307230753077308530913096310331063127313931403146315531593161317231773178318231863260326832993301330633103388340535033510353135513555355935623563359036223780379038383841395440004010402240634064407241004150415541574282432143694430443444354436444344444500450645234524453147004899491149495001500650075010509351005123520952225231523852515256543154325435544455035568559055915597560056065620563058535858590259045911598459935997600060016002600760226161626262646352648866016622663366536666666766686688674869557001700270187050708571717172717372187283740174157434748075357548760176347782790079798002800980118017802280328037803980428046808180838085808780898092809981168126813581368139814081568157816981728174818181858190819282008203825182808282829183228333841084128413843284438445844684628465846784808500850285058510851985458551855485578564856585758580858385878588859087008706870887238733876487848791881888248834883988608869888388848889889188998900890289088916900390159020902190249027903090399042904490469048905190579060906190659072907490839085909290959096909991009103910991149124913191349135914691489151915691609173919492099220922292479250929993039306930793159333934593989454951396339682971197619876991899309939994399449966997799949998999910000100021000510011100171002810035100411004910200102251044310477108921091111000110651111011111111801121011288113001170112000120191205612082121091211212114121251213512138121451214712150121571216112174121751218112182121881219612198121991220012201122181222912232122361224512250122601226312267122741227812302123151231712322123291233312339123451235112352123821238712390124031240912411124141241912425124351243712444124471245212454124811248512491124941249712499125021250312505125061251712521125251253312543125521255512567125691257112572125831258412587125901308213084140241414714265143441440314406145231489615018151511544315555156731583116010160151601616023160271603116038160641606516066160681608416088160941609916103164021644316464166671683116992170101707017773177751800418010180131801718030180331804318046180491807018077180781808018081180861808718099181021818218245184431855319084191001920019776199302000020001200602008420087201072018220201202022054720880209002100221025210832123121249212512126321267212732127921280212882129921302213072130921312213132131521319213292137922067220702222222556230232308423182234242500125003250052510525565257822665626657270152701627017280152801728080288182979829799300023000330013300223002930050301203030130303303223045230501306223071830922313373142231443315223162232022320803240032422330603333835000372153777738333400014047140894414434179441800421944242443200441584430344304443094432044400445204481845111458864700147808480014801848889488994915249592500005000450050501005010751106512355144353413538055413854984550005520055442554435555355554555555778157782577855853260001601296044361234616166207862865632106325663257632606344365000
11 / tcp
660175493 | 2025-04-18T00:15:59.214308
13 / tcp
-1770051369 | 2025-04-06T16:14:23.031331
15 / tcp
-1399940268 | 2025-04-17T18:34:41.997767
17 / tcp
2063576847 | 2025-04-23T01:44:48.701180
19 / tcp
751496153 | 2025-04-07T08:50:06.126345
20 / tcp
-2089734047 | 2025-04-18T09:09:50.048417
21 / tcp
-1248408558 | 2025-04-20T02:37:06.324908
23 / tcp
-1288412979 | 2025-04-09T00:07:29.815775
43 / tcp
539065883 | 2025-04-03T00:59:58.258973
49 / tcp
-1620040646 | 2025-04-19T10:42:15.268439
53 / tcp
-626196604 | 2025-03-28T12:02:06.594407
66 / tcp
165188539 | 2025-04-04T00:24:03.883378
70 / tcp
857710896 | 2025-03-28T22:43:50.699524
79 / tcp
1732483321 | 2025-04-22T07:53:05.728858
80 / tcp
0 | 2025-04-19T09:07:31.392623
81 / tcp
0 | 2025-04-17T15:17:00.262677
94 / tcp
1911457608 | 2025-04-10T22:55:03.437808
102 / tcp
-1888448627 | 2025-04-26T03:27:49.659643
104 / tcp
1919228981 | 2025-04-08T05:40:41.748729
110 / tcp
1911457608 | 2025-04-25T18:47:43.789962
111 / tcp
-971970408 | 2025-03-31T17:14:40.163661
135 / tcp
1483120365 | 2025-04-26T19:39:23.507644
175 / tcp
103159425 | 2025-04-20T04:52:16.348494
177 / tcp
-1399940268 | 2025-04-23T23:26:33.681137
179 / tcp
-399606100 | 2025-04-24T02:03:33.839733
189 / tcp
921225407 | 2025-04-18T23:00:38.550115
192 / tcp
-1611764932 | 2025-04-26T11:26:48.827788
195 / tcp
2087396567 | 2025-04-18T04:23:27.421448
264 / tcp
-1547821026 | 2025-04-14T21:00:20.306203
311 / tcp
67948279 | 2025-03-28T09:35:30.911780
340 / tcp
-1678345660 | 2025-04-12T02:48:04.291373
385 / tcp
971933601 | 2025-04-09T16:48:37.512771
389 / tcp
-1743283776 | 2025-04-26T21:23:11.644406
427 / tcp
1530390632 | 2025-04-17T21:14:00.513457
440 / tcp
-2033111675 | 2025-04-18T21:35:54.385094
441 / tcp
819727972 | 2025-04-04T22:22:20.620674
442 / tcp
1381121983 | 2025-04-16T16:38:19.248097
449 / tcp
321971019 | 2025-03-31T21:20:36.911285
450 / tcp
321971019 | 2025-04-02T06:29:39.698843
465 / tcp
897328069 | 2025-04-15T18:26:32.008849
503 / tcp
-1795027372 | 2025-04-20T06:31:26.995516
513 / tcp
-1399940268 | 2025-04-02T05:27:43.726253
515 / tcp
321971019 | 2025-04-23T03:46:12.914683
522 / tcp
-2096652808 | 2025-04-05T11:44:42.724627
541 / tcp
1497273505 | 2025-04-12T16:05:35.653891
554 / tcp
1060450357 | 2025-04-18T18:25:48.632932
556 / tcp
-122096153 | 2025-04-10T20:50:19.234714
587 / tcp
-1890071674 | 2025-04-22T17:01:26.335228
593 / tcp
-1261053701 | 2025-04-20T07:40:07.098644
632 / tcp
1911457608 | 2025-04-09T23:00:17.907818
636 / tcp
1239199743 | 2025-04-23T11:51:38.442857
646 / tcp
-1600864159 | 2025-04-02T19:05:08.501266
666 / tcp
1300162323 | 2025-04-16T13:04:06.595956
700 / tcp
-2021756999 | 2025-04-12T21:36:56.805638
771 / tcp
819727972 | 2025-04-26T02:51:34.385439
782 / tcp
819727972 | 2025-04-04T14:48:28.078545
801 / tcp
819727972 | 2025-04-19T00:20:32.178556
811 / tcp
2098371729 | 2025-04-25T10:53:07.215512
853 / tcp
-1839934832 | 2025-04-18T15:10:34.807254
873 / tcp
