2 /
tcp
1911457608 | 2025-02-23T20:06:49.531208
\x00[\x00\x00\x00\x00\x00\x00
1100205395 | 2025-03-12T23:19:38.191559
HTTP/1.1 200 OK
Cache-Control: private, max-age=300
17 /
tcp
5698739 | 2025-03-22T08:34:50.610984
"We have no more right to consume happiness without producing it than to
consume wealth without producing it." George Bernard Shaw (1856-1950)
\x00
19 /
tcp
829384519 | 2025-03-14T08:13:49.621015
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefg
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUV
20 /
tcp
-2096652808 | 2025-02-24T17:30:29.103549
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
21 /
tcp
-1672628673 | 2025-03-11T03:34:03.251074
220 DiskStation FTP server ready.\r\n
25 /
tcp
1278527606 | 2025-03-04T08:23:54.620903
37 /
tcp
1463575233 | 2025-03-16T16:37:30.344589
43 /
tcp
1308377066 | 2025-02-21T14:10:08.964623
53 /
tcp
-42462918 | 2025-03-19T21:29:44.332625
9
\x81\x05\x00\x01\x00\x00\x00\x00\x00\x00\x08clients1\x06google\x03com\x00\x00\x01\x00\x01
\x00\x06\x85\x00\x00\x01\x00\x01\x00\x01\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03\xc0\x00\x10\x00\x03\x00\x00\x00\x00\x00\x05\x04none\xc0\x00\x02\x00\x03\
-1839934832 | 2025-03-06T18:31:10.953143
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
-1763883228 | 2025-03-15T01:41:55.725925
HTTP/1.1 400 Bad Request
Server: vista/0.7
Content-Type: text/html
Connection: close
79 /
tcp
1732483321 | 2025-02-22T11:03:34.260465
421 too many connections\r\n
102 /
tcp
-358801646 | 2025-03-17T09:01:00.492169
104 /
tcp
-784071826 | 2025-02-26T17:07:53.501691
SSH-2.0-OpenSSH_8.0
Vulnerabilities
111 /
tcp
-801484042 | 2025-03-14T08:17:14.115077
-1713467553 | 2025-03-14T18:48:15.858742
HTTP/1.1 400 Bad Request
Content-Type: text/html; charset=us-ascii
Server: Microsoft-HTTPAPI/2.0
Connection: close
141730637 | 2025-03-22T18:46:55.327903
HTTP/1.0 200 OK
Server: Proxy
135 /
tcp
-1729522695 | 2025-03-20T10:47:37.802969
\\x05\\x00\r\\x03\\x10\\x00\\x00\\x00\\x18\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x04\\x00\\x01\\x05\\x00\\x00\\x00\\x00\n\nServerAlive2: \n IP1: DESKTOP-BFAHJ06\n IP2: 192.168.3.8\n IP3: 172.29.96.1\n IP4: 172.19.80.1\n\nNTLMSSP:\nTarget_Name: DESKTOP-BFAHJ06\nProduct_Version: 10.0.19041 Ntlm 15\nOS: Windows 10, Version 2004/Windows Server, Version 2004\nNetBIOS_Domain_Name: DESKTOP-BFAHJ06\nNetBIOS_Computer_Name: DESKTOP-BFAHJ06\nDNS_Domain_Name: DESKTOP-BFAHJ06\nDNS_Computer_Name: DESKTOP-BFAHJ06\nSystem_Time: 2024-01-22 04:05:47 +0000 UTC\n\nDCERP
175 /
tcp
-1399940268 | 2025-02-24T06:42:49.569072
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
177 /
tcp
632542934 | 2025-03-12T03:13:30.847966
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
179 /
tcp
-399606100 | 2025-03-20T21:41:28.638480
BGP Message\nType: 3\nMajor error Code: 6\nMinor error Code: 5\n
189 /
tcp
1911457608 | 2025-03-07T10:04:33.954464
\x00[\x00\x00\x00\x00\x00\x00
195 /
tcp
1741579575 | 2025-03-21T07:15:48.781875
221 /
tcp
-1189269828 | 2025-02-27T00:39:21.847715
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
222 /
tcp
-926139304 | 2025-03-04T05:33:00.551569
SSH-2.0-BHostSSH_7.0\r\n\n
-1013082686 | 2025-02-26T15:57:28.651250
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
-1932800090 | 2025-03-13T02:44:07.876665
-1547976805 | 2025-03-21T13:52:04.103484
HTTP/1.1 403 Forbidden
Server: nginx
Content-Type: text/html
Connection: close
385 /
tcp
321971019 | 2025-02-28T02:36:55.509287
-ERR client ip is not in whitelist\r
389 /
tcp
-1639129386 | 2025-03-14T11:52:28.622052
0%\\x02\\x01\\x01a \n\\x010\\x04\\x00\\x04\\x19anonymous bind disallowed
427 /
tcp
-826599962 | 2025-03-20T01:18:10.434265
SAAdvert Response:\nVersion: 2\nFunction: SA Advertisement (11)\nURL: service:service-agent://localhost.localdomain\nScopeList: default\nAttrributeList: \n\n
443 /
tcp
187705409 | 2025-02-27T13:28:22.164945
Versions\xef\xbc\x9a39,43,46,50\nQUIC Protocol\t\\x89\\xc1\\x9c\\x1c*\\xff\\xfc\\xf1Q039Q043Q046Q050\\xff\\x00\\x00\\x1b\\xff\\x00\\x00\\x1d\\x00\\x00\\x00\\x01\\xfa\\xfa\\xfa\\xfa
444 /
tcp
819727972 | 2025-03-15T12:15:31.208109
SSH-2.0-OpenSSH_7.4
Vulnerabilities
446 /
tcp
-1399940268 | 2025-02-22T19:49:01.344510
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
465 /
tcp
897328069 | 2025-03-17T04:36:49.115913
220 mail.scott000.com ESMTP
502 /
tcp
2121220663 | 2025-03-18T10:00:48.783150
503 /
tcp
-1399940268 | 2025-03-22T21:13:59.064633
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
515 /
tcp
-905685638 | 2025-03-18T11:59:29.327050
541 /
tcp
1497273505 | 2025-03-21T09:51:42.470081
\\x16\\x03\\x01\\x01P\\x01\\x00\\x01L\\x03\\x03\\x84L\\xcf\\x00\\x0e\xc4\x96Q\\xf3\\xb1\\x9f\\x88\\x08\\x92\\xd7S\\xf1\\xb7\\xc9\\xc79\\xcc\\xf6Tk\\x1dj\\xc6`\\x89\\x86\\xeb \\xbc\\xef\\xc3<\\xe5g\\x96\\xa4L\\x1c\\x1b]ea\\x81$D\\x99\\x92eH\\x85\\x82\\x1b*\\xc2*\\xaeb9n9\\x002\\x13\\x02\\x13\\x03\\x13\\x01\\x009\\x0
548 /
tcp
-969286897 | 2025-03-03T18:42:48.930857
Fast Copy: Yes\nExtended Sleep: Yes\nUUIDs: Yes\nUTF8 Server Name: Yes\nDirectory Services: Yes\nReconnect: No\nServer Notifications: Yes\nTCP/IP: Yes\nServer Signature: Yes\nServer Message: No\nPassword Saving Prohibited: No\nPassword Changing: No\nCopy File: Yes\nServer Name: TNAS-0E01\nMachine Type: \\x0eNetatalk3.1.12\nAFP Versions: AFP2.2, AFPX03, AFP3.1, AFP3.2, AFP3.3, AFP3.4\nUAMs: No User Authent\\x04,DHX2\t,DHCAST128\\x00\nServer Signature: 00000000008002000180030002800280
554 /
tcp
285770450 | 2025-03-16T13:13:26.264479
RTSP/1.0 401 Unauthorized
CSeq: 1
-2074356892 | 2025-03-12T01:49:34.890675
HTTP/1.1 302 Moved Temporarily
Content-Type: text/html
Connection: close
Server: Nginx
Expires: 0
Pragma: no-cache
Cache-Control: no-cache
Location: https://portal.ikuai8-wifi.com/templates/default/index.html?timestamp=1705534875&router_ver=3.2.7&firmware=IK-RouterOS&template=default&gwid=dd51dff587fb29512f5e0c65319cba25&user_ip=106%2E75%2E95%2E40
771 /
tcp
632542934 | 2025-02-28T02:42:54.407213
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
785 /
tcp
1504401647 | 2025-03-18T09:45:44.260260
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
2143387245 | 2025-03-08T14:08:40.185836
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
-1166978945 | 2025-03-17T00:57:44.791595
HTTP/1.1 407 Proxy Authentication Required
Server: Proxy
Proxy-Authenticate: Basic realm="CCProxy Authorization"
Connection: Close
Proxy-Connection: Close
873 /
tcp
2128189041 | 2025-03-14T02:13:15.212251
@RSYNCD: 31.0\n\n@RSYNCD: EXIT\n
885 /
tcp
-1888448627 | 2025-03-13T02:23:41.915993
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
947 /
tcp
-1888448627 | 2025-03-15T00:59:14.383947
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
953 /
tcp
1011407350 | 2025-03-12T21:13:49.880365
* OK GroupWise IMAP4rev1 Server Ready\r\n
1635335563 | 2025-03-10T06:27:00.800266
HTTP/1.1 503 Service Unavailable
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 2-8753623-0 0NNN RT(1705908001343 0) q(0 -1 -1 -1) r(0 -1)
-1242315829 | 2025-03-13T10:28:52.240635
HTTP/1.1 302 Found
Content-Type: text/html; charset=utf-8
Location: /app/
Permissions-Policy: autoplay=(), camera=(), microphone=(), usb=()
Referrer-Policy: same-origin
Vary: Origin
X-Content-Type-Options: nosniff
X-Frame-Options: DENY
995 /
tcp
1356395159 | 2025-03-15T08:11:52.314481
+OK Welcome to RaidenMAILD POP3 SSL service v4904, Mon, 22 Jan 2024 16:39:07 +0800, (C)2001-2023 <947064546@raidenmaild>\r\n
1282941221 | 2025-02-25T13:43:43.724570
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
1013 /
tcp
1426971893 | 2025-03-21T21:03:18.009030
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
1023 /
tcp
1353260875 | 2025-03-12T07:01:41.572649
\x00[g\xc2\x95N\x7f\x00\x00
1025 /
tcp
-358801646 | 2025-03-21T05:42:00.805821
1099 /
tcp
-2089734047 | 2025-03-18T20:39:31.398752
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
456721301 | 2025-03-10T01:12:29.234752
HTTP/1.1 200 OK
Server: Citrix-3.2.5.9 'Marshal West'
Content-Type: text/html; charset=UTF-8
1111 /
tcp
-358801646 | 2025-02-23T20:29:51.659775
1153 /
tcp
1543809371 | 2025-03-21T22:33:57.464404
220 corpease.net Anti-spam GT for Coremail System (icmhosting[2\n0181212])
1180 /
tcp
-1399940268 | 2025-03-06T22:14:23.619161
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1181 /
tcp
-1399940268 | 2025-03-15T12:49:15.881359
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1618598266 | 2025-03-09T13:43:19.546073
HTTP/1.1 503 Service Unavailable
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 13-201807867-0 0NNN RT(1704062972329 0) q(0 -1 -1 -1) r(0 -1)
1200 /
tcp
2087396567 | 2025-03-19T22:44:40.684031
kjnkjabhbanc283ubcsbhdc72
1355 /
tcp
1911457608 | 2025-02-24T10:59:26.357637
\x00[\x00\x00\x00\x00\x00\x00
1387 /
tcp
1615193817 | 2025-03-20T00:18:57.226885
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
1388 /
tcp
165188539 | 2025-03-09T07:40:30.861015
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
1414 /
tcp
-441419608 | 2025-03-09T06:07:55.353239
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
1433 /
tcp
-182670276 | 2025-03-15T00:48:03.056836
MSSQL Server\nVersion: 171050560 (0xa320640)\nSub-Build: 0\nEncryption:Not available\n\nMSSQL NTLM Info:\nTarget_Name: IZJ6FUBS9PLYUOZ\nProduct_Version: 6.3.9600 Ntlm 15\nOS: Windows 8.1/Windows Server 2012 R2\nNetBIOS_Domain_Name: IZJ6FUBS9PLYUOZ\nNetBIOS_Computer_Name: IZJ6FUBS9PLYUOZ\nDNS_Domain_Name: iZj6fubs9plyuoZ\nDNS_Computer_Name: iZj6fubs9plyuoZ\nSystem_Time: 2024-01-22 03:53:09 +0000 UTC\n\n
-1715152554 | 2025-03-03T23:51:09.696157
HTTP/1.1 302 Moved Temporarily
Server: nginx/1.22.1
Date: Mon, 03 Mar 2025 23:51:09 GMT
Content-Type: text/html
Content-Length: 145
Connection: close
Location: https://120.77.139.53:443/
1458 /
tcp
-1105333987 | 2025-03-06T00:19:18.991596
1515 /
tcp
819727972 | 2025-03-22T07:10:29.556489
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-186520940 | 2025-03-18T05:58:00.195668
1577 /
tcp
819727972 | 2025-02-24T16:24:07.295922
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1588 /
tcp
-1399940268 | 2025-03-22T17:41:39.062260
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1599 /
tcp
1492413928 | 2025-03-14T00:57:59.895828
SSH-2.0-OpenSSH_7.5
Vulnerabilities
1604 /
tcp
-2089734047 | 2025-03-18T21:24:42.377786
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1605 /
tcp
1134517380 | 2025-03-04T09:07:15.332136
welcome to Pandora console!\r\n----------------------------\n-------------------------\n| Login Time | 2021-12-08 1...\n
-271515508 | 2025-03-13T09:36:29.605044
HTTP/1.1 302 Moved Temporarily
Server: DrcomServer1.0
Location: http://192.168.254.3
Cache-Control: no-cache
Connection: close
2064046231 | 2025-03-10T03:22:10.904064
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae1c77_tb143_15913-45531
1800 /
tcp
-2089734047 | 2025-03-09T09:09:10.331274
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1801 /
tcp
1266492139 | 2025-03-09T21:23:44.815177
\\x10Z\x0b\\x00LIOR<\\x02\\x00\\x00\\xff\\xff\\xff\\xff\\x00\\x00\\x12\\x00a36a0e421af47074q\\xc0\\x86\xd9\xb0\\xc1hG\\xbf\\xbd\\x9f\\x89tx%\\x8892d3\\x10\\x03\\x00\\x00ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ
1883 /
tcp
2087396567 | 2025-03-21T03:05:32.310963
kjnkjabhbanc283ubcsbhdc72
1911 /
tcp
-1399940268 | 2025-03-16T14:17:21.451658
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1926 /
tcp
-653033013 | 2025-03-15T10:56:07.520129
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
1956 /
tcp
165188539 | 2025-03-22T12:25:02.557561
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
1957 /
tcp
-1399940268 | 2025-03-09T04:16:13.828280
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1959 /
tcp
165188539 | 2025-03-13T18:15:52.895032
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
1962 /
tcp
-2089734047 | 2025-03-20T20:57:47.805612
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
2000 /
tcp
-1399940268 | 2025-03-07T12:35:11.482877
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2003 /
tcp
-1399940268 | 2025-02-24T00:49:39.609799
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2008 /
tcp
474736340 | 2025-03-05T23:59:52.169687
431 Unable to negotiate secure command connection.
372433470 | 2025-03-20T17:18:15.798046
HTTP/1.1 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm=""
2051 /
tcp
1492413928 | 2025-03-16T23:12:44.247584
SSH-2.0-OpenSSH_7.5
Vulnerabilities
2055 /
tcp
575925250 | 2025-03-19T01:03:10.887544
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
2058 /
tcp
-1399940268 | 2025-03-07T18:26:38.392063
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2063 /
tcp
575925250 | 2025-02-23T21:03:03.504197
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
971933601 | 2025-02-27T19:15:48.055893
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
2081 /
tcp
2098371729 | 2025-03-16T16:57:01.098321
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
2083 /
tcp
-154107716 | 2025-03-14T10:27:13.238166
220 Microsoft FTP Service
530 User cannot log in.
214-The following commands are recognized (* ==>'s unimplemented).
ABOR
ACCT
ADAT *
ALLO
APPE
AUTH
CCC
CDUP
CWD
DELE
ENC *
EPRT
EPSV
FEAT
HELP
HOST
LANG
LIST ...
2087 /
tcp
2087396567 | 2025-03-20T19:19:37.587107
kjnkjabhbanc283ubcsbhdc72
2091 /
tcp
-1399940268 | 2025-03-13T14:23:36.318989
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2096 /
tcp
1919228981 | 2025-03-06T23:48:46.855813
\x00\x1e\x00\x06\xc2\x81\xc2\x85\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
2100 /
tcp
-1399940268 | 2025-03-12T13:05:58.508497
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2108 /
tcp
-303199180 | 2025-03-17T00:05:13.328752
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
2109 /
tcp
165188539 | 2025-03-17T00:31:53.027731
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
372433470 | 2025-03-10T18:51:48.249173
HTTP/1.1 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm=""
2154 /
tcp
-971970408 | 2025-03-07T03:14:55.344365
2181 /
tcp
546151771 | 2025-03-16T11:52:01.963873
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC
Clients:
/*.*.*.*:11264[0](queued=0,recved=1,sent=0)
Latency min/avg/max: 0/0.0/0
Received: 8557
Sent: 11410
Connections: 1
Outstanding: 0
Zxid: 0x332907ad3391
Mode: follower
Node count: 104618
2195 /
tcp
-2031152423 | 2025-03-21T16:30:32.787952
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
2210 /
tcp
-1399940268 | 2025-03-21T20:28:20.343166
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2211 /
tcp
677934968 | 2025-02-24T13:29:01.243085
2220 /
tcp
-891714208 | 2025-03-12T10:17:44.343981
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
2221 /
tcp
-891714208 | 2025-03-21T22:41:24.297231
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
2222 /
tcp
-1659353189 | 2025-03-21T08:28:05.781890
SSH-2.0-ssh-server\r\n\\x00\\x00\\x02\\x14\x0b\\x14\x0b\\xed\\x16\\xae\\x96\t\\xc5En\\xbd\\x1cgn\\xff\\xad\\xd7\\x00\\x00\\x00\\xbbcurve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group14-sha256,diffie-hellman-gr
2248 /
tcp
321971019 | 2025-03-05T03:32:52.961839
-ERR client ip is not in whitelist\r
1662205251 | 2025-03-21T01:30:18.115728
HTTP/1.0 404 FAIL
Content-length:5
Connection:Close
2345 /
tcp
-1399940268 | 2025-03-21T07:15:48.534774
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2352 /
tcp
819727972 | 2025-02-24T22:45:14.418441
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2404 /
tcp
-1733645023 | 2025-03-19T19:21:03.840051
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
2455 /
tcp
819727972 | 2025-03-17T22:18:36.938033
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2554 /
tcp
819727972 | 2025-02-21T20:44:39.087798
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2570 /
tcp
1911457608 | 2025-03-15T05:51:44.687785
\x00[\x00\x00\x00\x00\x00\x00
2572 /
tcp
1363464823 | 2025-03-13T21:08:29.455978
-1045760528 | 2025-03-21T06:07:37.869454
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
2761 /
tcp
1426971893 | 2025-02-26T12:03:05.868599
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
2762 /
tcp
-1399940268 | 2025-03-22T22:30:35.205821
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2985 /
tcp
-1399940268 | 2025-03-15T18:44:13.089155
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1013082686 | 2025-03-22T20:59:42.409871
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
3002 /
tcp
1911457608 | 2025-03-10T17:07:43.320268
\x00[\x00\x00\x00\x00\x00\x00
3007 /
tcp
321971019 | 2025-03-18T17:09:36.323394
-ERR client ip is not in whitelist\r
3009 /
tcp
117101543 | 2025-03-13T17:09:33.884632
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
-1227409554 | 2025-02-22T08:24:04.248470
HTTP/1.1 500 Internal Server Error
Server: Zope/(2.13.23, python 1.7.18, linux2) ZServer/1.1
Content-Type: text/plain; charset=utf-8
Connection: close
-1568680103 | 2025-03-17T05:53:11.698940
HTTP/1.1 301 Moved Permanently
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3047 /
tcp
-904840257 | 2025-02-21T10:17:44.081328
572 Relay not authorized\r\n
2103111368 | 2025-03-13T10:09:14.433203
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
3051 /
tcp
-1375131644 | 2025-03-06T12:05:16.495229
\x00[v\xc3\xbdC\x7f\x00\x00
3063 /
tcp
819727972 | 2025-03-20T02:13:40.041904
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3064 /
tcp
-2089734047 | 2025-03-05T11:21:06.224496
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3065 /
tcp
-2089734047 | 2025-02-21T23:22:54.010264
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3070 /
tcp
321971019 | 2025-03-20T04:36:48.228863
-ERR client ip is not in whitelist\r
3073 /
tcp
-1399940268 | 2025-02-26T11:18:06.451737
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1282941221 | 2025-03-17T20:20:45.533170
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
3075 /
tcp
1911457608 | 2025-02-25T23:53:09.041587
\x00[\x00\x00\x00\x00\x00\x00
198844676 | 2025-02-26T20:11:40.817151
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3088 /
tcp
1911457608 | 2025-03-18T14:16:43.638227
\x00[\x00\x00\x00\x00\x00\x00
3112 /
tcp
819727972 | 2025-02-24T23:47:47.368426
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3122 /
tcp
-585940771 | 2025-02-23T07:22:41.564107
3123 /
tcp
-1888448627 | 2025-02-27T04:40:15.132735
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
3132 /
tcp
-1733645023 | 2025-03-21T01:30:56.929808
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
3134 /
tcp
1911457608 | 2025-03-22T13:30:40.532008
\x00[\x00\x00\x00\x00\x00\x00
3148 /
tcp
-2089734047 | 2025-03-17T11:02:22.981170
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3149 /
tcp
-339084706 | 2025-03-22T05:44:39.705287
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
3151 /
tcp
-339084706 | 2025-02-25T05:42:19.099035
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
3166 /
tcp
-1888448627 | 2025-03-15T15:27:43.399312
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
-1227409554 | 2025-03-20T17:34:56.360011
HTTP/1.1 500 Internal Server Error
Server: Zope/(2.13.23, python 1.7.18, linux2) ZServer/1.1
Content-Type: text/plain; charset=utf-8
Connection: close
3180 /
tcp
-339084706 | 2025-02-27T14:11:12.406532
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
3188 /
tcp
-1399940268 | 2025-03-21T11:22:25.921262
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3194 /
tcp
455076604 | 2025-03-17T12:58:24.328561
!\x07version\x04bind7 t{RPowerDNS Recursor 410
3196 /
tcp
1830187220 | 2025-03-06T16:25:41.761202
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
3256 /
tcp
-952165951 | 2025-03-14T18:36:57.489323
3260 /
tcp
1135752610 | 2025-03-12T12:48:22.535438
Login Response Success(0x0000)\nKey/Value Pairs\nAuthMethod=None
-1688921933 | 2025-02-27T22:49:24.419893
HTTP/1.1 503 Service Unavailable
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 12-14878276-0 0NNN RT(1705363841143 0) q(0 -1 -1 -1) r(0 -1)
3269 /
tcp
1911457608 | 2025-03-14T23:35:35.368364
\x00[\x00\x00\x00\x00\x00\x00
3299 /
tcp
1082732927 | 2025-03-16T06:42:55.558154
STAT pid 1660
STAT uptime 28884
STAT time 1641290377
STAT version 1.2.1
STAT pointer_size 32
STAT curr_items 14
STAT total_items 3533
STAT bytes 30524
STAT curr_connections 1
STAT total_connections 3542
STAT connection_structures 3
STAT cmd_get 3533
STAT cmd_set 3533
STAT get_hits 3519
STAT get_misses 14
STAT bytes_read 7927780
STAT bytes_written 7848552
STAT limit_maxbytes 67108864
END
3301 /
tcp
-136006866 | 2025-03-10T14:06:31.845604
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
3306 /
tcp
1047846045 | 2025-03-21T03:40:54.629856
H\\x00\\x00\\x01\\xffj\\x04Host \'*.*.*.*\' is not allowed to connect to this MariaDB server
