11 /
tcp
1453929220 | 2025-03-07T08:43:57.100714
13 /
tcp
1193556399 | 2025-03-10T15:18:19.998034
15 /
tcp
-1681927087 | 2025-03-21T08:25:54.305787
kjnkjabhbanc283ubcsbhdc72
17 /
tcp
-1316491703 | 2025-02-24T22:07:58.376988
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready
19 /
tcp
829384519 | 2025-02-27T19:43:45.458825
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefg
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUV
21 /
tcp
179309064 | 2025-03-19T13:36:59.720683
220 Microsoft FTP Service
530 User cannot log in.
23 /
tcp
460589547 | 2025-03-21T21:02:45.236249
25 /
tcp
-1399940268 | 2025-03-11T17:34:15.913415
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1110767461 | 2025-03-09T20:06:48.779006
HTTP/1.1 200 OK
Server: nginx/1
43 /
tcp
-971970408 | 2025-03-14T18:45:57.018676
49 /
tcp
-801484042 | 2025-03-21T21:25:58.683418
53 /
tcp
-1511422614 | 2025-03-21T17:44:49.886971
9
\x81\x80\x00\x01\x00\x02\x00\x00\x00\x00\x08clients1\x06google\x03com\x00\x00\x01\x00\x01\xc0\x00\x05\x00\x01\x00\x00\x00U\x00\x07clients\x01l\xc0\x15\xc01\x00\x01\x00\x01\x00\x00\x00\x9d\x00\x04\x8e\xfb*\xee
\x00\x06\x85\x00\x00\x01\x00\x01\x00\x00\
-2029556872 | 2025-02-28T09:33:29.718544
HTTP/1.1 200 OK
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
Content-Type: text/html
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Connection: Keep-Alive
Accept-Ranges: bytes
87 /
tcp
-1626979812 | 2025-03-14T04:26:16.790503
220 Service ready for new user.
91 /
tcp
-1032713145 | 2025-03-09T20:45:35.256946
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
97 /
tcp
-1399940268 | 2025-03-08T20:08:11.638417
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1282941221 | 2025-02-26T22:05:19.641457
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
104 /
tcp
-1399940268 | 2025-03-13T07:00:13.879532
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
106 /
tcp
366084633 | 2025-02-24T11:23:47.470102
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
110 /
tcp
1911457608 | 2025-03-22T01:48:51.015935
\x00[\x00\x00\x00\x00\x00\x00
111 /
tcp
-971970408 | 2025-03-18T19:32:32.172907
113 /
tcp
60948681 | 2025-03-17T11:42:14.735631
lpd [@Boyk]: Print-services are not available to your host (aF2qXkQ2m).
139 /
tcp
-1270998736 | 2025-03-17T23:32:50.805848
\\x83\\x00\\x00\\x01\\x8f
143 /
tcp
-858402222 | 2025-03-12T16:31:04.985640
* OK Waiting for authentication process to respond..\r\n
179 /
tcp
-399606100 | 2025-03-18T02:12:44.494495
BGP Message\nType: 3\nMajor error Code: 6\nMinor error Code: 5\n
180 /
tcp
1332894250 | 2025-03-19T00:26:50.832156
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
195 /
tcp
-375604792 | 2025-03-17T10:42:44.179082
220 Microsoft FTP Service
221 /
tcp
-1399940268 | 2025-02-27T17:40:22.272163
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
264 /
tcp
-1180827859 | 2025-03-04T21:41:41.666152
CheckPoint\nFirewall Host: SKIET_LIBS1_INT_FW_SG5400_1\nSmartCenter Host: SKIET_LIBS1_MGMT_FW_NGSM10..umxpwy\\x00\n
285 /
tcp
1911457608 | 2025-03-22T01:10:34.880395
\x00[\x00\x00\x00\x00\x00\x00
389 /
tcp
-1907080992 | 2025-02-25T06:18:34.531949
0\x0c\\x02\\x01\\x01a\\x07\n\\x01\\x00\\x04\\x00\\x04\\x00
400 /
tcp
1208318993 | 2025-02-25T23:46:50.860047
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
427 /
tcp
1801635450 | 2025-03-09T07:08:46.869849
SAAdvert Response:\nVersion: 2\nFunction: SA Advertisement (11)\nURL: service:service-agent://127.0.0.1\nScopeList: default\nAttrributeList: \n\n\nserviceTypes:\nservice:ipmi\nservice:cdserver\nservice:fdserver\nservice:hdserver\nservice:adviser\nservice:lighttpd\nB://l:87/x\n\nResponse of service:ipmi SrvReq:\nVersion: 2\nFunction: Service Reply (2)\nErrorCode: SUCCESS (0)\nURL Entries:\n Lifetime: 65535\n URL: service:ipmi://(none):623\n Lifetime: 65535\n URL: service:ipmi://IEI9CC2C40E4251:623\n\n\nResponse of service:ipmi Attr
444 /
tcp
2087396567 | 2025-03-21T08:51:31.551048
kjnkjabhbanc283ubcsbhdc72
446 /
tcp
1723769361 | 2025-03-09T19:58:53.081890
ELM Enterprise Manager _l\r\nCopyright \xc2\xa9 18668511-928641920 TNT Software, Inc.\r\n
452 /
tcp
819727972 | 2025-03-22T12:28:56.800407
SSH-2.0-OpenSSH_7.4
Vulnerabilities
462 /
tcp
819727972 | 2025-03-22T11:58:28.367562
SSH-2.0-OpenSSH_7.4
Vulnerabilities
465 /
tcp
897328069 | 2025-03-12T21:21:59.047905
220 mail.scott000.com ESMTP
485 /
tcp
1353260875 | 2025-02-28T16:19:03.624515
\x00[g\xc2\x95N\x7f\x00\x00
488 /
tcp
-249504111 | 2025-03-06T12:47:04.039574
502 /
tcp
-1399940268 | 2025-03-19T17:52:57.260956
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
503 /
tcp
1996932384 | 2025-03-16T00:03:32.594757
513 /
tcp
-1032713145 | 2025-03-12T16:43:55.171748
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
1396488228 | 2025-03-15T21:57:03.910459
HTTP/1.1 200 OK
Content-Length: 2037
Cache-Control: private, max-age=300
Content-Type: text/html
541 /
tcp
-1876452130 | 2025-03-17T22:58:36.715713
\\x16\\x03\\x01\\x01N\\x01\\x00\\x01J\\x03\\x03\\x1f\\xa5H\\xe5\\xb5*G%Y\\xc7\\xecN\\xe3\\x87\\xe4\\x86)D.}J\\x13\\xeb\'\\x95\\x8b\xc8\x8cD&b\\xae \\x8e\\x84\\x12\\x9fX\r\\xaf\\xcd)\\xa55kb\\xa2\\x8e\\xe72,\\x9e\x0b\\x90?}cg>\\xe6\\xfb\\x97\\x92O\\x94\\x002\\x13\\x02\\x13\\x03\\x13\\x01\\x009\\x005\\x00k\\x00=\\xc00\\
554 /
tcp
448214121 | 2025-03-22T23:45:00.180118
RTSP/1.0 200 OK
Server: TVT RTSP Server/1.0.0
CSeq: 1
Public: OPTIONS, DESCRIBE, SETUP, TEARDOWN, PLAY, GET_PARAMETER, SET_PARAMETER
556 /
tcp
-358801646 | 2025-03-12T23:54:35.848873
587 /
tcp
1332630808 | 2025-02-28T16:07:56.762049
220 ESMTP MAIL Server\r\n250-mail.kyoeisha.com.tw\r\n250-PIPELINING\r\n250-SIZE 20480000\r\n250-VRFY\r\n250-ETRN\r\n250-STARTTLS\r\n250-AUTH PLAIN LOGIN\r\n250-ENHANCEDSTATUSCODES\r\n250-8BITMIME\r\n250-DSN\r\n250-SMTPUTF8\r\n250 CHUNKING\r\n502 5.5.2 Error: command not recognized\r\n
-1407711311 | 2025-03-05T10:54:01.703769
HTTP/1.1 302 Found
Cache-Control: private
Content-Type: text/html; charset=utf-8
Location: /login.html?gotourl=default.aspx
X-Powered-By: JunFei
Access-Control-Allow-Credentials: true
X-Content-Type-Options: nosniff
X-XSS-Protection: 1
X-Download-Options: SAMEORIGIN
Access-Control-Allow-Headers: Content-Type
X-Frame-Options: SAMEORIGIN
632 /
tcp
819727972 | 2025-03-13T11:40:41.442169
SSH-2.0-OpenSSH_7.4
Vulnerabilities
826560219 | 2025-03-16T17:58:40.906159
HTTP/1.1 400 Bad Request
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 59-8951886-0 0NNN RT(1705909763732 169) q(-1 -1 -1 -1) r(0 -1) b1
-1166978945 | 2025-02-21T11:26:41.914021
HTTP/1.1 407 Proxy Authentication Required
Server: Proxy
Proxy-Authenticate: Basic realm="CCProxy Authorization"
Connection: Close
Proxy-Connection: Close
809 /
tcp
321971019 | 2025-03-11T06:05:39.128065
-ERR client ip is not in whitelist\r
843 /
tcp
-2004989248 | 2025-02-24T13:19:01.775556
<cross-domain-policy>\n <allow-access-from domain="*" to-po\nrts="*" />\n</cross-domain-policy>
902 /
tcp
1956828827 | 2025-02-25T19:21:18.108474
220 VMware Authentication Daemon Version 1.10: SSL Required, Se
rverDaemonProtocol:SOAP, MKSDisplayProtocol:VNC , , NFCSSL supported/t
947 /
tcp
-1810987450 | 2025-03-07T17:18:49.406946
990 /
tcp
945910976 | 2025-03-22T16:28:58.944045
* OK TeamXchange IMAP4rev1 server (otyUg) ready.\r\n
-936692830 | 2025-02-24T08:24:24.780169
HTTP/1.1 202 OK
Connection: Keep-Alive
Content-Type: text/html
Keep-Alive: timeout=15; max=19
993 /
tcp
-1329831334 | 2025-03-12T07:20:36.153034
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
995 /
tcp
934210070 | 2025-03-20T21:03:38.825688
+OK mail.dupre.idv.tw IceWarp 11.2.1.2 x64 POP3 Mon, 22 Jan 2024 12:43:35 +0800 <20240122124334@mail.dupre.idv.tw>\r\n
1023 /
tcp
740837454 | 2025-03-16T14:26:32.605896
SSH-2.0-OpenSSH_5.3
Vulnerabilities
1025 /
tcp
-1399940268 | 2025-03-19T08:23:10.283101
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1026 /
tcp
-1899074860 | 2025-03-13T06:36:32.173162
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00\x00\x00\n03\x00\x00\x00d\x00\x04\x00\x01\x00\x00\x00\x00\x04\x08\x00\x00\x00\n
1027 /
tcp
-1399940268 | 2025-03-16T09:19:12.712736
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1080 /
tcp
1362344524 | 2025-03-06T20:21:38.934381
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.7
1099 /
tcp
-303199180 | 2025-03-16T04:41:08.481827
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
1103 /
tcp
677934968 | 2025-02-26T06:39:30.052197
1153 /
tcp
820958131 | 2025-03-21T01:21:41.033642
kjnkjabhbanc283ubcsbhdc72\x02
1167 /
tcp
-653033013 | 2025-03-15T19:41:32.712188
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
1177 /
tcp
539065883 | 2025-03-15T19:02:59.179221
1195 /
tcp
-1899074860 | 2025-03-13T04:28:15.465127
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00\x00\x00\n03\x00\x00\x00d\x00\x04\x00\x01\x00\x00\x00\x00\x04\x08\x00\x00\x00\n
1200 /
tcp
-1399940268 | 2025-03-13T03:09:51.093442
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1234 /
tcp
-1538260461 | 2025-03-11T15:31:00.382005
1250 /
tcp
-122096153 | 2025-03-13T16:54:13.400384
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
1337 /
tcp
1741579575 | 2025-03-06T04:54:57.328724
1343 /
tcp
-1733645023 | 2025-02-24T20:58:10.821374
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
1364 /
tcp
819727972 | 2025-02-25T08:49:13.078109
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1377 /
tcp
-1399940268 | 2025-03-13T11:21:05.234104
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1414 /
tcp
1911457608 | 2025-03-18T15:25:58.202733
\x00[\x00\x00\x00\x00\x00\x00
1433 /
tcp
-182670276 | 2025-03-15T10:23:04.867038
MSSQL Server\nVersion: 171050560 (0xa320640)\nSub-Build: 0\nEncryption:Not available\n\nMSSQL NTLM Info:\nTarget_Name: IZJ6FUBS9PLYUOZ\nProduct_Version: 6.3.9600 Ntlm 15\nOS: Windows 8.1/Windows Server 2012 R2\nNetBIOS_Domain_Name: IZJ6FUBS9PLYUOZ\nNetBIOS_Computer_Name: IZJ6FUBS9PLYUOZ\nDNS_Domain_Name: iZj6fubs9plyuoZ\nDNS_Computer_Name: iZj6fubs9plyuoZ\nSystem_Time: 2024-01-22 03:53:09 +0000 UTC\n\n
1446 /
tcp
-146605374 | 2025-03-20T01:50:34.921396
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
1451 /
tcp
165188539 | 2025-03-20T15:09:04.914734
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
1453 /
tcp
-1730858130 | 2025-03-20T15:21:08.349996
RFB 003.008
VNC:
Protocol Version: 3.8
1515 /
tcp
-984990168 | 2025-03-20T10:29:29.037801
-186520940 | 2025-03-22T01:01:21.063833
1599 /
tcp
-1114821551 | 2025-03-11T19:19:49.532772
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
1604 /
tcp
-971970408 | 2025-02-27T09:38:57.102459
1727667211 | 2025-03-14T00:40:16.829692
HTTP/1.1 503 Service Unavailable
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 7-120613361-0 0NNN RT(1701279697055 177) q(0 -1 -1 -1) r(0 -1)
1723 /
tcp
-1608241410 | 2025-03-23T07:08:13.628722
Firmware: 1\nHostname: local\nVendor: linux\n
1800 /
tcp
580340387 | 2025-03-19T17:54:13.438431
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
1801 /
tcp
1692069329 | 2025-03-16T07:31:24.908815
\\x10Z\x0b\\x00LIOR<\\x02\\x00\\x00\\xff\\xff\\xff\\xff\\x00\\x00\\x12\\x00a36a0e421af47074\\xe14\\xf0\\xb6\\xb85\x0bB\\x86\\x99B\\xa5\\x07\\xb0\\xf6V92d3\\x10\\x03\\x00\\x00ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ
1830 /
tcp
-1641514916 | 2025-03-06T23:44:17.572542
* OK Merak 1dFUa2 IMAP4rev1
1883 /
tcp
819727972 | 2025-03-18T21:56:23.274024
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1926 /
tcp
-1114821551 | 2025-03-14T08:01:35.317831
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
1830697416 | 2025-02-23T23:15:59.711871
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
1956 /
tcp
819727972 | 2025-03-09T20:48:23.506756
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1962 /
tcp
-2046514463 | 2025-03-04T06:51:57.607743
1980 /
tcp
819727972 | 2025-03-15T15:44:15.251173
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1982 /
tcp
599074451 | 2025-03-09T21:48:52.415290
2000 /
tcp
-2089734047 | 2025-03-20T03:18:23.288820
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
2001 /
tcp
165188539 | 2025-02-24T20:55:28.489637
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
2002 /
tcp
-1730858130 | 2025-02-26T09:50:53.083882
RFB 003.008
VNC:
Protocol Version: 3.8
2003 /
tcp
165188539 | 2025-03-11T17:30:49.808077
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
2008 /
tcp
-345718689 | 2025-03-21T23:02:37.946815
2022 /
tcp
819727972 | 2025-03-10T15:32:15.283303
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2050 /
tcp
-1399940268 | 2025-03-04T07:36:03.199515
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2051 /
tcp
-1713437100 | 2025-02-28T02:12:55.147846
\xc3\xbf\xc3\xbb\x01\r\nWelcome to NetLinx v94 Copyright AMX Corp. 34395-49007\r\n>
2055 /
tcp
1353260875 | 2025-03-17T00:22:52.444237
\x00[g\xc2\x95N\x7f\x00\x00
2060 /
tcp
709622286 | 2025-03-04T14:30:58.779209
OK Welcome <299685> on DirectUpdate server 7286\r\n
2061 /
tcp
1308377066 | 2025-03-13T04:30:05.871906
2067 /
tcp
504717326 | 2025-03-16T09:50:29.035092
SSH-2.0-OpenSSH_8.6
Vulnerabilities
2068 /
tcp
-42767839 | 2025-03-17T01:48:37.356418
RFB 005.000
VNC:
Protocol Version: 5.0
2070 /
tcp
1767345577 | 2025-03-14T14:57:31.985728
Hello, this is Quagga (version 0T).