-1970692834 | 2025-04-02T06:50:26.103533
886 / tcp
-1730858130 | 2025-04-04T01:29:47.154964
887 / tcp
2063598737 | 2025-03-29T03:00:39.811552
902 / tcp
693973426 | 2025-03-29T03:14:37.430008
947 / tcp
-441419608 | 2025-04-07T09:55:01.622265
992 / tcp
-936692830 | 2025-04-25T09:29:22.207972
995 / tcp
-2113068813 | 2025-04-16T01:04:52.832140
1022 / tcp
819727972 | 2025-04-15T23:02:17.652659
1023 / tcp
1632932802 | 2025-04-21T03:43:41.709753
1025 / tcp
1991883981 | 2025-03-31T18:43:28.290739
1153 / tcp
-1327660293 | 2025-04-23T18:35:39.298805
1177 / tcp
1093576587 | 2025-04-26T19:29:04.537268
1195 / tcp
-1737707071 | 2025-04-20T09:55:07.759031
1234 / tcp
-653033013 | 2025-04-25T20:26:35.813938
1290 / tcp
819727972 | 2025-04-23T19:47:49.379511
1337 / tcp
1741579575 | 2025-04-16T00:18:23.391932
1365 / tcp
1911457608 | 2025-04-21T04:22:32.737391
1414 / tcp
-1428621233 | 2025-04-22T13:02:47.241267
1433 / tcp
-325802316 | 2025-04-04T00:20:01.284290
1451 / tcp
-980525298 | 2025-04-02T04:17:15.496211
1453 / tcp
-375604792 | 2025-04-14T20:11:37.518193
1456 / tcp
119860953 | 2025-03-31T09:45:30.847982
1458 / tcp
1911457608 | 2025-03-28T12:18:45.035291
1521 / tcp
-1337747449 | 2025-04-15T19:52:32.139167
1599 / tcp
842535728 | 2025-03-28T02:53:00.379008
1604 / tcp
-971970408 | 2025-03-28T14:52:19.334915
1723 / tcp
-1608241410 | 2025-04-20T19:47:47.571212
1883 / tcp
-1559123399 | 2025-04-16T17:38:16.962533
1955 / tcp
321971019 | 2025-04-15T19:46:51.154964
1959 / tcp
165188539 | 2025-04-01T09:31:41.576267
1962 / tcp
-1105333987 | 2025-04-22T16:33:48.613409
1965 / tcp
-1839934832 | 2025-04-15T23:05:09.317632
1970 / tcp
165188539 | 2025-04-14T22:27:49.854558
1974 / tcp
-1547976805 | 2025-04-03T21:34:06.123431
1979 / tcp
1208318993 | 2025-04-12T18:53:13.876191
2000 / tcp
-904840257 | 2025-04-23T09:52:49.742602
2001 / tcp
1911457608 | 2025-04-03T16:20:45.549481
2003 / tcp
1911457608 | 2025-04-16T20:56:11.759862
2006 / tcp
-2089734047 | 2025-04-07T22:33:31.775724
2008 / tcp
-1453516345 | 2025-04-24T23:59:11.032315
2010 / tcp
-375604792 | 2025-04-22T13:10:23.253350
2016 / tcp
1911457608 | 2025-04-23T00:55:28.977109
2021 / tcp
1911457608 | 2025-04-12T05:02:58.208241
2048 / tcp
-1399940268 | 2025-04-09T12:59:51.051263
2053 / tcp
1911457608 | 2025-04-06T19:59:28.494718
2055 / tcp
819727972 | 2025-03-31T22:53:21.679598
2059 / tcp
1492413928 | 2025-04-17T15:22:32.698162
2067 / tcp
539065883 | 2025-04-02T20:08:36.198092
2069 / tcp
-345718689 | 2025-04-10T22:54:02.096130
2081 / tcp
1189133115 | 2025-04-22T14:53:21.313233
2083 / tcp
1282941221 | 2025-04-17T15:29:44.179343
2087 / tcp
1911457608 | 2025-04-20T16:28:06.435289
2095 / tcp
-2107996212 | 2025-04-22T17:50:20.730654
2096 / tcp
321971019 | 2025-04-19T00:57:58.549009
2107 / tcp
-2031152423 | 2025-04-12T19:51:37.720017
2122 / tcp
-1626979812 | 2025-04-06T14:05:01.448725
2126 / tcp
-2060002556 | 2025-04-02T15:19:49.035555
2181 / tcp
546151771 | 2025-04-20T16:59:50.790625
2196 / tcp
819727972 | 2025-04-18T07:24:34.206949
2200 / tcp
1023953321 | 2025-04-19T17:26:47.206601
2222 / tcp
372433470 | 2025-04-24T05:40:24.845445
2323 / tcp
1662205251 | 2025-04-25T21:35:20.806081
2345 / tcp
819727972 | 2025-04-23T22:50:22.884232
2376 / tcp
-971970408 | 2025-03-31T21:14:21.178018
2404 / tcp
-1230049476 | 2025-04-21T16:42:53.064042
2433 / tcp
-1839934832 | 2025-04-04T14:35:55.304255
2455 / tcp
1327134490 | 2025-04-27T01:35:28.169764
2567 / tcp
-1327660293 | 2025-03-31T06:02:24.727322
2626 / tcp
819727972 | 2025-04-22T03:35:03.020816
2628 / tcp
-971970408 | 2025-04-23T14:27:41.164657
2709 / tcp
819727972 | 2025-04-03T11:50:32.665799
2761 / tcp
1911457608 | 2025-04-08T11:00:11.018778
2762 / tcp
401555314 | 2025-04-16T02:11:35.672917
3001 / tcp
819727972 | 2025-04-22T18:16:55.854234
3005 / tcp
624004002 | 2025-04-02T16:26:45.937139
3006 / tcp
1911457608 | 2025-04-03T20:28:57.201063
3009 / tcp
-1399940268 | 2025-04-11T13:19:10.974753
3011 / tcp
-1227409554 | 2025-04-23T17:16:10.638455
3019 / tcp
401555314 | 2025-04-24T05:50:06.505418
3021 / tcp
1911457608 | 2025-04-17T05:54:00.814162
3048 / tcp
-1032713145 | 2025-04-12T11:23:52.013206
3050 / tcp
-1399940268 | 2025-04-16T19:49:34.637405
3051 / tcp
1911457608 | 2025-04-12T01:22:47.326645
3052 / tcp
-159371303 | 2025-04-22T08:54:41.172687
3053 / tcp
1615193817 | 2025-03-28T23:55:20.017554
3057 / tcp
1615193817 | 2025-04-05T11:18:59.160258
3061 / tcp
-1730858130 | 2025-04-17T12:05:57.210584
3067 / tcp
1911457608 | 2025-04-07T00:41:50.476133
3071 / tcp
198844676 | 2025-04-23T10:52:34.851866
3072 / tcp
580340387 | 2025-04-26T11:18:43.575119
3075 / tcp
-1399940268 | 2025-04-12T14:42:08.830986
3077 / tcp
198844676 | 2025-04-23T02:55:37.716474
3085 / tcp
-2089734047 | 2025-04-16T23:13:17.796787
3091 / tcp
-1013082686 | 2025-04-25T14:47:13.203156
3096 / tcp
1363464823 | 2025-04-19T06:03:00.369265
3103 / tcp
-1399940268 | 2025-04-02T06:25:31.496303
3106 / tcp
-1399940268 | 2025-04-20T21:16:50.235703
3127 / tcp
-1399940268 | 2025-04-09T05:05:53.846580
3139 / tcp
-747911285 | 2025-04-07T14:04:20.938812
3140 / tcp
165188539 | 2025-04-19T00:07:25.395044
3146 / tcp
-653033013 | 2025-04-16T11:36:03.914243
3155 / tcp
-1327660293 | 2025-04-06T10:23:38.246250
3159 / tcp
1624217396 | 2025-04-16T09:27:07.639301
3161 / tcp
-1730858130 | 2025-04-24T04:36:08.992089
3172 / tcp
165188539 | 2025-04-16T10:56:30.641745
3177 / tcp
-2096652808 | 2025-04-03T05:54:54.922465
3178 / tcp
-2096652808 | 2025-04-07T03:14:27.775219
3182 / tcp
-1399940268 | 2025-04-26T00:39:34.826558
3186 / tcp
1911457608 | 2025-04-15T09:11:24.839535
3260 / tcp
-1914158197 | 2025-04-18T05:12:16.502803
3268 / tcp
-805362002 | 2025-04-26T08:26:06.299610
3299 / tcp
2087396567 | 2025-04-18T08:54:54.725838
3301 / tcp
117101543 | 2025-03-31T19:33:44.678768
3306 / tcp
849822411 | 2025-04-21T22:01:48.041370
3310 / tcp
1077013874 | 2025-04-22T01:04:06.453710