3310 /
tcp
1426971893 | 2025-03-22T00:39:22.057763
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
3341 /
tcp
-1888448627 | 2025-03-05T11:06:10.240868
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
3388 /
tcp
-1626979812 | 2025-03-19T04:42:03.757200
220 Service ready for new user.
-1839934832 | 2025-03-08T19:52:31.008278
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
3405 /
tcp
-980525298 | 2025-02-25T09:35:25.119548
\x01\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
3407 /
tcp
-1733106930 | 2025-03-12T00:40:31.554292
Mysql Version: 5.6.50-log\nN\n5.6.50-log\x14(\nG5se"tGE\xc3\xbf\xc3\xb7-\x02\x7f\xc2\x80\x15cB^3$Zwh$wM[mysql_native_password
3410 /
tcp
-1733106930 | 2025-03-20T16:02:40.494882
Mysql Version: 5.6.50-log\nN\n5.6.50-log\x14(\nG5se"tGE\xc3\xbf\xc3\xb7-\x02\x7f\xc2\x80\x15cB^3$Zwh$wM[mysql_native_password
3479 /
tcp
-2096652808 | 2025-03-10T08:44:56.247084
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
3549 /
tcp
-1399940268 | 2025-03-21T03:11:25.341035
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3550 /
tcp
-2089734047 | 2025-02-25T12:41:40.110418
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
198844676 | 2025-03-04T22:59:38.197944
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
1282941221 | 2025-03-13T23:10:42.976565
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
3780 /
tcp
2087396567 | 2025-02-24T02:52:59.058223
kjnkjabhbanc283ubcsbhdc72
3791 /
tcp
1911457608 | 2025-03-20T06:52:13.933003
\x00[\x00\x00\x00\x00\x00\x00
-1960639992 | 2025-03-22T12:00:55.120051
HTTP/1.1 401 Unauthorized
4022 /
tcp
-1730858130 | 2025-03-16T20:13:43.498270
RFB 003.008
VNC:
Protocol Version: 3.8
4023 /
tcp
2098371729 | 2025-03-20T03:21:51.347764
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
4043 /
tcp
-1730858130 | 2025-03-14T22:42:24.166880
RFB 003.008
VNC:
Protocol Version: 3.8
4063 /
tcp
819727972 | 2025-03-20T16:33:18.773625
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4064 /
tcp
165188539 | 2025-03-21T14:04:16.260879
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
4120 /
tcp
632542934 | 2025-03-08T21:21:24.352278
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
4150 /
tcp
165188539 | 2025-03-20T01:18:39.586879
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
4157 /
tcp
2087396567 | 2025-03-20T10:56:51.849162
kjnkjabhbanc283ubcsbhdc72
4159 /
tcp
165188539 | 2025-03-14T03:42:06.764193
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
302222687 | 2025-03-18T16:57:53.461430
HTTP/1.1 301 Moved Permanently
Server: Apache/2.4.41 (Unix) OpenSSL/1.1.1d TST PHP/7.3.11
Content-Type: text/plain; charset=utf-8
Connection: close
-2107996212 | 2025-02-26T09:18:56.887130
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
4282 /
tcp
-1036370807 | 2025-03-21T13:45:44.832533
4321 /
tcp
-1250504565 | 2025-03-18T01:16:18.948771
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x80\x00\x04\x00\x01\x00\x00\x00\x05\x00\xff\xff\xff\x00\x00\x04\x08\x00\x00\x00\x00\x00\x7f\xff\x00\x00\x00\x00\x08\x07\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01
4369 /
tcp
-2017887953 | 2025-03-17T00:43:59.873577
SSH-2.0-OpenSSH_7.9
Vulnerabilities
4400 /
tcp
-1399940268 | 2025-03-17T04:42:49.156322
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4433 /
tcp
171352214 | 2025-03-20T13:30:44.011815
-ERR client ip is not in whitelist
4434 /
tcp
2087396567 | 2025-03-22T12:34:38.308244
kjnkjabhbanc283ubcsbhdc72
4463 /
tcp
-1059554316 | 2025-03-16T07:09:13.598700
\xc2\xa5A\x00\x01\x00\x00\x00,\x00\x00\x00\x02\x00\x00\x00L\x00\x00\x00\x08Connect\x00\x00\x00\x00x\x00\x00\x00\x0857222\x00\x00\x00
4500 /
tcp
-784071826 | 2025-03-06T15:25:46.107057
SSH-2.0-OpenSSH_8.0
Vulnerabilities
-2107996212 | 2025-03-14T14:14:25.682805
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
4531 /
tcp
-792826324 | 2025-03-08T22:16:15.188938
220 FTP server ready - login please
4550 /
tcp
-585940771 | 2025-03-04T10:31:35.462653
4643 /
tcp
-1399940268 | 2025-03-13T21:36:44.682125
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4786 /
tcp
-2089734047 | 2025-03-21T19:53:35.443924
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
4840 /
tcp
-1399940268 | 2025-03-14T21:56:07.168642
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4899 /
tcp
550048729 | 2025-02-27T14:14:16.447263
4911 /
tcp
165188539 | 2025-03-06T11:54:06.027672
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
4949 /
tcp
2032042134 | 2025-02-23T17:55:27.978970
5004 /
tcp
1911457608 | 2025-03-05T07:30:54.453698
\x00[\x00\x00\x00\x00\x00\x00
5006 /
tcp
-454087041 | 2025-03-21T02:52:25.154995
\x1e\xc3\x80\x010\x02\x00\xc2\xa8\xc3\xa3\x00\x00\x00\x00
-1122307493 | 2025-03-15T23:31:23.777824
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae1ed0_xz202_38367-12424
5010 /
tcp
819727972 | 2025-03-14T00:04:53.611448
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5053 /
tcp
1911457608 | 2025-03-21T06:56:35.739340
\x00[\x00\x00\x00\x00\x00\x00
5083 /
tcp
-2089734047 | 2025-03-15T20:47:49.655008
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
5090 /
tcp
1911457608 | 2025-02-22T10:47:04.754421
\x00[\x00\x00\x00\x00\x00\x00
5160 /
tcp
-784071826 | 2025-03-06T18:48:11.652789
SSH-2.0-OpenSSH_8.0
Vulnerabilities
5172 /
tcp
-1730858130 | 2025-03-17T23:13:58.035610
RFB 003.008
VNC:
Protocol Version: 3.8
-1056270173 | 2025-03-16T19:06:43.983594
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
5209 /
tcp
-1888448627 | 2025-03-19T05:53:29.989793
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
-1249500036 | 2025-02-26T17:40:27.319608
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html
Connection: keep-alive
Accept-Ranges: bytes
5226 /
tcp
819727972 | 2025-03-17T05:30:03.439719
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5235 /
tcp
-1114821551 | 2025-03-04T21:22:27.838505
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
2143387245 | 2025-03-14T21:06:00.165161
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
5251 /
tcp
-1399940268 | 2025-03-14T15:09:18.259730
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5266 /
tcp
-2089734047 | 2025-02-22T10:22:26.777133
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
-1854630806 | 2025-02-21T17:09:02.270576
HTTP/1.1 400 Bad Request
Server: CWAP-waf
Content-Type: text/html
Connection: close
WZWS-RAY: 1249-1705937491.237-w-waf01tjgt
5277 /
tcp
-1327660293 | 2025-03-11T11:13:38.366144
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
5278 /
tcp
1911457608 | 2025-03-22T18:44:55.077056
\x00[\x00\x00\x00\x00\x00\x00
5400 /
tcp
-1399940268 | 2025-03-06T22:47:10.617968
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5433 /
tcp
-358801646 | 2025-03-20T05:13:50.045034
5494 /
tcp
1919228981 | 2025-03-16T06:34:26.426938
\x00\x1e\x00\x06\xc2\x81\xc2\x85\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
1023953321 | 2025-03-20T19:29:06.683852
HTTP/1.0 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm="proxy"
Connection: close
Content-type: text/html; charset=utf-8
5556 /
tcp
-2089734047 | 2025-03-19T09:05:06.845963
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
5567 /
tcp
-1487943323 | 2025-02-27T01:13:46.764700
431 Unable to negotiate secure command connection.\r\n
5620 /
tcp
819727972 | 2025-03-09T19:17:02.585677
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5630 /
tcp
-891714208 | 2025-03-09T10:07:09.901845
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
5672 /
tcp
575925250 | 2025-03-22T05:05:20.038150
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
5696 /
tcp
-1399940268 | 2025-03-04T22:14:07.084044
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5858 /
tcp
-971970408 | 2025-02-21T19:18:04.111305
1396488228 | 2025-03-17T22:35:26.958297
HTTP/1.1 200 OK
Content-Length: 2037
Cache-Control: private, max-age=300
Content-Type: text/html
5908 /
tcp
-1538260461 | 2025-02-25T03:46:11.073697
5913 /
tcp
-2031152423 | 2025-03-05T11:08:52.685240
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
-1249500036 | 2025-03-18T15:22:46.168640
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html
Connection: keep-alive
Accept-Ranges: bytes
-1013082686 | 2025-03-17T08:54:51.197395
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
1999272906 | 2025-03-19T21:47:12.673013
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
-912876292 | 2025-03-10T22:41:08.803783
HTTP/1.1 503 Service Unavailable
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 13-298599-0 0NNN RT(1699908785717 9) q(0 -1 -1 -1) r(0 -1)
5991 /
tcp
-1795027372 | 2025-03-22T18:32:23.515570
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
5995 /
tcp
321971019 | 2025-03-09T13:55:41.985685
-ERR client ip is not in whitelist\r
6000 /
tcp
120534451 | 2025-03-21T14:58:42.108445
6001 /
tcp
-1399940268 | 2025-02-25T14:10:14.807059
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6002 /
tcp
1412519768 | 2025-03-14T19:21:41.367296
"AP0F1D85"
Connection: close
<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD>
<BODY BGCOLOR
6005 /
tcp
-358801646 | 2025-03-10T03:52:06.065046
1623449421 | 2025-03-05T17:10:29.003639
HTTP/1.1 200 OK
Server: nginx/1.12.2
Content-Type: text/html
Accept-Ranges: bytes
Connection: Keep-alive
Via: 1.1 ID-1716635744544672 uproxy-9
6036 /
tcp
1948301213 | 2025-03-10T07:12:20.762287
RFB 003.003
VNC:
Protocol Version: 3.3
6161 /
tcp
1615193817 | 2025-03-17T20:52:24.664735
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
6348 /
tcp
-1327660293 | 2025-03-21T03:40:10.569017
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
6379 /
tcp
321971019 | 2025-03-10T12:26:04.890134
-ERR client ip is not in whitelist\r
6443 /
tcp
-1810987450 | 2025-03-06T14:30:47.182063
6505 /
tcp
819727972 | 2025-03-18T21:57:18.442658
SSH-2.0-OpenSSH_7.4
Vulnerabilities
6544 /
tcp
2063598737 | 2025-03-04T10:09:00.791107
-1056270173 | 2025-03-15T19:27:58.932854
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
6600 /
tcp
-2089734047 | 2025-03-07T16:34:26.395417
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
6603 /
tcp
51259122 | 2025-03-01T01:15:41.266384
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
6605 /
tcp
1208318993 | 2025-02-28T08:35:50.814966
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
6622 /
tcp
-1399940268 | 2025-02-21T06:07:09.919164
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6633 /
tcp
-1375131644 | 2025-03-17T15:08:29.534930
\x00[v\xc3\xbdC\x7f\x00\x00
6653 /
tcp
1991883981 | 2025-02-28T02:41:52.273834
B\x00\x00\x00\xc3\xbfn\x04Too many connections
6666 /
tcp
-63576005 | 2025-02-26T15:54:34.489763
\\x00\\x0e@\\xbdT\\xa7\\xd0f(*\\xd4\\x00\\x00\\x00\\x00\\x00
6667 /
tcp
-971970408 | 2025-03-22T04:20:05.049793
6668 /
tcp
-1428621233 | 2025-03-05T02:46:34.363713
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
6688 /
tcp
-653033013 | 2025-02-26T05:35:45.401270
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
-1045760528 | 2025-03-06T08:55:19.917383
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
1265582946 | 2025-02-27T18:58:37.758493
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae2838_PS-JJN-01GM465_27752-26327
7011 /
tcp
-653033013 | 2025-03-11T08:26:39.994796
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
7014 /
tcp
-653033013 | 2025-03-22T21:50:41.395750
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
7050 /
tcp
-653033013 | 2025-03-10T20:00:09.470993
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
572436013 | 2025-03-16T07:20:57.790041
HTTP/1.1 404 Not Found
Content-Type: text/plain
7071 /
tcp
2087396567 | 2025-03-10T16:59:31.969019
kjnkjabhbanc283ubcsbhdc72
7081 /
tcp
-1399940268 | 2025-03-06T11:47:18.625597
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7087 /
tcp
-1888448627 | 2025-03-22T17:53:31.550141
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
7171 /
tcp
-1888448627 | 2025-03-18T03:21:14.223874
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
7218 /
tcp
819727972 | 2025-03-16T03:02:02.760992
SSH-2.0-OpenSSH_7.4
Vulnerabilities
7415 /
tcp
51259122 | 2025-03-17T02:52:46.231532
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
7434 /
tcp
291723434 | 2025-02-24T12:04:46.202940
Lantronix MSS100 Version V118/523(045538937)
Type HELP at the 'Local_61349> ' prompt for assistance.