Copyright 1996-200
2081 /
tcp
819727972 | 2025-03-12T14:51:15.448980
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2083 /
tcp
1690634669 | 2025-03-16T20:03:10.775891
2087 /
tcp
1689518693 | 2025-03-17T08:17:57.135135
2095 /
tcp
-1327660293 | 2025-03-10T18:44:05.439162
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
2103 /
tcp
826567260 | 2025-03-22T00:33:48.894388
\\x05\\x00\r\\x03\\x10\\x00\\x00\\x00\\x18\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x04\\x00\\x01\\x05\\x00\\x00\\x00\\x00
141730637 | 2025-03-12T01:45:06.245252
HTTP/1.0 200 OK
Server: Proxy
2133 /
tcp
-1105333987 | 2025-03-12T05:06:06.996259
2134 /
tcp
-2031152423 | 2025-03-18T19:49:35.076463
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
2154 /
tcp
539065883 | 2025-03-20T06:05:05.880662
2181 /
tcp
546151771 | 2025-03-15T23:12:03.491598
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC
Clients:
/*.*.*.*:11264[0](queued=0,recved=1,sent=0)
Latency min/avg/max: 0/0.0/0
Received: 8557
Sent: 11410
Connections: 1
Outstanding: 0
Zxid: 0x332907ad3391
Mode: follower
Node count: 104618
2195 /
tcp
1624217396 | 2025-03-20T21:27:26.303173
HELO:10.3.6.0.false\nAS:2048\nHL:19
2211 /
tcp
819727972 | 2025-02-24T03:01:38.132968
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2222 /
tcp
2051656595 | 2025-03-12T09:01:39.371686
SSH-2.0-OpenSSH_7.4\r\n\n
2323 /
tcp
-1410782175 | 2025-03-19T14:59:53.322505
\r\r\nH3C login: \n\nTELNET Negotiation:\nwill: Echo, Suppress Go Ahead\ndo: Echo, Negotiate About Window Size, Remote Flow Control\n
2345 /
tcp
-1399940268 | 2025-03-20T10:18:44.127515
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2352 /
tcp
-1399940268 | 2025-03-06T21:11:24.049099
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2376 /
tcp
819727972 | 2025-03-13T17:54:38.199102
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2404 /
tcp
1911457608 | 2025-03-20T23:11:14.385328
\x00[\x00\x00\x00\x00\x00\x00
2423 /
tcp
-1888448627 | 2025-03-21T08:43:49.265165
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
2453 /
tcp
-1399940268 | 2025-02-24T13:50:26.466123
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2455 /
tcp
-1681927087 | 2025-03-21T01:28:02.057626
kjnkjabhbanc283ubcsbhdc72
2551 /
tcp
1353260875 | 2025-03-19T12:47:15.376523
\x00[g\xc2\x95N\x7f\x00\x00
2560 /
tcp
-1399940268 | 2025-03-06T06:18:29.871047
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2572 /
tcp
-1399940268 | 2025-02-25T07:25:56.957243
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2601 /
tcp
-345718689 | 2025-03-22T23:11:03.699620
2628 /
tcp
2063598737 | 2025-02-25T02:48:34.112296
2761 /
tcp
1911457608 | 2025-03-19T18:41:18.306205
\x00[\x00\x00\x00\x00\x00\x00
2762 /
tcp
165188539 | 2025-03-17T03:15:48.646122
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
3001 /
tcp
2087396567 | 2025-03-17T02:05:30.832299
kjnkjabhbanc283ubcsbhdc72
3002 /
tcp
-2031152423 | 2025-03-05T18:03:56.292870
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
3004 /
tcp
-1399940268 | 2025-03-17T15:15:57.295733
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3006 /
tcp
1911457608 | 2025-03-20T12:23:01.918436
\x00[\x00\x00\x00\x00\x00\x00
3009 /
tcp
321971019 | 2025-03-14T06:11:07.094886
-ERR client ip is not in whitelist\r
2143387245 | 2025-03-17T23:18:21.039230
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
3057 /
tcp
-2089734047 | 2025-03-06T13:42:29.950267
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1830697416 | 2025-03-09T14:58:38.939210
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
3060 /
tcp
401555314 | 2025-03-13T08:53:49.772767
3065 /
tcp
-904840257 | 2025-03-05T18:58:48.357555
572 Relay not authorized\r\n
3066 /
tcp
-1538260461 | 2025-03-16T10:23:11.411414
3068 /
tcp
-653033013 | 2025-03-18T21:28:13.284093
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
198844676 | 2025-03-06T16:26:22.739801
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3076 /
tcp
819727972 | 2025-02-24T05:43:51.755529
SSH-2.0-OpenSSH_7.4
Vulnerabilities
198844676 | 2025-03-21T04:10:56.862127
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3078 /
tcp
1911457608 | 2025-03-19T17:42:12.014499
\x00[\x00\x00\x00\x00\x00\x00
3082 /
tcp
669849225 | 2025-02-23T23:56:10.217624
SSH-98.60-SysaxSSH_81885..42\r\n
3083 /
tcp
-358801646 | 2025-02-25T05:17:10.420655
3086 /
tcp
-1399940268 | 2025-03-23T03:47:11.249717
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3091 /
tcp
897328069 | 2025-03-18T14:11:02.000175
220 mail.scott000.com ESMTP
3097 /
tcp
-1019343788 | 2025-02-23T02:16:53.590250
3106 /
tcp
15018106 | 2025-02-26T06:24:29.967927
\x00\x19\x02\x00\x02\x00\x07\x00Protocol version mismatch\x00
3108 /
tcp
921225407 | 2025-03-18T19:50:58.397789
\x00\x00\x00\x04\x00\x00\x00\x00\x00
3109 /
tcp
165188539 | 2025-03-10T15:24:36.009527
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
3118 /
tcp
-2089734047 | 2025-02-28T17:09:33.570289
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3125 /
tcp
-1428621233 | 2025-02-21T15:55:36.099000
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
3130 /
tcp
-1399940268 | 2025-02-22T07:48:51.145064
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3132 /
tcp
-1477838366 | 2025-03-13T16:51:59.002878
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
3133 /
tcp
-1477838366 | 2025-02-21T15:11:48.144903
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
3140 /
tcp
819727972 | 2025-03-09T23:46:07.170950
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3141 /
tcp
1996932384 | 2025-02-25T16:36:02.447995
3142 /
tcp
1370263973 | 2025-02-28T04:12:54.697162
3145 /
tcp
-375604792 | 2025-03-16T02:57:32.496460
220 Microsoft FTP Service
3151 /
tcp
321971019 | 2025-02-28T22:09:14.443646
-ERR client ip is not in whitelist\r
3163 /
tcp
1370263973 | 2025-03-11T18:12:36.224402
3164 /
tcp
-1399940268 | 2025-03-20T18:47:43.723518
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3165 /
tcp
-142686627 | 2025-02-23T04:47:21.209756
\x00[\xc2\xba\x7fs\x7f\x00\x00
3166 /
tcp
-136006866 | 2025-03-06T19:06:17.423628
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
3167 /
tcp
-375604792 | 2025-03-11T03:27:34.901482
220 Microsoft FTP Service
3169 /
tcp
-1399940268 | 2025-03-09T13:04:58.714262
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3170 /
tcp
-1399940268 | 2025-03-19T10:15:02.332972
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3173 /
tcp
1911457608 | 2025-03-06T06:57:32.546540
\x00[\x00\x00\x00\x00\x00\x00
3175 /
tcp
1504401647 | 2025-03-15T18:57:05.655369
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
971933601 | 2025-02-24T11:56:12.861941
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
3188 /
tcp
819727972 | 2025-03-21T21:53:28.025480
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3195 /
tcp
1308377066 | 2025-02-25T04:30:09.792093
3256 /
tcp
-154107716 | 2025-03-14T16:45:49.890054
220 Microsoft FTP Service
530 User cannot log in.
214-The following commands are recognized (* ==>'s unimplemented).
ABOR
ACCT
ADAT *
ALLO
APPE
AUTH
CCC
CDUP
CWD
DELE
ENC *
EPRT
EPSV
FEAT
HELP
HOST
LANG
LIST ...
3260 /
tcp
-862070606 | 2025-03-09T12:00:06.613799
Login Response Success(0x0000)\nKey/Value Pairs\nAuthMethod=None\nTargetAlias=LIO Target\nTargetPortalGroupTag=1\n\n
1727372229 | 2025-02-24T14:17:42.103495
HTTP/1.1 302
Location: http://116.6.76.114:3268/index.html
-1839934832 | 2025-03-04T19:53:30.341645
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
3299 /
tcp
-971970408 | 2025-03-12T12:56:58.025462
3301 /
tcp
2063598737 | 2025-03-22T11:08:44.868114
3306 /
tcp
369808347 | 2025-03-22T09:13:09.251900
Mysql Version: 5.7.31-log \r\nN\\x00\\x00\\x00\n5.7.31-log\\x00Ut_\\x02S|d0n0s \\x00\\xff\\xff-\\x02\\x00\\xff\\xc1\\x15\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\x0c\\x04&+MJX\n#in8\\x00mysql_native_password\\x00
3307 /
tcp
-2089734047 | 2025-03-20T18:21:46.839990
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3310 /
tcp
740837454 | 2025-03-20T13:47:05.491187
SSH-2.0-OpenSSH_5.3
Vulnerabilities
3365 /
tcp
1911457608 | 2025-02-23T14:54:33.424434
\x00[\x00\x00\x00\x00\x00\x00
3388 /
tcp
-2096652808 | 2025-03-11T20:27:28.357576
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
3389 /
tcp
-989469824 | 2025-03-17T13:08:37.551299
Remote Desktop Protocol\n\\x03\\x00\\x00\\x13\\x0e\\xd0\\x00\\x00\\x124\\x00\\x02\\x0f\\x08\\x00\\x08\\x00\\x00\\x00\n\nFlag: PROTOCOL_HYBRID_EX\nTarget_Name: 10_0_4_6\nProduct_Version: 6.3.9600 Ntlm 15\nOS: Windows 8.1/Windows Server 2012 R2\nNetBIOS_Domain_Name: 10_0_4_6\nNetBIOS_Computer_Name: 10_0_4_6\nDNS_Domain_Name: 10_0_4_6\nDNS_Computer_Name: 10_0_4_6\nSystem_Time: 2024-01-22 08:42:17 +0000 UTC\n\n
3403 /
tcp
-1733106930 | 2025-03-05T08:28:58.178617
Mysql Version: 5.6.50-log\nN\n5.6.50-log\x14(\nG5se"tGE\xc3\xbf\xc3\xb7-\x02\x7f\xc2\x80\x15cB^3$Zwh$wM[mysql_native_password
3412 /
tcp
-1888448627 | 2025-03-21T17:02:23.183680
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
198844676 | 2025-02-22T18:52:21.009992
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3554 /
tcp
-980525298 | 2025-02-21T21:54:09.011839
\x01\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
3555 /
tcp
1911457608 | 2025-03-16T22:22:02.788262
\x00[\x00\x00\x00\x00\x00\x00
3567 /
tcp
1911457608 | 2025-03-21T19:47:04.562266
\x00[\x00\x00\x00\x00\x00\x00
3568 /
tcp
-1399940268 | 2025-02-21T09:53:43.179475
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3622 /
tcp
-1399940268 | 2025-02-28T18:39:50.350652
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3780 /
tcp
-79865617 | 2025-03-20T17:04:39.934565
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com
mit-revprops depth log-revprops partial-replay ) ) )
3790 /
tcp
-1189269828 | 2025-03-11T21:49:42.618364
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
3792 /
tcp
-1399940268 | 2025-03-19T05:13:41.080555
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3954 /
tcp
-1026951088 | 2025-02-23T18:04:51.244143
4021 /
tcp
-2089734047 | 2025-03-13T01:27:25.598804
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
4022 /
tcp
-784071826 | 2025-03-15T01:00:45.684467
SSH-2.0-OpenSSH_8.0
Vulnerabilities
4063 /
tcp
366084633 | 2025-03-12T20:45:03.481354
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
4064 /
tcp
-1019343788 | 2025-03-17T03:01:32.509451
4080 /
tcp
-1399940268 | 2025-03-19T08:04:59.118794
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4095 /
tcp
165188539 | 2025-02-27T15:34:12.875373
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
4117 /
tcp
1353260875 | 2025-03-04T20:04:15.115075
\x00[g\xc2\x95N\x7f\x00\x00
4118 /
tcp
-2096652808 | 2025-02-28T23:47:54.223082
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
4120 /
tcp
1308377066 | 2025-03-22T23:12:55.854693
4150 /
tcp
1767345577 | 2025-03-17T16:00:59.139854
Hello, this is Quagga (version 0T).