3388 / tcp
-457235091 | 2025-04-17T13:40:12.431283
3405 / tcp
-2089734047 | 2025-04-02T19:10:01.874965
3503 / tcp
-1399940268 | 2025-04-10T16:12:30.825435
3510 / tcp
1308377066 | 2025-04-16T16:52:22.410699
3531 / tcp
1911457608 | 2025-04-07T07:27:18.764205
3551 / tcp
198844676 | 2025-04-09T11:31:19.747794
3555 / tcp
-1399940268 | 2025-04-05T21:47:28.498729
3559 / tcp
-438503381 | 2025-04-05T20:40:23.445192
3562 / tcp
-1648456501 | 2025-04-21T15:38:58.031424
3563 / tcp
-1399940268 | 2025-04-25T00:56:21.323056
3590 / tcp
165188539 | 2025-04-05T21:20:58.933269
3622 / tcp
-180163620 | 2025-04-01T19:31:54.393677
3780 / tcp
-971970408 | 2025-04-22T22:12:14.726692
3790 / tcp
539065883 | 2025-04-23T19:45:55.355305
3838 / tcp
819727972 | 2025-04-09T11:34:08.701424
3841 / tcp
-2080784861 | 2025-04-03T08:32:57.989746
3954 / tcp
-358801646 | 2025-04-06T14:11:12.891328
4000 / tcp
141533638 | 2025-04-19T11:56:55.292364
4010 / tcp
165188539 | 2025-03-28T11:10:30.512868
4022 / tcp
1332894250 | 2025-04-24T07:54:16.204185
4063 / tcp
-1471513798 | 2025-04-25T17:23:03.168660
4064 / tcp
897328069 | 2025-03-29T19:27:13.556874
4072 / tcp
-1013082686 | 2025-04-07T20:51:42.727305
4100 / tcp
-1611764932 | 2025-04-19T07:20:18.221862
4150 / tcp
671605376 | 2025-04-11T01:29:30.037692
4155 / tcp
-585940771 | 2025-04-23T04:53:24.141775
4157 / tcp
1778988322 | 2025-04-20T00:15:42.340877
4282 / tcp
416263569 | 2025-04-21T19:36:31.484085
4321 / tcp
-1250504565 | 2025-04-20T03:36:49.780485
4369 / tcp
-801484042 | 2025-04-01T12:51:37.744499
4430 / tcp
819727972 | 2025-04-24T18:03:28.170897
4434 / tcp
-1641514916 | 2025-04-09T11:36:26.962723
4435 / tcp
-1399940268 | 2025-04-22T22:03:48.915575
4436 / tcp
599074451 | 2025-04-09T09:01:06.851524
4443 / tcp
2069201278 | 2025-04-23T16:35:06.001259
4444 / tcp
1282941221 | 2025-04-21T18:56:59.680971
4500 / tcp
1278527606 | 2025-04-20T17:11:30.335583
4506 / tcp
1741579575 | 2025-04-05T20:33:47.583244
4523 / tcp
-1713437100 | 2025-04-10T06:02:27.308144
4524 / tcp
-2096652808 | 2025-04-08T23:03:36.465693
4531 / tcp
2143387245 | 2025-03-29T00:33:04.579195
4700 / tcp
401555314 | 2025-04-10T20:49:22.729032
4899 / tcp
819727972 | 2025-04-18T09:30:00.502254
4911 / tcp
-1476017887 | 2025-04-19T20:35:33.728215
4949 / tcp
2087396567 | 2025-04-17T19:53:26.773255
5001 / tcp
-971970408 | 2025-04-23T05:56:30.560662
5006 / tcp
1426971893 | 2025-04-11T14:55:55.611157
5007 / tcp
117101543 | 2025-04-15T02:41:09.758793
5010 / tcp
-1746074029 | 2025-04-20T22:43:04.825888
5093 / tcp
632542934 | 2025-04-08T09:59:04.304167
5100 / tcp
-2096652808 | 2025-04-20T01:54:57.555459
5123 / tcp
114471724 | 2025-04-14T16:35:06.391544
5209 / tcp
819727972 | 2025-04-24T15:52:40.869506
5222 / tcp
819727972 | 2025-04-14T19:08:59.238141
5231 / tcp
819727972 | 2025-04-01T00:29:43.381760
5238 / tcp
-1779118422 | 2025-04-25T05:13:30.728270
5251 / tcp
-805362002 | 2025-04-07T19:14:10.377673
5256 / tcp
921225407 | 2025-04-17T16:06:39.662049
5431 / tcp
-981921233 | 2025-04-03T07:34:35.493541
5432 / tcp
-1399940268 | 2025-04-23T10:57:49.828962
5435 / tcp
-136006866 | 2025-04-09T10:52:06.948952
5444 / tcp
-2096652808 | 2025-04-06T13:25:41.797692
5503 / tcp
504717326 | 2025-04-20T17:54:25.273414
5568 / tcp
-1899074860 | 2025-04-04T11:55:00.414170
5590 / tcp
-1279886438 | 2025-04-20T23:12:52.898371
5591 / tcp
1975288991 | 2025-04-05T00:26:14.311298
5597 / tcp
-1013082686 | 2025-04-11T02:26:33.642336
5600 / tcp
-249504111 | 2025-04-06T20:32:22.195430
5606 / tcp
671605376 | 2025-04-24T20:29:11.493465
5620 / tcp
-904840257 | 2025-04-06T01:07:14.527585
5630 / tcp
-1399940268 | 2025-04-03T18:04:57.772128
5853 / tcp
-1399940268 | 2025-04-03T18:42:49.749054
5858 / tcp
1093576587 | 2025-04-19T08:25:10.449496
5902 / tcp
-1730858130 | 2025-04-20T23:24:19.759280
5904 / tcp
-441419608 | 2025-04-03T12:59:43.254815
5911 / tcp
632542934 | 2025-04-19T07:30:41.284641
5984 / tcp
1999272906 | 2025-04-06T11:59:43.903366
5993 / tcp
-1032713145 | 2025-04-08T08:19:30.816252
5997 / tcp
321971019 | 2025-04-25T06:32:26.993258
6000 / tcp
-146605374 | 2025-04-08T01:28:51.595920
6001 / tcp
1282941221 | 2025-04-22T07:25:25.634906
6002 / tcp
-737567094 | 2025-04-14T20:32:43.238652
6007 / tcp
1761482307 | 2025-04-20T20:54:59.619276
6022 / tcp
819727972 | 2025-04-04T20:32:10.724463
6161 / tcp
632542934 | 2025-04-07T14:49:08.291242
6262 / tcp
165188539 | 2025-04-04T06:39:32.856812
6264 / tcp
-1399940268 | 2025-03-28T09:02:42.128007
6352 / tcp
-1626979812 | 2025-04-15T14:16:12.242794
6488 / tcp
1213931722 | 2025-04-07T12:17:18.956894
6601 / tcp
-2089734047 | 2025-04-16T00:35:25.163588
6622 / tcp
-1888448627 | 2025-04-21T04:12:36.722066
6633 / tcp
1911457608 | 2025-04-25T11:06:42.439413
6653 / tcp
-1730858130 | 2025-04-26T21:04:38.234010
6666 / tcp
4935895 | 2025-04-18T15:23:27.220694
6667 / tcp
-1399940268 | 2025-04-26T04:46:26.159954
6668 / tcp
-891714208 | 2025-04-19T18:34:02.753700
6688 / tcp
-288825733 | 2025-04-03T15:09:43.318830
6748 / tcp
-1626979812 | 2025-03-31T09:21:49.726386
6955 / tcp
-1032713145 | 2025-04-24T03:25:23.686592
7001 / tcp
-274925451 | 2025-04-10T19:29:05.820797
7002 / tcp
-1399940268 | 2025-04-19T23:15:42.527856
7018 / tcp
-1399940268 | 2025-03-31T16:47:18.017123
7050 / tcp
-1399940268 | 2025-04-06T23:36:33.409842
7085 / tcp
321971019 | 2025-04-10T14:08:49.181804
7171 / tcp
-1032713145 | 2025-04-24T03:52:28.762315
7172 / tcp
-1375131644 | 2025-03-29T13:40:32.067864
7173 / tcp
671605376 | 2025-03-31T23:46:39.936191
7218 / tcp
1887224352 | 2025-04-18T08:26:49.359417
7283 / tcp
1911457608 | 2025-04-24T11:37:06.147724
7401 / tcp
-1114821551 | 2025-04-06T23:16:44.788646
7415 / tcp
-1399940268 | 2025-04-24T05:49:49.283073
7434 / tcp
2087396567 | 2025-04-11T02:09:25.452438
7480 / tcp
366084633 | 2025-04-21T13:27:27.132273
7535 / tcp
-2046514463 | 2025-04-01T21:47:06.171713