Username>
1342763855 | 2025-03-17T09:33:31.096021
HTTP/1.1 302 Moved Temporarily
Content-Type: text/html
Connection: close
Server: Nginx
Expires: 0
Pragma: no-cache
Cache-Control: no-cache
X-LANG: 1
X-Timezone: 0800
X-Timestamp: 1705912071
X-Arch: x86
X-Sysbit: x64
X-Enterprise: 0
X-Support-i18n: 0
X-Support-wifi: 0
Location: /login
7548 /
tcp
-1026951088 | 2025-03-20T18:42:37.231971
7603 /
tcp
-1399940268 | 2025-03-10T08:27:01.511141
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1839934832 | 2025-03-21T03:24:02.387626
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
-1249500036 | 2025-02-21T21:26:23.946124
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html
Connection: keep-alive
Accept-Ranges: bytes
7771 /
tcp
1308377066 | 2025-03-17T19:01:59.835005
7773 /
tcp
-2140303521 | 2025-03-12T06:32:24.795961
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected\n
1391945995 | 2025-03-15T07:13:17.639588
HTTP/1.1 403 Forbidden
Content-Type: text/plain; charset=utf-8
Proxy-Authenticate: Basic realm=""
7878 /
tcp
1623746877 | 2025-02-28T13:26:01.797510
500 Permission denied - closing connection.\r\n
8000 /
tcp
-1204391172 | 2025-03-16T05:45:26.331632
2103111368 | 2025-03-10T19:06:15.443978
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
8003 /
tcp
-1810987450 | 2025-03-20T00:44:44.052016
8009 /
tcp
-1248408558 | 2025-03-09T20:03:50.304754
220 MikroTik FTP server (MikroTik 6.44.3) ready
8029 /
tcp
-1399940268 | 2025-03-19T20:06:23.203671
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2059642140 | 2025-03-05T03:21:44.411158
HTTP/1.1 503 Service Unavailable
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 56-52314072-0 0NNN RT(1700786708752 0) q(0 -1 -1 -1) r(0 -1)
8048 /
tcp
-585940771 | 2025-03-09T14:21:59.434358
8051 /
tcp
819727972 | 2025-03-18T15:58:53.832252
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8052 /
tcp
-1327660293 | 2025-03-21T20:18:26.086835
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
8057 /
tcp
819727972 | 2025-03-05T21:53:54.731812
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8059 /
tcp
819727972 | 2025-03-11T04:37:36.782711
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8062 /
tcp
2098371729 | 2025-03-16T06:17:05.029755
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
8065 /
tcp
-1329831334 | 2025-03-13T01:27:08.536517
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
1077013874 | 2025-02-25T22:01:32.248958
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
8068 /
tcp
921225407 | 2025-03-09T08:41:15.569712
\x00\x00\x00\x04\x00\x00\x00\x00\x00
8073 /
tcp
-345718689 | 2025-02-23T20:20:06.715675
8078 /
tcp
-1399940268 | 2025-03-11T12:15:40.768780
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8079 /
tcp
165188539 | 2025-02-23T09:47:17.058412
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8081 /
tcp
-1990350878 | 2025-03-21T15:59:36.897230
8084 /
tcp
-1888448627 | 2025-03-07T02:31:22.747915
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8085 /
tcp
-1189269828 | 2025-03-17T07:27:07.761873
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8087 /
tcp
-441419608 | 2025-03-16T00:29:39.974214
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
8101 /
tcp
1911457608 | 2025-03-22T21:22:33.875681
\x00[\x00\x00\x00\x00\x00\x00
8113 /
tcp
-1399940268 | 2025-02-24T01:00:50.138213
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8115 /
tcp
-1399940268 | 2025-03-04T04:07:37.817090
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8119 /
tcp
-1327660293 | 2025-02-26T22:40:05.279575
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
0 | 2025-03-15T23:01:44.774147
HTTP/1.1 408 Request Timeout
Content-Length: 0
8126 /
tcp
171352214 | 2025-03-18T16:56:39.947154
-ERR client ip is not in whitelist
8131 /
tcp
740837454 | 2025-03-13T13:52:37.019037
SSH-2.0-OpenSSH_5.3
Vulnerabilities
8133 /
tcp
819727972 | 2025-03-20T06:17:25.582970
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8137 /
tcp
1492413928 | 2025-02-28T15:58:33.489135
SSH-2.0-OpenSSH_7.5
Vulnerabilities
8138 /
tcp
1208318993 | 2025-03-14T04:36:55.318269
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
8139 /
tcp
740837454 | 2025-03-18T14:03:47.778557
SSH-2.0-OpenSSH_5.3
Vulnerabilities
8140 /
tcp
2087396567 | 2025-03-20T16:41:42.326431
kjnkjabhbanc283ubcsbhdc72
8141 /
tcp
1911457608 | 2025-03-09T18:41:52.543286
\x00[\x00\x00\x00\x00\x00\x00
8143 /
tcp
1911457608 | 2025-03-20T06:18:27.874586
\x00[\x00\x00\x00\x00\x00\x00
8147 /
tcp
-2089734047 | 2025-02-25T16:46:40.138645
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8157 /
tcp
740837454 | 2025-03-10T23:34:23.297722
SSH-2.0-OpenSSH_5.3
Vulnerabilities
8159 /
tcp
-1399940268 | 2025-02-23T10:11:05.523036
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8160 /
tcp
-1399940268 | 2025-03-20T05:42:16.408213
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1902426733 | 2025-03-21T02:08:27.753259
HTTP/1.1 200 OK
Connection: Keep-Alive
Content-Type: text/html
Expires: 0
8181 /
tcp
2087396567 | 2025-03-20T12:51:13.498754
kjnkjabhbanc283ubcsbhdc72
8189 /
tcp
-1730858130 | 2025-03-09T10:05:34.530575
RFB 003.008
VNC:
Protocol Version: 3.8
8193 /
tcp
1911457608 | 2025-03-19T09:53:27.265801
\x00[\x00\x00\x00\x00\x00\x00
8199 /
tcp
-1888448627 | 2025-02-25T14:50:25.262976
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8200 /
tcp
-877598700 | 2025-03-15T22:29:12.285597
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\\x01\xc3\xbf\xc3\xbb\\x03\xc3\xbf\xc3\xbd\\x01\xc3\xbf\xc3\xbe\\x01Username:
8230 /
tcp
1989907056 | 2025-03-14T07:47:55.199006
RTSP/1.0 453 Not Enough Bandwidth\r\nServer: AirTunes/7l_wZ\r\n\r\n
8280 /
tcp
-585940771 | 2025-02-21T07:26:06.447050
8291 /
tcp
-2096652808 | 2025-03-17T06:03:00.757388
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8318 /
tcp
-339084706 | 2025-02-26T12:37:41.495216
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
-1729028106 | 2025-03-19T13:29:14.596522
HTTP/1.1 401 Unauthorized
Content-Type: text/html
Server: Microsoft-IIS/10.0
8350 /
tcp
-1428621233 | 2025-03-15T21:03:29.251089
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
8401 /
tcp
1911457608 | 2025-02-24T05:55:08.861006
\x00[\x00\x00\x00\x00\x00\x00
8403 /
tcp
-2089734047 | 2025-03-04T10:54:37.494912
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8407 /
tcp
-585940771 | 2025-03-10T00:47:06.514507
8408 /
tcp
819727972 | 2025-03-20T23:07:04.425665
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8442 /
tcp
-358801646 | 2025-03-16T04:43:57.444512
1096654864 | 2025-03-14T19:17:15.256678
HTTP/1.0 200 OK
Server: httpd/2.0
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
Content-Type: text/html
Connection: close
8449 /
tcp
-1399940268 | 2025-03-22T14:28:17.403249
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8451 /
tcp
-1297953727 | 2025-03-15T21:06:07.554242
\x02\x00\x00\x00\x00\x00\x06\x04\x00\x00\x00\x00\x00\x0c\x00\x00\n0\x00\x1c
8452 /
tcp
-1032713145 | 2025-03-09T18:33:34.849383
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
8484 /
tcp
-1476017887 | 2025-02-26T10:36:14.818985
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
1929293267 | 2025-03-14T14:50:33.409159
HTTP/1.1 404 Not Found
Server: nginx
Content-Type: text/html; charset=utf-8
Connection: keep-alive
8543 /
tcp
205347087 | 2025-03-19T01:14:01.825078
SSH-25453-Cisco-3524665.35\n
8545 /
tcp
-2096652808 | 2025-03-19T05:07:33.260724
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8554 /
tcp
-10442315 | 2025-03-08T11:53:19.515632
8557 /
tcp
1911457608 | 2025-03-16T23:55:34.718507
\x00[\x00\x00\x00\x00\x00\x00
8570 /
tcp
937756010 | 2025-02-23T01:44:43.470933
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x01\x00\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8571 /
tcp
-1888448627 | 2025-03-09T23:55:17.436759
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8575 /
tcp
-303199180 | 2025-03-18T22:18:07.141735
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
8578 /
tcp
669849225 | 2025-03-12T03:18:27.303544
SSH-98.60-SysaxSSH_81885..42\r\n
8580 /
tcp
-1032713145 | 2025-03-10T19:43:46.917259
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
-1013082686 | 2025-03-20T03:17:23.372214
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
8598 /
tcp
-2031152423 | 2025-02-26T09:41:05.259070
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
8621 /
tcp
632542934 | 2025-03-19T13:05:30.474748
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
8622 /
tcp
1911457608 | 2025-03-18T11:00:27.231892
\x00[\x00\x00\x00\x00\x00\x00
8630 /
tcp
671605376 | 2025-02-21T17:30:03.936979
8649 /
tcp
842535728 | 2025-03-19T12:59:46.161654
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>
A<!DOCTYPE GANGLIA_XML [
<!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...
-1045760528 | 2025-02-25T22:44:32.419527
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
8701 /
tcp
-213539783 | 2025-03-16T01:07:41.222324
<\\x03\\x03\\x00/ HTTP/1.1\\x00\\x10.4 VIKING\\x01\\x00\\x01\\x00\\x00\\x07 _\\x97H\\x00\\x00\\x00\\x04 A\\x98\\x00 x\\xd10\\x00\\x00\\x00\\x01 A\\x93\\x80\\x00\\x00\\x00\n
8703 /
tcp
1492413928 | 2025-02-21T15:44:00.684075
SSH-2.0-OpenSSH_7.5
Vulnerabilities
8706 /
tcp
1911457608 | 2025-03-19T16:51:23.270064
\x00[\x00\x00\x00\x00\x00\x00
8728 /
tcp
51259122 | 2025-03-06T07:56:08.479195
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
8767 /
tcp
1948301213 | 2025-03-04T01:15:50.058655
RFB 003.003
VNC:
Protocol Version: 3.3
1077013874 | 2025-03-11T13:09:27.910249
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
8788 /
tcp
50497985 | 2025-03-15T07:50:28.759868
\x00[\xc3\x88\xc3\x9dS\x7f\x00\x00
8816 /
tcp
1911457608 | 2025-03-07T09:34:40.311677
\x00[\x00\x00\x00\x00\x00\x00
8819 /
tcp
-358801646 | 2025-03-18T07:22:45.871853
8826 /
tcp
819727972 | 2025-03-01T01:39:48.786007
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8827 /
tcp
-1399940268 | 2025-03-13T06:30:45.391813
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8833 /
tcp
321971019 | 2025-03-17T07:10:48.627858
-ERR client ip is not in whitelist\r
8834 /
tcp
-1189269828 | 2025-02-21T18:33:08.281356
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8837 /
tcp
165188539 | 2025-02-24T23:02:59.761446
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8842 /
tcp
1911457608 | 2025-02-28T17:51:45.689254
\x00[\x00\x00\x00\x00\x00\x00
8854 /
tcp
-1399940268 | 2025-02-23T11:18:28.960230
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8864 /
tcp
-1641514916 | 2025-03-21T09:35:09.137724
* OK Merak 1dFUa2 IMAP4rev1
8866 /
tcp
-2089734047 | 2025-03-22T18:30:52.591900
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8867 /
tcp
-2089734047 | 2025-03-10T22:29:05.543623
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8868 /
tcp
-1399940268 | 2025-03-18T22:37:41.014760
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8871 /
tcp
-2096652808 | 2025-03-12T16:51:02.162017
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8875 /
tcp
-1477838366 | 2025-03-06T05:24:10.424448
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
8878 /
tcp
580340387 | 2025-02-27T08:44:58.659118
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
8880 /
tcp
2087396567 | 2025-03-16T04:13:54.559259
kjnkjabhbanc283ubcsbhdc72
8883 /
tcp
-1399940268 | 2025-03-20T22:19:41.687338
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8884 /
tcp
-1888448627 | 2025-03-11T14:49:07.385001
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8891 /
tcp
1911457608 | 2025-02-28T05:01:58.767654
\x00[\x00\x00\x00\x00\x00\x00
8902 /
tcp
117101543 | 2025-03-21T20:57:23.723668
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
8905 /
tcp
-1114821551 | 2025-02-22T11:01:43.278479
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
8906 /
tcp
321971019 | 2025-03-09T20:10:34.749161
-ERR client ip is not in whitelist\r
8943 /
tcp
1655023012 | 2025-03-09T06:12:53.025202
athinfod: invalid query.\n
8969 /
tcp
820958131 | 2025-03-15T06:04:40.648071
kjnkjabhbanc283ubcsbhdc72\x02
8999 /
tcp
410249975 | 2025-03-18T21:45:57.136878
9000 /
tcp
-2067028711 | 2025-03-18T18:47:34.948705
\x15\x03\x01\x00\x02\x02F
9002 /
tcp
-971970408 | 2025-02-25T19:40:37.573590
9005 /
tcp
-1139539254 | 2025-03-06T11:58:03.314105
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
9006 /
tcp
1632932802 | 2025-02-22T04:17:06.606977
9008 /
tcp
580340387 | 2025-03-05T03:07:20.314840
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
9011 /
tcp
-1810987450 | 2025-03-07T08:20:39.927000
9018 /
tcp
707919486 | 2025-03-22T13:11:27.906325
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
9021 /
tcp
-2096652808 | 2025-02-24T12:12:31.174761
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
9025 /
tcp
819727972 | 2025-02-24T08:58:22.203198
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9030 /
tcp
-1399940268 | 2025-03-11T10:56:01.086044
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9035 /
tcp
819727972 | 2025-03-21T08:41:40.738342
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9042 /
tcp
-1023516719 | 2025-03-20T15:43:22.430382
ã
KvInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
9048 /
tcp
1763259671 | 2025-03-21T20:42:43.399734
{\n"Version": "3.4.18",\n"VersionArray": [\n3,\n4,\n18,\n0\n],\n"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",\n"OpenSSLVersion": "",\n"SysInfo": "",\n"Bits": 64,\n"Debug": false,\n"MaxObjectSize": 16777216\n}\n\n
-1839934832 | 2025-03-15T22:43:44.226268
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
9058 /
tcp
819727972 | 2025-03-08T12:34:59.987310
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9065 /
tcp
-1399940268 | 2025-02-24T23:49:16.081524
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1056270173 | 2025-02-24T23:33:10.442199
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
9076 /
tcp
671605376 | 2025-03-20T15:37:45.763555
9079 /
tcp
-358801646 | 2025-03-14T03:15:04.564141
9085 /
tcp
-1399940268 | 2025-03-18T09:10:01.966658
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9091 /
tcp
-971970408 | 2025-03-20T19:07:30.940189
9092 /
tcp
819727972 | 2025-03-16T17:12:51.366091
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9093 /
tcp
1911457608 | 2025-02-23T11:53:29.129776
\x00[\x00\x00\x00\x00\x00\x00
9095 /
tcp
2087396567 | 2025-03-21T22:24:14.686169
kjnkjabhbanc283ubcsbhdc72
9100 /
tcp
820958131 | 2025-03-09T20:05:29.209563
kjnkjabhbanc283ubcsbhdc72\x02
9105 /
tcp
493955023 | 2025-03-03T18:23:18.955666
\x00\x00\x0c\x04\x00\x00\x00\x00\x00\x00\x04\x00\x10\x00\x00\x00\n0\x05\x00\x00@\x00
9112 /
tcp
1911457608 | 2025-03-07T13:28:32.966320
\x00[\x00\x00\x00\x00\x00\x00
9122 /
tcp
165188539 | 2025-03-20T09:49:57.462672
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
9123 /
tcp
165188539 | 2025-02-28T00:27:45.462302
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
9131 /
tcp
-653033013 | 2025-03-10T07:36:21.793055
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
9134 /
tcp
-2089734047 | 2025-03-11T22:24:58.942935
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9137 /
tcp
-2017887953 | 2025-03-10T12:56:06.818492
SSH-2.0-OpenSSH_7.9
Vulnerabilities
-2107996212 | 2025-03-04T10:56:31.472753
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
9151 /
tcp
-1399940268 | 2025-03-06T11:44:07.041950
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9160 /
tcp
-438503381 | 2025-03-03T21:23:53.793364
WORLD OF WARCRAFT CONNECTION - SERVER TO CLIENT - V2
9166 /
tcp
-1399940268 | 2025-03-11T10:54:50.717684
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9180 /
tcp
632542934 | 2025-02-22T20:19:07.219471
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
9199 /
tcp
398077695 | 2025-03-06T04:35:53.221519
9211 /
tcp
819727972 | 2025-03-09T05:37:27.893914
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9212 /
tcp
819727972 | 2025-03-12T19:47:26.653101
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9215 /
tcp
-992671574 | 2025-03-03T19:23:50.765099
9241 /
tcp
-1730858130 | 2025-02-22T11:06:16.958938
RFB 003.008
VNC:
Protocol Version: 3.8
9242 /
tcp
-1399940268 | 2025-02-25T20:45:09.814965
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9252 /
tcp
-1399940268 | 2025-02-25T11:23:52.639168
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9273 /
tcp
-1888448627 | 2025-03-16T12:23:44.102741
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9303 /
tcp
-1538260461 | 2025-03-10T05:05:48.406088
9306 /
tcp
-1099385124 | 2025-03-19T08:04:17.493174
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
9312 /
tcp
-1279886438 | 2025-03-15T04:01:09.749176
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
9333 /
tcp
-1279886438 | 2025-03-19T11:57:40.224149
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
9410 /
tcp
321971019 | 2025-03-09T20:16:27.977889
-ERR client ip is not in whitelist\r
1909672637 | 2025-02-27T18:25:54.079471
HTTP/1.1 400 Bad Request
Content-Type: text/plain; charset=utf-8
Sec-Websocket-Version: 13
X-Content-Type-Options: nosniff
9433 /
tcp
-407828767 | 2025-03-19T00:55:54.863464
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
9447 /
tcp
1762042191 | 2025-03-06T04:31:58.735439
9455 /
tcp
-1032713145 | 2025-02-27T18:11:26.581648
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
9465 /
tcp
-1399940268 | 2025-03-04T01:10:45.779117
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9505 /
tcp
-1888448627 | 2025-03-07T18:14:06.074475
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9529 /
tcp
-1810987450 | 2025-02-26T20:14:22.207895
9530 /
tcp
819727972 | 2025-03-12T12:59:22.989296
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-2118655245 | 2025-02-21T05:48:14.360406
HTTP/1.0 500 Internal Server Error
Content-Length: 20
9600 /
tcp
-136006866 | 2025-03-17T12:18:21.492515
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
9611 /
tcp
921225407 | 2025-02-24T16:11:53.874693
\x00\x00\x00\x04\x00\x00\x00\x00\x00
9633 /
tcp
-321444299 | 2025-03-22T03:26:14.242137
:dircproxy NOTICE AUTH :Looking up your hostname...