Copyright 1996-200
4157 /
tcp
-1036370807 | 2025-03-22T12:53:53.214849
-1341662640 | 2025-03-09T17:15:10.269710
HTTP/1.1 301 Moved Permanently
Server: Zope/(2.13.23, python 1.7.18, linux2) ZServer/1.1
Content-Type: text/plain; charset=utf-8
Connection: close
4282 /
tcp
2087396567 | 2025-03-16T13:42:39.922137
kjnkjabhbanc283ubcsbhdc72
4321 /
tcp
-1250504565 | 2025-03-14T17:15:05.355819
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x80\x00\x04\x00\x01\x00\x00\x00\x05\x00\xff\xff\xff\x00\x00\x04\x08\x00\x00\x00\x00\x00\x7f\xff\x00\x00\x00\x00\x08\x07\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01
4369 /
tcp
1574088840 | 2025-03-23T00:21:06.946238
">Application and Content Networking Software 3.9</a>)\n</BODY><
4438 /
tcp
-2140303521 | 2025-03-13T01:03:04.466631
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected\n
751161953 | 2025-03-15T06:40:45.683137
HTTP/1.1 403 Forbidden
Server: openresty
Content-Type: text/html
Connection: keep-alive
Deny-Reason: hotload rechange server uri format error!!
Request-Id: 65ae295529c967ad650ec3304d944abd
4447 /
tcp
401555314 | 2025-03-08T16:48:18.930190
4477 /
tcp
1189133115 | 2025-02-22T20:03:26.857754
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
4499 /
tcp
-1026951088 | 2025-03-13T05:06:53.669329
4502 /
tcp
-1810987450 | 2025-02-26T11:10:39.783878
4506 /
tcp
1636811864 | 2025-03-12T19:17:38.503276
0 | 2025-03-20T04:17:35.880319
HTTP/1.1 408 Request Timeout
Content-Length: 0
4700 /
tcp
-1888448627 | 2025-03-09T06:35:20.950406
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
4786 /
tcp
632542934 | 2025-02-24T12:15:22.187232
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
4840 /
tcp
117101543 | 2025-03-13T00:02:25.126801
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
4899 /
tcp
2087396567 | 2025-03-10T13:03:34.059600
kjnkjabhbanc283ubcsbhdc72
4911 /
tcp
639175818 | 2025-03-20T13:21:28.859135
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
4949 /
tcp
1690634669 | 2025-03-17T12:55:07.678769
5001 /
tcp
-2096652808 | 2025-02-23T23:28:51.426298
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
5006 /
tcp
2087396567 | 2025-03-19T22:09:26.857219
kjnkjabhbanc283ubcsbhdc72
5007 /
tcp
819727972 | 2025-03-20T21:21:20.133679
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5010 /
tcp
-1399940268 | 2025-03-11T12:19:35.759720
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5025 /
tcp
996960436 | 2025-03-16T11:12:55.488132
5053 /
tcp
1911457608 | 2025-02-22T08:37:58.106040
\x00[\x00\x00\x00\x00\x00\x00
5061 /
tcp
-2089734047 | 2025-03-10T23:51:06.970182
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
5070 /
tcp
-1733645023 | 2025-03-06T18:59:35.850292
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
25420265 | 2025-02-22T04:21:28.939415
HTTP/1.1 302 Found
Server: Apache
X-Frame-Options: SAMEORIGIN
X-Permitted-Cross-Domain-Policies: master-only
X-Download-Options: noopen
Strict-Transport-Security: max-age=31536000;include SubDomains
X-Content-Type-Options: nosniff
Referrer-Policy: same-origin
Access-Control-Allow-Origin: same-origin
X-XSS-Protection: 1
Permissions-Policy: payment 'none';geolocation 'none';
Location: ipg/
Content-Type: text/html; charset=UTF-8
5150 /
tcp
1911457608 | 2025-03-14T17:21:37.689817
\x00[\x00\x00\x00\x00\x00\x00
-1839934832 | 2025-03-07T07:03:42.487806
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
5172 /
tcp
996960436 | 2025-03-17T20:46:11.019858
5201 /
tcp
819727972 | 2025-03-06T04:16:20.311946
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5209 /
tcp
1911457608 | 2025-03-15T17:07:02.093508
\x00[\x00\x00\x00\x00\x00\x00
5222 /
tcp
841014058 | 2025-03-16T09:30:53.287448
Hello, this is FRRouting (version 4.0).
Copyright 19
96-2005 Kunihiro Ishiguro, et al.
Use...
-1249500036 | 2025-03-10T00:55:15.721130
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html
Connection: keep-alive
Accept-Ranges: bytes
5227 /
tcp
-1327660293 | 2025-03-09T11:13:07.376969
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
5235 /
tcp
-358801646 | 2025-03-12T18:54:46.086318
5240 /
tcp
1363464823 | 2025-02-26T10:00:18.131359
5254 /
tcp
-1435414831 | 2025-03-10T14:13:35.450385
5263 /
tcp
1911457608 | 2025-03-06T18:33:54.825129
\x00[\x00\x00\x00\x00\x00\x00
5268 /
tcp
-1888448627 | 2025-03-19T05:24:26.703303
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
-898901461 | 2025-03-13T09:27:30.772665
HTTP/1.1 400 Bad Request
Server: CWAP-waf
Content-Type: text/html
Connection: close
WZWS-RAY: 1249-1705941047.522-w-waf01tjgt
5400 /
tcp
1332894250 | 2025-03-20T20:35:24.045299
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
5432 /
tcp
-2089734047 | 2025-02-28T03:08:33.388378
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
5435 /
tcp
-2031152423 | 2025-03-22T11:49:09.182909
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
5443 /
tcp
-1399940268 | 2025-03-14T16:51:47.921125
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5454 /
tcp
-1428621233 | 2025-02-23T04:04:22.658402
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
5591 /
tcp
597764502 | 2025-03-06T14:16:46.607102
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
5593 /
tcp
-1648456501 | 2025-02-27T03:39:14.113227
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
-1230049476 | 2025-03-20T09:34:43.718447
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
5599 /
tcp
-1327660293 | 2025-03-04T05:24:24.475357
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
5608 /
tcp
819727972 | 2025-03-06T01:37:07.836417
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5620 /
tcp
575925250 | 2025-02-22T14:46:09.534104
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
5640 /
tcp
1208318993 | 2025-03-15T16:09:50.131071
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
5680 /
tcp
1911457608 | 2025-03-19T21:15:29.151842
\x00[\x00\x00\x00\x00\x00\x00
5721 /
tcp
921225407 | 2025-03-07T16:01:25.391096
\x00\x00\x00\x04\x00\x00\x00\x00\x00
-1045760528 | 2025-03-22T17:16:00.532965
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
5902 /
tcp
-1730858130 | 2025-03-10T04:35:54.619934
RFB 003.008
VNC:
Protocol Version: 3.8
5913 /
tcp
1911457608 | 2025-02-28T23:04:08.019573
\x00[\x00\x00\x00\x00\x00\x00
5914 /
tcp
-2089734047 | 2025-03-06T08:25:44.952405
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
5938 /
tcp
398077695 | 2025-03-17T05:37:57.336460
1999272906 | 2025-03-11T12:43:12.886174
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
5988 /
tcp
1911457608 | 2025-03-13T13:34:06.758658
\x00[\x00\x00\x00\x00\x00\x00
5990 /
tcp
-2089734047 | 2025-03-23T00:04:42.740602
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
5991 /
tcp
2098371729 | 2025-03-22T05:25:28.800511
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
5994 /
tcp
-1399940268 | 2025-03-20T17:53:19.419222
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6000 /
tcp
120534451 | 2025-03-17T09:37:47.056812
-1839934832 | 2025-03-23T02:37:15.141359
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
6002 /
tcp
-1609150592 | 2025-03-12T06:53:33.094286
6006 /
tcp
1308377066 | 2025-03-16T00:54:49.605614
6007 /
tcp
1308377066 | 2025-03-05T00:02:05.528833
6036 /
tcp
1911457608 | 2025-02-26T22:32:39.430083
\x00[\x00\x00\x00\x00\x00\x00
6061 /
tcp
-2089734047 | 2025-03-21T13:59:11.131879
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
6100 /
tcp
-1763998376 | 2025-03-13T05:33:41.761587
\\x00\\x00\\x00\\x02\\x00\\x00\\x00\\x00
6102 /
tcp
897328069 | 2025-02-28T22:34:34.089443
220 mail.scott000.com ESMTP
6134 /
tcp
-1097188123 | 2025-03-20T23:23:26.250684
6308 /
tcp
165188539 | 2025-03-09T19:55:04.013803
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
6379 /
tcp
321971019 | 2025-03-11T23:34:34.396562
-ERR client ip is not in whitelist\r
6400 /
tcp
-1779118422 | 2025-03-07T07:34:14.636381
\x00[\xc2\xae\xc2\x8d{\x7f\x00\x00
6500 /
tcp
-1399940268 | 2025-03-09T21:58:46.130108
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6512 /
tcp
1426971893 | 2025-03-09T13:08:50.551256
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
6561 /
tcp
819727972 | 2025-02-28T19:32:23.169485
SSH-2.0-OpenSSH_7.4
Vulnerabilities
6590 /
tcp
-2096652808 | 2025-02-27T10:49:12.420253
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
6633 /
tcp
-903067560 | 2025-03-05T19:48:00.626623
\x00[\x13)\xc2\x81\x7f\x00\x00
4935895 | 2025-03-08T17:55:32.388125
HTTP/1.1 400 Bad Request
Server: CloudWAF
6667 /
tcp
1911457608 | 2025-03-21T00:26:47.134276
\x00[\x00\x00\x00\x00\x00\x00
6668 /
tcp
-1399940268 | 2025-03-13T13:23:31.843766
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1749359477 | 2025-03-15T23:58:10.846886
HTTP/1.1 403 Forbidden
Content-Type: text/html
Connection: keep-alive
NO_SERVICE: 1
7005 /
tcp
-891714208 | 2025-02-25T08:09:12.565427
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
7015 /
tcp
632542934 | 2025-03-11T00:24:31.202698
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
7071 /
tcp
819727972 | 2025-03-17T10:22:09.445841
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-2107996212 | 2025-03-10T07:12:07.415143
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
7090 /
tcp
-1611764932 | 2025-02-25T13:44:54.384962
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
2107474833 | 2025-02-27T12:29:14.937815
HTTP/1.1 200 OK
Content-Type: text/plain
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding
Cache-Control: no-store, no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Pragma: no-cache
7102 /
tcp
321971019 | 2025-03-14T15:25:16.982481
-ERR client ip is not in whitelist\r
7171 /
tcp
921225407 | 2025-03-20T10:04:41.223854
\x00\x00\x00\x04\x00\x00\x00\x00\x00
7218 /
tcp
-345718689 | 2025-02-28T21:42:28.363962
7415 /
tcp
-1399940268 | 2025-03-20T07:59:48.334251
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7434 /
tcp
539065883 | 2025-03-21T17:13:38.488933
-584993230 | 2025-03-20T11:50:26.268002
HTTP/1.1 400 Bad Request
Server:
Content-Type: text/html
Connection: close
7480 /
tcp
-1399940268 | 2025-03-13T02:44:47.352246
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7500 /
tcp
-1598265216 | 2025-03-04T07:06:55.667564
7535 /
tcp
-1399940268 | 2025-03-18T17:13:41.753763
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-2107996212 | 2025-03-21T11:17:10.740277
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
7601 /
tcp
-1399940268 | 2025-03-04T08:09:36.283269
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7603 /
tcp
-1399940268 | 2025-03-12T23:44:03.274182
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7634 /
tcp
1469043098 | 2025-03-21T14:49:57.292917
7700 /
tcp
-2096652808 | 2025-03-22T21:19:06.246344
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
7790 /
tcp
819727972 | 2025-03-09T05:19:27.307259
SSH-2.0-OpenSSH_7.4
Vulnerabilities
7946 /
tcp
1911457608 | 2025-03-07T18:06:43.046312
\x00[\x00\x00\x00\x00\x00\x00
8000 /
tcp
-1204391172 | 2025-03-16T03:19:27.818184
2103111368 | 2025-03-16T15:53:56.095298
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
8003 /
tcp
-891714208 | 2025-03-08T20:50:05.779176
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
8009 /
tcp
-2017887953 | 2025-03-04T14:46:51.869005
SSH-2.0-OpenSSH_7.9
Vulnerabilities
-1013082686 | 2025-02-22T02:00:17.888976
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
8015 /
tcp
-1399940268 | 2025-02-28T17:29:29.314260
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8016 /
tcp
401555314 | 2025-02-25T17:56:54.188751
2103111368 | 2025-03-19T21:19:21.158961
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
8041 /
tcp
-441419608 | 2025-03-16T02:15:13.528059
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
8048 /
tcp
1615193817 | 2025-02-24T17:52:20.893022
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
8054 /
tcp
-1733645023 | 2025-03-18T22:20:13.042561
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
8055 /
tcp
-1888448627 | 2025-03-15T05:08:07.623003
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8058 /
tcp
-1297953727 | 2025-03-08T11:18:12.870616
\x02\x00\x00\x00\x00\x00\x06\x04\x00\x00\x00\x00\x00\x0c\x00\x00\n0\x00\x1c
8064 /
tcp
819727972 | 2025-03-08T16:13:22.595428
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8087 /
tcp
-2089734047 | 2025-02-27T16:24:40.135156
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8089 /
tcp
842535728 | 2025-03-22T23:25:08.510690
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>
A<!DOCTYPE GANGLIA_XML [
<!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...