7548 / tcp
2087396567 | 2025-04-12T10:03:35.831618
7601 / tcp
819727972 | 2025-04-07T07:21:21.692627
7634 / tcp
2103111368 | 2025-04-23T12:28:33.377264
7782 / tcp
-136006866 | 2025-04-01T10:49:29.635596
7900 / tcp
-2096652808 | 2025-04-27T00:32:46.716095
7979 / tcp
103159425 | 2025-04-03T19:38:10.620550
8002 / tcp
1911457608 | 2025-04-18T22:33:00.597725
8009 / tcp
1426971893 | 2025-04-12T06:09:29.581845
8011 / tcp
-1140468363 | 2025-03-28T05:34:59.129826
8017 / tcp
-1996280214 | 2025-04-23T03:57:53.112309
8022 / tcp
819727972 | 2025-04-05T17:34:56.514660
8032 / tcp
-1839934832 | 2025-04-18T15:07:25.925407
8037 / tcp
-2089734047 | 2025-04-20T22:42:51.376612
8039 / tcp
-1399940268 | 2025-03-31T13:23:45.858603
8042 / tcp
2049274725 | 2025-04-17T14:08:04.269197
8046 / tcp
398077695 | 2025-04-06T18:28:46.557425
8081 / tcp
-801484042 | 2025-04-10T07:44:03.138969
8083 / tcp
-441419608 | 2025-04-23T03:32:04.816254
8085 / tcp
841014058 | 2025-04-17T16:05:13.166690
8087 / tcp
-2089734047 | 2025-04-12T03:53:44.879493
8089 / tcp
-321444299 | 2025-04-10T15:49:42.416362
8092 / tcp
1282941221 | 2025-04-08T07:49:21.580220
8099 / tcp
623236583 | 2025-04-14T20:53:13.899942
8116 / tcp
-1746074029 | 2025-04-16T20:54:05.371686
8126 / tcp
-527005584 | 2025-04-18T07:28:27.885001
8135 / tcp
819727972 | 2025-04-18T14:39:11.642724
8136 / tcp
1911457608 | 2025-04-04T06:39:33.853114
8139 / tcp
2087396567 | 2025-04-17T21:43:06.363408
8140 / tcp
-616720387 | 2025-04-18T00:11:46.412764
8156 / tcp
819727972 | 2025-04-10T21:13:41.590657
8157 / tcp
-1139539254 | 2025-04-08T19:16:49.619090
8169 / tcp
1911457608 | 2025-04-19T03:31:33.729752
8172 / tcp
1308377066 | 2025-04-26T19:35:41.440408
8174 / tcp
119860953 | 2025-04-05T05:39:45.088533
8181 / tcp
819727972 | 2025-04-08T23:15:06.709581
8185 / tcp
1308377066 | 2025-04-20T18:41:10.515810
8190 / tcp
1911457608 | 2025-04-05T12:12:27.226670
8192 / tcp
-2050145619 | 2025-04-12T06:22:40.236102
8200 / tcp
1320285193 | 2025-04-21T10:19:25.839766
8203 / tcp
410249975 | 2025-04-17T21:26:21.560842
8251 / tcp
-1888448627 | 2025-04-23T03:59:36.333831
8280 / tcp
1911457608 | 2025-04-05T15:55:49.266240
8282 / tcp
740837454 | 2025-04-05T12:30:20.134665
8291 / tcp
819727972 | 2025-04-15T23:07:52.099319
8322 / tcp
-1899074860 | 2025-04-06T08:04:14.126387
8333 / tcp
-1713467553 | 2025-04-09T18:28:16.107029
8410 / tcp
-1730858130 | 2025-04-24T00:44:11.954478
8412 / tcp
1189133115 | 2025-04-01T09:47:39.862086
8413 / tcp
-1399940268 | 2025-04-23T16:57:02.397295
8432 / tcp
-1013082686 | 2025-04-11T20:45:44.812424
8443 / tcp
1096654864 | 2025-04-02T04:45:06.524591
8445 / tcp
1830697416 | 2025-04-02T21:56:44.229158
8446 / tcp
819727972 | 2025-04-02T18:39:52.971411
8462 / tcp
632542934 | 2025-04-17T10:12:41.594836
8465 / tcp
693973426 | 2025-04-25T23:53:18.408546
8467 / tcp
-303199180 | 2025-04-25T03:57:46.615767
8480 / tcp
1975288991 | 2025-04-22T19:00:17.498627
8500 / tcp
-684625978 | 2025-04-18T16:55:26.983227
8502 / tcp
2103111368 | 2025-04-19T00:34:24.867838
8505 / tcp
-1399940268 | 2025-04-04T23:43:55.750131
8510 / tcp
-1399940268 | 2025-04-25T11:11:59.739587
8519 / tcp
-2033111675 | 2025-04-06T22:18:51.937377
8545 / tcp
819727972 | 2025-04-07T23:51:53.913745
8551 / tcp
-1399940268 | 2025-04-01T08:01:16.339986
8554 / tcp
660175493 | 2025-04-04T13:36:27.025679
8557 / tcp
1911457608 | 2025-04-03T07:38:24.716342
8564 / tcp
921225407 | 2025-04-19T13:49:11.819313
8565 / tcp
709622286 | 2025-04-06T20:52:24.104351
8575 / tcp
921225407 | 2025-04-23T12:32:49.502435
8580 / tcp
819727972 | 2025-04-05T12:56:12.029830
8583 / tcp
165188539 | 2025-04-21T16:47:57.938775
8587 / tcp
-1399940268 | 2025-04-17T13:34:37.560177
8588 / tcp
-2017887953 | 2025-04-22T20:23:16.054871
8590 / tcp
1655023012 | 2025-04-22T14:29:19.335114
8700 / tcp
1991883981 | 2025-04-11T03:26:32.161791
8706 / tcp
632542934 | 2025-04-21T00:03:59.925687
8708 / tcp
-1795027372 | 2025-04-25T05:54:38.608175
8723 / tcp
-802143704 | 2025-04-19T22:16:15.836842
8733 / tcp
-2089734047 | 2025-04-21T15:51:36.340531
8764 / tcp
321971019 | 2025-04-17T10:06:24.005096
8784 / tcp
-2118655245 | 2025-04-17T18:34:30.354170
8791 / tcp
1911457608 | 2025-03-28T23:02:25.220361
8818 / tcp
-784071826 | 2025-04-18T20:23:29.575955
8824 / tcp
117101543 | 2025-04-21T13:21:38.188836
8834 / tcp
-2107996212 | 2025-04-10T08:24:19.708353
8839 / tcp
321971019 | 2025-04-24T03:04:37.312568
8860 / tcp
-1399940268 | 2025-04-12T14:40:26.789863
8869 / tcp
321971019 | 2025-03-29T10:39:27.981546
8883 / tcp
165188539 | 2025-04-24T11:27:16.042997
8884 / tcp
-1399940268 | 2025-04-21T21:48:09.824584
8889 / tcp
-1681927087 | 2025-04-18T14:20:49.567633
8891 / tcp
-1265999252 | 2025-04-04T20:11:47.734101
8899 / tcp
474736340 | 2025-04-08T08:25:21.366748
8900 / tcp
-1099385124 | 2025-04-03T07:21:46.003271
8902 / tcp
-1099385124 | 2025-04-19T22:13:31.306064
8908 / tcp
1911457608 | 2025-04-09T08:03:49.573283
8916 / tcp
819727972 | 2025-03-28T10:55:59.545743
9003 / tcp
921225407 | 2025-04-02T13:43:14.034982
9015 / tcp
1996932384 | 2025-03-29T08:04:32.739891
9020 / tcp
2063598737 | 2025-04-25T15:20:56.230690
9021 / tcp
819727972 | 2025-04-24T13:36:05.286018
9024 / tcp
-2089734047 | 2025-04-06T08:52:03.857919
9027 / tcp
205347087 | 2025-04-12T05:18:21.057008
9030 / tcp
819727972 | 2025-04-16T02:09:08.096039
9039 / tcp
-1399940268 | 2025-04-17T06:16:21.057911
9042 / tcp
539065883 | 2025-04-25T17:32:29.052488
9044 / tcp
205347087 | 2025-04-09T06:40:40.449360
9046 / tcp
398077695 | 2025-04-08T06:14:41.133094
9048 / tcp
1911457608 | 2025-04-01T20:10:56.151535
9051 / tcp
1842524259 | 2025-04-25T11:42:04.246997
9057 / tcp
-1399940268 | 2025-03-28T20:21:58.255255
9060 / tcp
1574088840 | 2025-04-03T18:09:52.291745
9061 / tcp
-1737707071 | 2025-04-11T06:29:13.251248
9065 / tcp
-1399940268 | 2025-04-02T05:38:25.092355