:dircproxy NOTICE AUTH :Got your hostname.
9704 /
tcp
-1261090339 | 2025-03-11T19:34:32.104542
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
9761 /
tcp
819727972 | 2025-03-22T01:05:24.955891
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9797 /
tcp
-1399940268 | 2025-03-11T15:36:14.663899
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9802 /
tcp
-653033013 | 2025-03-12T04:10:21.577680
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
-2118655245 | 2025-03-22T07:05:32.786921
HTTP/1.0 500 Internal Server Error
Content-Length: 20
-255236012 | 2025-03-15T09:59:24.586337
HTTP/1.1 302
X-Frame-Options: SAMEORIGIN
9888 /
tcp
321971019 | 2025-02-24T07:45:34.969621
-ERR client ip is not in whitelist\r
1320285193 | 2025-03-08T18:59:12.486443
HTTP/1.1 404 Not Found
Server: CloudWAF
Content-Type: text/html
Connection: keep-alive
492642197 | 2025-03-05T20:14:45.060534
HTTP/1.1 404 Not Found
Content-Type: text/plain; charset=utf-8
Via: 1.1 google
Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
X-Non-Compliaence: CK6u06Vu4
9909 /
tcp
-1399940268 | 2025-02-25T23:33:17.810006
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9916 /
tcp
819727972 | 2025-03-11T05:20:49.448773
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9923 /
tcp
-1399940268 | 2025-03-12T04:57:17.768260
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9929 /
tcp
-1399940268 | 2025-03-10T04:34:34.240993
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9944 /
tcp
-971970408 | 2025-03-18T06:19:12.126695
9955 /
tcp
921225407 | 2025-03-11T06:52:32.983634
\x00\x00\x00\x04\x00\x00\x00\x00\x00
9977 /
tcp
709622286 | 2025-03-14T08:37:51.024989
OK Welcome <299685> on DirectUpdate server 7286\r\n
-696402907 | 2025-03-14T23:58:50.595772
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae298c_PS-HIA-01Q7y203_55153-4321
9999 /
tcp
1161309183 | 2025-03-20T05:13:24.870451
10000 /
tcp
104385780 | 2025-03-11T18:27:05.514467
-1839934832 | 2025-02-21T02:24:31.042922
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
10010 /
tcp
-1810987450 | 2025-02-25T22:13:38.554101
10011 /
tcp
740837454 | 2025-03-11T02:28:47.549177
SSH-2.0-OpenSSH_5.3
Vulnerabilities
10021 /
tcp
-1399940268 | 2025-03-20T16:43:31.081453
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10022 /
tcp
819727972 | 2025-03-05T16:07:09.901084
SSH-2.0-OpenSSH_7.4
Vulnerabilities
10026 /
tcp
-457235091 | 2025-03-21T06:58:36.979586
audio 0 RTP/AVP 18 4 3 8 0 101\r\na
10033 /
tcp
-1279886438 | 2025-03-17T17:50:59.762318
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
10036 /
tcp
-1810987450 | 2025-02-26T11:26:57.028053
10046 /
tcp
1911457608 | 2025-03-19T01:53:18.459098
\x00[\x00\x00\x00\x00\x00\x00
10048 /
tcp
1911457608 | 2025-02-24T14:05:48.242030
\x00[\x00\x00\x00\x00\x00\x00
10050 /
tcp
-441419608 | 2025-03-12T13:03:59.770099
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
10051 /
tcp
2087396567 | 2025-03-14T15:57:29.708443
kjnkjabhbanc283ubcsbhdc72
-1045760528 | 2025-03-22T17:19:41.073633
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
10087 /
tcp
1911457608 | 2025-03-16T17:07:38.185712
\x00[\x00\x00\x00\x00\x00\x00
10089 /
tcp
1363464823 | 2025-03-08T14:45:56.270943
10134 /
tcp
-832380282 | 2025-03-05T16:29:51.032855
lpd [@Boyk]: Print-services are not available to your host (aF2qXkQ2m).\n
10225 /
tcp
-904840257 | 2025-03-20T23:48:24.307223
572 Relay not authorized\r\n
10240 /
tcp
-1399940268 | 2025-02-21T17:12:49.722188
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10250 /
tcp
2087396567 | 2025-02-27T21:13:04.432503
kjnkjabhbanc283ubcsbhdc72
10348 /
tcp
639175818 | 2025-02-23T22:54:42.541635
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
10399 /
tcp
-1399940268 | 2025-03-12T18:30:03.410841
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10443 /
tcp
-971970408 | 2025-03-10T15:05:23.003762
10533 /
tcp
819727972 | 2025-02-27T21:59:07.843477
SSH-2.0-OpenSSH_7.4
Vulnerabilities
10554 /
tcp
171352214 | 2025-03-19T00:41:33.743797
-ERR client ip is not in whitelist
-1045760528 | 2025-03-21T12:20:47.864709
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
10911 /
tcp
632542934 | 2025-03-04T06:34:20.974576
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
11000 /
tcp
-1730858130 | 2025-02-27T07:00:49.703321
RFB 003.008
VNC:
Protocol Version: 3.8
11112 /
tcp
-784071826 | 2025-03-07T17:29:49.947150
SSH-2.0-OpenSSH_8.0
Vulnerabilities
11210 /
tcp
819727972 | 2025-03-17T23:40:40.266748
SSH-2.0-OpenSSH_7.4
Vulnerabilities
11211 /
tcp
-136006866 | 2025-02-25T12:35:32.370376
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
11288 /
tcp
-1888448627 | 2025-03-08T13:00:31.406486
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
-288825733 | 2025-03-18T02:28:13.216189
HTTP/1.1 200 OK
Connection: close
Content-Length: 2619
Accept-Ranges: bytes
Access-Control-Allow-Credentials: true
Access-Control-Allow-Headers: authorization,Content-Type
Access-Control-Allow-Methods: POST, GET, OPTIONS, PUT, HEAD, DELETE
Content-Type: text/html
Server: Jetty(9.4.14.v20181114)
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1
11601 /
tcp
-1399940268 | 2025-03-19T03:11:15.592869
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-446385447 | 2025-03-22T21:48:14.568289
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae1efa_PS-CKG-01vQy48_16235-38870
12056 /
tcp
-1888448627 | 2025-03-20T17:28:17.669717
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12084 /
tcp
-1888448627 | 2025-03-06T03:43:18.825411
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12106 /
tcp
-1399940268 | 2025-03-18T18:51:13.811823
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12107 /
tcp
597764502 | 2025-03-11T09:51:40.084009
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
12114 /
tcp
-375604792 | 2025-03-10T04:06:38.550259
220 Microsoft FTP Service
12115 /
tcp
-2089734047 | 2025-03-17T12:00:21.579583
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12125 /
tcp
-1487943323 | 2025-02-21T03:00:41.662894
431 Unable to negotiate secure command connection.\r\n
12128 /
tcp
1911457608 | 2025-03-17T13:59:55.063825
\x00[\x00\x00\x00\x00\x00\x00
12130 /
tcp
-1399940268 | 2025-03-17T07:32:13.372902
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12140 /
tcp
-2089734047 | 2025-03-19T05:40:29.040684
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12146 /
tcp
1519486042 | 2025-02-25T09:10:32.208412
<KU_goodbye>Protocol Error: XML data is not well-formed.</KU_goodbye>
12152 /
tcp
117101543 | 2025-03-06T02:58:07.008586
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
12157 /
tcp
1911457608 | 2025-03-14T07:48:41.671519
\x00[\x00\x00\x00\x00\x00\x00
12161 /
tcp
-2089734047 | 2025-03-11T03:16:15.304002
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12166 /
tcp
-1399940268 | 2025-03-10T10:58:24.662857
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12187 /
tcp
1911457608 | 2025-03-20T19:16:16.803718
\x00[\x00\x00\x00\x00\x00\x00
1077013874 | 2025-03-18T15:00:22.037668
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
1077013874 | 2025-02-28T19:25:55.714515
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
12198 /
tcp
819727972 | 2025-02-23T20:29:08.636314
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12203 /
tcp
1911457608 | 2025-03-17T16:14:16.683964
\x00[\x00\x00\x00\x00\x00\x00
12209 /
tcp
-1297953727 | 2025-03-12T11:49:21.004694
\x02\x00\x00\x00\x00\x00\x06\x04\x00\x00\x00\x00\x00\x0c\x00\x00\n0\x00\x1c
12212 /
tcp
575925250 | 2025-03-15T02:17:37.423045
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
12213 /
tcp
1911457608 | 2025-03-09T23:12:35.690456
\x00[\x00\x00\x00\x00\x00\x00
12220 /
tcp
819727972 | 2025-03-10T01:55:34.907664
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12222 /
tcp
707919486 | 2025-03-07T17:39:55.209311
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
12223 /
tcp
-358801646 | 2025-03-09T11:05:55.620382
12228 /
tcp
-2031152423 | 2025-03-15T02:33:24.789473
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
12237 /
tcp
1911457608 | 2025-03-19T22:20:41.775347
\x00[\x00\x00\x00\x00\x00\x00
12238 /
tcp
1911457608 | 2025-03-10T20:50:07.734382
\x00[\x00\x00\x00\x00\x00\x00
1282941221 | 2025-03-14T05:26:45.766651
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
12249 /
tcp
-1399940268 | 2025-03-21T13:47:17.080296
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12252 /
tcp
366084633 | 2025-03-12T17:52:44.886633
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
12253 /
tcp
1911457608 | 2025-03-16T06:01:36.743070
\x00[\x00\x00\x00\x00\x00\x00
12267 /
tcp
1911457608 | 2025-03-13T19:28:30.090512
\x00[\x00\x00\x00\x00\x00\x00
12277 /
tcp
-180163620 | 2025-03-13T06:08:35.883011
NPC Telnet permit one connection.\r\n But One connection() already keep alive.\r\nGood Bye !! \r\n
12280 /
tcp
740837454 | 2025-03-10T20:55:29.264040
SSH-2.0-OpenSSH_5.3
Vulnerabilities
12282 /
tcp
1911457608 | 2025-03-11T00:14:53.989266
\x00[\x00\x00\x00\x00\x00\x00
12300 /
tcp
-1139539254 | 2025-03-11T09:12:55.984796
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
12304 /
tcp
-1435414831 | 2025-03-13T17:29:07.665134
12307 /
tcp
504717326 | 2025-03-16T09:29:35.588669
SSH-2.0-OpenSSH_8.6
Vulnerabilities
12308 /
tcp
1492413928 | 2025-03-11T21:28:54.528304
SSH-2.0-OpenSSH_7.5
Vulnerabilities
12311 /
tcp
-407828767 | 2025-03-18T17:25:12.344420
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
12315 /
tcp
1210754493 | 2025-02-24T02:50:46.862948
0\x0c\x02\x01\x01a\x07\n\x01\x00\x04\x00\x04\x00
-1839934832 | 2025-03-12T12:13:10.521457
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
12327 /
tcp
165188539 | 2025-03-13T07:47:15.778196
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12335 /
tcp
-1399940268 | 2025-03-18T23:12:32.915207
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1748152518 | 2025-03-11T06:38:46.404951
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae26f8_hwt112_4105-46187
12349 /
tcp
-1399940268 | 2025-03-19T13:42:41.034711
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12360 /
tcp
-1888448627 | 2025-02-26T17:29:13.541740
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12362 /
tcp
-1888448627 | 2025-03-05T02:46:32.382555
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12363 /
tcp
-1888448627 | 2025-03-19T23:57:35.107890
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12369 /
tcp
165188539 | 2025-03-12T15:42:42.024667
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12389 /
tcp
-1399940268 | 2025-03-13T19:55:48.206390
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12391 /
tcp
1620329124 | 2025-03-16T02:14:54.435450
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\x01\xc3\xbf\xc3\xbb\x03\xc3\xbf\xc3\xbd\x01\xc3\xbf\xc3\xbe\x01Username:
12402 /
tcp
-904840257 | 2025-03-15T00:36:47.476271
572 Relay not authorized\r\n
12407 /
tcp
-1036370807 | 2025-03-04T12:18:16.866810
12410 /
tcp
819727972 | 2025-02-21T04:13:42.998171
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12412 /
tcp
1975288991 | 2025-03-17T01:46:21.299623
12419 /
tcp
-2080784861 | 2025-03-19T11:59:10.789278
GBPK\xc3\xbb\xc3\xb7n\xc2\x93W\xc2\xaf\xc2\x86\xc2\x93x@\xc2\xa9\x0e\xc3\x8a*\xc2\x9bS\x00
12429 /
tcp
1911457608 | 2025-03-14T09:14:23.952264
\x00[\x00\x00\x00\x00\x00\x00
12452 /
tcp
-1399940268 | 2025-03-21T01:53:54.946911
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12456 /
tcp