-1416565584 | 2025-03-03T19:55:36.069668
HTTP/1.1 500 Internal Server Error
Content-Type: text/html
X-Frame-Options: SAMEORIGIN
X-Content-Type-Options: nosniff
X-XSS-Protection: 1
Connection: close
8109 /
tcp
-1327660293 | 2025-03-06T08:47:14.626318
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
8110 /
tcp
945910976 | 2025-03-20T08:41:20.052214
* OK TeamXchange IMAP4rev1 server (otyUg) ready.\r\n
8114 /
tcp
-1114821551 | 2025-02-27T06:32:54.657434
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
8126 /
tcp
819727972 | 2025-03-13T14:17:17.973699
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8128 /
tcp
1911457608 | 2025-03-07T05:10:02.211157
\x00[\x00\x00\x00\x00\x00\x00
8135 /
tcp
-180163620 | 2025-03-11T20:18:04.281051
NPC Telnet permit one connection.\r\n But One connection() already keep alive.\r\nGood Bye !! \r\n
8138 /
tcp
-1428621233 | 2025-03-10T20:31:29.318423
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
8140 /
tcp
1741579575 | 2025-03-05T02:01:24.004466
8144 /
tcp
-1399940268 | 2025-03-20T20:00:09.629262
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8149 /
tcp
-2096652808 | 2025-03-20T18:02:01.453779
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8155 /
tcp
819727972 | 2025-03-13T14:04:24.989104
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8159 /
tcp
-2031152423 | 2025-02-24T22:54:18.085921
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
8160 /
tcp
1208318993 | 2025-03-21T21:02:55.132525
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
1282941221 | 2025-03-15T15:21:23.685626
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
8181 /
tcp
1261582754 | 2025-03-21T20:21:09.828368
unknown command
unknown command
8184 /
tcp
-441419608 | 2025-03-16T00:52:29.515063
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
-1839934832 | 2025-03-06T01:31:00.233290
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
8200 /
tcp
-877598700 | 2025-03-17T03:07:57.733792
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\\x01\xc3\xbf\xc3\xbb\\x03\xc3\xbf\xc3\xbd\\x01\xc3\xbf\xc3\xbe\\x01Username:
-2107996212 | 2025-03-06T21:38:08.736063
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
8237 /
tcp
165188539 | 2025-03-13T23:10:46.370613
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8285 /
tcp
820958131 | 2025-03-11T07:06:17.802916
kjnkjabhbanc283ubcsbhdc72\x02
8291 /
tcp
1615193817 | 2025-03-18T07:00:14.862978
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
8317 /
tcp
-358801646 | 2025-03-20T04:31:41.907148
8319 /
tcp
-146605374 | 2025-03-17T20:08:42.193706
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
8322 /
tcp
-1888448627 | 2025-03-10T02:53:52.979683
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
-1261053701 | 2025-03-16T15:41:27.373004
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html; charset="UTF-8"
Transfer-Encoding: chunked
Connection: keep-alive
Keep-Alive: timeout=20
Cache-control: no-store
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
8343 /
tcp
-1399940268 | 2025-03-22T14:55:54.397372
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8382 /
tcp
-2140303521 | 2025-03-15T11:22:41.630381
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected\n
8406 /
tcp
-2096652808 | 2025-03-08T20:58:41.972419
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8414 /
tcp
-2096652808 | 2025-03-10T21:38:22.464201
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8421 /
tcp
-1399940268 | 2025-03-21T23:15:15.550580
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8423 /
tcp
-1399940268 | 2025-03-09T22:45:19.106681
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8424 /
tcp
504717326 | 2025-02-27T17:07:18.192827
SSH-2.0-OpenSSH_8.6
Vulnerabilities
8426 /
tcp
819727972 | 2025-03-19T14:20:18.864105
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-2107996212 | 2025-02-26T04:50:21.068184
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
8447 /
tcp
-1888448627 | 2025-02-25T07:45:19.004618
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8459 /
tcp
-1730858130 | 2025-03-10T14:23:55.609682
RFB 003.008
VNC:
Protocol Version: 3.8
8470 /
tcp
-1888448627 | 2025-03-20T17:45:50.688829
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8519 /
tcp
-345718689 | 2025-03-16T05:10:12.842962
8520 /
tcp
-1435414831 | 2025-03-05T10:52:29.509680
8545 /
tcp
-1311598826 | 2025-03-19T03:42:04.583437
AMQP:
cluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local
copyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.
information:Licensed under the MPL 2.0. Website: https://rabbitmq.com
platform:Erlang/OTP 24.1
product:RabbitMQ
version:3.9.7
Capabilities:
publisher_confirms:true
exchange_exchange_bindings:true
basic.nack:true
consumer_cancel_notify:true
connection.blocked:true
consumer_priorities:true
authentication_failure_close:true
per_consumer_qos:true
direct_reply_to:tru
8548 /
tcp
1574088840 | 2025-03-11T05:45:28.666921
">Application and Content Networking Software 3.9</a>)\n</BODY><
8551 /
tcp
1911457608 | 2025-02-28T12:27:48.542233
\x00[\x00\x00\x00\x00\x00\x00
8562 /
tcp
1911457608 | 2025-03-22T00:58:41.686524
\x00[\x00\x00\x00\x00\x00\x00
8567 /
tcp
-375604792 | 2025-03-19T10:29:39.861807
220 Microsoft FTP Service
8570 /
tcp
-1375131644 | 2025-03-19T19:32:40.605531
\x00[v\xc3\xbdC\x7f\x00\x00
8574 /
tcp
165188539 | 2025-03-10T16:32:54.800789
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8575 /
tcp
1632932802 | 2025-03-22T22:05:04.964020
8578 /
tcp
677934968 | 2025-03-22T23:39:11.913784
8585 /
tcp
307999478 | 2025-02-23T08:34:13.468189
unknown command \r\nunknown command \r\n
8599 /
tcp
321971019 | 2025-03-04T00:27:27.672921
-ERR client ip is not in whitelist\r
8605 /
tcp
321971019 | 2025-03-22T09:19:27.215505
-ERR client ip is not in whitelist\r
1489954473 | 2025-03-15T22:48:07.388109
HTTP/1.1 410 Gone
Server: openresty
Transfer-Encoding: chunked
Connection: keep-alive
Via: 1.1 google
8686 /
tcp
632542934 | 2025-02-25T01:35:11.375495
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
8700 /
tcp
-1399940268 | 2025-03-19T17:32:03.960431
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8704 /
tcp
1767345577 | 2025-03-23T04:43:16.353702
Hello, this is Quagga (version 0T).
Copyright 1996-200
8705 /
tcp
1767345577 | 2025-03-11T21:23:23.984551
Hello, this is Quagga (version 0T).
Copyright 1996-200
8706 /
tcp
-1327660293 | 2025-03-11T15:33:38.496843
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
8728 /
tcp
-1810987450 | 2025-03-16T03:24:41.719552
8731 /
tcp
-1899074860 | 2025-03-03T21:13:48.865808
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00\x00\x00\n03\x00\x00\x00d\x00\x04\x00\x01\x00\x00\x00\x00\x04\x08\x00\x00\x00\n
8782 /
tcp
307999478 | 2025-03-10T11:28:05.099181
unknown command \r\nunknown command \r\n
8807 /
tcp
-747911285 | 2025-03-11T23:47:42.741306
8819 /
tcp
-747911285 | 2025-03-13T06:02:12.891136
8821 /
tcp
-1888448627 | 2025-03-20T16:33:02.207343
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8823 /
tcp
-1810987450 | 2025-03-12T09:25:57.989159
8824 /
tcp
921225407 | 2025-03-04T18:28:49.397752
\x00\x00\x00\x04\x00\x00\x00\x00\x00
8831 /
tcp
1723769361 | 2025-03-11T06:35:04.595411
ELM Enterprise Manager _l\r\nCopyright \xc2\xa9 18668511-928641920 TNT Software, Inc.\r\n
8835 /
tcp
-2033111675 | 2025-03-16T09:10:07.296389
8839 /
tcp
-2017887953 | 2025-03-22T14:03:09.170624
SSH-2.0-OpenSSH_7.9
Vulnerabilities
8841 /
tcp
669849225 | 2025-03-18T13:22:37.898741
SSH-98.60-SysaxSSH_81885..42\r\n
8845 /
tcp
-1105333987 | 2025-03-10T16:10:15.364009
8859 /
tcp
-441419608 | 2025-03-17T03:17:28.553407
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
-1013082686 | 2025-02-23T20:28:59.432480
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
8868 /
tcp
-1795027372 | 2025-03-09T14:23:49.994678
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
8870 /
tcp
-441419608 | 2025-03-04T23:12:04.130513
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
8871 /
tcp
321971019 | 2025-03-19T16:31:23.273869
-ERR client ip is not in whitelist\r
8876 /
tcp
-1399940268 | 2025-02-28T01:37:26.395962
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8880 /
tcp
1690634669 | 2025-03-15T19:37:44.055696
8889 /
tcp
-971970408 | 2025-03-16T06:48:09.636901
8935 /
tcp
-2089734047 | 2025-03-20T05:15:41.147198
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1077013874 | 2025-03-11T10:18:26.025615
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
8993 /
tcp
-653033013 | 2025-03-16T07:33:34.656534
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
9001 /
tcp
-1026951088 | 2025-03-10T04:20:15.065041
9002 /
tcp
2087396567 | 2025-02-22T18:42:34.456847
kjnkjabhbanc283ubcsbhdc72
9006 /
tcp
1911457608 | 2025-02-26T17:08:00.449451
\x00[\x00\x00\x00\x00\x00\x00
9008 /
tcp
-303199180 | 2025-03-16T11:07:54.856934
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
9011 /
tcp
1911457608 | 2025-03-18T08:49:18.482559
\x00[\x00\x00\x00\x00\x00\x00
9012 /
tcp
-585940771 | 2025-02-22T18:54:18.836464
9026 /
tcp
575925250 | 2025-03-21T12:59:22.098384
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
9028 /
tcp
819727972 | 2025-03-15T18:15:19.995623
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9039 /
tcp
1911457608 | 2025-03-21T13:35:13.333328
\x00[\x00\x00\x00\x00\x00\x00
9041 /
tcp
1911457608 | 2025-03-10T08:51:01.116521
\x00[\x00\x00\x00\x00\x00\x00
9042 /
tcp
1921398876 | 2025-03-09T12:34:09.885619
ÿý"
LinuxNode v06953 (ggfks)
login:
9051 /
tcp
-1598265216 | 2025-03-23T04:01:04.698407
9053 /
tcp
819727972 | 2025-03-14T11:23:01.670911
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9054 /
tcp
1911457608 | 2025-03-19T06:37:38.925767
\x00[\x00\x00\x00\x00\x00\x00
9055 /
tcp
1996932384 | 2025-03-04T19:03:32.931085
9060 /
tcp
-1399940268 | 2025-03-11T19:50:44.854707
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9061 /
tcp
-1399940268 | 2025-03-04T04:21:44.805866
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9064 /
tcp
-1399940268 | 2025-02-23T09:16:47.800727
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9077 /
tcp
-1399940268 | 2025-03-10T18:49:41.541260
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9078 /
tcp
-1099385124 | 2025-02-27T05:50:19.072166
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
9083 /
tcp
51259122 | 2025-03-20T19:15:13.343610
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
9084 /
tcp
1308377066 | 2025-03-21T00:06:12.860105
9085 /
tcp
-1248408558 | 2025-03-10T09:39:41.277789
220 MikroTik FTP server (MikroTik 6.44.3) ready
9086 /
tcp
-1399940268 | 2025-02-26T19:07:25.530002
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9089 /
tcp
1426971893 | 2025-02-21T10:30:26.664960
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
-2107996212 | 2025-03-06T19:44:18.530554
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
9093 /
tcp
-2089734047 | 2025-03-06T10:07:27.820296
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9095 /
tcp
-445721795 | 2025-03-09T15:30:48.321795
\x00[\xc3\xaed\x1a\x7f\x00\x00
9097 /
tcp
632542934 | 2025-03-08T22:37:13.048029
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
9100 /
tcp
-1746074029 | 2025-03-04T00:57:27.460309
9102 /
tcp
-1648456501 | 2025-02-28T10:48:20.927488
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
9104 /
tcp
1911457608 | 2025-03-17T22:35:03.861507
\x00[\x00\x00\x00\x00\x00\x00
9105 /
tcp
-1399940268 | 2025-03-15T02:03:24.386945
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9106 /
tcp
-1399940268 | 2025-03-20T20:36:21.169628
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9111 /
tcp
1623746877 | 2025-03-20T20:38:44.930017
500 Permission denied - closing connection.\r\n
-1839934832 | 2025-03-20T18:13:11.953989
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
9125 /
tcp
-339084706 | 2025-03-18T01:20:09.273300
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
9126 /
tcp
-1399940268 | 2025-03-18T15:16:27.864929
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9134 /
tcp
-1327660293 | 2025-02-25T13:08:27.941658
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
9136 /
tcp
-1399940268 | 2025-03-22T21:30:21.813717
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9140 /
tcp
819727972 | 2025-02-28T20:02:42.210713
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9151 /
tcp
-2096652808 | 2025-03-14T15:12:33.186489
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
9154 /
tcp
1911457608 | 2025-03-06T23:21:45.044169
\x00[\x00\x00\x00\x00\x00\x00
9158 /
tcp
1911457608 | 2025-03-06T05:27:16.920639
\x00[\x00\x00\x00\x00\x00\x00
9161 /
tcp
1665283070 | 2025-03-14T21:15:40.780316
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x01\x00\x00\x10\x00\x00\n0\x03\x00\x00\x00\x01\x00\x05\x00\x00@\x00\x00\x06\x00\x00\x1f@