9072 / tcp
-1648456501 | 2025-04-15T22:32:51.092021
9074 / tcp
819727972 | 2025-04-21T03:35:37.590704
9083 / tcp
114471724 | 2025-04-25T17:40:37.555441
9085 / tcp
1282941221 | 2025-03-31T20:30:15.716856
9092 / tcp
1911457608 | 2025-04-22T15:10:06.863062
9095 / tcp
819727972 | 2025-04-26T22:31:08.435638
9096 / tcp
1282941221 | 2025-04-07T06:24:54.354790
9099 / tcp
638001051 | 2025-04-18T13:18:19.587593
9100 / tcp
-358801646 | 2025-04-25T05:09:32.974871
9103 / tcp
1353260875 | 2025-04-21T09:26:18.951367
9109 / tcp
165188539 | 2025-04-06T16:57:58.684108
9114 / tcp
693973426 | 2025-04-10T06:34:37.909314
9124 / tcp
1011407350 | 2025-04-11T04:56:27.733244
9131 / tcp
1278527606 | 2025-04-25T21:40:44.701080
9134 / tcp
-1399940268 | 2025-04-22T05:20:39.885424
9135 / tcp
-1737707071 | 2025-04-23T07:45:51.490396
9146 / tcp
1011407350 | 2025-04-11T03:29:58.913130
9148 / tcp
819727972 | 2025-04-25T01:55:40.603842
9151 / tcp
819727972 | 2025-04-17T14:14:25.423011
9156 / tcp
1763259671 | 2025-04-05T15:24:29.623582
9160 / tcp
-1399940268 | 2025-04-25T22:07:28.417178
9173 / tcp
-358801646 | 2025-04-05T12:24:50.664344
9194 / tcp
819727972 | 2025-04-19T09:55:21.767013
9209 / tcp
-805362002 | 2025-03-28T04:38:40.026781
9220 / tcp
1911457608 | 2025-04-05T18:15:44.927378
9222 / tcp
-1888448627 | 2025-04-11T19:39:23.563269
9247 / tcp
1642597142 | 2025-04-06T21:52:19.026602
9250 / tcp
1911457608 | 2025-04-14T16:17:18.379217
9299 / tcp
-1810987450 | 2025-04-01T10:19:21.186213
9303 / tcp
-2089734047 | 2025-04-03T14:26:22.397959
9306 / tcp
1911457608 | 2025-04-23T16:07:35.078620
9307 / tcp
-1399940268 | 2025-04-23T03:34:02.751281
9315 / tcp
-1428621233 | 2025-04-08T01:40:39.563818
9333 / tcp
-1746074029 | 2025-04-26T06:23:59.986014
9345 / tcp
-1839934832 | 2025-04-09T00:03:40.806972
9398 / tcp
-1453516345 | 2025-03-31T14:45:38.986134
9454 / tcp
1504401647 | 2025-04-18T22:08:29.595092
9513 / tcp
-1140468363 | 2025-04-06T07:03:09.207432
9633 / tcp
1824169301 | 2025-04-22T17:46:41.577643
9682 / tcp
-445721795 | 2025-04-19T05:00:22.237204
9711 / tcp
-1730858130 | 2025-04-17T16:09:30.098937
9761 / tcp
1620329124 | 2025-04-22T09:38:15.860865
9876 / tcp
-1451615933 | 2025-04-02T11:37:05.780234
9918 / tcp
1830697416 | 2025-04-17T19:57:37.014528
9930 / tcp
1911457608 | 2025-04-24T05:40:34.362027
9939 / tcp
-2140303521 | 2025-04-26T21:44:27.668894
9943 / tcp
1712606111 | 2025-04-16T20:00:02.981006
9944 / tcp
2087396567 | 2025-04-08T07:46:21.268285
9966 / tcp
-2096652808 | 2025-04-26T17:14:31.853834
9977 / tcp
-249504111 | 2025-04-20T08:58:06.553356
9994 / tcp
1911457608 | 2025-03-29T17:14:25.625451
9998 / tcp
-1223770960 | 2025-04-24T05:16:46.325716
9999 / tcp
1161309183 | 2025-04-23T18:38:33.699982
10000 / tcp
2087396567 | 2025-04-11T20:33:18.470981
10002 / tcp
-1327660293 | 2025-04-07T09:27:48.468876
10005 / tcp
971933601 | 2025-04-02T18:28:27.856699
10011 / tcp
-1248408558 | 2025-04-09T16:49:01.716104
10017 / tcp
-1476017887 | 2025-04-22T16:59:09.467073
10028 / tcp
2143387245 | 2025-04-10T17:31:57.228823
10035 / tcp
-2033111675 | 2025-04-18T14:23:06.513264
10041 / tcp
-2017887953 | 2025-04-24T21:49:54.913247
10049 / tcp
632542934 | 2025-04-01T06:53:22.503473
10200 / tcp
597764502 | 2025-04-12T17:30:36.083451
10225 / tcp
971933601 | 2025-04-12T22:04:50.584351
10443 / tcp
1741579575 | 2025-04-15T10:01:23.604495
10477 / tcp
-1737707071 | 2025-04-03T08:42:36.496641
10892 / tcp
-2089734047 | 2025-03-28T08:44:54.530395
10911 / tcp
-1032713145 | 2025-04-25T14:56:35.551529
11000 / tcp
-358801646 | 2025-04-06T20:42:42.758281
11065 / tcp
-1399940268 | 2025-04-20T10:13:53.180170
11110 / tcp
-147424911 | 2025-04-08T12:00:01.614282
11111 / tcp
401555314 | 2025-04-03T19:54:58.328073
11180 / tcp
89142341 | 2025-04-19T18:26:55.534511
11210 / tcp
-1013082686 | 2025-04-18T15:32:35.084667
11288 / tcp
-2089734047 | 2025-04-25T20:44:42.520235
11300 / tcp
-441419608 | 2025-04-24T18:07:08.649322
11701 / tcp
819727972 | 2025-04-21T02:27:51.567324
12000 / tcp
368820174 | 2025-04-19T23:37:32.509445
12019 / tcp
1308377066 | 2025-04-02T14:57:26.390496
12056 / tcp
1632932802 | 2025-04-02T10:42:42.319873
12082 / tcp
-1036370807 | 2025-04-23T17:12:36.879221
12109 / tcp
580340387 | 2025-04-02T21:50:31.633484
12112 / tcp
-904840257 | 2025-04-22T16:42:47.569384
12114 / tcp
-904840257 | 2025-04-15T13:24:08.323707
12125 / tcp
165188539 | 2025-04-25T22:23:57.806381
12135 / tcp
165188539 | 2025-04-15T09:42:04.070217
12138 / tcp
-1399940268 | 2025-04-07T15:35:40.297426
12145 / tcp
-1839934832 | 2025-03-31T05:38:52.733399
12147 / tcp
-1839934832 | 2025-04-05T10:49:17.279751
12150 / tcp
-339084706 | 2025-03-31T20:09:47.515539
12157 / tcp
-2096652808 | 2025-03-31T09:53:10.062530
12161 / tcp
-146605374 | 2025-04-15T22:06:00.209127
12174 / tcp
891314996 | 2025-04-23T00:41:00.858916
12175 / tcp
-2096652808 | 2025-04-09T07:25:07.947721
12181 / tcp
-2089734047 | 2025-04-01T18:00:52.110309
12182 / tcp
-146605374 | 2025-04-25T18:04:28.474060
12188 / tcp
819727972 | 2025-04-04T05:32:28.656866
12196 / tcp
504717326 | 2025-04-22T17:01:51.343567
12198 / tcp
-358801646 | 2025-04-24T10:02:41.826560
12199 / tcp
677934968 | 2025-04-26T09:02:14.638478
12200 / tcp
1543809371 | 2025-04-20T07:42:00.920311
12201 / tcp
1134517380 | 2025-04-12T00:31:35.530677
12218 / tcp
-1839934832 | 2025-04-14T22:35:46.143593
12229 / tcp
-784071826 | 2025-04-17T03:49:36.827696
12232 / tcp
320677201 | 2025-04-23T05:27:45.526167
12236 / tcp
165188539 | 2025-04-05T02:02:55.409402
12245 / tcp
-2096652808 | 2025-04-09T18:15:20.535815
12250 / tcp
-784071826 | 2025-04-14T17:12:50.127619
12260 / tcp
1911457608 | 2025-04-09T02:10:18.020930
12263 / tcp
-1733106930 | 2025-04-20T07:02:29.099310
12267 / tcp
-358801646 | 2025-04-24T14:58:52.705891
12274 / tcp
-1373613804 | 2025-04-07T13:50:18.517125
12278 / tcp
-1399940268 | 2025-03-28T06:06:06.948813