-1399940268 | 2025-03-14T10:57:11.248895
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12458 /
tcp
1632932802 | 2025-03-19T19:37:22.252172
12459 /
tcp
165188539 | 2025-02-25T23:11:29.252909
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12465 /
tcp
-358801646 | 2025-03-20T23:16:55.907921
12468 /
tcp
-1996280214 | 2025-03-12T00:14:04.707168
12469 /
tcp
-1996280214 | 2025-03-12T13:37:14.215709
12474 /
tcp
819727972 | 2025-02-26T16:43:09.395330
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12477 /
tcp
921225407 | 2025-02-22T17:36:16.430964
\x00\x00\x00\x04\x00\x00\x00\x00\x00
12479 /
tcp
-1699556818 | 2025-02-22T20:04:56.486192
\x01remshd: Kerberos Authentication not enabled.\n
12481 /
tcp
632542934 | 2025-03-13T16:51:53.290654
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
-288825733 | 2025-02-21T22:05:48.556957
HTTP/1.1 200 OK
Connection: close
Content-Length: 2619
Accept-Ranges: bytes
Access-Control-Allow-Credentials: true
Access-Control-Allow-Headers: authorization,Content-Type
Access-Control-Allow-Methods: POST, GET, OPTIONS, PUT, HEAD, DELETE
Content-Type: text/html
Server: Jetty(9.4.14.v20181114)
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1
12489 /
tcp
-1140468363 | 2025-03-15T00:03:20.514169
12500 /
tcp
1308377066 | 2025-03-17T02:21:27.887089
12501 /
tcp
1504401647 | 2025-03-17T11:08:24.746184
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
12516 /
tcp
321971019 | 2025-03-18T10:22:58.883909
-ERR client ip is not in whitelist\r
12536 /
tcp
1353260875 | 2025-02-24T06:37:52.957144
\x00[g\xc2\x95N\x7f\x00\x00
12537 /
tcp
-1399940268 | 2025-03-12T09:35:27.236999
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12539 /
tcp
1911457608 | 2025-02-27T06:31:13.378945
\x00[\x00\x00\x00\x00\x00\x00
12540 /
tcp
1519486042 | 2025-03-04T07:33:35.947431
<KU_goodbye>Protocol Error: XML data is not well-formed.</KU_goodbye>
12543 /
tcp
1519486042 | 2025-02-23T14:46:18.187836
<KU_goodbye>Protocol Error: XML data is not well-formed.</KU_goodbye>
12547 /
tcp
-1032713145 | 2025-03-12T17:39:02.736455
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
-1839934832 | 2025-02-23T13:49:16.136364
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
12555 /
tcp
599074451 | 2025-02-26T23:48:23.885088
12557 /
tcp
-1399940268 | 2025-03-08T13:15:05.583130
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12565 /
tcp
-1399940268 | 2025-02-26T14:59:47.501555
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12568 /
tcp
-1795027372 | 2025-03-06T07:52:30.913714
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
12570 /
tcp
165188539 | 2025-03-05T15:02:44.404374
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12573 /
tcp
819727972 | 2025-03-04T23:22:58.668501
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1013082686 | 2025-02-27T09:57:59.831740
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
12980 /
tcp
-1399940268 | 2025-03-12T12:58:46.746021
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
13001 /
tcp
-1399940268 | 2025-03-15T03:26:37.526876
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
13082 /
tcp
1632932802 | 2025-02-20T23:44:49.829132
13084 /
tcp
819727972 | 2025-03-09T13:03:55.476238
SSH-2.0-OpenSSH_7.4
Vulnerabilities
13443 /
tcp
-1899074860 | 2025-03-14T22:36:46.167918
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00\x00\x00\n03\x00\x00\x00d\x00\x04\x00\x01\x00\x00\x00\x00\x04\x08\x00\x00\x00\n
14147 /
tcp
632542934 | 2025-03-18T17:04:29.543533
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
14265 /
tcp
-1399940268 | 2025-03-04T02:21:01.425570
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
14330 /
tcp
1911457608 | 2025-03-12T15:53:05.700440
\x00[\x00\x00\x00\x00\x00\x00
14344 /
tcp
-1399940268 | 2025-03-10T20:52:44.944629
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
14401 /
tcp
-1059554316 | 2025-03-20T23:05:56.322656
\xc2\xa5A\x00\x01\x00\x00\x00,\x00\x00\x00\x02\x00\x00\x00L\x00\x00\x00\x08Connect\x00\x00\x00\x00x\x00\x00\x00\x0857222\x00\x00\x00
14443 /
tcp
-303199180 | 2025-03-12T21:30:36.368213
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
15006 /
tcp
-1399940268 | 2025-02-27T20:50:24.978952
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
15044 /
tcp
-1399940268 | 2025-03-20T06:12:19.884247
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
15082 /
tcp
165188539 | 2025-02-24T04:05:58.702463
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
15443 /
tcp
-971970408 | 2025-03-14T05:31:34.196727
15555 /
tcp
819727972 | 2025-03-15T02:34:55.082481
SSH-2.0-OpenSSH_7.4
Vulnerabilities
16015 /
tcp
-1327660293 | 2025-03-21T11:55:51.403111
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
-147424911 | 2025-03-10T07:25:39.238688
HTTP/1.1 404 Not Found
Content Length: 0
16020 /
tcp
-1279886438 | 2025-03-19T06:02:19.098158
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
16029 /
tcp
1911457608 | 2025-03-05T18:20:31.962262
\x00[\x00\x00\x00\x00\x00\x00
16039 /
tcp
-1399940268 | 2025-02-27T09:36:48.694524
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16040 /
tcp
89142341 | 2025-03-05T01:10:59.588103
\x05\x00\x00\x00\x0b\x08\x05\x1a\x00
16060 /
tcp
1126993057 | 2025-02-28T20:54:31.023876
* OK [CAPABILITY a2,M\\] nBwXk2pPP IMAP4rev1 20qx at
16063 /
tcp
-1148066627 | 2025-03-06T10:56:11.166212
\x00[\xc2\x84\xc2\x86\xc3\xb2\x7f\x00\x00
16069 /
tcp
-653033013 | 2025-03-04T23:07:10.736404
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
16076 /
tcp
-653033013 | 2025-03-14T10:48:05.810340
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
16085 /
tcp
1189133115 | 2025-03-21T21:33:33.451869
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
-1013082686 | 2025-03-10T01:07:26.596734
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
16097 /
tcp
1911457608 | 2025-03-17T06:57:48.319782
\x00[\x00\x00\x00\x00\x00\x00
16098 /
tcp
1723769361 | 2025-03-13T10:44:18.846894
ELM Enterprise Manager _l\r\nCopyright \xc2\xa9 18668511-928641920 TNT Software, Inc.\r\n
16400 /
tcp
1543809371 | 2025-03-19T20:38:31.220346
220 corpease.net Anti-spam GT for Coremail System (icmhosting[2\n0181212])
16464 /
tcp
2087396567 | 2025-03-21T00:34:35.490586
kjnkjabhbanc283ubcsbhdc72
-1261053701 | 2025-03-22T17:12:07.636090
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html; charset="UTF-8"
Transfer-Encoding: chunked
Connection: keep-alive
Keep-Alive: timeout=20
Cache-control: no-store
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
16993 /
tcp
1541211644 | 2025-03-21T13:47:48.762479
17084 /
tcp
1208318993 | 2025-02-28T13:20:29.989341
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
17182 /
tcp
-903067560 | 2025-02-26T15:13:10.113560
\x00[\x13)\xc2\x81\x7f\x00\x00
17776 /
tcp
-1399940268 | 2025-03-15T07:45:03.299281
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1839934832 | 2025-02-28T19:48:51.608168
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
18010 /
tcp
103159425 | 2025-03-09T11:14:48.878897
18011 /
tcp
-1036370807 | 2025-03-12T21:41:30.771358
18026 /
tcp
-801484042 | 2025-02-24T17:22:35.641151
18033 /
tcp
1911457608 | 2025-03-12T16:24:32.395249
\x00[\x00\x00\x00\x00\x00\x00
18041 /
tcp
-1399940268 | 2025-03-14T12:03:06.431529
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18051 /
tcp
819727972 | 2025-03-19T08:24:35.636461
SSH-2.0-OpenSSH_7.4
Vulnerabilities
18053 /
tcp
-2089734047 | 2025-03-06T07:35:36.742075
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
18068 /
tcp
-2096652808 | 2025-03-20T13:31:56.871094
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
18070 /
tcp
1911457608 | 2025-02-28T18:24:05.334639
\x00[\x00\x00\x00\x00\x00\x00
18073 /
tcp
-2089734047 | 2025-03-16T22:59:55.540286
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
18074 /
tcp
921225407 | 2025-03-16T11:36:02.206716
\x00\x00\x00\x04\x00\x00\x00\x00\x00
18078 /
tcp
-585940771 | 2025-03-21T08:08:10.053228
18079 /
tcp
-1888448627 | 2025-03-18T21:31:22.148747
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
18080 /
tcp
-1399940268 | 2025-03-13T11:40:26.443807
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18081 /
tcp
-1399940268 | 2025-03-05T00:10:35.218556
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18091 /
tcp
165188539 | 2025-02-26T13:22:11.112802
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
18096 /
tcp
-2017887953 | 2025-03-09T12:19:25.115052
SSH-2.0-OpenSSH_7.9
Vulnerabilities
1873760314 | 2025-03-20T16:56:26.512912
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65a113e0_PSfjfzdx2ol90_17620-16261
18103 /
tcp
321971019 | 2025-03-14T13:16:26.623282
-ERR client ip is not in whitelist\r
18110 /
tcp
-2089734047 | 2025-03-14T14:18:11.893795
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
18200 /
tcp
921225407 | 2025-03-22T07:20:49.403574
\x00\x00\x00\x04\x00\x00\x00\x00\x00
18245 /
tcp
2087396567 | 2025-03-21T19:36:52.979494
kjnkjabhbanc283ubcsbhdc72
18553 /
tcp
1842524259 | 2025-03-14T12:30:15.735672
19000 /
tcp
-1986594217 | 2025-03-06T08:29:04.070474
"AP0F1D85"\r\nConnection: close\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD>\n<BODY BGCOLOR
19016 /
tcp
677934968 | 2025-02-23T04:16:18.663729
19082 /
tcp
-1399940268 | 2025-03-19T18:46:50.980920
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1077013874 | 2025-02-21T07:40:32.417888
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
19930 /
tcp
2087396567 | 2025-03-14T10:42:22.925840
kjnkjabhbanc283ubcsbhdc72
20018 /
tcp
-1399940268 | 2025-03-17T17:41:57.390487
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
20020 /
tcp
321971019 | 2025-03-18T22:38:04.927166
-ERR client ip is not in whitelist\r
20050 /
tcp
-1105333987 | 2025-03-08T19:06:01.447622
20053 /
tcp
-1476017887 | 2025-02-21T12:33:33.791008
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
20060 /
tcp
-2089734047 | 2025-03-09T21:30:57.738897
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
-1230049476 | 2025-03-10T04:05:49.943143
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
20110 /
tcp
-653033013 | 2025-03-22T09:36:20.414109
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
20200 /
tcp
-457235091 | 2025-03-05T07:46:11.280671
audio 0 RTP/AVP 18 4 3 8 0 101\r\na
20256 /
tcp
-1329831334 | 2025-03-11T19:05:31.441414
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
20512 /
tcp
-1795027372 | 2025-03-18T21:51:54.359745
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
20547 /
tcp
819727972 | 2025-03-11T21:57:37.186324
SSH-2.0-OpenSSH_7.4
Vulnerabilities
20600 /
tcp
921225407 | 2025-03-09T22:13:48.851783
\x00\x00\x00\x04\x00\x00\x00\x00\x00
20880 /
tcp
1370263973 | 2025-03-16T17:52:46.500614
20892 /
tcp
-1435414831 | 2025-02-25T08:34:42.022465
21025 /
tcp
1690634669 | 2025-03-19T06:46:39.552193
21230 /
tcp
-1399940268 | 2025-03-21T00:04:51.162972
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21235 /
tcp
-358801646 | 2025-03-14T08:53:14.690857
-1839934832 | 2025-03-19T01:20:50.237233
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
21259 /
tcp
-1139539254 | 2025-03-17T09:22:45.565441
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
21275 /
tcp
1948301213 | 2025-03-19T19:13:15.516519
RFB 003.003
VNC:
Protocol Version: 3.3
21280 /
tcp
-1399940268 | 2025-02-22T18:56:47.148523
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21282 /
tcp
165188539 | 2025-03-11T22:00:56.240724
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