9164 /
tcp
-1399940268 | 2025-02-22T16:36:59.385281
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9165 /
tcp
-2089734047 | 2025-03-03T18:49:10.142378
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9170 /
tcp
1911457608 | 2025-03-22T07:38:07.701317
\x00[\x00\x00\x00\x00\x00\x00
9171 /
tcp
1278527606 | 2025-03-21T06:25:02.265336
9174 /
tcp
-2089734047 | 2025-03-13T23:19:25.415263
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9180 /
tcp
1911457608 | 2025-03-23T04:46:31.275381
\x00[\x00\x00\x00\x00\x00\x00
9183 /
tcp
-1399940268 | 2025-03-21T18:51:47.221931
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9193 /
tcp
1911457608 | 2025-03-17T19:10:51.294951
\x00[\x00\x00\x00\x00\x00\x00
9201 /
tcp
398077695 | 2025-03-14T07:15:58.142272
9202 /
tcp
1370263973 | 2025-02-26T22:17:09.238267
9211 /
tcp
-1399940268 | 2025-03-14T16:31:05.879351
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9215 /
tcp
-1888448627 | 2025-03-17T12:48:47.757353
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9217 /
tcp
1911457608 | 2025-03-17T02:58:56.228529
\x00[\x00\x00\x00\x00\x00\x00
9219 /
tcp
1308377066 | 2025-03-11T19:04:27.280231
9251 /
tcp
-1327660293 | 2025-03-17T19:17:19.606381
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
9252 /
tcp
-1399940268 | 2025-03-05T16:31:51.105566
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9257 /
tcp
-2096652808 | 2025-03-19T16:40:06.960890
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
1830697416 | 2025-03-23T03:28:09.945134
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
9305 /
tcp
-1399940268 | 2025-03-12T05:39:46.984472
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9333 /
tcp
-1399940268 | 2025-03-21T04:31:42.777809
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9345 /
tcp
1308377066 | 2025-02-27T13:30:37.578287
9383 /
tcp
1975288991 | 2025-02-23T13:30:43.493149
-833168972 | 2025-03-13T04:52:25.730452
HTTP/1.1 200
Content-Type: text/html;charset=UTF-8
Transfer-Encoding: chunked
9443 /
tcp
50497985 | 2025-02-27T14:48:21.942543
\x00[\xc3\x88\xc3\x9dS\x7f\x00\x00
9445 /
tcp
709622286 | 2025-03-22T04:44:14.017711
OK Welcome <299685> on DirectUpdate server 7286\r\n
9465 /
tcp
-1399940268 | 2025-03-22T19:39:23.291772
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9488 /
tcp
321971019 | 2025-02-26T07:30:15.595110
-ERR client ip is not in whitelist\r
-1013082686 | 2025-03-15T22:10:22.919730
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
2143387245 | 2025-02-26T22:25:30.550332
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
9530 /
tcp
1911457608 | 2025-03-22T13:52:39.674121
\x00[\x00\x00\x00\x00\x00\x00
9553 /
tcp
-1626979812 | 2025-03-16T17:39:15.553400
220 Service ready for new user.
9600 /
tcp
1911457608 | 2025-02-23T15:01:15.647837
\x00[\x00\x00\x00\x00\x00\x00
9633 /
tcp
-1681927087 | 2025-03-17T13:50:30.315884
kjnkjabhbanc283ubcsbhdc72
9711 /
tcp
819727972 | 2025-03-15T08:34:21.855115
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1839934832 | 2025-02-24T01:39:37.275054
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
9761 /
tcp
-1641514916 | 2025-03-21T12:14:35.021974
* OK Merak 1dFUa2 IMAP4rev1
9804 /
tcp
-1399940268 | 2025-03-13T12:16:04.643611
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9872 /
tcp
1996932384 | 2025-03-16T06:01:10.635611
9876 /
tcp
-1709563712 | 2025-02-26T07:08:57.030466
\\x00\\x00\\x01+\\x00\\x00\\x00_{"code":0,"flag":1,"language":"JAVA","opaque":0,"serializeTypeCurrentRPC":"JSON","version":433}{"brokerAddrTable":{"broker-a":{"brokerAddrs":{0:"62.118.54.92:10911"},"brokerName":"broker-a","cluster":"DefaultCluster","enableActingMaster":false}},"clusterAddrTable":{"DefaultCluster":["broker-a"]}}
9885 /
tcp
321971019 | 2025-03-16T15:34:47.758599
-ERR client ip is not in whitelist\r
1320285193 | 2025-02-23T18:30:56.257801
HTTP/1.1 404 Not Found
Server: CloudWAF
Content-Type: text/html
Connection: keep-alive
9899 /
tcp
707919486 | 2025-02-27T08:19:02.234243
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
56005235 | 2025-03-14T04:42:03.148182
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
WZWS-RAY: 1249-1705935860.556-s5jhg
9977 /
tcp
1911457608 | 2025-03-19T20:12:23.004961
\x00[\x00\x00\x00\x00\x00\x00
-1901729922 | 2025-03-19T01:43:26.532865
HTTP/1.1 404
Vary: Origin
Vary: Access-Control-Request-Method
Vary: Access-Control-Request-Headers
Content-Type: application/json
Transfer-Encoding: chunked
9999 /
tcp
1161309183 | 2025-03-20T23:28:51.004450
10000 /
tcp
1208318993 | 2025-03-23T05:10:14.930242
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
10001 /
tcp
1492413928 | 2025-03-21T00:06:47.142434
SSH-2.0-OpenSSH_7.5
Vulnerabilities
10003 /
tcp
-2096652808 | 2025-03-03T20:57:57.821247
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
10015 /
tcp
-1888448627 | 2025-03-11T12:38:56.261183
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
10023 /
tcp
1134517380 | 2025-03-21T03:49:46.932876
welcome to Pandora console!\r\n----------------------------\n-------------------------\n| Login Time | 2021-12-08 1...\n
10026 /
tcp
819727972 | 2025-03-21T08:24:58.842943
SSH-2.0-OpenSSH_7.4
Vulnerabilities
10030 /
tcp
-1733645023 | 2025-03-09T10:50:46.773313
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
10042 /
tcp
-1428621233 | 2025-02-23T05:34:08.161592
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
10048 /
tcp
-1399940268 | 2025-03-22T17:07:05.466770
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1830697416 | 2025-03-19T00:21:16.674251
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
10084 /
tcp
632542934 | 2025-03-11T14:07:22.638597
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
10134 /
tcp
89142341 | 2025-03-21T01:46:52.807414
\x05\x00\x00\x00\x0b\x08\x05\x1a\x00
10181 /
tcp
-1399940268 | 2025-02-24T23:34:18.631015
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10201 /
tcp
-1399940268 | 2025-03-04T23:37:06.255207
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10210 /
tcp
165188539 | 2025-03-14T05:25:02.081217
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
10250 /
tcp
-971970408 | 2025-03-17T09:18:01.514738
10255 /
tcp
-1399940268 | 2025-03-19T06:17:55.269260
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10302 /
tcp
-1399940268 | 2025-03-19T23:45:43.555513
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10324 /
tcp
1911457608 | 2025-03-14T09:31:47.209338
\x00[\x00\x00\x00\x00\x00\x00
10348 /
tcp
921225407 | 2025-02-21T18:41:01.078534
\x00\x00\x00\x04\x00\x00\x00\x00\x00
10443 /
tcp
819727972 | 2025-03-12T03:56:47.565226
SSH-2.0-OpenSSH_7.4
Vulnerabilities
10554 /
tcp
233634112 | 2025-03-21T17:57:12.535788
SSH-98.60-SysaxSSH_81885..42
10810 /
tcp
-1399940268 | 2025-03-16T00:01:32.166191
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10909 /
tcp
1911457608 | 2025-03-17T13:25:27.899537
\x00[\x00\x00\x00\x00\x00\x00
10911 /
tcp
1011407350 | 2025-03-21T19:37:27.078351
* OK GroupWise IMAP4rev1 Server Ready\r\n
10943 /
tcp
-805362002 | 2025-03-20T11:23:48.605270
ICAP/1.0 501 Other
Server: Traffic Spicer 7788179225
2103111368 | 2025-03-01T01:36:43.468395
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
11001 /
tcp
1541211644 | 2025-03-21T20:14:44.412121
11075 /
tcp
1492413928 | 2025-03-04T14:06:43.202874
SSH-2.0-OpenSSH_7.5
Vulnerabilities
-147424911 | 2025-03-23T05:21:52.218236
HTTP/1.1 404 Not Found
Content Length: 0
11112 /
tcp
-2089734047 | 2025-03-21T22:02:15.260791
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
11300 /
tcp
-457235091 | 2025-03-20T23:48:06.187256
audio 0 RTP/AVP 18 4 3 8 0 101\r\na
11481 /
tcp
165188539 | 2025-03-14T04:32:29.406801
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
11688 /
tcp
-1399940268 | 2025-03-22T00:11:39.292650
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12000 /
tcp
-457235091 | 2025-02-28T21:58:31.209283
audio 0 RTP/AVP 18 4 3 8 0 101\r\na
12109 /
tcp
-2096652808 | 2025-02-23T02:03:30.431052
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
-1013082686 | 2025-03-17T16:11:00.111303
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
12136 /
tcp
677934968 | 2025-03-20T20:54:25.656040
12138 /
tcp
1381121983 | 2025-02-26T09:55:57.589869
12141 /
tcp
-297128567 | 2025-03-14T18:02:54.507010
\x04\x01\xc3\xb4\x00\x15Internal Server Error\x00\x00\x00AB\x00\x02\x05\x00
12155 /
tcp
-1399940268 | 2025-03-07T18:33:29.929486
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12157 /
tcp
321971019 | 2025-03-12T14:16:12.448437
-ERR client ip is not in whitelist\r
12165 /
tcp
-358801646 | 2025-02-27T18:58:44.895454
12166 /
tcp
1911457608 | 2025-03-20T18:51:57.434785
\x00[\x00\x00\x00\x00\x00\x00
12170 /
tcp
-1399940268 | 2025-03-22T22:28:01.300696
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12171 /
tcp
740837454 | 2025-03-22T03:38:53.233323
SSH-2.0-OpenSSH_5.3
Vulnerabilities
12178 /
tcp
937756010 | 2025-03-05T13:48:09.856490
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x01\x00\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12183 /
tcp
819727972 | 2025-03-13T13:02:06.690059
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12184 /
tcp
-2089734047 | 2025-03-09T19:11:15.163580
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12210 /
tcp
1911457608 | 2025-02-22T12:18:58.494787
\x00[\x00\x00\x00\x00\x00\x00
12215 /
tcp
-2089734047 | 2025-03-09T04:45:19.545239
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12216 /
tcp
921225407 | 2025-02-27T20:59:00.367460
\x00\x00\x00\x04\x00\x00\x00\x00\x00
12219 /
tcp
1761482307 | 2025-03-16T01:49:56.027622
\x00[\xc2\xa5\t\xc2\xbe\x7f\x00\x00
12227 /
tcp
-2031152423 | 2025-03-13T06:03:48.491820
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
12246 /
tcp
819727972 | 2025-02-24T22:57:56.530897
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12247 /
tcp
50497985 | 2025-03-19T01:40:14.567211
\x00[\xc3\x88\xc3\x9dS\x7f\x00\x00
12249 /
tcp
-2089734047 | 2025-03-04T00:51:43.653287
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12252 /
tcp
1919228981 | 2025-03-07T18:38:55.475315
\x00\x1e\x00\x06\xc2\x81\xc2\x85\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
12257 /
tcp
-1626979812 | 2025-03-18T23:52:45.806264
220 Service ready for new user.
12258 /
tcp
-616720387 | 2025-03-05T08:54:55.961707
12259 /
tcp
1615193817 | 2025-03-16T15:44:14.956058
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
12262 /
tcp
-1477838366 | 2025-03-22T13:35:48.313905
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
12264 /
tcp
-1399940268 | 2025-03-08T12:10:45.513756
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12271 /
tcp
321971019 | 2025-03-07T04:33:55.311366
-ERR client ip is not in whitelist\r
12281 /
tcp
-1399940268 | 2025-03-14T08:27:44.132813
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12291 /
tcp
-2046514463 | 2025-02-28T01:43:25.375969
12293 /
tcp
-1947777893 | 2025-02-28T17:25:52.270414
"Broadband Router"\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
12300 /
tcp
-1399940268 | 2025-03-14T15:40:33.786967
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12310 /
tcp
-1626979812 | 2025-02-23T11:13:28.012907
220 Service ready for new user.
12316 /
tcp
-2096652808 | 2025-03-11T12:17:12.663437
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12323 /
tcp
-1399940268 | 2025-03-14T16:56:49.676772
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12329 /
tcp
-1399940268 | 2025-03-10T13:23:53.799727
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12335 /
tcp
1911457608 | 2025-03-01T01:12:44.513081
\x00[\x00\x00\x00\x00\x00\x00
12341 /
tcp
-1399940268 | 2025-03-13T22:10:37.986897
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12342 /
tcp
1426971893 | 2025-03-13T13:44:59.321523
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
12344 /
tcp
632542934 | 2025-03-09T18:15:12.094805
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
296364507 | 2025-03-14T21:01:03.438486
HTTP/1.1 500 Internal Server Error
SERVER: Trend Chip UPnP/1.0 DMS
CONNECTION: close
CONTENT-LENGTH: 60
CONTENT-TYPE: text/html
12346 /
tcp
103159425 | 2025-03-21T22:57:24.380725
-2107996212 | 2025-03-05T21:57:31.695505
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
12353 /
tcp
-1996280214 | 2025-03-19T19:57:57.206901
-1839934832 | 2025-02-28T10:09:10.090450
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
12372 /
tcp
-1399940268 | 2025-03-10T23:06:10.368557
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12376 /
tcp
1911457608 | 2025-03-16T02:28:31.626623
\x00[\x00\x00\x00\x00\x00\x00
12377 /
tcp
-1399940268 | 2025-03-10T22:41:57.405005
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12380 /
tcp
-1611764932 | 2025-03-12T14:44:01.465038
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
12384 /
tcp
-1626979812 | 2025-03-17T21:15:46.267956
220 Service ready for new user.
12393 /
tcp
-358801646 | 2025-02-25T02:55:32.750044
12396 /
tcp
-1888448627 | 2025-03-05T18:41:21.657877
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12408 /
tcp
-2089734047 | 2025-03-10T15:57:05.308017
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12410 /
tcp
819727972 | 2025-02-24T16:11:55.529222
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12415 /
tcp
-1399940268 | 2025-03-06T21:23:41.726070
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12420 /
tcp
165188539 | 2025-03-15T00:54:30.767883
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12428 /
tcp
819727972 | 2025-03-18T13:28:53.201319
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12434 /
tcp
1911457608 | 2025-02-28T18:02:15.545153
\x00[\x00\x00\x00\x00\x00\x00
12440 /
tcp
-1327660293 | 2025-02-28T09:40:22.439013
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
12450 /
tcp
897328069 | 2025-03-17T05:21:54.257153
220 mail.scott000.com ESMTP
12451 /
tcp
-2096652808 | 2025-02-27T07:45:55.668294
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12454 /
tcp
165188539 | 2025-03-13T18:10:37.666108
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12459 /
tcp
1620329124 | 2025-03-18T16:22:26.517100
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\x01\xc3\xbf\xc3\xbb\x03\xc3\xbf\xc3\xbd\x01\xc3\xbf\xc3\xbe\x01Username:
12462 /
tcp
165188539 | 2025-03-10T23:28:08.074427
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12479 /
tcp
-1399940268 | 2025-02-23T17:28:22.508941
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12484 /
tcp
819727972 | 2025-02-28T17:32:14.081292
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12485 /
tcp
1492413928 | 2025-03-22T22:54:39.223499
SSH-2.0-OpenSSH_7.5
Vulnerabilities
12493 /
tcp
1911457608 | 2025-03-18T18:33:53.272010
\x00[\x00\x00\x00\x00\x00\x00
12496 /
tcp
1911457608 | 2025-03-18T23:25:54.287182
\x00[\x00\x00\x00\x00\x00\x00
12501 /
tcp
119860953 | 2025-03-11T14:06:56.584567
* OK ArGoSoft Mail Server IMAP Module v.YW at
12507 /
tcp
1911457608 | 2025-03-11T10:42:19.470670
\x00[\x00\x00\x00\x00\x00\x00
12520 /
tcp
819727972 | 2025-03-11T05:46:22.966844
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12525 /
tcp
-2096652808 | 2025-02-27T13:05:12.983542
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12527 /
tcp
-1399940268 | 2025-02-25T02:35:23.715442
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12529 /
tcp
-1032713145 | 2025-03-21T05:23:52.116972
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
12531 /
tcp
-2096652808 | 2025-02-24T13:31:56.453826
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12541 /
tcp
1767345577 | 2025-02-28T06:35:08.368552
Hello, this is Quagga (version 0T).