12302 / tcp
-904840257 | 2025-04-06T22:17:26.448211
12315 / tcp
-1399940268 | 2025-04-25T04:32:26.552420
12317 / tcp
-1746074029 | 2025-04-05T11:54:31.742293
12322 / tcp
-345718689 | 2025-04-03T07:50:09.459091
12329 / tcp
707919486 | 2025-04-19T04:37:53.569565
12333 / tcp
819727972 | 2025-04-06T23:03:33.208048
12339 / tcp
-1996280214 | 2025-04-18T04:43:59.033059
12345 / tcp
296364507 | 2025-04-24T19:42:01.809942
12351 / tcp
819727972 | 2025-04-20T21:14:15.232340
12352 / tcp
-1730858130 | 2025-04-21T14:30:59.143014
12382 / tcp
-1399940268 | 2025-04-07T03:33:06.181604
12387 / tcp
-1399940268 | 2025-04-16T06:38:46.976637
12390 / tcp
921225407 | 2025-04-21T18:15:41.108323
12403 / tcp
-1888448627 | 2025-04-04T14:40:02.051313
12409 / tcp
-1399940268 | 2025-04-02T13:12:06.848018
12411 / tcp
-2089734047 | 2025-04-18T09:28:09.907616
12414 / tcp
-146605374 | 2025-04-22T03:18:57.958716
12419 / tcp
-792826324 | 2025-04-22T07:11:08.112381
12425 / tcp
-1399940268 | 2025-04-05T15:22:21.078623
12435 / tcp
-1399940268 | 2025-04-18T02:04:59.794462
12437 / tcp
580340387 | 2025-03-28T14:16:56.217006
12444 / tcp
-358801646 | 2025-04-03T01:10:28.303232
12447 / tcp
-653033013 | 2025-04-01T08:15:04.757682
12452 / tcp
-891714208 | 2025-04-24T07:28:55.545682
12454 / tcp
-358801646 | 2025-04-26T14:35:53.092761
12481 / tcp
-1888448627 | 2025-04-06T03:58:17.804849
12485 / tcp
1911457608 | 2025-04-02T06:31:55.581417
12491 / tcp
-457235091 | 2025-04-03T22:16:50.133405
12494 / tcp
-1399940268 | 2025-04-02T22:24:11.366522
12497 / tcp
-1428621233 | 2025-04-16T19:29:30.699139
12499 / tcp
1911457608 | 2025-04-02T13:44:53.823782
12502 / tcp
-1730858130 | 2025-04-06T17:39:45.641163
12503 / tcp
-1399940268 | 2025-04-03T18:40:22.422875
12505 / tcp
1975288991 | 2025-04-13T00:20:21.735144
12506 / tcp
-653033013 | 2025-04-23T14:39:42.648769
12517 / tcp
-1399940268 | 2025-04-03T20:28:10.488589
12521 / tcp
-1375131644 | 2025-04-21T07:32:53.604835
12525 / tcp
-1399940268 | 2025-04-08T14:32:00.471680
12533 / tcp
921225407 | 2025-04-22T18:00:42.839906
12543 / tcp
-2096652808 | 2025-04-17T23:22:16.377028
12552 / tcp
1126993057 | 2025-03-28T23:58:33.393733
12555 / tcp
1911457608 | 2025-04-17T08:08:54.193167
12567 / tcp
321971019 | 2025-04-10T21:28:12.041107
12569 / tcp
-2096652808 | 2025-04-20T03:33:34.407731
12571 / tcp
307999478 | 2025-04-24T16:22:16.319410
12572 / tcp
-1032713145 | 2025-04-26T21:43:54.889592
12583 / tcp
0 | 2025-04-22T00:39:39.300185
12584 / tcp
-1279886438 | 2025-04-05T23:03:49.586992
12587 / tcp
-303199180 | 2025-04-15T09:54:12.409967
12590 / tcp
-2096652808 | 2025-03-31T14:15:15.701358
13082 / tcp
1911457608 | 2025-03-29T20:47:45.964507
13084 / tcp
321971019 | 2025-04-26T20:32:40.466279
14024 / tcp
-1839934832 | 2025-04-23T00:05:46.226918
14147 / tcp
-1795027372 | 2025-04-23T08:58:33.652580
14265 / tcp
-616720387 | 2025-04-26T07:53:59.125546
14344 / tcp
819727972 | 2025-04-22T01:00:19.868437
14403 / tcp
-358801646 | 2025-04-21T18:37:48.692139
14406 / tcp
-1399940268 | 2025-04-17T15:59:41.952660
14523 / tcp
-1730858130 | 2025-04-24T20:42:17.881682
14896 / tcp
-1428621233 | 2025-04-22T04:37:35.844017
15018 / tcp
632542934 | 2025-04-06T18:22:54.321447
15151 / tcp
-2031152423 | 2025-03-31T22:57:25.802581
15443 / tcp
1911457608 | 2025-04-16T17:24:25.868287
15555 / tcp
-1265999252 | 2025-04-11T12:20:24.041855
15673 / tcp
15018106 | 2025-04-15T19:49:47.047904
15831 / tcp
2098371729 | 2025-04-07T16:00:45.596782
16010 / tcp
-2096652808 | 2025-04-01T01:04:30.474137
16015 / tcp
-2096652808 | 2025-04-06T11:23:14.825254
16016 / tcp
-147424911 | 2025-04-10T21:03:53.035698
16023 / tcp
-1737707071 | 2025-04-15T04:06:24.416356
16027 / tcp
-1399940268 | 2025-04-25T04:41:19.843994
16031 / tcp
165188539 | 2025-04-10T23:34:04.677042
16038 / tcp
819727972 | 2025-04-25T04:06:30.940391
16064 / tcp
-1399940268 | 2025-04-21T11:29:31.664471
16065 / tcp
1519486042 | 2025-04-04T22:32:00.565730
16066 / tcp
-1428621233 | 2025-04-04T03:47:11.511156
16068 / tcp
1911457608 | 2025-04-05T23:45:43.501312
16084 / tcp
-1399940268 | 2025-04-24T23:15:22.535062
16088 / tcp
1615193817 | 2025-04-04T10:00:57.033661
16094 / tcp
-1399940268 | 2025-04-24T06:02:01.806371
16099 / tcp
-2096652808 | 2025-04-06T02:28:43.455805
16103 / tcp
1665283070 | 2025-04-08T02:30:09.359471
16402 / tcp
-2107996212 | 2025-04-03T07:15:04.866782
16443 / tcp
1011407350 | 2025-04-24T23:39:38.736824
16464 / tcp
1690634669 | 2025-04-02T08:38:11.874438
16667 / tcp
-1399940268 | 2025-03-28T21:10:38.940525
16831 / tcp
1911457608 | 2025-04-15T18:34:00.142118
16992 / tcp
-1840324437 | 2025-03-31T07:16:56.726059
17010 / tcp
-1279886438 | 2025-04-20T22:45:02.368377
17070 / tcp
-1733645023 | 2025-04-24T19:42:30.187108
17773 / tcp
-616720387 | 2025-04-24T04:33:44.021352
17775 / tcp
165188539 | 2025-04-18T18:54:56.777535
18004 / tcp
-1947777893 | 2025-04-22T21:34:00.837407
18010 / tcp
-904840257 | 2025-03-29T20:33:01.614945
18013 / tcp
632542934 | 2025-04-09T15:18:17.392146
18017 / tcp
-2096652808 | 2025-04-08T17:36:59.133642
18030 / tcp
-1996280214 | 2025-04-09T02:49:15.519219
18033 / tcp
820958131 | 2025-04-22T23:52:11.463390
18043 / tcp
1208318993 | 2025-04-19T20:32:34.174670
18046 / tcp
-1730858130 | 2025-03-29T05:21:33.882582
18049 / tcp
-1248408558 | 2025-04-04T21:11:46.704906
18070 / tcp
-2096652808 | 2025-04-17T19:26:25.141907
18077 / tcp
-1399940268 | 2025-04-26T03:55:34.223987
18078 / tcp
1492413928 | 2025-04-22T09:00:56.745586
18080 / tcp
2087396567 | 2025-04-08T15:48:11.669817
18081 / tcp
-138733098 | 2025-04-09T07:43:03.809251
18086 / tcp
740837454 | 2025-04-10T02:37:19.292006
18087 / tcp
1911457608 | 2025-04-10T16:39:41.500779
18099 / tcp
-146605374 | 2025-04-15T08:23:45.615803
18102 / tcp
1762042191 | 2025-04-01T09:21:55.231312
18182 / tcp
-1059554316 | 2025-04-21T18:32:34.505112
18245 / tcp