21285 /
tcp
-146605374 | 2025-03-19T15:46:26.384781
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
21293 /
tcp
-1399940268 | 2025-03-11T02:44:20.117501
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21304 /
tcp
-2096652808 | 2025-03-17T23:48:49.440996
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
21324 /
tcp
820958131 | 2025-03-21T00:46:11.144462
kjnkjabhbanc283ubcsbhdc72\x02
21329 /
tcp
-792826324 | 2025-03-05T16:35:25.275886
220 FTP server ready - login please
21379 /
tcp
-2096652808 | 2025-03-10T11:17:36.813056
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
21515 /
tcp
677934968 | 2025-03-14T03:55:54.933689
22084 /
tcp
-585940771 | 2025-03-16T16:02:26.397304
22222 /
tcp
-358801646 | 2025-03-10T09:37:58.291265
22380 /
tcp
-1435414831 | 2025-03-12T00:20:56.129522
22556 /
tcp
1911457608 | 2025-03-22T12:11:45.863089
\x00[\x00\x00\x00\x00\x00\x00
22609 /
tcp
-2089734047 | 2025-03-16T17:11:48.774625
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
22705 /
tcp
740837454 | 2025-03-16T14:31:21.762099
SSH-2.0-OpenSSH_5.3
Vulnerabilities
24181 /
tcp
1911457608 | 2025-03-14T07:15:41.286045
\x00[\x00\x00\x00\x00\x00\x00
24245 /
tcp
-407828767 | 2025-03-14T16:33:26.934984
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
25000 /
tcp
1363464823 | 2025-03-18T21:17:48.965198
25001 /
tcp
1911457608 | 2025-03-13T07:15:04.597448
\x00[\x00\x00\x00\x00\x00\x00
25005 /
tcp
-2096652808 | 2025-02-24T14:07:09.387507
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
25007 /
tcp
-2096652808 | 2025-03-21T08:55:00.324429
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
25008 /
tcp
89142341 | 2025-03-05T13:43:44.190420
\x05\x00\x00\x00\x0b\x08\x05\x1a\x00
25009 /
tcp
-1888448627 | 2025-03-09T12:45:12.946229
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
25105 /
tcp
-1375131644 | 2025-03-22T22:13:09.938531
\x00[v\xc3\xbdC\x7f\x00\x00
27015 /
tcp
-613706304 | 2025-03-10T13:12:18.538020
Command: None
Size: 540029490
ID: 1919117645
Type: 1718580079
27017 /
tcp
1763259671 | 2025-03-20T04:13:19.741349
{\n"Version": "3.4.18",\n"VersionArray": [\n3,\n4,\n18,\n0\n],\n"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",\n"OpenSSLVersion": "",\n"SysInfo": "",\n"Bits": 64,\n"Debug": false,\n"MaxObjectSize": 16777216\n}\n\n
28015 /
tcp
-358801646 | 2025-02-25T08:39:48.144094
28080 /
tcp
1189133115 | 2025-02-28T01:31:05.140229
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
28818 /
tcp
410249975 | 2025-03-05T03:12:00.026606
29799 /
tcp
819727972 | 2025-03-08T17:25:51.842478
SSH-2.0-OpenSSH_7.4
Vulnerabilities
30000 /
tcp
-1426182427 | 2025-03-20T19:54:39.419856
\\x00[\\x00\\x00\\x00\\x00\\x00\\x00
30002 /
tcp
-1681927087 | 2025-03-17T22:48:57.683916
kjnkjabhbanc283ubcsbhdc72
30003 /
tcp
-1681927087 | 2025-03-19T17:18:30.256733
kjnkjabhbanc283ubcsbhdc72
30004 /
tcp
398077695 | 2025-03-18T16:37:03.929066
30005 /
tcp
819727972 | 2025-02-27T08:55:39.254015
SSH-2.0-OpenSSH_7.4
Vulnerabilities
30006 /
tcp
-1779118422 | 2025-03-16T09:06:10.297144
\x00[\xc2\xae\xc2\x8d{\x7f\x00\x00
30022 /
tcp
1956828827 | 2025-03-18T21:49:27.120583
220 VMware Authentication Daemon Version 1.10: SSL Required, Se
rverDaemonProtocol:SOAP, MKSDisplayProtocol:VNC , , NFCSSL supported/t
30029 /
tcp
1308377066 | 2025-03-07T12:43:57.396619
30083 /
tcp
-2046514463 | 2025-03-19T09:14:11.217826
30122 /
tcp
1741579575 | 2025-03-19T20:32:30.272802
30303 /
tcp
2087396567 | 2025-03-19T22:48:15.433309
kjnkjabhbanc283ubcsbhdc72
1282941221 | 2025-03-09T04:47:11.637411
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
30422 /
tcp
472902042 | 2025-03-13T12:45:40.314339
"Magic:ActiveMQ
Version:12
<ActiveMQ*TcpNoDelayEnabledSizePrefixDisabled CacheSizeProviderName ActiveMQStackTraceEnabledPlatformDetails JavaCacheEnabledTightEncodingEnabledMaxFrameSize@MaxInac
30452 /
tcp
321971019 | 2025-02-23T05:29:45.197829
-ERR client ip is not in whitelist\r
30622 /
tcp
-971970408 | 2025-03-12T11:08:22.018724
30718 /
tcp
-1719756037 | 2025-03-22T12:06:36.947471
LH\xdb\xc6\xdd\xf6g\x10\x19\x00\x00\x00\x18\x00\x01\x02\x00\x10\x00\x04\x00\x00\x00\x01\x8fm\x0fN\xc7\x1e\x88"\xee\xd9\xd7\xf2x{\x04\x85
30722 /
tcp
2087396567 | 2025-03-13T13:41:52.271133
kjnkjabhbanc283ubcsbhdc72
30822 /
tcp
-441419608 | 2025-03-12T19:56:15.013894
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
30922 /
tcp
2087396567 | 2025-03-12T09:28:33.087566
kjnkjabhbanc283ubcsbhdc72
31017 /
tcp
1308377066 | 2025-03-21T21:13:13.859958
31022 /
tcp
-1810987450 | 2025-03-13T08:23:24.991402
31122 /
tcp
2087396567 | 2025-03-09T17:21:21.401270
kjnkjabhbanc283ubcsbhdc72
31222 /
tcp
2087396567 | 2025-03-13T04:42:37.403531
kjnkjabhbanc283ubcsbhdc72
31322 /
tcp
-971970408 | 2025-03-09T16:12:22.391826
31443 /
tcp
819727972 | 2025-03-12T19:28:36.804361
SSH-2.0-OpenSSH_7.4
Vulnerabilities
31822 /
tcp
-1648456501 | 2025-03-20T19:12:13.544428
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
31922 /
tcp
-1990350878 | 2025-03-11T06:58:48.085540
32122 /
tcp
171352214 | 2025-03-20T03:45:32.011598
-ERR client ip is not in whitelist
32303 /
tcp
897328069 | 2025-03-17T20:06:05.143803
220 mail.scott000.com ESMTP
32422 /
tcp
504717326 | 2025-03-09T14:29:36.334654
SSH-2.0-OpenSSH_8.6
Vulnerabilities
32522 /
tcp
2087396567 | 2025-03-22T04:09:00.743030
kjnkjabhbanc283ubcsbhdc72
32622 /
tcp
-801484042 | 2025-03-21T03:53:03.772352
32722 /
tcp
-1139539254 | 2025-03-11T16:38:54.704133
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
32746 /
tcp
1370263973 | 2025-03-17T21:16:04.163434
32764 /
tcp
1842524259 | 2025-03-14T07:52:34.385457
32922 /
tcp
-952165951 | 2025-03-11T02:33:07.859746
33122 /
tcp
104385780 | 2025-03-04T14:47:02.643659
33222 /
tcp
-409020351 | 2025-03-20T00:00:56.112511
NPC Telnet permit one connection.
But One connection() already keep alive.
Good Bye !!
33422 /
tcp
819727972 | 2025-03-19T18:34:43.724116
SSH-2.0-OpenSSH_7.4
Vulnerabilities
33522 /
tcp
1690634669 | 2025-03-20T14:29:34.841965
33622 /
tcp
-971970408 | 2025-03-21T05:32:46.368270
33822 /
tcp
1286504516 | 2025-03-18T11:28:27.333725
CP2E Control Console
Connected to Host: gZI
33922 /
tcp
-154107716 | 2025-03-18T02:43:09.157861
220 Microsoft FTP Service
530 User cannot log in.
214-The following commands are recognized (* ==>'s unimplemented).
ABOR
ACCT
ADAT *
ALLO
APPE
AUTH
CCC
CDUP
CWD
DELE
ENC *
EPRT
EPSV
FEAT
HELP
HOST
LANG
LIST ...
34022 /
tcp
1620329124 | 2025-03-20T20:14:06.768406
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\x01\xc3\xbf\xc3\xbb\x03\xc3\xbf\xc3\xbd\x01\xc3\xbf\xc3\xbe\x01Username:
34322 /
tcp
-454087041 | 2025-03-19T18:45:35.654054
\x1e\xc3\x80\x010\x02\x00\xc2\xa8\xc3\xa3\x00\x00\x00\x00
34422 /
tcp
-1681927087 | 2025-03-15T02:04:22.557323
kjnkjabhbanc283ubcsbhdc72
34522 /
tcp
-971970408 | 2025-03-19T11:40:38.528589
34622 /
tcp
-2096652808 | 2025-03-19T10:11:15.900251
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
34722 /
tcp
1231376952 | 2025-03-19T08:17:06.896149
34822 /
tcp
1778988322 | 2025-03-03T22:24:31.033617
* OK GroupWise IMAP4rev1 Server Ready
35000 /
tcp
321971019 | 2025-02-22T11:51:34.437501
-ERR client ip is not in whitelist\r
35322 /
tcp
-971970408 | 2025-03-17T08:53:14.807349
35522 /
tcp
455076604 | 2025-03-18T20:44:38.122521
!\x07version\x04bind7 t{RPowerDNS Recursor 410
35622 /
tcp
-441419608 | 2025-03-18T08:01:24.474005
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
35722 /
tcp
-441419608 | 2025-03-17T11:45:20.569792
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
35822 /
tcp
2087396567 | 2025-03-17T18:01:13.619876
kjnkjabhbanc283ubcsbhdc72
36022 /
tcp
2087396567 | 2025-03-17T21:55:30.776341
kjnkjabhbanc283ubcsbhdc72
36322 /
tcp
-1900404274 | 2025-03-17T12:20:22.194293
36422 /
tcp
-1559123399 | 2025-03-15T08:43:47.529062
500 Permission denied - closing connection.
36522 /
tcp
-375604792 | 2025-02-28T20:53:37.972036
220 Microsoft FTP Service
36722 /
tcp
2087396567 | 2025-03-17T05:52:22.605822
kjnkjabhbanc283ubcsbhdc72
36922 /
tcp
1741579575 | 2025-03-18T13:40:23.560676
36982 /
tcp
-441419608 | 2025-03-05T19:39:29.866174
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
37022 /
tcp
-747911285 | 2025-03-16T19:58:34.900172
37122 /
tcp
819727972 | 2025-03-17T00:01:02.273124
SSH-2.0-OpenSSH_7.4
Vulnerabilities
37215 /
tcp
819727972 | 2025-03-21T10:49:01.456809
SSH-2.0-OpenSSH_7.4
Vulnerabilities
37222 /
tcp
-2031152423 | 2025-03-14T19:52:14.665847
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
37322 /
tcp
539065883 | 2025-02-28T22:39:57.210396
37422 /
tcp
2087396567 | 2025-03-15T12:17:13.147644
kjnkjabhbanc283ubcsbhdc72
37522 /
tcp
1741579575 | 2025-02-28T17:23:58.942720
37622 /
tcp
-805362002 | 2025-02-28T12:17:36.661011
ICAP/1.0 501 Other
Server: Traffic Spicer 7788179225
37922 /
tcp
-971970408 | 2025-02-28T01:30:57.217293
38022 /
tcp
539065883 | 2025-03-17T23:19:53.805717
38122 /
tcp
819727972 | 2025-03-15T17:41:03.948579
SSH-2.0-OpenSSH_7.4
Vulnerabilities
38222 /
tcp
1741579575 | 2025-03-10T21:06:36.602414
38722 /
tcp
819727972 | 2025-03-13T22:24:21.623778
SSH-2.0-OpenSSH_7.4
Vulnerabilities
38822 /
tcp
-971970408 | 2025-03-03T21:02:29.962932
38922 /
tcp
2087396567 | 2025-03-13T15:55:35.696467
kjnkjabhbanc283ubcsbhdc72
39122 /
tcp
2087396567 | 2025-03-13T18:55:04.279112
kjnkjabhbanc283ubcsbhdc72
39222 /
tcp
422524323 | 2025-03-13T17:10:41.907855
{
"Version": "3.4.18",
"VersionArray": [
3,
4,
18,
0
],
"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",
"OpenSSLVersion": "",
"SysInfo": "",
"Bits": 64,
"Debug": false,
"MaxObjectSize": 16777216
}
39322 /
tcp
819727972 | 2025-03-11T11:20:04.417336
SSH-2.0-OpenSSH_7.4
Vulnerabilities
39422 /
tcp
1492413928 | 2025-03-11T13:06:48.426888
SSH-2.0-OpenSSH_7.5
Vulnerabilities
39522 /
tcp
-2096652808 | 2025-03-11T09:34:09.234102
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
39622 /
tcp
1690634669 | 2025-03-11T07:50:47.426961
39922 /
tcp
398077695 | 2025-02-26T17:33:18.095140
40000 /
tcp
1911457608 | 2025-02-23T15:06:58.436217
\x00[\x00\x00\x00\x00\x00\x00
40022 /
tcp
104385780 | 2025-03-09T11:05:43.267340
40322 /
tcp
819727972 | 2025-03-08T21:52:05.949157
SSH-2.0-OpenSSH_7.4
Vulnerabilities
40894 /
tcp
-2033111675 | 2025-02-28T15:02:48.550979
41522 /
tcp
459162008 | 2025-03-04T21:33:16.124274
41922 /
tcp
401555314 | 2025-03-07T16:20:59.665910
42122 /
tcp
2087396567 | 2025-03-05T02:51:47.401331
kjnkjabhbanc283ubcsbhdc72
42222 /
tcp
-407828767 | 2025-03-04T23:19:20.110210
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
42235 /
tcp
165188539 | 2025-03-15T17:20:49.774172
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
42422 /
tcp
-1148066627 | 2025-03-04T19:48:48.687278
\x00[\xc2\x84\xc2\x86\xc3\xb2\x7f\x00\x00
42922 /
tcp
-445721795 | 2025-02-28T17:06:58.744730
\x00[\xc3\xaed\x1a\x7f\x00\x00
43008 /
tcp
1126993057 | 2025-02-24T16:02:34.038603
* OK [CAPABILITY a2,M\\] nBwXk2pPP IMAP4rev1 20qx at
43222 /
tcp
-971970408 | 2025-03-01T01:11:38.742006
43422 /
tcp
-2031152423 | 2025-02-27T22:20:20.488012
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
43522 /
tcp
1412519768 | 2025-02-27T18:34:59.597244
"AP0F1D85"
Connection: close
<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD>
<BODY BGCOLOR
43622 /
tcp
504717326 | 2025-02-21T18:14:03.494140
SSH-2.0-OpenSSH_8.6
Vulnerabilities
43722 /
tcp
2087396567 | 2025-02-27T04:15:11.741504
kjnkjabhbanc283ubcsbhdc72
43922 /
tcp
-314039103 | 2025-02-26T20:34:36.087086
Surnom.