Copyright 1996-200
12546 /
tcp
1911457608 | 2025-03-17T11:08:49.398870
\x00[\x00\x00\x00\x00\x00\x00
12551 /
tcp
401555314 | 2025-03-21T15:26:13.055153
12559 /
tcp
-1327660293 | 2025-03-07T07:26:04.428036
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
12567 /
tcp
-1327660293 | 2025-03-09T19:46:58.905125
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
12569 /
tcp
671605376 | 2025-03-05T15:23:41.973678
12570 /
tcp
-1399940268 | 2025-03-06T20:27:16.579577
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1282941221 | 2025-03-10T22:43:24.905615
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
12579 /
tcp
1363464823 | 2025-03-18T06:28:24.677540
12581 /
tcp
-1399940268 | 2025-03-15T00:52:22.653513
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12583 /
tcp
580340387 | 2025-03-12T11:58:05.155198
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
12584 /
tcp
-1795027372 | 2025-03-12T18:21:14.055707
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
12586 /
tcp
1308377066 | 2025-02-22T19:49:52.595798
12588 /
tcp
-1986594217 | 2025-03-11T16:20:11.849376
"AP0F1D85"\r\nConnection: close\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD>\n<BODY BGCOLOR
13001 /
tcp
165188539 | 2025-03-18T06:37:43.881007
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
13047 /
tcp
-2033111675 | 2025-03-11T23:10:06.423253
13082 /
tcp
-1327660293 | 2025-03-13T12:55:53.177414
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
13380 /
tcp
-1399940268 | 2025-03-06T17:08:00.057931
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
14026 /
tcp
819727972 | 2025-03-19T15:24:07.421907
SSH-2.0-OpenSSH_7.4
Vulnerabilities
14147 /
tcp
-1105333987 | 2025-03-20T00:30:33.663388
14265 /
tcp
-1611764932 | 2025-03-04T17:16:55.925698
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
14344 /
tcp
165188539 | 2025-03-18T18:51:44.904808
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
14401 /
tcp
-1730858130 | 2025-03-05T06:15:26.560032
RFB 003.008
VNC:
Protocol Version: 3.8
14895 /
tcp
1911457608 | 2025-03-20T18:56:58.255526
\x00[\x00\x00\x00\x00\x00\x00
14900 /
tcp
1911457608 | 2025-03-14T21:00:47.492100
\x00[\x00\x00\x00\x00\x00\x00
14901 /
tcp
-1399940268 | 2025-03-15T09:54:02.086948
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
15443 /
tcp
1208318993 | 2025-03-14T04:20:26.180188
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
16000 /
tcp
1944032451 | 2025-02-28T08:33:01.907369
K\\x02%~)J/\\tHjU(IAGENT = (AGENT_VERSION = 2388790170)(RPC_VERSION = 5..722))
16005 /
tcp
-1399940268 | 2025-03-10T10:35:22.288376
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16010 /
tcp
546151771 | 2025-03-21T01:01:03.215419
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC
Clients:
/*.*.*.*:11264[0](queued=0,recved=1,sent=0)
Latency min/avg/max: 0/0.0/0
Received: 8557
Sent: 11410
Connections: 1
Outstanding: 0
Zxid: 0x332907ad3391
Mode: follower
Node count: 104618
16011 /
tcp
1911457608 | 2025-03-11T19:33:48.086689
\x00[\x00\x00\x00\x00\x00\x00
-147424911 | 2025-02-21T17:11:44.987260
HTTP/1.1 404 Not Found
Content Length: 0
16015 /
tcp
-2089734047 | 2025-02-26T17:37:11.141448
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
-147424911 | 2025-03-14T21:08:07.798843
HTTP/1.1 404 Not Found
Content Length: 0
16020 /
tcp
-2096652808 | 2025-03-20T19:55:41.626541
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
16031 /
tcp
165188539 | 2025-03-20T19:59:51.646161
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
16038 /
tcp
-2089734047 | 2025-02-28T11:17:50.731999
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
16058 /
tcp
-1399940268 | 2025-03-20T00:25:25.433069
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16062 /
tcp
-358801646 | 2025-03-05T16:59:56.906053
16064 /
tcp
-1279886438 | 2025-02-26T21:44:14.136532
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
16069 /
tcp
-801484042 | 2025-03-16T20:28:17.149591
16070 /
tcp
-274082663 | 2025-03-12T01:55:36.715458
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
16081 /
tcp
-801484042 | 2025-02-28T07:32:54.933759
16094 /
tcp
1911457608 | 2025-02-21T16:35:45.407797
\x00[\x00\x00\x00\x00\x00\x00
16103 /
tcp
-1899074860 | 2025-02-25T13:55:36.732939
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00\x00\x00\n03\x00\x00\x00d\x00\x04\x00\x01\x00\x00\x00\x00\x04\x08\x00\x00\x00\n
16403 /
tcp
1830187220 | 2025-03-14T00:48:25.532891
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
16464 /
tcp
2087396567 | 2025-03-20T23:15:29.501476
kjnkjabhbanc283ubcsbhdc72
16601 /
tcp
-1139539254 | 2025-03-16T05:17:39.944235
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
-147424911 | 2025-03-22T16:08:43.248814
HTTP/1.1 404 Not Found
Content Length: 0
16993 /
tcp
2087396567 | 2025-03-22T14:30:35.959853
kjnkjabhbanc283ubcsbhdc72
17010 /
tcp
-1399940268 | 2025-03-19T17:49:56.992810
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
17020 /
tcp
321971019 | 2025-02-23T12:26:57.339211
-ERR client ip is not in whitelist\r
17100 /
tcp
-303199180 | 2025-03-11T06:26:09.320660
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
17102 /
tcp
-1477838366 | 2025-03-18T19:21:23.278843
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
17182 /
tcp
-2089734047 | 2025-03-05T20:52:19.231696
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
17773 /
tcp
1911457608 | 2025-03-23T03:11:25.998718
\x00[\x00\x00\x00\x00\x00\x00
18001 /
tcp
-1373613804 | 2025-02-23T17:05:46.606554
00970795:d7:smethod,6:shello,8:soptions,80:d10:shttp_port,368696:i1082,5:sname,5:sL_x,10:ssync_port,5:i00469,10:stimestamp,3190459:f920.7251553166,8:sversion,6262522:sl4X,
18003 /
tcp
-1888448627 | 2025-03-15T08:55:01.549393
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
18012 /
tcp
-2089734047 | 2025-03-15T12:23:18.091157
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
18024 /
tcp
1911457608 | 2025-02-27T19:49:59.036868
\x00[\x00\x00\x00\x00\x00\x00
18028 /
tcp
-1019343788 | 2025-03-11T13:58:30.683856
18031 /
tcp
-1399940268 | 2025-03-23T01:17:01.476735
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18034 /
tcp
-1399940268 | 2025-02-25T03:39:14.921091
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18039 /
tcp
1911457608 | 2025-02-26T10:34:47.464243
\x00[\x00\x00\x00\x00\x00\x00
18044 /
tcp
-1099385124 | 2025-03-08T19:19:03.844236
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
18047 /
tcp
-1399940268 | 2025-03-20T20:16:13.546807
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18048 /
tcp
1911457608 | 2025-03-19T04:56:53.976750
\x00[\x00\x00\x00\x00\x00\x00
18055 /
tcp
632542934 | 2025-02-27T20:43:09.103966
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
-2107996212 | 2025-03-15T14:03:21.003798
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
18069 /
tcp
-1399940268 | 2025-03-05T07:06:42.659799
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18080 /
tcp
1286504516 | 2025-03-17T15:02:22.938420
CP2E Control Console
Connected to Host: gZI
18081 /
tcp
740837454 | 2025-03-17T06:07:29.999051
SSH-2.0-OpenSSH_5.3
Vulnerabilities
18087 /
tcp
-1888448627 | 2025-03-11T10:54:50.885089
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
18090 /
tcp
1763259671 | 2025-03-22T11:04:34.056887
{\n"Version": "3.4.18",\n"VersionArray": [\n3,\n4,\n18,\n0\n],\n"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",\n"OpenSSLVersion": "",\n"SysInfo": "",\n"Bits": 64,\n"Debug": false,\n"MaxObjectSize": 16777216\n}\n\n
18093 /
tcp
-1730858130 | 2025-02-26T19:55:40.238657
RFB 003.008
VNC:
Protocol Version: 3.8
18095 /
tcp
366084633 | 2025-03-09T21:33:47.416381
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
18096 /
tcp
1632932802 | 2025-02-23T11:31:03.819425
-1230049476 | 2025-03-17T09:01:43.846143
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
18105 /
tcp
819727972 | 2025-02-21T14:59:59.913247
SSH-2.0-OpenSSH_7.4
Vulnerabilities
18245 /
tcp
2087396567 | 2025-03-21T18:22:04.540056
kjnkjabhbanc283ubcsbhdc72
18553 /
tcp
819727972 | 2025-03-14T11:53:59.295563
SSH-2.0-OpenSSH_7.4
Vulnerabilities
19000 /
tcp
1830187220 | 2025-02-24T17:25:25.880250
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
19014 /
tcp
-1399940268 | 2025-03-16T22:41:01.447180
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
19022 /
tcp
819727972 | 2025-02-28T17:27:06.018375
SSH-2.0-OpenSSH_7.4
Vulnerabilities
19443 /
tcp
-303199180 | 2025-03-20T08:42:54.256666
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
19998 /
tcp
632542934 | 2025-03-04T11:32:16.833929
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
1900503736 | 2025-03-13T04:06:51.480074
HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-HTTPAPI/2.0
20030 /
tcp
-358801646 | 2025-03-21T07:04:00.784133
20070 /
tcp
-1032713145 | 2025-03-16T01:14:18.967366
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
20082 /
tcp
1726594447 | 2025-03-17T11:33:31.338980
\r\n\nLantronix MSS100 Version V118/523(045538937)\n\r\nType HELP at the \'Local_61349> \' prompt for assistance.\n\r\n\r\n\nUsername>
20100 /
tcp
-2089734047 | 2025-02-27T15:10:27.202238
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
20107 /
tcp
1189133115 | 2025-02-28T12:22:41.754886
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
20110 /
tcp
-303199180 | 2025-03-12T02:40:00.498923
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
20121 /
tcp
819727972 | 2025-03-09T09:43:57.624380
SSH-2.0-OpenSSH_7.4
Vulnerabilities
20201 /
tcp
165188539 | 2025-02-28T05:24:09.574308
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
20443 /
tcp
1911457608 | 2025-03-18T09:28:11.100330
\x00[\x00\x00\x00\x00\x00\x00
20512 /
tcp
-358801646 | 2025-03-05T16:07:03.076414
20800 /
tcp
-1399940268 | 2025-02-27T10:49:34.771446
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
20880 /
tcp
1370263973 | 2025-03-19T01:42:43.212233
20894 /
tcp
-1105333987 | 2025-03-04T06:12:33.674993
21025 /
tcp
-754988795 | 2025-03-21T21:14:56.778943
21084 /
tcp
-1327660293 | 2025-03-04T17:40:40.226943
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
21100 /
tcp
921225407 | 2025-03-21T11:36:13.704560
\x00\x00\x00\x04\x00\x00\x00\x00\x00
21231 /
tcp
-1730858130 | 2025-02-22T06:49:36.542633
RFB 003.008
VNC:
Protocol Version: 3.8
21232 /
tcp
321971019 | 2025-03-16T20:40:47.555018
-ERR client ip is not in whitelist\r
21238 /
tcp
1991883981 | 2025-03-20T15:02:28.309895
B\x00\x00\x00\xc3\xbfn\x04Too many connections
21243 /
tcp
-1730858130 | 2025-03-19T08:19:46.719575
RFB 003.008
VNC:
Protocol Version: 3.8
21246 /
tcp
1911457608 | 2025-03-16T12:01:06.671818
\x00[\x00\x00\x00\x00\x00\x00
21262 /
tcp
1911457608 | 2025-03-14T07:01:42.688449
\x00[\x00\x00\x00\x00\x00\x00
21267 /
tcp
1504401647 | 2025-03-20T00:22:07.879549
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
971933601 | 2025-03-22T10:11:43.368038
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
21284 /
tcp
-1019343788 | 2025-02-23T18:04:21.741413
21286 /
tcp
-1399940268 | 2025-03-17T20:02:53.140016
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21290 /
tcp
1623746877 | 2025-03-15T16:01:00.983836
500 Permission denied - closing connection.\r\n
21291 /
tcp
-992671574 | 2025-03-04T09:15:19.066737
21293 /
tcp
1911457608 | 2025-03-19T01:52:49.678635
\x00[\x00\x00\x00\x00\x00\x00
21301 /
tcp
-1399940268 | 2025-03-13T16:15:20.520676
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21314 /
tcp
-1329831334 | 2025-03-16T04:44:14.500824
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
21316 /
tcp
-653033013 | 2025-03-20T08:55:17.736222
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
21322 /
tcp
632542934 | 2025-03-18T05:27:52.045439
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
21324 /
tcp
117101543 | 2025-03-09T22:32:10.794618
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
21379 /
tcp
1504401647 | 2025-03-08T18:44:37.407199
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
21500 /
tcp
165188539 | 2025-03-06T03:18:48.853558
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
22107 /
tcp
819727972 | 2025-03-05T06:21:55.358891
SSH-2.0-OpenSSH_7.4
Vulnerabilities
22345 /
tcp
-1399940268 | 2025-03-19T17:34:05.820306
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
22556 /
tcp
1911457608 | 2025-03-21T07:42:53.334130
\x00[\x00\x00\x00\x00\x00\x00
23023 /
tcp
-1435414831 | 2025-03-16T03:05:54.280050
23084 /
tcp
921225407 | 2025-02-23T20:30:39.576270
\x00\x00\x00\x04\x00\x00\x00\x00\x00
23184 /
tcp
165188539 | 2025-03-07T17:49:54.869245
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
24245 /
tcp
-1730858130 | 2025-03-14T13:30:12.939997
RFB 003.008
VNC:
Protocol Version: 3.8
1077013874 | 2025-03-14T19:02:23.038232
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
-1453516345 | 2025-03-20T14:26:38.242012
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
25009 /
tcp
-441419608 | 2025-03-13T14:48:34.273791
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
25105 /
tcp
-1148066627 | 2025-03-22T20:00:31.825742
\x00[\xc2\x84\xc2\x86\xc3\xb2\x7f\x00\x00
25565 /
tcp
-1810987450 | 2025-03-10T04:24:34.230454
25952 /
tcp
2098371729 | 2025-03-17T12:47:48.381104
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
26656 /
tcp
-971970408 | 2025-03-13T05:24:46.344706
26657 /
tcp
2087396567 | 2025-03-12T01:37:48.896522
kjnkjabhbanc283ubcsbhdc72
27015 /
tcp
-1588385920 | 2025-03-16T17:40:26.656579
Command: None
Size: 540029490
ID: 1987208531
Type: 543515497
27017 /
tcp
1763259671 | 2025-03-07T08:23:51.690986
{\n"Version": "3.4.18",\n"VersionArray": [\n3,\n4,\n18,\n0\n],\n"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",\n"OpenSSLVersion": "",\n"SysInfo": "",\n"Bits": 64,\n"Debug": false,\n"MaxObjectSize": 16777216\n}\n\n
28015 /
tcp
1911457608 | 2025-03-17T01:54:53.968683
\x00[\x00\x00\x00\x00\x00\x00
28080 /
tcp
819727972 | 2025-03-11T00:14:29.340686
SSH-2.0-OpenSSH_7.4
Vulnerabilities
30002 /
tcp
-2031152423 | 2025-03-15T13:09:57.754204
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
30003 /
tcp
-1681927087 | 2025-02-26T07:00:38.641366
kjnkjabhbanc283ubcsbhdc72
30007 /
tcp
921225407 | 2025-02-23T18:05:35.018150
\x00\x00\x00\x04\x00\x00\x00\x00\x00
30009 /
tcp
580340387 | 2025-03-17T04:21:46.647680
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
30021 /
tcp
-1399940268 | 2025-03-16T10:12:07.819050
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
30022 /
tcp
1370263973 | 2025-03-18T22:47:54.810215
30083 /
tcp
-1399940268 | 2025-03-20T19:48:22.861114
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
30121 /
tcp
-1329831334 | 2025-03-10T18:27:46.704733
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
30122 /
tcp
-1476017887 | 2025-03-19T20:31:06.295059
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
30123 /
tcp
-1329831334 | 2025-03-13T02:12:13.063414
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
30301 /
tcp
171352214 | 2025-03-15T18:21:41.412086
-ERR client ip is not in whitelist
30303 /
tcp
-1730858130 | 2025-03-19T23:14:58.506422
RFB 003.008
VNC:
Protocol Version: 3.8
30322 /
tcp
-1032713145 | 2025-03-09T04:38:02.713471
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
30444 /
tcp
-2089734047 | 2025-03-20T18:13:21.501952
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
30622 /
tcp
-1872120160 | 2025-03-12T10:09:27.020585
">Application and Content Networking Software 3.9</a>)
</BODY><
30700 /
tcp
1911457608 | 2025-03-14T04:22:39.881376
\x00[\x00\x00\x00\x00\x00\x00
30718 /
tcp
-305970756 | 2025-03-22T12:19:19.055491
MAC Addr:00:80:a3:fd:5f:0d
30822 /
tcp
539065883 | 2025-03-12T18:58:56.854692
30892 /
tcp
-358801646 | 2025-03-08T20:15:15.753227
30922 /
tcp
320677201 | 2025-03-20T21:34:43.594213
H\x00\x00\x00\xc3\xbfj\x04Host \'101.133.140.114\' is not allowed to \nconnect to this MySQL server
1282941221 | 2025-03-13T07:14:31.244933
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
31122 /
tcp
-1733645023 | 2025-03-09T11:44:34.321638
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
-1013082686 | 2025-03-13T03:36:36.836614
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
31322 /
tcp
2087396567 | 2025-03-09T15:10:55.487590
kjnkjabhbanc283ubcsbhdc72
-2133761335 | 2025-03-18T00:32:33.948588
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding
Vary: Accept-Encoding
X-Powered-By: PHP/7.4.21
1282941221 | 2025-03-07T01:19:56.553638
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
31422 /
tcp
-441419608 | 2025-03-13T01:49:28.028435
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
31443 /
tcp
119860953 | 2025-03-21T15:23:19.479914
* OK ArGoSoft Mail Server IMAP Module v.YW at
31522 /
tcp
1261582754 | 2025-03-13T00:05:08.109867
unknown command
unknown command
31622 /
tcp
-971970408 | 2025-03-12T22:20:31.912869
31722 /
tcp
-1428621233 | 2025-03-21T15:06:34.438845
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
31922 /
tcp
1741579575 | 2025-03-11T05:05:57.171208
32022 /
tcp
751496153 | 2025-03-12T03:22:29.856972
* OK TeamXchange IMAP4rev1 server (otyUg) ready.
32122 /
tcp
539065883 | 2025-03-20T02:25:07.760633
32202 /
tcp
-1105333987 | 2025-02-21T20:23:41.733469
32222 /
tcp
-2031152423 | 2025-03-09T06:42:20.060998
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
32322 /
tcp
2087396567 | 2025-03-09T17:06:28.144166
kjnkjabhbanc283ubcsbhdc72
32422 /
tcp
1852418385 | 2025-03-09T13:27:43.270368
RTSP/1.0 453 Not Enough Bandwidth
Server: AirTunes/7l_wZ
32522 /
tcp
1690634669 | 2025-03-22T03:03:45.973274
32622 /
tcp
1492413928 | 2025-03-21T03:01:10.895997
SSH-2.0-OpenSSH_7.5
Vulnerabilities
32722 /
tcp
2087396567 | 2025-03-23T04:33:55.485931
kjnkjabhbanc283ubcsbhdc72
32746 /
tcp
165188539 | 2025-02-28T16:30:25.466161
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
32764 /
tcp
-905685638 | 2025-03-09T11:27:46.936889
32822 /
tcp
819727972 | 2025-03-23T02:47:42.092521
SSH-2.0-OpenSSH_7.4
Vulnerabilities
33022 /
tcp
104385780 | 2025-03-22T23:17:54.530410
33060 /
tcp
-358801646 | 2025-03-21T00:32:09.929075
33122 /
tcp
104385780 | 2025-03-22T21:27:45.328558
33222 /
tcp
-1148066627 | 2025-03-09T18:33:43.242435
\x00[\xc2\x84\xc2\x86\xc3\xb2\x7f\x00\x00
33322 /
tcp
-1477838366 | 2025-02-23T16:39:30.306442
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
33422 /
tcp
-2096652808 | 2025-03-19T16:02:07.751433
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
33522 /
tcp
660175493 | 2025-02-26T15:42:15.566114
33622 /
tcp
2087396567 | 2025-03-08T18:47:58.009808
kjnkjabhbanc283ubcsbhdc72
33722 /
tcp
2087396567 | 2025-03-18T04:00:03.013665
kjnkjabhbanc283ubcsbhdc72
33822 /
tcp
660175493 | 2025-03-08T12:11:31.315453
33922 /
tcp
2087396567 | 2025-03-18T01:36:27.385834
kjnkjabhbanc283ubcsbhdc72
34022 /
tcp
819727972 | 2025-03-20T17:28:17.776812
SSH-2.0-OpenSSH_7.4
Vulnerabilities
971933601 | 2025-03-20T14:43:43.226101
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
34222 /
tcp
-971970408 | 2025-03-20T00:41:17.724987
34322 /
tcp
1690634669 | 2025-03-19T17:44:07.950555
34422 /
tcp
104385780 | 2025-03-15T00:08:52.284422
34522 /
tcp
104385780 | 2025-03-19T10:38:24.220684
34622 /
tcp
-1392039491 | 2025-03-04T17:21:20.664772
"Broadband Router"
<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
34822 /
tcp
841014058 | 2025-03-03T21:56:00.329616
Hello, this is FRRouting (version 4.0).
Copyright 19
96-2005 Kunihiro Ishiguro, et al.
Use...
34922 /
tcp
320677201 | 2025-03-18T19:06:37.911471
H\x00\x00\x00\xc3\xbfj\x04Host \'101.133.140.114\' is not allowed to \nconnect to this MySQL server
35000 /
tcp
205347087 | 2025-03-08T19:44:36.562393
SSH-25453-Cisco-3524665.35\n
35022 /
tcp
841014058 | 2025-03-19T01:57:48.425305
Hello, this is FRRouting (version 4.0).
Copyright 19
96-2005 Kunihiro Ishiguro, et al.
Use...
35101 /
tcp
117101543 | 2025-03-10T18:04:52.065865
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
35122 /
tcp
-971970408 | 2025-03-19T00:22:24.500796
35322 /
tcp
897328069 | 2025-03-17T08:31:10.964385
220 mail.scott000.com ESMTP
35422 /
tcp
2067064333 | 2025-03-19T00:02:41.172126
35522 /
tcp
1975288991 | 2025-03-17T00:09:09.025893
35722 /
tcp
1353260875 | 2025-03-17T09:34:23.946701
\x00[g\xc2\x95N\x7f\x00\x00
35922 /
tcp
1778988322 | 2025-03-16T20:32:19.548574
* OK GroupWise IMAP4rev1 Server Ready
36022 /
tcp
-297128567 | 2025-03-17T20:34:37.191835
\x04\x01\xc3\xb4\x00\x15Internal Server Error\x00\x00\x00AB\x00\x02\x05\x00
36122 /
tcp
2087396567 | 2025-03-13T09:07:55.398008
kjnkjabhbanc283ubcsbhdc72
36222 /
tcp
-358801646 | 2025-03-17T19:22:39.056310
36422 /
tcp
2087396567 | 2025-03-15T08:25:02.475966
kjnkjabhbanc283ubcsbhdc72
1830697416 | 2025-03-16T06:53:21.361272
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
36722 /
tcp
677934968 | 2025-03-17T04:08:13.952278
36822 /
tcp
1286504516 | 2025-03-18T14:41:08.408604
CP2E Control Console
Connected to Host: gZI
36922 /
tcp
1690634669 | 2025-03-01T01:06:47.022028
37022 /
tcp
-321444299 | 2025-03-16T18:40:00.378200
:dircproxy NOTICE AUTH :Looking up your hostname...
:dircproxy NOTICE AUTH :Got your hostname.
37122 /
tcp
1082732927 | 2025-03-16T22:35:57.838504
STAT pid 1660
STAT uptime 28884
STAT time 1641290377
STAT version 1.2.1
STAT pointer_size 32
STAT curr_items 14
STAT total_items 3533
STAT bytes 30524
STAT curr_connections 1
STAT total_connections 3542
STAT connection_structures 3
STAT cmd_get 3533
STAT cmd_set 3533
STAT get_hits 3519
STAT get_misses 14
STAT bytes_read 7927780
STAT bytes_written 7848552
STAT limit_maxbytes 67108864
END
37215 /
tcp
1850902677 | 2025-03-21T10:20:16.269866
37222 /
tcp
660175493 | 2025-03-14T18:44:31.805499
37322 /
tcp
-1598265216 | 2025-02-28T21:35:14.174704
37422 /
tcp
380146262 | 2025-03-15T11:16:52.402119
37443 /
tcp
632542934 | 2025-03-10T21:10:29.264575
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
37522 /
tcp
2087396567 | 2025-02-28T16:19:24.564394
kjnkjabhbanc283ubcsbhdc72
37622 /
tcp
401555314 | 2025-03-16T01:14:20.258419
37722 /
tcp
1919228981 | 2025-03-15T23:32:34.526143
\x00\x1e\x00\x06\xc2\x81\xc2\x85\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
37777 /
tcp
-971970408 | 2025-03-23T06:56:45.505528
37822 /
tcp
597764502 | 2025-03-14T00:51:19.640287
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
37922 /
tcp
104385780 | 2025-03-17T23:49:18.232618
38022 /
tcp
1690634669 | 2025-02-27T12:59:29.843934
38122 /
tcp
-971970408 | 2025-03-15T16:40:08.825012
38222 /
tcp
-784071826 | 2025-03-11T17:21:21.128629
SSH-2.0-OpenSSH_8.0
Vulnerabilities
38333 /
tcp
-358801646 | 2025-03-15T20:18:35.555386
38522 /
tcp
2087396567 | 2025-02-21T13:46:46.000979
kjnkjabhbanc283ubcsbhdc72
38622 /
tcp
2087396567 | 2025-03-14T07:56:39.259923
kjnkjabhbanc283ubcsbhdc72
38722 /
tcp
2087396567 | 2025-03-13T21:19:27.980351
kjnkjabhbanc283ubcsbhdc72
38822 /
tcp
1991883981 | 2025-03-03T20:10:38.360636
B\x00\x00\x00\xc3\xbfn\x04Too many connections
39001 /
tcp
819727972 | 2025-03-18T01:31:34.932228
SSH-2.0-OpenSSH_7.4
Vulnerabilities
39022 /
tcp
-441419608 | 2025-03-13T19:35:40.160101
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
39122 /
tcp
-146605374 | 2025-03-13T17:57:54.081785
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
39222 /
tcp
1741579575 | 2025-03-13T16:32:23.974635
39322 /
tcp
1991883981 | 2025-03-11T10:15:12.487793
B\x00\x00\x00\xc3\xbfn\x04Too many connections
39422 /
tcp
819727972 | 2025-03-11T12:00:48.130151
SSH-2.0-OpenSSH_7.4
Vulnerabilities
39522 /
tcp
-616720387 | 2025-03-11T08:41:36.931251
39722 /
tcp
-801484042 | 2025-03-05T03:47:37.511269
39822 /
tcp
1189133115 | 2025-03-12T05:01:27.764864
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
39922 /
tcp
996960436 | 2025-02-26T16:31:15.832465
40005 /
tcp
1624217396 | 2025-02-25T01:14:50.595759
HELO:10.3.6.0.false\nAS:2048\nHL:19
40022 /
tcp
819727972 | 2025-03-09T10:16:26.777485
SSH-2.0-OpenSSH_7.4
Vulnerabilities
40522 /
tcp
233634112 | 2025-03-04T06:35:01.438720
SSH-98.60-SysaxSSH_81885..42
40722 /
tcp
-1733106930 | 2025-03-08T13:43:34.818480
Mysql Version: 5.6.50-log\nN\n5.6.50-log\x14(\nG5se"tGE\xc3\xbf\xc3\xb7-\x02\x7f\xc2\x80\x15cB^3$Zwh$wM[mysql_native_password
40892 /
tcp
-1399940268 | 2025-03-09T05:58:24.906265
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
41022 /
tcp
2087396567 | 2025-03-08T22:11:23.248446
kjnkjabhbanc283ubcsbhdc72
41443 /
tcp
103159425 | 2025-03-14T02:33:59.366951
41522 /
tcp
1690634669 | 2025-03-04T20:31:32.356150
41822 /
tcp
-971970408 | 2025-03-07T17:00:18.460995
41922 /
tcp
-321444299 | 2025-03-07T15:17:13.190752
:dircproxy NOTICE AUTH :Looking up your hostname...
:dircproxy NOTICE AUTH :Got your hostname.
42022 /
tcp
2087396567 | 2025-03-04T15:31:33.691745
kjnkjabhbanc283ubcsbhdc72
42122 /
tcp
-747911285 | 2025-03-05T04:47:49.564405
42208 /
tcp
-1327660293 | 2025-02-24T21:51:20.342297
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
42235 /
tcp
-805362002 | 2025-02-21T22:11:09.441110
ICAP/1.0 501 Other
Server: Traffic Spicer 7788179225
42422 /
tcp
1948301213 | 2025-03-04T19:19:45.617453
RFB 003.003
VNC:
Protocol Version: 3.3
42443 /
tcp
1911457608 | 2025-02-22T20:47:42.532041
\x00[\x00\x00\x00\x00\x00\x00
42922 /
tcp
2087396567 | 2025-02-28T14:33:06.812375
kjnkjabhbanc283ubcsbhdc72
43009 /
tcp
-1399940268 | 2025-02-25T21:35:40.923206
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
43322 /
tcp
1852418385 | 2025-02-27T21:16:50.616026
RTSP/1.0 453 Not Enough Bandwidth
Server: AirTunes/7l_wZ
43422 /
tcp
1741579575 | 2025-02-27T19:15:11.185038
43522 /
tcp
-905685638 | 2025-02-27T17:41:53.858603
43622 /
tcp
-905685638 | 2025-02-26T23:23:18.161485
43722 /
tcp
671605376 | 2025-02-27T02:48:03.820910
43822 /
tcp
539065883 | 2025-02-27T01:03:37.566326
43922 /
tcp
1308377066 | 2025-02-27T09:33:58.266500
44022 /
tcp
2087396567 | 2025-02-27T06:20:31.156140
kjnkjabhbanc283ubcsbhdc72
44122 /
tcp
-971970408 | 2025-02-26T21:56:33.580944
44158 /
tcp
2054287019 | 2025-03-11T20:22:26.936805
44222 /
tcp
-971970408 | 2025-03-10T21:49:09.064983
44305 /
tcp
819727972 | 2025-03-11T17:41:46.780896
SSH-2.0-OpenSSH_7.4
Vulnerabilities
44306 /
tcp
819727972 | 2025-03-19T20:15:33.910126
SSH-2.0-OpenSSH_7.4
Vulnerabilities
44308 /
tcp
165188539 | 2025-03-13T21:39:56.719359
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
44322 /
tcp
-358801646 | 2025-02-26T09:55:26.318707
44422 /
tcp
1082732927 | 2025-02-25T23:49:29.739305
STAT pid 1660
STAT uptime 28884
STAT time 1641290377
STAT version 1.2.1
STAT pointer_size 32
STAT curr_items 14
STAT total_items 3533
STAT bytes 30524
STAT curr_connections 1
STAT total_connections 3542
STAT connection_structures 3
STAT cmd_get 3533
STAT cmd_set 3533
STAT get_hits 3519
STAT get_misses 14
STAT bytes_read 7927780
STAT bytes_written 7848552
STAT limit_maxbytes 67108864
END
44510 /
tcp
-1810987450 | 2025-03-12T20:07:20.356253
44622 /
tcp
2087396567 | 2025-02-23T03:23:06.411445
kjnkjabhbanc283ubcsbhdc72
44922 /
tcp
1332894250 | 2025-02-26T02:52:16.627127
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
45006 /
tcp
408230060 | 2025-03-19T06:28:12.857942
\r\nSorry, that nickname format is invalid.\r\n
45022 /
tcp
-407828767 | 2025-03-10T15:12:22.192672
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
45122 /
tcp
1741579575 | 2025-02-24T06:36:06.567784
45222 /
tcp
-952165951 | 2025-02-25T18:30:29.274392
45522 /
tcp
339872247 | 2025-02-25T15:29:58.335929
-1839934832 | 2025-03-16T22:22:46.816045
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
45822 /
tcp
504717326 | 2025-03-10T11:46:12.260714
SSH-2.0-OpenSSH_8.6
Vulnerabilities
45886 /
tcp
89142341 | 2025-03-21T15:25:28.275521
\x05\x00\x00\x00\x0b\x08\x05\x1a\x00
45888 /
tcp
575925250 | 2025-03-12T10:33:46.155320
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
45922 /
tcp
1948301213 | 2025-03-10T13:29:09.185931
RFB 003.003
VNC:
Protocol Version: 3.3
46000 /
tcp
1911457608 | 2025-03-13T12:45:03.515579
\x00[\x00\x00\x00\x00\x00\x00
46022 /
tcp
-653033013 | 2025-02-21T20:38:59.986909
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
46122 /
tcp
1767345577 | 2025-02-24T11:44:37.683000
Hello, this is Quagga (version 0T).
Copyright 1996-200
46222 /
tcp
401555314 | 2025-02-24T22:08:54.811517
46322 /
tcp
660175493 | 2025-02-24T20:21:52.831438
46422 /
tcp
2067064333 | 2025-02-24T08:19:20.441428
46522 /
tcp
660175493 | 2025-02-24T06:14:53.248795
46622 /
tcp
474736340 | 2025-02-24T03:08:59.380523
431 Unable to negotiate secure command connection.
46822 /
tcp
2087396567 | 2025-02-24T01:22:23.919729
kjnkjabhbanc283ubcsbhdc72
1282941221 | 2025-02-23T22:16:20.120314
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
47222 /
tcp
-971970408 | 2025-02-23T20:52:37.509419
47322 /
tcp
-1990350878 | 2025-02-25T03:24:25.400022
47422 /
tcp
819727972 | 2025-02-24T23:55:43.390716
SSH-2.0-OpenSSH_7.4
Vulnerabilities
47622 /
tcp
-747911285 | 2025-02-25T02:04:24.508320
47722 /
tcp
-2031152423 | 2025-03-10T11:12:15.726033
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
47822 /
tcp
-375604792 | 2025-03-10T08:17:49.434061
220 Microsoft FTP Service
47990 /
tcp
-407828767 | 2025-03-13T14:52:26.224824
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
48000 /
tcp
740837454 | 2025-03-16T17:30:01.108779
SSH-2.0-OpenSSH_5.3
Vulnerabilities
48012 /
tcp
921225407 | 2025-02-21T20:53:11.667693
\x00\x00\x00\x04\x00\x00\x00\x00\x00
48022 /
tcp
1690634669 | 2025-03-07T11:51:11.753633
48222 /
tcp
-616720387 | 2025-03-10T03:08:23.976379
48322 /
tcp
819727972 | 2025-03-10T01:22:12.074598
SSH-2.0-OpenSSH_7.4
Vulnerabilities
48422 /
tcp
104385780 | 2025-03-09T23:42:39.078948
48522 /
tcp
-971970408 | 2025-03-09T21:56:11.833879
48622 /
tcp
1975288991 | 2025-02-24T18:37:02.110783
48722 /
tcp
-1730858130 | 2025-02-23T09:46:31.503330
RFB 003.008
VNC:
Protocol Version: 3.8
48822 /
tcp
819727972 | 2025-02-24T18:47:01.074583
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1292343804 | 2025-03-20T05:52:33.312861
HTTP/1.1 500 Internal Server Error
CONTENT-LENGTH: 411
CONTENT-TYPE: text/xml; charset="utf-8"
DATE: Mon, 22 Jan 2024 16:32:35 GMT
EXT:
SERVER: Linux/3.10.0, UPnP/1.0, Portable SDK for UPnP devices/1.6.18
X-User-Agent: redsonic
<s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">
<s:Body>
<s:Fault>
<faultcode>s:Client</faultcode>
<faultstring>UPnPError</faultstring>
<detail>
<UPnPError xmlns="urn:schemas-upnp-org:control-1-0">
49222 /
tcp
897328069 | 2025-02-23T02:20:02.706804
220 mail.scott000.com ESMTP
49501 /
tcp
-1032713145 | 2025-03-22T13:36:12.958569
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
49722 /
tcp
1741579575 | 2025-02-22T22:15:55.902123
49822 /
tcp
422524323 | 2025-02-22T19:46:11.674679
{
"Version": "3.4.18",
"VersionArray": [
3,
4,
18,
0
],
"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",
"OpenSSLVersion": "",
"SysInfo": "",
"Bits": 64,
"Debug": false,
"MaxObjectSize": 16777216
}
49922 /
tcp
-1990350878 | 2025-02-22T18:02:13.940060
50000 /
tcp
-1681927087 | 2025-03-23T02:09:37.330160
kjnkjabhbanc283ubcsbhdc72
50007 /
tcp
1911457608 | 2025-03-12T00:57:20.899758
\x00[\x00\x00\x00\x00\x00\x00
50008 /
tcp
1991883981 | 2025-02-25T23:19:27.373361
B\x00\x00\x00\xc3\xbfn\x04Too many connections
50012 /
tcp
1911457608 | 2025-03-09T16:46:37.024702
\x00[\x00\x00\x00\x00\x00\x00
50013 /
tcp
-1399940268 | 2025-03-11T04:27:12.457846
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
0 | 2025-03-04T10:49:02.801771
HTTP/1.1 408 Request Timeout
content-length: 0
50100 /
tcp
-321444299 | 2025-03-22T23:08:06.586626
:dircproxy NOTICE AUTH :Looking up your hostname...
:dircproxy NOTICE AUTH :Got your hostname.
50104 /
tcp
639175818 | 2025-03-21T16:45:34.380265
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
50122 /
tcp
1632932802 | 2025-02-22T08:49:09.287299
-1261314728 | 2025-03-14T21:47:48.880009
HTTP/1.1 503 Service Unavailable
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 12-42587391-0 0NNN RT(1701246017593 16) q(0 -1 -1 -1) r(0 -1)
50522 /
tcp
-1261090339 | 2025-02-21T23:07:18.799252
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
50622 /
tcp
819727972 | 2025-02-21T19:09:04.131819
SSH-2.0-OpenSSH_7.4
Vulnerabilities
50805 /
tcp
165188539 | 2025-03-06T08:38:22.168073
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
50997 /
tcp
-303199180 | 2025-03-12T18:14:03.998226
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
51000 /
tcp
-358801646 | 2025-03-18T01:39:55.917116
51005 /
tcp
819727972 | 2025-03-14T17:40:23.140199
SSH-2.0-OpenSSH_7.4
Vulnerabilities
51222 /
tcp
-801484042 | 2025-02-21T12:16:02.509430
-1230049476 | 2025-03-21T17:21:51.287032
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
51422 /
tcp
1189133115 | 2025-02-21T07:34:06.818620
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
51443 /
tcp
2087396567 | 2025-03-12T00:55:52.062961
kjnkjabhbanc283ubcsbhdc72
52010 /
tcp
599074451 | 2025-03-16T03:23:35.421402
52311 /
tcp
493955023 | 2025-03-14T23:13:30.295830
\x00\x00\x0c\x04\x00\x00\x00\x00\x00\x00\x04\x00\x10\x00\x00\x00\n0\x05\x00\x00@\x00
-1072158793 | 2025-03-21T13:41:28.484271
HTTP/1.1 500 Internal Server Error
SERVER: Linux/2.6.21.5, UPnP/1.0, Portable SDK for UPnP devices/1.6.6
CONNECTION: close
CONTENT-LENGTH: 60
CONTENT-TYPE: text/html
53413 /
tcp
-314039103 | 2025-03-22T03:14:06.475265
Surnom.
Sorry, that nickname format is invalid.
53483 /
tcp
119860953 | 2025-03-08T17:15:55.100935
* OK ArGoSoft Mail Server IMAP Module v.YW at
53805 /
tcp
1208318993 | 2025-03-07T08:25:09.442746
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
53806 /
tcp
-457235091 | 2025-02-28T16:48:36.023469
audio 0 RTP/AVP 18 4 3 8 0 101\r\na
54138 /
tcp
-1428621233 | 2025-03-16T18:14:45.225355
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
54922 /
tcp
1741579575 | 2025-03-07T08:21:13.125847
55000 /
tcp
1911457608 | 2025-03-03T20:11:24.114320
\x00[\x00\x00\x00\x00\x00\x00
55022 /
tcp
2087396567 | 2025-03-07T03:16:18.097324
kjnkjabhbanc283ubcsbhdc72
55222 /
tcp
745343730 | 2025-03-07T01:39:11.190082
220 smtp.qq.com Esmtp QQ Mail Server
55388 /
tcp
-1399940268 | 2025-03-18T13:33:30.747954
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
55422 /
tcp
740837454 | 2025-03-06T17:15:18.648202
SSH-2.0-OpenSSH_5.3
Vulnerabilities
55442 /
tcp
1767345577 | 2025-03-20T19:54:26.757423
Hello, this is Quagga (version 0T).
Copyright 1996-200
55443 /
tcp
-971970408 | 2025-03-19T14:13:28.877080
55475 /
tcp
1011407350 | 2025-03-15T09:04:38.991941
* OK GroupWise IMAP4rev1 Server Ready\r\n
55522 /
tcp
291723434 | 2025-03-06T22:11:37.705862
Lantronix MSS100 Version V118/523(045538937)
Type HELP at the 'Local_61349> ' prompt for assistance.
Username>
55553 /
tcp
-1428621233 | 2025-03-20T19:12:09.650858
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
55554 /
tcp
-971970408 | 2025-03-20T08:18:34.539202
-147424911 | 2025-03-21T15:18:57.455954
HTTP/1.1 404 Not Found
Content Length: 0
55722 /
tcp
-1036370807 | 2025-03-06T18:44:38.726912
55822 /
tcp
-1648456501 | 2025-03-06T20:27:41.181836
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
57622 /
tcp
-2017887953 | 2025-03-06T10:33:25.948752
SSH-2.0-OpenSSH_7.9
Vulnerabilities
1396488228 | 2025-03-09T11:03:50.161459
HTTP/1.1 200 OK
Content-Length: 2037
Cache-Control: private, max-age=300
Content-Type: text/html
57922 /
tcp
-2031152423 | 2025-03-06T03:45:47.948751
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
58122 /
tcp
-971970408 | 2025-03-06T02:25:00.892511
1282941221 | 2025-03-06T00:15:41.013362
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
58322 /
tcp
-1261090339 | 2025-03-05T22:31:44.526409
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
58603 /
tcp
1911457608 | 2025-03-11T14:39:52.097075
\x00[\x00\x00\x00\x00\x00\x00
58722 /
tcp
-1032713145 | 2025-03-05T17:30:27.434195
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
58922 /
tcp
2087396567 | 2025-03-05T13:55:49.246061
kjnkjabhbanc283ubcsbhdc72
59022 /
tcp
2087396567 | 2025-03-05T12:11:36.818627
kjnkjabhbanc283ubcsbhdc72
59322 /
tcp
539065883 | 2025-03-05T07:48:24.401327
-2107996212 | 2025-03-03T17:58:19.008856
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
60001 /
tcp
-971970408 | 2025-03-15T01:49:18.104288
60021 /
tcp
-792826324 | 2025-02-27T18:35:56.793138
220 FTP server ready - login please
60099 /
tcp
819727972 | 2025-03-11T08:13:47.400813
SSH-2.0-OpenSSH_7.4
Vulnerabilities
60129 /
tcp
-971970408 | 2025-03-14T23:19:00.775307
61613 /
tcp
-1329831334 | 2025-03-19T15:42:20.363302
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
61616 /
tcp
-79865617 | 2025-03-15T04:42:23.460995
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com
mit-revprops depth log-revprops partial-replay ) ) )
62078 /
tcp
-1113435755 | 2025-03-07T10:46:23.860489
/1.1 404 Not Found
Content Length: 0
62443 /
tcp
-2096652808 | 2025-03-16T21:12:38.692587
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
63045 /
tcp
632542934 | 2025-03-05T15:21:44.222613
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
63210 /
tcp
-1681927087 | 2025-03-14T22:32:45.222752
kjnkjabhbanc283ubcsbhdc72
1282941221 | 2025-03-22T08:04:44.512419
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
63260 /
tcp
2087396567 | 2025-03-11T20:22:01.457724
kjnkjabhbanc283ubcsbhdc72
63443 /
tcp
-1399940268 | 2025-03-17T19:35:50.065718
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
63676 /
tcp
-1399940268 | 2025-02-28T08:03:50.928624
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1906191280 | 2025-03-19T16:01:14.564302
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 657d0443_jdx210_8928-57530