1690634669 | 2025-04-03T22:34:19.715535
18443 / tcp
-971970408 | 2025-03-28T19:32:52.454208
18553 / tcp
1636811864 | 2025-04-06T19:24:19.991750
19084 / tcp
-2089734047 | 2025-04-25T03:57:06.215709
19100 / tcp
165188539 | 2025-04-21T03:20:34.199715
19200 / tcp
1852418385 | 2025-04-04T02:28:39.724662
19776 / tcp
819727972 | 2025-04-12T06:55:26.711554
19930 / tcp
-1045760528 | 2025-04-06T14:12:13.554336
20000 / tcp
1900503736 | 2025-04-23T11:19:39.256268
20001 / tcp
-345718689 | 2025-04-17T07:54:36.708611
20060 / tcp
-653033013 | 2025-04-15T19:01:47.523544
20084 / tcp
366084633 | 2025-04-18T01:17:02.956876
20087 / tcp
2087396567 | 2025-04-02T23:29:09.892837
20107 / tcp
1911457608 | 2025-03-31T22:51:25.120690
20182 / tcp
117101543 | 2025-04-18T20:29:25.669629
20201 / tcp
597764502 | 2025-04-23T01:02:05.348545
20202 / tcp
-1399940268 | 2025-04-02T02:23:31.630734
20547 / tcp
-457235091 | 2025-04-22T15:21:59.168184
20880 / tcp
1370263973 | 2025-04-08T16:57:53.041497
20900 / tcp
-303199180 | 2025-04-18T04:50:43.903043
21002 / tcp
819727972 | 2025-04-25T04:33:55.168043
21025 / tcp
-441419608 | 2025-04-12T23:09:53.240895
21083 / tcp
-1733645023 | 2025-04-07T09:48:58.824771
21231 / tcp
-1105333987 | 2025-04-22T11:10:03.164085
21249 / tcp
165188539 | 2025-04-24T02:00:18.382278
21251 / tcp
-1399940268 | 2025-04-09T10:12:35.091913
21263 / tcp
-1810987450 | 2025-04-23T21:08:48.522948
21267 / tcp
-1399940268 | 2025-04-20T21:27:35.635191
21273 / tcp
-1648456501 | 2025-04-21T05:28:37.897922
21279 / tcp
819727972 | 2025-04-12T22:06:13.490043
21280 / tcp
-653033013 | 2025-04-02T17:16:15.626656
21288 / tcp
-441419608 | 2025-03-31T15:41:27.444898
21299 / tcp
-1399940268 | 2025-04-06T06:38:24.881490
21302 / tcp
1911457608 | 2025-04-17T15:54:56.892682
21307 / tcp
321971019 | 2025-04-20T17:48:06.271158
21309 / tcp
-1399940268 | 2025-04-17T08:57:37.717648
21312 / tcp
1911457608 | 2025-04-11T17:57:34.571247
21313 / tcp
-1248408558 | 2025-04-08T23:18:59.264720
21315 / tcp
1308377066 | 2025-04-03T19:33:06.382206
21319 / tcp
-2089734047 | 2025-04-02T08:12:37.178511
21329 / tcp
575925250 | 2025-04-01T15:20:25.783820
21379 / tcp
320677201 | 2025-04-24T23:08:30.714145
22067 / tcp
2087396567 | 2025-04-02T03:11:39.677817
22070 / tcp
-653033013 | 2025-04-04T00:24:40.340168
22222 / tcp
-358801646 | 2025-04-12T16:42:13.978564
22556 / tcp
1911457608 | 2025-04-24T19:54:00.278873
23023 / tcp
-1461540015 | 2025-04-18T18:59:49.777767
23084 / tcp
-1648456501 | 2025-04-26T15:42:22.747070
23182 / tcp
-2080784861 | 2025-04-23T20:51:32.825306
23424 / tcp
971933601 | 2025-04-03T06:28:35.819343
25001 / tcp
1911457608 | 2025-04-12T23:25:03.635932
25003 / tcp
1911457608 | 2025-04-08T01:51:54.660856
25005 / tcp
1363464823 | 2025-04-26T07:47:55.813988
25105 / tcp
-952165951 | 2025-04-12T09:35:20.910420
25565 / tcp
873425297 | 2025-04-12T14:51:03.968301
25782 / tcp
-1013082686 | 2025-03-31T11:10:32.289315
26656 / tcp
597764502 | 2025-03-28T23:19:38.259809
26657 / tcp
1842524259 | 2025-04-07T14:39:05.328026
27015 / tcp
841014058 | 2025-04-12T14:09:35.077832
27016 / tcp
-971970408 | 2025-03-29T08:34:17.927828
27017 / tcp
1763259671 | 2025-04-09T11:31:58.701100
28015 / tcp
819727972 | 2025-04-18T09:43:32.213850
28017 / tcp
2087396567 | 2025-04-02T10:21:29.864073
28080 / tcp
-527005584 | 2025-04-07T08:32:02.712263
28818 / tcp
740837454 | 2025-04-23T06:07:46.876811
29798 / tcp
1426971893 | 2025-04-19T01:31:43.850140
29799 / tcp
408230060 | 2025-04-15T23:55:50.262910
30002 / tcp
178736976 | 2025-04-22T21:01:45.182709
30003 / tcp
1978059005 | 2025-03-29T14:53:20.617853
30013 / tcp
921225407 | 2025-04-02T01:44:12.379328
30022 / tcp
740837454 | 2025-04-05T23:27:31.083747
30029 / tcp
1948301213 | 2025-03-29T01:29:07.370101
30050 / tcp
-1399940268 | 2025-04-19T07:40:13.663008
30120 / tcp
1911457608 | 2025-04-09T11:50:44.254669
30301 / tcp
-407828767 | 2025-03-31T17:43:23.526264
30303 / tcp
539065883 | 2025-04-09T12:20:07.333624
30322 / tcp
841014058 | 2025-04-06T01:12:03.617387
30452 / tcp
-1399940268 | 2025-04-15T04:34:50.447868
30501 / tcp
632542934 | 2025-04-17T00:29:38.804831
30622 / tcp
-1611764932 | 2025-04-05T11:22:00.908900
30718 / tcp
-2099439721 | 2025-04-11T19:28:33.883813
30922 / tcp
1332894250 | 2025-04-05T21:44:20.068558
31337 / tcp
-1992519278 | 2025-04-09T04:51:28.807008
31422 / tcp
-1681927087 | 2025-04-05T07:38:49.860542
31443 / tcp
165188539 | 2025-04-09T17:23:16.118497
31522 / tcp
1919228981 | 2025-04-04T21:21:11.342178
31622 / tcp
-1839934832 | 2025-04-04T17:40:42.485949
32022 / tcp
1919228981 | 2025-04-05T06:29:58.095792
32080 / tcp
819727972 | 2025-04-18T20:33:20.885890
32400 / tcp
-1900404274 | 2025-04-12T02:54:50.804705
32422 / tcp
819727972 | 2025-04-04T18:46:45.776185
33060 / tcp
677934968 | 2025-04-20T02:32:54.847976
33338 / tcp
2087396567 | 2025-04-11T13:51:58.060654
35000 / tcp
-1399940268 | 2025-04-15T07:01:35.580026
37215 / tcp
-1230049476 | 2025-04-02T14:46:07.951013
37777 / tcp
165188539 | 2025-04-17T23:22:56.728293
38333 / tcp
819727972 | 2025-03-28T17:52:14.379169
40001 / tcp
-1399940268 | 2025-04-11T06:31:01.477659
40471 / tcp
0 | 2025-04-17T03:40:29.023919
40894 / tcp
-1986594217 | 2025-04-17T17:36:31.075765
41443 / tcp
-154107716 | 2025-03-28T05:34:53.123986
41794 / tcp
-1839934832 | 2025-04-11T10:26:20.401767
41800 / tcp
-303199180 | 2025-04-15T21:54:45.793601
42194 / tcp
-358801646 | 2025-04-08T16:39:49.265608
42424 / tcp
-2096652808 | 2025-04-03T06:34:46.216594
43200 / tcp
1991883981 | 2025-04-23T07:47:28.508456
44158 / tcp
-433302150 | 2025-04-06T20:19:23.678564
44303 / tcp
-1399940268 | 2025-04-16T03:23:15.234238
44304 / tcp
921225407 | 2025-04-05T04:41:47.389327
44309 / tcp
1353260875 | 2025-04-07T21:58:06.084801
44320 / tcp
-1329831334 | 2025-04-02T09:08:01.335335
44400 / tcp
401555314 | 2025-04-15T08:08:46.213304
44520 / tcp
-345718689 | 2025-04-06T12:00:18.547241
44818 / tcp
-2017887953 | 2025-04-17T05:40:01.213851
45111 / tcp
-1733645023 | 2025-04-23T00:32:17.735223
45886 / tcp
819727972 | 2025-04-01T19:43:57.909255
47001 / tcp
-1399940268 | 2025-04-20T04:36:12.853311
47808 / tcp
-1779118422 | 2025-04-10T16:46:10.002055
48001 / tcp
671605376 | 2025-04-17T22:19:39.880077
48018 / tcp
1353260875 | 2025-04-18T21:19:28.485818
48889 / tcp
1911457608 | 2025-04-04T04:11:30.920585
48899 / tcp
-1529979118 | 2025-04-11T05:59:32.574266
49152 / tcp
1686199642 | 2025-03-31T19:51:01.289038
49592 / tcp
-1059554316 | 2025-04-26T23:07:12.491842
50000 / tcp
-1316398834 | 2025-04-25T20:33:25.084047
50004 / tcp
-1598265216 | 2025-04-17T23:26:57.145151
50050 / tcp
1690634669 | 2025-04-10T22:09:13.262750
50100 / tcp
-1681927087 | 2025-04-25T19:26:13.435980
50107 / tcp
1726594447 | 2025-04-15T22:20:35.797482
51106 / tcp
2087396567 | 2025-03-29T19:36:34.676922
51235 / tcp
-1248408558 | 2025-04-01T18:35:02.387146
51443 / tcp
-971970408 | 2025-04-07T01:45:41.412899
53413 / tcp
1261582754 | 2025-04-10T07:55:25.059575
53805 / tcp
2143387245 | 2025-04-12T11:46:33.841811
54138 / tcp
820958131 | 2025-04-22T21:10:10.541903
54984 / tcp
1741579575 | 2025-04-10T06:52:32.579998
55000 / tcp
-249504111 | 2025-04-05T23:55:21.419995
55200 / tcp
-1399940268 | 2025-04-21T00:27:26.121299
55442 / tcp
841014058 | 2025-04-10T00:35:54.322564
55443 / tcp
-1648456501 | 2025-04-01T13:13:27.902430
55553 / tcp
-321444299 | 2025-04-18T10:45:52.501374
55554 / tcp
-21576419 | 2025-04-21T06:25:22.183281
55555 / tcp
-147424911 | 2025-04-11T19:19:07.104827
57781 / tcp
819727972 | 2025-04-18T20:04:15.892826
57782 / tcp
165188539 | 2025-04-06T13:32:55.781198
57785 / tcp
1911457608 | 2025-04-01T04:27:30.819883
58532 / tcp
-1428621233 | 2025-04-04T02:11:25.164072
60001 / tcp
-971970408 | 2025-04-09T17:29:36.546001
60129 / tcp
1975288991 | 2025-04-10T23:40:36.634141
60443 / tcp
179185434 | 2025-04-18T14:40:25.860669
61234 / tcp
1282941221 | 2025-04-20T20:09:04.621859
61616 / tcp
-1399940268 | 2025-04-22T12:23:48.906679
62078 / tcp
-154616015 | 2025-04-12T04:35:07.523406
62865 / tcp
-1996280214 | 2025-04-21T00:10:27.771293
63210 / tcp
1632932802 | 2025-04-17T00:27:44.273126
63256 / tcp
2087396567 | 2025-04-07T02:44:53.386081
63257 / tcp
-154107716 | 2025-04-06T21:10:37.335252
63260 / tcp
-2089734047 | 2025-04-23T07:50:19.038217
63443 / tcp
-1839934832 | 2025-04-04T15:02:02.769234
65000 / tcp
-147424911 | 2025-04-17T21:00:58.412131

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2025(1)
CVE-2025-26465
6.8A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
2024(1)
CVE-2024-6387
8.1A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
2023(4)
CVE-2023-51767
7.0OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
CVE-2023-51385
6.5In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
CVE-2023-48795
5.9The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
CVE-2023-38408
9.8The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
2021(2)
CVE-2021-41617
7.0sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
CVE-2021-36368
3.7An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass, since nothing is being bypassed.
2020(2)
CVE-2020-15778
7.8scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
CVE-2020-14145
5.9The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
2019(4)
CVE-2019-16905
7.8OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
CVE-2019-6111
5.9An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
CVE-2019-6110
6.8In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
CVE-2019-6109
6.8An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
2018(3)
CVE-2018-20685
5.3In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
CVE-2018-15919
5.3Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
CVE-2018-15473
5.3OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
2017(1)
CVE-2017-15906
5.3The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
2016(9)
CVE-2016-20012
5.3OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
CVE-2016-10708
7.5sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
CVE-2016-10012
7.8The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
CVE-2016-10011
5.5authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
CVE-2016-10010
7.0sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
CVE-2016-10009
7.3Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
CVE-2016-3115
6.4Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
CVE-2016-1908
9.8The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
CVE-2016-0777
6.5The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
2015(4)
CVE-2015-6564
6.9Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
CVE-2015-6563
1.9The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
CVE-2015-5600
8.5The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
CVE-2015-5352
4.3The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
2014(3)
CVE-2014-2653
5.8The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
CVE-2014-2532
4.9sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
CVE-2014-1692
7.5The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.
2012(1)
CVE-2012-0814
3.5The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
2011(2)
CVE-2011-5000
3.5The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
CVE-2011-4327
2.1ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.
2010(3)
CVE-2010-5107
5.0The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
CVE-2010-4755
4.0The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
CVE-2010-4478
7.5OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
2008(1)
CVE-2008-3844
9.3Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
2007(1)
CVE-2007-2768
4.3OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.



Contact Us

Shodan ® - All rights reserved