Sorry, that nickname format is invalid.
44022 /
tcp
1690634669 | 2025-02-27T09:18:37.138746
44100 /
tcp
-1399940268 | 2025-03-12T10:54:52.370051
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
44158 /
tcp
-433302150 | 2025-03-06T01:58:41.686726
44222 /
tcp
-1730858130 | 2025-03-10T23:03:06.319449
RFB 003.008
VNC:
Protocol Version: 3.8
44303 /
tcp
-1399940268 | 2025-03-18T20:44:23.511877
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
44322 /
tcp
1741579575 | 2025-02-26T10:40:18.414742
44333 /
tcp
-358801646 | 2025-02-26T06:59:58.869760
44410 /
tcp
1911457608 | 2025-03-13T11:35:27.214160
\x00[\x00\x00\x00\x00\x00\x00
44522 /
tcp
-952165951 | 2025-02-26T07:15:05.262317
44818 /
tcp
-1888448627 | 2025-03-10T08:37:24.651356
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
44922 /
tcp
2087396567 | 2025-02-26T03:51:52.063182
kjnkjabhbanc283ubcsbhdc72
45000 /
tcp
-274082663 | 2025-03-10T03:45:46.537547
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
45022 /
tcp
2087396567 | 2025-03-10T16:15:07.937175
kjnkjabhbanc283ubcsbhdc72
45122 /
tcp
2087396567 | 2025-02-24T09:17:21.741353
kjnkjabhbanc283ubcsbhdc72
45222 /
tcp
-1026951088 | 2025-02-25T19:33:28.560821
45322 /
tcp
1412519768 | 2025-02-25T18:04:51.977398
"AP0F1D85"
Connection: close
<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD>
<BODY BGCOLOR
45522 /
tcp
819727972 | 2025-02-25T16:27:21.366434
SSH-2.0-OpenSSH_7.4
Vulnerabilities
45622 /
tcp
401555314 | 2025-02-25T14:45:57.774358
45788 /
tcp
-1114821551 | 2025-03-20T02:54:02.785355
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
45822 /
tcp
-1248408558 | 2025-03-10T12:48:50.719703
220 MikroTik FTP server (MikroTik 6.44.3) ready
45922 /
tcp
-79865617 | 2025-03-10T14:32:41.663711
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com
mit-revprops depth log-revprops partial-replay ) ) )
46000 /
tcp
455076604 | 2025-03-22T10:43:15.963710
!\x07version\x04bind7 t{RPowerDNS Recursor 410
46001 /
tcp
1504401647 | 2025-03-18T08:33:24.895980
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
46022 /
tcp
819727972 | 2025-02-21T21:43:54.004173
SSH-2.0-OpenSSH_7.4
Vulnerabilities
46122 /
tcp
660175493 | 2025-02-24T12:56:22.930789
46222 /
tcp
1741579575 | 2025-02-24T23:13:14.437594
46322 /
tcp
863754335 | 2025-02-24T21:26:30.089349
46522 /
tcp
-1733645023 | 2025-02-24T05:54:38.930731
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
46622 /
tcp
-1626979812 | 2025-02-24T04:11:36.166703
220 Service ready for new user.
-288825733 | 2025-02-23T22:26:53.281034
HTTP/1.1 200 OK
Connection: close
Content-Length: 2619
Accept-Ranges: bytes
Access-Control-Allow-Credentials: true
Access-Control-Allow-Headers: authorization,Content-Type
Access-Control-Allow-Methods: POST, GET, OPTIONS, PUT, HEAD, DELETE
Content-Type: text/html
Server: Jetty(9.4.14.v20181114)
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1
47522 /
tcp
-971970408 | 2025-02-25T09:49:56.182950
47534 /
tcp
-180163620 | 2025-03-14T12:09:30.071805
NPC Telnet permit one connection.\r\n But One connection() already keep alive.\r\nGood Bye !! \r\n
2143387245 | 2025-02-25T03:01:58.085331
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
47722 /
tcp
819727972 | 2025-03-10T11:04:32.873286
SSH-2.0-OpenSSH_7.4
Vulnerabilities
47822 /
tcp
1308377066 | 2025-03-10T09:38:10.757551
47990 /
tcp
-1999117212 | 2025-02-23T02:49:26.929371
48222 /
tcp
-1730858130 | 2025-03-10T04:31:18.409136
RFB 003.008
VNC:
Protocol Version: 3.8
48322 /
tcp
745343730 | 2025-03-10T03:13:18.960159
220 smtp.qq.com Esmtp QQ Mail Server
48622 /
tcp
819727972 | 2025-02-23T12:32:24.407952
SSH-2.0-OpenSSH_7.4
Vulnerabilities
48822 /
tcp
2087396567 | 2025-02-24T17:56:16.449606
kjnkjabhbanc283ubcsbhdc72
2143387245 | 2025-03-22T06:20:26.128773
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
49153 /
tcp
819727972 | 2025-03-22T13:41:41.142607
SSH-2.0-OpenSSH_7.4
Vulnerabilities
49222 /
tcp
171352214 | 2025-02-23T02:15:11.135164
-ERR client ip is not in whitelist
49422 /
tcp
-805362002 | 2025-02-23T02:25:42.512858
ICAP/1.0 501 Other
Server: Traffic Spicer 7788179225
49522 /
tcp
-358801646 | 2025-02-21T05:08:56.918335
49622 /
tcp
1842524259 | 2025-02-22T13:11:33.387277
49686 /
tcp
1615193817 | 2025-02-24T03:17:02.204548
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
49694 /
tcp
937756010 | 2025-03-09T22:09:51.705029
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x01\x00\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
49722 /
tcp
539065883 | 2025-02-22T22:34:50.608477
49822 /
tcp
-1139539254 | 2025-02-22T21:01:17.414491
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
49922 /
tcp
1690634669 | 2025-02-22T19:33:56.107664
50000 /
tcp
-319440554 | 2025-03-22T10:10:54.371029
50003 /
tcp
205347087 | 2025-03-15T17:21:49.531824
SSH-25453-Cisco-3524665.35\n
50007 /
tcp
1623746877 | 2025-02-25T21:57:02.911786
500 Permission denied - closing connection.\r\n
50010 /
tcp
-1399940268 | 2025-03-15T12:43:43.425905
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
50013 /
tcp
669849225 | 2025-03-22T07:21:40.687178
SSH-98.60-SysaxSSH_81885..42\r\n
50022 /
tcp
819727972 | 2025-02-22T11:25:38.783814
SSH-2.0-OpenSSH_7.4
Vulnerabilities
50100 /
tcp
819727972 | 2025-03-07T02:44:47.932602
SSH-2.0-OpenSSH_7.4
Vulnerabilities
50101 /
tcp
-339084706 | 2025-03-11T09:11:02.394055
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
50222 /
tcp
539065883 | 2025-02-22T08:12:32.304998
50443 /
tcp
-1248408558 | 2025-02-24T20:30:52.664221
220 MikroTik FTP server (MikroTik 6.44.3) ready
957176216 | 2025-03-18T04:22:58.150527
HTTP/1.1 503 Service Unavailable
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 10-115032080-0 0NNN RT(1701249963412 12) q(0 -1 -1 -1) r(0 -1)
50580 /
tcp
-1399940268 | 2025-02-28T21:24:43.707392
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
50622 /
tcp
2087396567 | 2025-02-21T19:57:30.005446
kjnkjabhbanc283ubcsbhdc72
50722 /
tcp
1332894250 | 2025-02-20T23:40:37.767936
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
50922 /
tcp
2087396567 | 2025-02-21T16:33:02.648431
kjnkjabhbanc283ubcsbhdc72
50996 /
tcp
740837454 | 2025-03-20T18:29:06.520884
SSH-2.0-OpenSSH_5.3
Vulnerabilities
51003 /
tcp
1911457608 | 2025-02-22T16:44:36.322311
\x00[\x00\x00\x00\x00\x00\x00
51005 /
tcp
-1399940268 | 2025-02-23T17:56:55.788548
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
51007 /
tcp
1911457608 | 2025-03-07T03:11:22.880204
\x00[\x00\x00\x00\x00\x00\x00
51235 /
tcp
103159425 | 2025-03-07T11:06:14.757107
51294 /
tcp
-445721795 | 2025-03-21T11:06:33.749176
\x00[\xc3\xaed\x1a\x7f\x00\x00
51322 /
tcp
2087396567 | 2025-02-21T11:31:15.100044
kjnkjabhbanc283ubcsbhdc72
51443 /
tcp
-971970408 | 2025-03-12T00:55:48.322173
51622 /
tcp
-375604792 | 2025-02-21T04:01:53.369523
220 Microsoft FTP Service
52340 /
tcp
-1097188123 | 2025-03-06T10:39:43.878931
52869 /
tcp
-1840324437 | 2025-03-21T14:16:40.398868
52931 /
tcp
-1399940268 | 2025-03-18T00:57:12.387902
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
53413 /
tcp
2033888749 | 2025-03-22T02:24:34.485778
Content-Type: text/rude-rejection
Content-Length: 24
Access Denied, go away.
Content-Type: text/disconnect-notice
C...
-1230049476 | 2025-03-20T17:57:56.988053
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
54138 /
tcp
-1648456501 | 2025-03-22T09:54:29.381093
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
55000 /
tcp
-122096153 | 2025-03-20T17:32:24.951138
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
55022 /
tcp
1741579575 | 2025-03-07T04:20:25.188405
55080 /
tcp
1011407350 | 2025-03-07T09:21:01.388242
* OK GroupWise IMAP4rev1 Server Ready\r\n
55222 /
tcp
-971970408 | 2025-03-07T02:41:41.963553
55350 /
tcp
-1810987450 | 2025-03-22T21:01:01.979298
55422 /
tcp
2087396567 | 2025-03-06T18:26:20.661218
kjnkjabhbanc283ubcsbhdc72
55443 /
tcp
2087396567 | 2025-03-19T15:20:25.311223
kjnkjabhbanc283ubcsbhdc72
55553 /
tcp
-971970408 | 2025-03-18T18:21:49.305806
-147424911 | 2025-03-21T18:44:52.983773
HTTP/1.1 404 Not Found
Content Length: 0
55622 /
tcp
1741579575 | 2025-03-06T16:22:28.930375
55722 /
tcp
-358801646 | 2025-03-06T19:48:23.548936
57788 /
tcp
1492413928 | 2025-03-09T21:31:17.063084
SSH-2.0-OpenSSH_7.5
Vulnerabilities
57822 /
tcp
539065883 | 2025-03-06T06:30:40.091820
57922 /
tcp
2087396567 | 2025-03-06T05:06:39.478775
kjnkjabhbanc283ubcsbhdc72
58322 /
tcp
671605376 | 2025-03-06T01:33:00.029165
58392 /
tcp
-358801646 | 2025-03-22T17:57:36.824262
58522 /
tcp
1208318993 | 2025-03-05T20:08:23.961516
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
58722 /
tcp
-971970408 | 2025-03-05T18:24:13.648272
58822 /
tcp
-952165951 | 2025-03-05T17:42:39.747934
59022 /
tcp
-1032713145 | 2025-03-05T13:15:20.298479
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
2143387245 | 2025-03-05T11:54:27.869285
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
59222 /
tcp
539065883 | 2025-03-05T09:48:51.839358
59322 /
tcp
-1428621233 | 2025-03-05T08:42:18.137481
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
-2118655245 | 2025-03-12T06:54:27.909128
HTTP/1.0 500 Internal Server Error
Content-Length: 20
60129 /
tcp
-2031152423 | 2025-03-20T05:11:17.414421
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
61613 /
tcp
-1399940268 | 2025-03-04T23:21:21.868419
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-147424911 | 2025-03-20T12:27:40.174851
HTTP/1.1 404 Not Found
Content Length: 0
63210 /
tcp
-158519641 | 2025-03-16T17:10:29.177257
63256 /
tcp
-1730858130 | 2025-03-21T21:07:18.801440
RFB 003.008
VNC:
Protocol Version: 3.8
63257 /
tcp
-527005584 | 2025-03-11T14:52:07.685606
63260 /
tcp
-1399940268 | 2025-03-15T20:55:13.250240
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
63443 /
tcp
89142341 | 2025-03-04T22:51:14.814079
\x05\x00\x00\x00\x0b\x08\x05\x1a\x00
-1230049476 | 2025-03-18T16:19:39.343285
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes