11 /
tcp
-321444299 | 2025-03-07T03:04:52.062177
:dircproxy NOTICE AUTH :Looking up your hostname...
:dircproxy NOTICE AUTH :Got your hostname.
15 /
tcp
539065883 | 2025-03-13T17:20:14.598053
17 /
tcp
-1316491703 | 2025-03-13T03:47:36.051196
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready
19 /
tcp
620044682 | 2025-02-19T05:15:11.283607
!"#$%&\'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefg\r\n!"#$%&\'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefgh\r\n"#$%&\'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghi\r\n#$%&\'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghij\r\n$%&\'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijk\r\n%&\'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijkl\r\n&\'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghi
23 /
tcp
676675086 | 2025-02-20T18:02:40.328990
25 /
tcp
-1139539254 | 2025-03-11T20:42:31.604818
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
43 /
tcp
-441419608 | 2025-03-10T08:42:18.162837
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
49 /
tcp
-1620040646 | 2025-02-21T09:38:08.600519
\xc3\xbf\xc3\xbb\\x01\r\nWelcome to NetLinx v94 Copyright AMX Corp. 34395-49007\r\n>
53 /
tcp
1155744004 | 2025-03-04T07:36:21.326480
9
\x81\x80\x00\x01\x00\x02\x00\x00\x00\x00\x08clients1\x06google\x03com\x00\x00\x01\x00\x01\xc0\x00\x05\x00\x01\x00\x00\x00\x1e\x00\x07clients\x01l\xc0\x15\xc01\x00\x01\x00\x01\x00\x00\x00\x1e\x00\x04\x8e\xfb+\x0e
\x00\x06\x85\x80\x00\x01\x00\x01\x00\x
70 /
tcp
-833941849 | 2025-02-27T17:20:04.848711
\x1e\x06\xc2\x81
\x01\x07version\x04bind\x10\x03
-275212591 | 2025-03-13T08:06:34.271852
HTTP/1.1 403 Forbidden
Server: AliyunOSS
Date: Thu, 13 Mar 2025 08:06:34 GMT
Content-Type: application/xml
Content-Length: 346
Connection: keep-alive
x-oss-request-id: 67D2920AA554993738D58A38
x-oss-server-time: 0
x-oss-ec: 0003-00001201
90 /
tcp
-1399940268 | 2025-02-19T22:47:10.603599
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
96 /
tcp
580340387 | 2025-02-21T08:07:41.060807
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
104 /
tcp
-1947777893 | 2025-03-09T05:29:02.116835
"Broadband Router"\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
-1839934832 | 2025-03-07T16:48:44.981441
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
111 /
tcp
1741579575 | 2025-03-03T22:37:17.330588
141730637 | 2025-03-06T21:00:26.077432
HTTP/1.0 200 OK
Server: Proxy
1282941221 | 2025-03-07T16:52:10.059023
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
135 /
tcp
-646274631 | 2025-02-27T16:36:33.265933
\\x05\\x00\r\\x03\\x10\\x00\\x00\\x00\\x18\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x04\\x00\\x01\\x05\\x00\\x00\\x00\\x00\n\nServerAlive2: \n IP1: user-PC\n IP2: 192.168.1.104\n IP3: 220.129.89.73\n IP4: 2001:b011:3009:904e:d83e:3f80:66e3:747\n IP5: 2001:b011:3009:904e:901d:7e1d:524b:cf68\n IP6: 2001:b011:3009:ec00:d8a9:208f:6a7e:b9c3\n\nNTLMSSP:\nTarget_Name: USER-PC\nProduct_Version: 6.1.7601 Ntlm 15\nOS: Windows 7, Service Pack 1/Windows Server 2008 R2, Service Pack 1\nNetBIOS_Domain_Name: USER-PC\nNetBIOS_Computer_Name: USER-PC\nDNS_Domain_Name:
139 /
tcp
-1270998736 | 2025-03-11T21:24:56.442629
\\x83\\x00\\x00\\x01\\x8f
143 /
tcp
-100373866 | 2025-03-04T09:41:51.922285
* OK TurboMail IMAP4 Service ready\r\n
175 /
tcp
1504401647 | 2025-03-13T14:10:48.682891
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
179 /
tcp
-399606100 | 2025-03-13T20:10:30.906426
BGP Message\nType: 3\nMajor error Code: 6\nMinor error Code: 5\n
195 /
tcp
819727972 | 2025-03-13T19:30:54.753844
SSH-2.0-OpenSSH_7.4
Vulnerabilities
221 /
tcp
1919228981 | 2025-03-09T18:17:42.996295
\x00\x1e\x00\x06\xc2\x81\xc2\x85\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
264 /
tcp
-1022036431 | 2025-03-09T10:17:50.676044
CheckPoint\nFirewall Host: CN05FWINT01\nSmartCenter Host: fw-go-mgmt-01..x6vcm5\\x00\n
67948279 | 2025-02-26T14:40:57.332222
HTTP/1.1 200 OK
Content-Type: text/html
Accept-Ranges: bytes
Server: Microsoft-IIS/8.5
X-Powered-By: ASP.NET
385 /
tcp
-2089734047 | 2025-03-10T18:34:29.983703
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
389 /
tcp
-1743283776 | 2025-02-26T06:54:04.777101
0\x0c\\x02\\x01\\x01a\\x07\n\\x01\\x04\\x04
427 /
tcp
1327409218 | 2025-03-04T03:05:15.458193
SAAdvert Response:\nVersion: 2\nFunction: SA Advertisement (11)\nURL: service:service-agent://localhost.localdomain\nScopeList: default\nAttrributeList: \n\n\nserviceTypes:\nservice:VMwareInfrastructure\n\nResponse of service:VMwareInfrastructure SrvReq:\nVersion: 2\nFunction: Service Reply (2)\nErrorCode: SUCCESS (0)\nURL Entries:\n Lifetime: 65535\n URL: service:VMwareInfrastructure://localhost.localdomain\n\n\nResponse of service:VMwareInfrastructure AttrRqst:\nVersion: 2\nFunction: Attribute Reply (7)\nErrorCode: SUCCESS (0
-616022385 | 2025-02-28T00:25:36.738810
HTTP/1.1 403 Forbidden
Server: AliyunOSS
Date: Fri, 28 Feb 2025 00:25:36 GMT
Content-Type: application/xml
Content-Length: 346
Connection: keep-alive
x-oss-request-id: 67C102808054033635E320F7
x-oss-server-time: 0
x-oss-ec: 0003-00001201
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
6a:14:da:36:53:09:8b:0e:94:cd:6d:ee
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=BE, O=GlobalSign nv-sa, CN=GlobalSign GCC R3 OV TLS CA 2024
Validity
Not Before: Jan 3 03:21:02 2025 GMT
Not After : Feb 4 03:21:01 2026 GMT
Subject: C=CN, ST=ZheJiang, L=HangZhou, O=Alibaba (China) Technology Co., Ltd., CN=*.oss-cn-shenzhen.aliyuncs.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:b0:c7:54:83:40:8e:09:77:61:48:ac:c9:ca:24:
6b:a5:f6:40:76:6a:c2:5e:38:f5:c3:d9:fa:b8:28:
2b:0e:8e:1d:d8:e3:c2:c3:e4:cc:bb:ce:ed:dc:88:
cf:31:05:22:ef:ae:26:bf:a2:15:1f:dd:cb:1f:46:
8f:4e:bc:41:5f:58:65:97:ad:8e:07:54:c3:f7:d8:
23:9e:3e:8e:a6:1b:36:86:e3:0d:f0:6f:fc:1e:a0:
c7:33:e3:2c:13:02:a1:12:10:d2:a8:8a:a2:ce:8e:
73:8c:83:e5:c5:51:c4:63:bf:57:a3:ff:37:4c:db:
bc:44:d9:91:cc:ee:88:9e:83:74:91:30:a2:d6:c7:
2b:ad:1b:68:de:63:a1:e6:13:b9:e4:2e:9c:64:18:
0e:b6:20:81:7b:00:14:c1:46:80:31:a4:cb:10:5d:
38:a2:6c:d7:77:09:8f:12:d1:6e:47:69:a1:79:c6:
35:c7:90:0b:84:09:ec:33:26:6c:56:98:fb:2d:38:
e4:a6:8a:98:1a:d5:f9:ac:d2:40:58:44:5d:a2:cb:
c1:34:98:c7:31:9a:78:f8:1e:98:26:4a:42:ef:78:
c8:27:b5:57:c3:c2:c4:f7:9a:dc:e0:66:75:56:0e:
02:c4:88:e5:16:e6:25:db:bf:24:26:b9:96:8c:07:
e2:c3
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature, Key Encipherment
X509v3 Basic Constraints: critical
CA:FALSE
Authority Information Access:
CA Issuers - URI:http://secure.globalsign.com/cacert/gsgccr3ovtlsca2024.crt
OCSP - URI:http://ocsp.globalsign.com/gsgccr3ovtlsca2024
X509v3 Certificate Policies:
Policy: 2.23.140.1.2.2
Policy: 1.3.6.1.4.1.4146.10.1.2
CPS: https://www.globalsign.com/repository/
X509v3 CRL Distribution Points:
Full Name:
URI:http://crl.globalsign.com/gsgccr3ovtlsca2024.crl
X509v3 Subject Alternative Name:
DNS:*.oss-cn-shenzhen.aliyuncs.com, DNS:*.oss-cn-shenzhen-finance-1.aliyuncs.com, DNS:*.oss-cn-shenzhen-internal.aliyuncs.com, DNS:*.img-cn-shenzhen-internal.aliyuncs.com, DNS:*.oss-cn-shenzhen-internal-cross.aliyuncs.com, DNS:*.oss-cn-szfinance.aliyuncs.com, DNS:*.oss-cn-shenzhen-diku-internal.aliyuncs.com, DNS:*.oss-cn-shenzhen-finance-1-internal.aliyuncs.com, DNS:*.cn-heyuan.oss.aliyuncs.com, DNS:*.oss-cn-shenzhen-cross.aliyuncs.com, DNS:*.oss-enet-cn-south.aliyuncs.com, DNS:*.oss-internal.aliyuncs.com, DNS:*.oss-cn-guangzhou.aliyuncs.com, DNS:*.oss-cn-guangzhou-cross.aliyuncs.com, DNS:*.oss-accelerate.aliyuncs.com, DNS:*.oss-cn-heyuan-internal.aliyuncs.com, DNS:*.oss-accelerate-overseas.aliyuncs.com, DNS:*.aliyuncs.com, DNS:*.oss.aliyuncs.com, DNS:*.oss-cn-heyuan-cross.aliyuncs.com, DNS:*.img-cn-shenzhen.aliyuncs.com, DNS:*.oss-enet.aliyuncs.com, DNS:*.oss-cn-szfinance-internal.aliyuncs.com, DNS:*.vpc100-oss-cn-shenzhen.aliyuncs.com, DNS:*.cn-shenzhen.oss.aliyuncs.com, DNS:*.oss-cn-heyuan.aliyuncs.com, DNS:*.oss-cn-guangzhou-internal.aliyuncs.com, DNS:*.cn-guangzhou.oss.aliyuncs.com, DNS:*.cn-shenzhen-finance.oss.aliyuncs.com, DNS:*.cn-shenzhen-dualstack.oss.aliyuncs.com, DNS:*.cn-shenzhen-vpc.oss.aliyuncs.com, DNS:*.oss-accesspoint.aliyuncs.com, DNS:*.oss-cn-shenzhen.oss-accesspoint.aliyuncs.com, DNS:*.oss-cn-shenzhen-internal.oss-accesspoint.aliyuncs.com, DNS:*.oss-cn-heyuan.oss-accesspoint.aliyuncs.com, DNS:*.oss-cn-heyuan-internal.oss-accesspoint.aliyuncs.com, DNS:*.oss-cn-guangzhou.oss-accesspoint.aliyuncs.com, DNS:*.oss-cn-guangzhou-internal.oss-accesspoint.aliyuncs.com, DNS:*.cn-shenzhen.oss-console.aliyuncs.com, DNS:*.s3.oss-cn-shenzhen.aliyuncs.com, DNS:*.s3.oss-cn-shenzhen-internal.aliyuncs.com, DNS:*.cn-shenzhen.mgw.aliyuncs.com, DNS:*.oss.cn-shenzhen.privatelink.aliyuncs.com, DNS:*.oss-cn-shenzhen.oss-object-process.aliyuncs.com, DNS:*.oss-cn-shenzhen-internal.oss-object-process.aliyuncs.com, DNS:*.oss-vpc.aliyuncs.com, DNS:*.cn-shenzhen.oss-vpc.aliyuncs.com, DNS:oss-cn-shenzhen.aliyuncs.com
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Authority Key Identifier:
DA:D3:A8:08:48:0C:34:37:58:EE:E5:A7:75:2E:59:FC:D6:DC:3C:38
X509v3 Subject Key Identifier:
6F:0A:05:0F:AD:E0:67:D5:94:20:25:0A:B9:A1:6C:32:00:B2:CD:87
CT Precertificate SCTs:
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 64:11:C4:6C:A4:12:EC:A7:89:1C:A2:02:2E:00:BC:AB:
4F:28:07:D4:1E:35:27:AB:EA:FE:D5:03:C9:7D:CD:F0
Timestamp : Jan 3 03:21:04.713 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:46:02:21:00:D6:1F:CC:D3:A4:9D:5F:9F:32:F0:74:
5F:B8:85:EF:D7:C9:B4:59:58:74:B2:B0:4A:06:A1:1E:
8B:A5:22:34:B9:02:21:00:B3:B1:61:82:15:32:FA:81:
22:82:AA:E0:3A:55:16:20:15:DE:B3:1B:94:7B:03:AE:
27:37:66:28:7C:4F:D2:82
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 0E:57:94:BC:F3:AE:A9:3E:33:1B:2C:99:07:B3:F7:90:
DF:9B:C2:3D:71:32:25:DD:21:A9:25:AC:61:C5:4E:21
Timestamp : Jan 3 03:21:05.062 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:20:35:96:5D:CD:F7:99:BA:18:39:06:9E:79:
69:44:44:96:FB:13:1A:9B:65:EC:FA:79:BA:AF:2D:51:
1E:1F:B3:E2:02:21:00:C7:A2:1C:30:C9:8A:51:6C:57:
6C:D4:B8:3B:84:E6:20:85:DA:FB:88:A6:38:F1:4C:5E:
34:69:AD:30:37:D4:AF
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 25:2F:94:C2:2B:29:E9:6E:9F:41:1A:72:07:2B:69:5C:
5B:52:FF:97:A9:0D:25:40:BB:FC:DC:51:EC:4D:EE:0B
Timestamp : Jan 3 03:21:04.792 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:44:02:20:4D:BB:E7:FF:BA:3B:0B:43:8F:9D:17:8C:
F4:3C:82:FA:F6:0F:8D:74:4C:EE:90:CA:F9:1F:36:CD:
1E:A7:1A:8F:02:20:4E:D0:A0:43:56:04:25:22:B3:24:
2E:60:EB:26:3C:8D:BD:42:15:F9:9C:FE:7E:74:EE:28:
E8:3F:CC:85:B4:B1
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
2b:f7:41:91:27:63:90:44:b9:92:f0:38:13:64:80:52:9b:fc:
d7:23:bc:5b:b9:6b:05:a4:2d:4b:22:b9:c0:59:73:ca:5c:70:
0e:97:6d:d5:00:d3:40:19:a1:39:81:a4:52:45:8e:8f:2b:32:
cd:df:31:cf:6e:aa:a4:99:34:66:5a:43:b7:62:ed:7d:97:63:
56:73:79:d5:c0:a2:df:e2:d2:73:22:90:93:7c:b8:d6:3f:ae:
52:3e:b7:14:f4:e9:e3:2f:a0:ac:ba:db:cd:48:1e:8c:df:ef:
25:d8:2c:3b:93:06:09:a6:13:25:45:27:68:e9:49:cc:03:27:
48:0a:f5:ed:ed:e4:d1:3c:fa:ac:2f:6a:0d:ee:92:d4:b5:f2:
31:8c:6b:61:88:81:e0:6f:89:f6:b9:1f:39:9e:00:6f:e2:d7:
c2:e9:47:ec:12:4f:cf:ad:74:2c:5a:a0:ea:b6:39:b5:c3:70:
fb:71:db:b0:f7:d3:b3:27:3f:14:5d:f2:3e:fe:46:97:f3:71:
1f:2b:23:c9:35:1d:aa:61:4b:16:9e:1b:05:dd:21:b2:ae:30:
05:aa:03:f6:75:ca:9e:a7:45:cc:77:ca:e7:09:3c:4b:e8:f8:
fb:8e:fc:91:b3:59:9c:a7:9f:76:17:b7:25:05:d1:e3:15:f8:
ce:8c:37:c6
1464910454 | 2025-03-05T11:29:52.669210
HTTP/1.1 400 Bad Request
Server: nginx/1.22.1
Date: Wed, 05 Mar 2025 11:29:52 GMT
Content-Type: text/html
Content-Length: 157
Connection: close
<html>
<head><title>400 Bad Request</title></head>
<body>
<center><h1>400 Bad Request</h1></center>
<hr><center>nginx/1.22.1</center>
</body>
</html>
446 /
tcp
597764502 | 2025-02-28T19:14:34.747405
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
448 /
tcp
-2046514463 | 2025-03-12T12:59:43.831602
1077013874 | 2025-03-06T18:17:16.607616
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
502 /
tcp
50497985 | 2025-03-05T22:39:18.384049
\x00[\xc3\x88\xc3\x9dS\x7f\x00\x00
503 /
tcp
-832380282 | 2025-02-20T14:18:09.007598
lpd [@Boyk]: Print-services are not available to your host (aF2qXkQ2m).\n
513 /
tcp
1911457608 | 2025-02-23T14:45:20.724390
\x00[\x00\x00\x00\x00\x00\x00
515 /
tcp
1453929220 | 2025-02-26T14:54:29.719588
541 /
tcp
1497273505 | 2025-03-12T01:50:00.560080
\\x16\\x03\\x01\\x01P\\x01\\x00\\x01L\\x03\\x03\\x84L\\xcf\\x00\\x0e\xc4\x96Q\\xf3\\xb1\\x9f\\x88\\x08\\x92\\xd7S\\xf1\\xb7\\xc9\\xc79\\xcc\\xf6Tk\\x1dj\\xc6`\\x89\\x86\\xeb \\xbc\\xef\\xc3<\\xe5g\\x96\\xa4L\\x1c\\x1b]ea\\x81$D\\x99\\x92eH\\x85\\x82\\x1b*\\xc2*\\xaeb9n9\\x002\\x13\\x02\\x13\\x03\\x13\\x01\\x009\\x0
548 /
tcp
-773160241 | 2025-03-10T07:05:12.973462
Fast Copy: Yes\nExtended Sleep: Yes\nUUIDs: Yes\nUTF8 Server Name: Yes\nDirectory Services: Yes\nReconnect: Yes\nServer Notifications: Yes\nTCP/IP: Yes\nServer Signature: Yes\nServer Message: No\nPassword Saving Prohibited: No\nPassword Changing: Yes\nCopy File: Yes\nServer Name: murphys-airport-time-capsule\nMachine Type: \\x10TimeCapsule8,119\nAFP Versions: AFP3.3, AFP3.2, AFP3.1\nUAMs: DHCAST128\\x04,DHX2\\x03,SRP\\x06,Recon1C\nServer Signature: 4338365332344c58463948350069672d
554 /
tcp
285770450 | 2025-02-25T17:54:30.998875
RTSP/1.0 401 Unauthorized
CSeq: 1
593 /
tcp
1308377066 | 2025-03-13T02:31:48.692200
1300162323 | 2025-03-12T11:54:26.102602
HTTP/1.1 404 Not Found
Content-Type: text/plain; charset=utf-8
X-Content-Type-Options: nosniff
685 /
tcp
-1737707071 | 2025-02-28T05:09:09.600970
\x00b\x00\x01\x00\x00\x00\x00x\x0b\x00\x00\x00\x00z\x00437
771 /
tcp
722711397 | 2025-02-21T20:21:50.610618
\x00[M\xc3\xba\xc3\x9a\x7f\x00\x00
789 /
tcp
1911457608 | 2025-02-26T10:54:34.075465
\x00[\x00\x00\x00\x00\x00\x00
805 /
tcp
-1399940268 | 2025-03-10T06:24:04.776351
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
843 /
tcp
-2004989248 | 2025-03-09T12:54:56.120774
<cross-domain-policy>\n <allow-access-from domain="*" to-po\nrts="*" />\n</cross-domain-policy>
873 /
tcp
-1970692834 | 2025-03-13T17:13:41.960215
@RSYNCD: 31.0\n@RSYNCD: EXIT\n
887 /
tcp
-891714208 | 2025-03-12T00:35:17.600223
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
902 /
tcp
693973426 | 2025-02-26T13:53:22.098842
220 VMware Authentication Daemon Version 1.10: SSL Required, Se\nrverDaemonProtocol:SOAP, MKSDisplayProtocol:VNC , , NFCSSL supported/t
943 /
tcp
1911457608 | 2025-02-27T10:28:42.087956
\x00[\x00\x00\x00\x00\x00\x00
995 /
tcp
1685649979 | 2025-02-28T01:32:01.612027
1000 /
tcp
-653033013 | 2025-03-13T01:28:57.297006
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
1025 /
tcp
408230060 | 2025-03-12T23:46:59.570326
\r\nSorry, that nickname format is invalid.\r\n
1027 /
tcp
819727972 | 2025-03-08T17:57:39.642539
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1839934832 | 2025-02-19T04:36:18.815751
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
1099 /
tcp
819727972 | 2025-02-25T20:38:13.392444
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1153 /
tcp
1911457608 | 2025-03-11T07:10:31.663977
\x00[\x00\x00\x00\x00\x00\x00
1177 /
tcp
-2033111675 | 2025-02-18T19:58:55.242822
1190 /
tcp
-2089734047 | 2025-02-18T15:50:34.952316
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1193 /
tcp
408230060 | 2025-02-26T09:21:09.058229
\r\nSorry, that nickname format is invalid.\r\n
-1839934832 | 2025-03-06T21:28:22.934028
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
1200 /
tcp
819727972 | 2025-02-20T17:07:35.857256
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1207 /
tcp
1911457608 | 2025-02-18T03:11:38.450238
\x00[\x00\x00\x00\x00\x00\x00
1234 /
tcp
1911457608 | 2025-02-23T18:25:24.434807
\x00[\x00\x00\x00\x00\x00\x00
1291 /
tcp
897328069 | 2025-02-26T17:41:16.557006
220 mail.scott000.com ESMTP
1337 /
tcp
1741579575 | 2025-03-11T10:16:30.778638
1377 /
tcp
321971019 | 2025-02-24T22:31:24.327558
-ERR client ip is not in whitelist\r
1414 /
tcp
-1399940268 | 2025-03-11T20:58:58.113697
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1433 /
tcp
-1279739995 | 2025-03-09T22:32:54.330059
MSSQL Server\nVersion: 167773760 (0xa000640)\nSub-Build: 0\nEncryption:Not available\n\nMSSQL NTLM Info:\nTarget_Name: XINKE20190306\nProduct_Version: 6.1.7601 Ntlm 15\nOS: Windows 7, Service Pack 1/Windows Server 2008 R2, Service Pack 1\nNetBIOS_Domain_Name: XINKE20190306\nNetBIOS_Computer_Name: XINKE20190306\nDNS_Domain_Name: xinke20190306\nDNS_Computer_Name: xinke20190306\nSystem_Time: 2024-01-22 04:04:46 +0000 UTC\n\n
1452 /
tcp
-2089734047 | 2025-03-09T12:59:13.066448
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1453 /
tcp
-297128567 | 2025-02-22T13:22:44.614737
\x04\x01\xc3\xb4\x00\x15Internal Server Error\x00\x00\x00AB\x00\x02\x05\x00
1460 /
tcp
401555314 | 2025-02-21T07:22:29.487037
-1835577706 | 2025-03-05T10:39:13.958345
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html; charset="UTF-8"
Transfer-Encoding: chunked
Connection: keep-alive
Keep-Alive: timeout=20
Vary: Accept-Encoding
Cache-control: no-store
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
1515 /
tcp
539065883 | 2025-03-11T08:20:24.896599
1521 /
tcp
-541815454 | 2025-03-06T16:23:50.690360
Version:11.2.0.1.0\n"\\x00\\x00Y(DESCRIPTION=(TMP=)(VSNNUM=186646784)(ERR=1189)(ERROR_STACK=(ERROR=(CODE=1189)(EMFI=4))))
1588 /
tcp
504717326 | 2025-02-23T08:56:37.070416
SSH-2.0-OpenSSH_8.6
Vulnerabilities
1599 /
tcp
-1626979812 | 2025-02-24T10:37:34.942363
220 Service ready for new user.
1723 /
tcp
1103582599 | 2025-03-06T21:58:54.754321
Firmware: 1\nHostname: Vigor\nVendor: DrayTek\n
1800 /
tcp
1492413928 | 2025-03-13T21:22:28.374628
SSH-2.0-OpenSSH_7.5
Vulnerabilities
1883 /
tcp
2087396567 | 2025-03-04T15:00:44.760375
kjnkjabhbanc283ubcsbhdc72
1911 /
tcp
819727972 | 2025-03-13T06:27:20.189781
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1926 /
tcp
539065883 | 2025-03-12T19:02:25.604300
1951 /
tcp
-1399940268 | 2025-02-24T11:19:47.478329
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1954 /
tcp
819727972 | 2025-02-26T16:34:23.710918
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1962 /
tcp
1911457608 | 2025-02-24T11:59:10.872327
\x00[\x00\x00\x00\x00\x00\x00
1964 /
tcp
-904840257 | 2025-03-06T18:35:16.552030
572 Relay not authorized\r\n
1979 /
tcp
1620329124 | 2025-03-13T18:01:30.962065
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\x01\xc3\xbf\xc3\xbb\x03\xc3\xbf\xc3\xbd\x01\xc3\xbf\xc3\xbe\x01Username:
1981 /
tcp
-2096652808 | 2025-03-05T15:22:58.475901
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
2002 /
tcp
-1358907795 | 2025-02-25T22:33:53.783765
2003 /
tcp
1911457608 | 2025-03-12T01:00:31.188681
\x00[\x00\x00\x00\x00\x00\x00
-1839934832 | 2025-02-27T06:16:37.971921
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
2008 /
tcp
1996932384 | 2025-03-11T14:53:40.642879
2012 /
tcp
-1399940268 | 2025-02-24T20:49:57.115849
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2018 /
tcp
-1795027372 | 2025-02-20T23:28:01.962836
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
372433470 | 2025-02-25T04:55:41.298329
HTTP/1.1 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm=""
2055 /
tcp
-142686627 | 2025-03-07T12:28:53.476157
\x00[\xc2\xba\x7fs\x7f\x00\x00
2061 /
tcp
1911457608 | 2025-03-07T01:11:19.622755
\x00[\x00\x00\x00\x00\x00\x00
2067 /
tcp
1880683805 | 2025-02-25T08:02:53.234289
2070 /
tcp
1996932384 | 2025-02-25T13:35:09.396335
2072 /
tcp
1911457608 | 2025-02-23T08:43:44.394086
\x00[\x00\x00\x00\x00\x00\x00
2083 /
tcp
1690634669 | 2025-03-11T12:53:11.685971
2087 /
tcp
320677201 | 2025-03-13T04:00:09.219897
H\x00\x00\x00\xc3\xbfj\x04Host \'101.133.140.114\' is not allowed to \nconnect to this MySQL server
2101 /
tcp
1623746877 | 2025-03-04T06:19:14.955106
500 Permission denied - closing connection.\r\n
2121 /
tcp
2047379038 | 2025-02-27T22:26:29.402100
220 RS820Plus FTP server ready.
1077013874 | 2025-02-25T02:06:23.580734
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
2154 /
tcp
676476721 | 2025-03-11T18:59:13.842907
ELM Enterprise Manager _l
Copyright © 18668511-928641920 TNT Software, Inc.
2156 /
tcp
1911457608 | 2025-03-10T13:05:44.276949
\x00[\x00\x00\x00\x00\x00\x00
2196 /
tcp
165188539 | 2025-02-22T01:17:17.342852
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
2202 /
tcp
819727972 | 2025-02-24T09:41:46.987770
SSH-2.0-OpenSSH_7.4
Vulnerabilities
372433470 | 2025-03-12T10:44:42.452208
HTTP/1.1 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm=""
2233 /
tcp
671605376 | 2025-03-10T20:30:29.108709
2266 /
tcp
-1105333987 | 2025-03-06T03:15:57.013935
2344 /
tcp
-122096153 | 2025-02-18T02:56:42.771880
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
2345 /
tcp
-2089734047 | 2025-03-11T16:19:46.718684
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
2376 /
tcp
819727972 | 2025-03-11T04:14:15.702718
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2404 /
tcp
-1399940268 | 2025-03-13T04:43:27.908752
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2444 /
tcp
-1733645023 | 2025-02-22T05:49:10.554219
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
2455 /
tcp
1212921144 | 2025-02-24T12:21:28.516260
2549 /
tcp
-358801646 | 2025-03-04T09:49:02.224510
2559 /
tcp
897328069 | 2025-03-06T20:57:07.289735
220 mail.scott000.com ESMTP
2761 /
tcp
-1399940268 | 2025-03-06T08:22:34.721687
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2762 /
tcp
-1888448627 | 2025-02-18T16:55:45.426089
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
2806 /
tcp
819727972 | 2025-03-05T10:13:44.601468
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2850 /
tcp
-1399940268 | 2025-03-13T05:17:28.473447
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3001 /
tcp
165188539 | 2025-02-26T14:28:46.762274
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
3008 /
tcp
455076604 | 2025-02-28T08:15:21.492298
!\x07version\x04bind7 t{RPowerDNS Recursor 410
3010 /
tcp
455076604 | 2025-02-24T19:51:09.436630
!\x07version\x04bind7 t{RPowerDNS Recursor 410
3050 /
tcp
2063598737 | 2025-03-10T18:34:12.418274
3065 /
tcp
819727972 | 2025-03-13T16:25:19.818524
SSH-2.0-OpenSSH_7.4
Vulnerabilities
198844676 | 2025-03-06T16:27:04.370495
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3073 /
tcp
-345718689 | 2025-02-26T20:50:17.727433
3074 /
tcp
-1795027372 | 2025-02-23T23:33:06.352789
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
198844676 | 2025-03-13T10:37:40.319794
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3080 /
tcp
401555314 | 2025-02-25T21:02:45.888040
3081 /
tcp
401555314 | 2025-02-24T21:44:29.268034
3084 /
tcp
-2089734047 | 2025-03-10T10:19:15.399316
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3094 /
tcp
-1399940268 | 2025-03-04T01:33:44.640062
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1453516345 | 2025-02-24T17:48:55.002081
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
3106 /
tcp
-1733645023 | 2025-02-19T12:01:54.165972
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
3107 /
tcp
1381121983 | 2025-03-10T06:19:26.466236
3114 /
tcp
-1399940268 | 2025-02-19T15:52:33.041638
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3126 /
tcp
921225407 | 2025-02-24T06:37:17.266200
\x00\x00\x00\x04\x00\x00\x00\x00\x00
3131 /
tcp
-2140303521 | 2025-03-10T21:08:59.691227
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected\n
3136 /
tcp
89142341 | 2025-02-22T18:42:52.065310
\x05\x00\x00\x00\x0b\x08\x05\x1a\x00
3144 /
tcp
-445721795 | 2025-03-04T22:57:52.151797
\x00[\xc3\xaed\x1a\x7f\x00\x00
3155 /
tcp
-1329831334 | 2025-02-27T03:28:34.210575
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
3160 /
tcp
-1059554316 | 2025-03-04T22:22:31.906045
\xc2\xa5A\x00\x01\x00\x00\x00,\x00\x00\x00\x02\x00\x00\x00L\x00\x00\x00\x08Connect\x00\x00\x00\x00x\x00\x00\x00\x0857222\x00\x00\x00
3161 /
tcp
-801484042 | 2025-02-19T14:26:58.458174
3177 /
tcp
-653033013 | 2025-03-11T10:23:43.873217
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
3185 /
tcp
1767345577 | 2025-02-20T03:58:44.724536
Hello, this is Quagga (version 0T).
Copyright 1996-200
3191 /
tcp
-1399940268 | 2025-02-25T10:11:59.497580
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3196 /
tcp
-303199180 | 2025-03-12T00:51:23.382567
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
-1341662640 | 2025-03-12T18:10:59.772373
HTTP/1.1 301 Moved Permanently
Server: Zope/(2.13.23, python 1.7.18, linux2) ZServer/1.1
Content-Type: text/plain; charset=utf-8
Connection: close
-2031078612 | 2025-02-19T04:50:01.471690
HTTP/1.1 302 Found
Content-Type: text/html; charset=utf-8
Location: http://proxy.ces.org.tw:3000/login?url=http%3A%2F%2Floginbyurl.wanfangdata.com.cn%2F
3269 /
tcp
-1032713145 | 2025-03-10T14:03:17.160959
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
3299 /
tcp
2087396567 | 2025-03-10T14:35:44.115093
kjnkjabhbanc283ubcsbhdc72
3301 /
tcp
-339084706 | 2025-03-10T18:32:43.464782
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
3307 /
tcp
-2096652808 | 2025-03-11T15:33:12.337703
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
3388 /
tcp
-2017887953 | 2025-02-24T07:16:18.701370
SSH-2.0-OpenSSH_7.9
Vulnerabilities
3401 /
tcp
1911457608 | 2025-03-04T11:04:43.654441
\x00[\x00\x00\x00\x00\x00\x00
1282941221 | 2025-02-19T23:00:01.081409
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
3523 /
tcp
2098371729 | 2025-03-13T02:20:54.891767
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
3553 /
tcp
-1399940268 | 2025-03-10T12:38:31.645619
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3559 /
tcp
-2089734047 | 2025-02-27T05:09:15.280969
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3561 /
tcp
-1399940268 | 2025-03-05T10:28:01.008285
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-288825733 | 2025-03-10T23:37:43.198587
HTTP/1.1 200 OK
Connection: close
Content-Length: 2619
Accept-Ranges: bytes
Access-Control-Allow-Credentials: true
Access-Control-Allow-Headers: authorization,Content-Type
Access-Control-Allow-Methods: POST, GET, OPTIONS, PUT, HEAD, DELETE
Content-Type: text/html
Server: Jetty(9.4.14.v20181114)
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1
3563 /
tcp
819727972 | 2025-03-08T17:13:47.979721
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3567 /
tcp
819727972 | 2025-02-26T15:17:51.925024
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3590 /
tcp
632542934 | 2025-02-28T07:22:38.109261
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
3780 /
tcp
2087396567 | 2025-02-23T09:35:43.198845
kjnkjabhbanc283ubcsbhdc72
3954 /
tcp
819727972 | 2025-03-05T18:03:12.593269
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4022 /
tcp
-445721795 | 2025-02-27T17:47:13.230372
\x00[\xc3\xaed\x1a\x7f\x00\x00
4063 /
tcp
-21576419 | 2025-02-24T20:58:28.507837
ÿûUDo you want ANSI color? (Y/n)
4064 /
tcp
-2089734047 | 2025-03-08T18:46:41.183017
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
4150 /
tcp
819727972 | 2025-03-03T22:31:40.076918
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4157 /
tcp
819727972 | 2025-03-09T21:18:22.911187
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4159 /
tcp
165188539 | 2025-02-26T22:08:55.973003
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
4282 /
tcp
-1881409212 | 2025-02-25T00:13:37.449092
4321 /
tcp
-1250504565 | 2025-03-06T08:10:24.204595
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x80\x00\x04\x00\x01\x00\x00\x00\x05\x00\xff\xff\xff\x00\x00\x04\x08\x00\x00\x00\x00\x00\x7f\xff\x00\x00\x00\x00\x08\x07\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01
4333 /
tcp
-1399940268 | 2025-02-26T00:33:32.396141
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4400 /
tcp
819727972 | 2025-02-26T23:19:52.375432
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1282941221 | 2025-03-09T23:11:48.344641
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
1282941221 | 2025-02-19T17:35:14.056115
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
4461 /
tcp
819727972 | 2025-02-20T07:32:02.491268
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4500 /
tcp
-1487943323 | 2025-03-07T05:03:36.270173
431 Unable to negotiate secure command connection.\r\n
4572 /
tcp
1911457608 | 2025-02-28T08:41:36.311293
\x00[\x00\x00\x00\x00\x00\x00
4840 /
tcp
165188539 | 2025-02-22T06:16:09.309900
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
4911 /
tcp
1492413928 | 2025-02-28T08:58:12.810153
SSH-2.0-OpenSSH_7.5
Vulnerabilities
4949 /
tcp
550048729 | 2025-03-11T06:42:34.544428
5001 /
tcp
117101543 | 2025-03-06T20:59:18.052528
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
5004 /
tcp
709622286 | 2025-02-21T20:11:46.745022
OK Welcome <299685> on DirectUpdate server 7286\r\n
5006 /
tcp
-1026951088 | 2025-02-23T15:55:25.919561
5007 /
tcp
-303199180 | 2025-03-12T11:56:15.446697
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
5010 /
tcp
-445721795 | 2025-02-18T12:54:43.116754
\x00[\xc3\xaed\x1a\x7f\x00\x00
5025 /
tcp
2087396567 | 2025-03-13T05:46:37.759744
kjnkjabhbanc283ubcsbhdc72
5123 /
tcp
1632932802 | 2025-03-06T17:24:26.534383
5150 /
tcp
1504401647 | 2025-03-12T01:40:35.240247
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
5172 /
tcp
-1441741890 | 2025-02-28T11:21:46.582777
220 corpease.net Anti-spam GT for Coremail System (icmhosting[2
0181212])
1077013874 | 2025-02-28T19:18:26.675938
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
5241 /
tcp
380146262 | 2025-03-10T07:35:37.749430
5249 /
tcp
819727972 | 2025-03-06T01:16:41.837963
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5254 /
tcp
-1189269828 | 2025-03-07T07:33:28.183186
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
5261 /
tcp
819727972 | 2025-02-23T23:18:59.766934
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-241300778 | 2025-02-23T04:04:07.831661
HTTP/1.1 400 Bad Request
Server: CWAP-waf
Content-Type: text/html
Connection: close
WZWS-RAY: 1249-1705938365.72-w-waf02tjgt
5274 /
tcp
-1189269828 | 2025-03-07T03:14:18.137752
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
-1059303297 | 2025-03-09T10:40:09.781251
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae26d2_PS-WNZ-01STm32_6219-62952
5432 /
tcp
-2046514463 | 2025-03-11T11:31:41.726059
5433 /
tcp
-1399940268 | 2025-02-20T04:51:37.859475
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5435 /
tcp
51259122 | 2025-03-12T09:09:47.243255
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
5568 /
tcp
-2140303521 | 2025-03-11T17:15:45.722145
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected\n
5569 /
tcp
-1297953727 | 2025-03-13T12:55:22.991596
\x02\x00\x00\x00\x00\x00\x06\x04\x00\x00\x00\x00\x00\x0c\x00\x00\n0\x00\x1c
5590 /
tcp
921225407 | 2025-03-05T03:43:14.475973
\x00\x00\x00\x04\x00\x00\x00\x00\x00
5596 /
tcp
-1399940268 | 2025-02-22T13:14:02.862019
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5640 /
tcp
-1399940268 | 2025-03-13T21:16:07.379805
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5672 /
tcp
575925250 | 2025-03-10T13:57:11.455134
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
5678 /
tcp
687434487 | 2025-02-22T00:55:31.805642
\\x00\\x00\\x00{\n "RPCMethod":"preinstall",\n }
5902 /
tcp
-1730858130 | 2025-03-06T22:08:19.116020
RFB 003.008
VNC:
Protocol Version: 3.8
-840053751 | 2025-03-10T10:48:43.349424
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html
Connection: keep-alive
Access-Control-Allow-Origin: *
Access-Control-Allow-Methods: POST, GET,PUT,DELETE OPTIONS
Access-Control-Allow-Headers: Origin, Authorization, Accept,Content-Type
Access-Control-Allow-Credentials: true
Accept-Ranges: bytes
Access-Control-Allow-Origin: *
Access-Control-Allow-Methods: POST, GET,PUT,DELETE OPTIONS
Access-Control-Allow-Headers: Origin, Authorization, Accept,Content-Type
Access-Control-Allow-Credentials: tru
-1839934832 | 2025-02-18T08:19:05.357457
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
5918 /
tcp
819727972 | 2025-03-11T04:09:10.738451
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5919 /
tcp
-2089734047 | 2025-02-24T05:57:05.570534
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
5938 /
tcp
-1399940268 | 2025-03-06T21:57:43.746458
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6000 /
tcp
-1327660293 | 2025-03-08T16:51:35.157112
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
6001 /
tcp
307999478 | 2025-02-19T23:04:15.514526
unknown command \r\nunknown command \r\n
6003 /
tcp
1911457608 | 2025-03-12T18:47:28.631509
\x00[\x00\x00\x00\x00\x00\x00
6005 /
tcp
-1713437100 | 2025-03-05T15:37:53.269203
\xc3\xbf\xc3\xbb\x01\r\nWelcome to NetLinx v94 Copyright AMX Corp. 34395-49007\r\n>
6010 /
tcp
-747911285 | 2025-02-25T14:23:07.089982
-271515508 | 2025-02-20T16:06:18.345955
HTTP/1.1 302 Moved Temporarily
Server: DrcomServer1.0
Location: http://192.168.254.3
Cache-Control: no-cache
Connection: close
6379 /
tcp
321971019 | 2025-03-05T10:49:56.080334
-ERR client ip is not in whitelist\r
6505 /
tcp
-1399940268 | 2025-02-25T13:47:23.462272
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
378148627 | 2025-02-18T16:34:22.447939
HTTP/1.1 497 Http to Https
Server: nginx/1.20.1
Content-Type: text/html; charset=utf-8
Connection: close
6511 /
tcp
819727972 | 2025-03-04T18:11:52.536294
SSH-2.0-OpenSSH_7.4
Vulnerabilities
6662 /
tcp
-1279886438 | 2025-03-06T05:16:58.341874
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
4935895 | 2025-02-24T17:20:43.223547
HTTP/1.1 400 Bad Request
Server: CloudWAF
6667 /
tcp
539065883 | 2025-02-24T14:17:06.163582
6668 /
tcp
819727972 | 2025-02-21T18:54:22.035503
SSH-2.0-OpenSSH_7.4
Vulnerabilities
6697 /
tcp
1911457608 | 2025-02-25T22:16:08.071455
\x00[\x00\x00\x00\x00\x00\x00
6755 /
tcp
677934968 | 2025-02-23T10:55:16.001302
6998 /
tcp
819727972 | 2025-02-25T17:52:44.253229
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1749359477 | 2025-03-04T18:21:43.956088
HTTP/1.1 403 Forbidden
Content-Type: text/html
Connection: keep-alive
NO_SERVICE: 1
7003 /
tcp
1615193817 | 2025-02-22T20:27:56.638065
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
1320285193 | 2025-03-10T20:43:49.550527
HTTP/1.1 404 Not Found
Server: CloudWAF
Content-Type: text/html
Connection: keep-alive
1282941221 | 2025-02-28T07:08:30.998416
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
7021 /
tcp
1911457608 | 2025-02-27T06:04:43.889346
\x00[\x00\x00\x00\x00\x00\x00
7071 /
tcp
233634112 | 2025-02-28T15:59:27.857650
SSH-98.60-SysaxSSH_81885..42
7082 /
tcp
-1399940268 | 2025-03-10T17:09:33.730776
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1163658549 | 2025-03-04T19:48:44.714906
HTTP/1.1 200 OK
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html
7348 /
tcp
-1399940268 | 2025-03-12T03:25:52.121715
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7401 /
tcp
-1713437100 | 2025-03-06T09:40:44.958575
\xc3\xbf\xc3\xbb\x01\r\nWelcome to NetLinx v94 Copyright AMX Corp. 34395-49007\r\n>
7415 /
tcp
-1730858130 | 2025-02-22T20:18:24.475735
RFB 003.008
VNC:
Protocol Version: 3.8
7434 /
tcp
-971970408 | 2025-03-07T10:00:34.174686
-1209805157 | 2025-03-11T10:05:39.031775
HTTP/1.1 403 Forbidden
Server: openresty
Content-Type: text/html
Connection: keep-alive
via: CHN-SH-COchilian1-CACHE1[1]
X-CCDN-FORBID-CODE: 040001
7465 /
tcp
-1399940268 | 2025-03-13T02:02:52.044177
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7500 /
tcp
-1036370807 | 2025-02-21T03:00:03.919778
0 | 2025-03-11T01:35:13.577479
HTTP/1.1 408 Request Timeout
Content-Length: 0
7548 /
tcp
539065883 | 2025-02-22T10:43:45.766936
1282941221 | 2025-02-18T06:19:05.216598
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
7634 /
tcp
-2096652808 | 2025-03-09T09:45:19.937425
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
7801 /
tcp
-1399940268 | 2025-03-12T15:18:26.802143
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1259524839 | 2025-03-13T10:30:31.786455
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=UTF-8
Server: Microsoft-HTTPAPI/2.0
2103111368 | 2025-03-10T19:26:26.003796
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
8003 /
tcp
1911457608 | 2025-02-24T18:47:42.431225
\x00[\x00\x00\x00\x00\x00\x00
8009 /
tcp
-2017887953 | 2025-03-09T21:52:40.291745
SSH-2.0-OpenSSH_7.9
Vulnerabilities
8011 /
tcp
-136006866 | 2025-02-18T19:39:46.156413
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
8012 /
tcp
-1373613804 | 2025-03-13T03:21:31.668892
00970795:d7:smethod,6:shello,8:soptions,80:d10:shttp_port,368696:i1082,5:sname,5:sL_x,10:ssync_port,5:i00469,10:stimestamp,3190459:f920.7251553166,8:sversion,6262522:sl4X,
8017 /
tcp
321971019 | 2025-02-22T18:44:09.278767
-ERR client ip is not in whitelist\r
8018 /
tcp
-1399940268 | 2025-03-04T21:36:36.837074
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8026 /
tcp
1996932384 | 2025-02-21T02:06:53.222756
8027 /
tcp
819727972 | 2025-03-12T20:07:41.468929
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8030 /
tcp
-1399940268 | 2025-02-18T01:50:33.494279
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1839934832 | 2025-03-06T10:40:35.249037
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
8047 /
tcp
-1399940268 | 2025-03-09T13:45:16.956487
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8063 /
tcp
-1399940268 | 2025-03-01T01:18:37.517180
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8064 /
tcp
-358801646 | 2025-03-11T09:05:02.550258
8081 /
tcp
366084633 | 2025-03-13T03:02:05.957676
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
8083 /
tcp
1208318993 | 2025-03-04T20:31:46.783734
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
8085 /
tcp
819727972 | 2025-02-25T15:28:02.366814
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8089 /
tcp
842535728 | 2025-03-04T23:31:57.779870
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>
A<!DOCTYPE GANGLIA_XML [
<!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...
-2107996212 | 2025-03-05T23:56:36.516719
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
8103 /
tcp
-2031152423 | 2025-03-07T18:00:29.768101
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
8113 /
tcp
-1477838366 | 2025-02-28T01:43:59.614815
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
8119 /
tcp
-407828767 | 2025-02-23T01:04:03.323062
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
8120 /
tcp
-2089734047 | 2025-02-19T18:37:18.294035
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8126 /
tcp
416263569 | 2025-03-05T11:55:45.088301
8134 /
tcp
1911457608 | 2025-03-04T11:17:13.581761
\x00[\x00\x00\x00\x00\x00\x00
8137 /
tcp
-2017887953 | 2025-02-27T04:00:17.042338
SSH-2.0-OpenSSH_7.9
Vulnerabilities
8139 /
tcp
873425297 | 2025-03-06T06:22:13.388939
200 NOD32SS 99 (3318497116)
8140 /
tcp
1278527606 | 2025-03-12T21:54:18.398675
8144 /
tcp
632542934 | 2025-02-18T19:41:45.677565
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
1282941221 | 2025-02-26T23:26:31.392242
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
8152 /
tcp
504717326 | 2025-02-20T19:22:23.355454
SSH-2.0-OpenSSH_8.6
Vulnerabilities
8161 /
tcp
-445721795 | 2025-02-23T18:06:39.075486
\x00[\xc3\xaed\x1a\x7f\x00\x00
8166 /
tcp
1911457608 | 2025-02-27T19:10:01.689692
\x00[\x00\x00\x00\x00\x00\x00
8170 /
tcp
1911457608 | 2025-03-12T13:03:55.197524
\x00[\x00\x00\x00\x00\x00\x00
8195 /
tcp
-146605374 | 2025-03-12T02:24:29.191553
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
8196 /
tcp
2121220663 | 2025-02-26T17:33:27.647086
8198 /
tcp
1308377066 | 2025-03-13T01:46:28.107749
8230 /
tcp
632542934 | 2025-03-10T11:26:57.320027
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
8238 /
tcp
740837454 | 2025-03-13T01:44:36.200608
SSH-2.0-OpenSSH_5.3
Vulnerabilities
8252 /
tcp
165188539 | 2025-02-21T23:27:33.562724
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8284 /
tcp
-345718689 | 2025-03-05T21:12:30.995144
8291 /
tcp
1126993057 | 2025-03-11T07:12:07.515711
* OK [CAPABILITY a2,M\\] nBwXk2pPP IMAP4rev1 20qx at
8316 /
tcp
-980525298 | 2025-03-11T22:25:01.976343
\x01\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8322 /
tcp
-1611764932 | 2025-02-23T08:28:46.184067
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
-1835577706 | 2025-03-12T14:40:16.990117
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html; charset="UTF-8"
Transfer-Encoding: chunked
Connection: keep-alive
Keep-Alive: timeout=20
Vary: Accept-Encoding
Cache-control: no-store
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
8385 /
tcp
-2046514463 | 2025-02-25T00:42:52.820491
8388 /
tcp
-1399940268 | 2025-02-17T23:34:25.249402
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8405 /
tcp
1911457608 | 2025-03-06T09:08:35.718048
\x00[\x00\x00\x00\x00\x00\x00
8406 /
tcp
-1399940268 | 2025-03-10T08:23:53.829857
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8409 /
tcp
165188539 | 2025-03-05T23:12:30.404552
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8415 /
tcp
321971019 | 2025-02-23T22:49:33.682763
-ERR client ip is not in whitelist\r
8427 /
tcp
1504401647 | 2025-03-10T09:16:40.375835
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
8433 /
tcp
165188539 | 2025-03-06T21:56:02.570360
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8440 /
tcp
-2089734047 | 2025-02-19T16:25:31.416507
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8450 /
tcp
-1888448627 | 2025-02-20T12:20:51.137728
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8456 /
tcp
-2089734047 | 2025-02-27T10:11:45.921274
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8458 /
tcp
921225407 | 2025-03-11T21:38:37.317636
\x00\x00\x00\x04\x00\x00\x00\x00\x00
8460 /
tcp
-1888448627 | 2025-02-18T15:44:22.043687
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8482 /
tcp
-1428621233 | 2025-03-08T11:41:52.706097
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
8484 /
tcp
165188539 | 2025-03-05T20:33:17.334658
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8494 /
tcp
-1399940268 | 2025-03-12T23:43:59.489187
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8500 /
tcp
-684625978 | 2025-02-22T01:27:19.503885
{Datacenter:dc1 NodeName:consul-dev NodeID:e61aec6b-e338-67fa-3b08-f8185bd5b528 Revision:db839f18b Server:true Version:1.10.1}
8505 /
tcp
709622286 | 2025-02-23T15:02:58.153614
OK Welcome <299685> on DirectUpdate server 7286\r\n
8510 /
tcp
-1888448627 | 2025-02-21T19:51:12.029835
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
-1839934832 | 2025-03-09T11:52:11.436572
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
8532 /
tcp
-1399940268 | 2025-02-18T20:27:29.962135
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8533 /
tcp
-339084706 | 2025-02-24T12:04:45.000142
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
8536 /
tcp
-1538260461 | 2025-03-05T05:49:55.555180
8540 /
tcp
669849225 | 2025-02-28T09:04:25.518906
SSH-98.60-SysaxSSH_81885..42\r\n
8545 /
tcp
819727972 | 2025-03-11T16:28:52.849998
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8554 /
tcp
-321444299 | 2025-03-10T01:35:29.031266
:dircproxy NOTICE AUTH :Looking up your hostname...
:dircproxy NOTICE AUTH :Got your hostname.
8602 /
tcp
-1648456501 | 2025-03-09T18:43:56.182863
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
8623 /
tcp
-1399940268 | 2025-03-06T23:04:41.785782
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1077013874 | 2025-03-11T19:04:10.748611
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
1489954473 | 2025-02-20T22:12:48.691238
HTTP/1.1 410 Gone
Server: openresty
Transfer-Encoding: chunked
Connection: keep-alive
Via: 1.1 google
8688 /
tcp
321971019 | 2025-03-07T07:10:25.564400
-ERR client ip is not in whitelist\r
338373490 | 2025-03-09T09:45:35.125418
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ab5971_PS-TSN-01U29149_28433-38153
8706 /
tcp
-1399940268 | 2025-03-07T01:32:52.948770
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8707 /
tcp
1911457608 | 2025-03-10T17:28:58.607472
\x00[\x00\x00\x00\x00\x00\x00
8728 /
tcp
1911457608 | 2025-03-13T20:29:44.451871
\x00[\x00\x00\x00\x00\x00\x00
8733 /
tcp
1911457608 | 2025-03-06T08:09:22.099639
\x00[\x00\x00\x00\x00\x00\x00
8743 /
tcp
-1329831334 | 2025-02-19T01:03:17.345522
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
8765 /
tcp
-1327660293 | 2025-03-06T16:42:22.085096
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
8801 /
tcp
819727972 | 2025-03-07T17:24:13.035029
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8807 /
tcp
-358801646 | 2025-03-11T13:53:19.355709
8810 /
tcp
-1399940268 | 2025-03-13T05:51:53.336875
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8822 /
tcp
819727972 | 2025-03-05T09:42:16.113677
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8823 /
tcp
-1399940268 | 2025-03-10T12:05:40.403825
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8824 /
tcp
575925250 | 2025-03-11T05:03:13.236994
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
-1013082686 | 2025-03-06T10:45:19.146830
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
8846 /
tcp
-1399940268 | 2025-03-13T14:03:00.234914
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1077013874 | 2025-02-22T18:10:06.973223
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
1077013874 | 2025-03-05T14:16:00.879106
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
8871 /
tcp
-1399940268 | 2025-03-06T16:28:04.090833
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8873 /
tcp
-1153858743 | 2025-02-18T02:03:33.335382
8876 /
tcp
-303199180 | 2025-02-19T15:04:19.838791
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
8877 /
tcp
-1189269828 | 2025-03-07T14:32:52.398733
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8880 /
tcp
1996932384 | 2025-02-22T17:34:51.267919
8889 /
tcp
819727972 | 2025-03-09T17:08:13.526368
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8943 /
tcp
1126993057 | 2025-03-12T05:44:08.835262
* OK [CAPABILITY a2,M\\] nBwXk2pPP IMAP4rev1 20qx at
2143387245 | 2025-03-05T11:36:22.738286
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
8999 /
tcp
-2089734047 | 2025-03-09T12:01:16.737441
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9000 /
tcp
1119676909 | 2025-02-23T21:23:01.416576
M\\xc4\xc5\xb1\\xfa\\xde\\xc8)W\\xad\\xaf\\xb8\\xb5\\x05\\x89\\x9f\\xa2\\x82\\xf2j7
9001 /
tcp
-1026951088 | 2025-03-04T23:21:56.748567
9002 /
tcp
2087396567 | 2025-03-11T22:05:08.254027
kjnkjabhbanc283ubcsbhdc72
9008 /
tcp
-2089734047 | 2025-02-24T08:39:24.096069
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9010 /
tcp
-1248408558 | 2025-02-23T07:29:36.132415
220 MikroTik FTP server (MikroTik 6.44.3) ready
9014 /
tcp
-1947777893 | 2025-02-20T10:29:59.560924
"Broadband Router"\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
9017 /
tcp
1381121983 | 2025-03-04T15:13:51.949239
9046 /
tcp
-1399940268 | 2025-02-27T19:21:26.542558
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9053 /
tcp
1911457608 | 2025-02-25T14:56:04.362236
\x00[\x00\x00\x00\x00\x00\x00
9065 /
tcp
321971019 | 2025-03-12T21:24:50.447882
-ERR client ip is not in whitelist\r
9066 /
tcp
1126993057 | 2025-02-18T20:47:42.987052
* OK [CAPABILITY a2,M\\] nBwXk2pPP IMAP4rev1 20qx at
-1056270173 | 2025-03-08T16:01:53.756280
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
9074 /
tcp
-122096153 | 2025-02-20T00:24:57.003710
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
9075 /
tcp
1911457608 | 2025-03-09T16:46:42.933204
\x00[\x00\x00\x00\x00\x00\x00
9083 /
tcp
-1888448627 | 2025-03-06T04:47:15.387454
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9091 /
tcp
1544300041 | 2025-02-25T03:44:44.386665
SSH-25453-Cisco-3524665.35
9092 /
tcp
-1399940268 | 2025-03-04T20:02:28.501026
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2103111368 | 2025-02-28T09:46:20.888681
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
9098 /
tcp
1911457608 | 2025-02-26T06:59:34.144424
\x00[\x00\x00\x00\x00\x00\x00
9100 /
tcp
165188539 | 2025-02-24T17:40:35.409276
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
9108 /
tcp
1911457608 | 2025-03-05T08:59:57.969036
\x00[\x00\x00\x00\x00\x00\x00
9111 /
tcp
117101543 | 2025-02-27T21:45:26.292894
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
9113 /
tcp
1911457608 | 2025-03-04T11:50:02.429119
\x00[\x00\x00\x00\x00\x00\x00
9115 /
tcp
-1059554316 | 2025-03-04T11:16:39.761995
\xc2\xa5A\x00\x01\x00\x00\x00,\x00\x00\x00\x02\x00\x00\x00L\x00\x00\x00\x08Connect\x00\x00\x00\x00x\x00\x00\x00\x0857222\x00\x00\x00
9117 /
tcp
-1327660293 | 2025-03-12T07:30:29.556601
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
9126 /
tcp
-1327660293 | 2025-02-24T12:28:21.008410
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
9134 /
tcp
-904840257 | 2025-03-12T10:25:00.954595
572 Relay not authorized\r\n
9151 /
tcp
-971970408 | 2025-03-11T04:28:27.895539
9157 /
tcp
597764502 | 2025-03-07T13:42:04.930212
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
9163 /
tcp
-1399940268 | 2025-02-27T23:00:38.871842
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9164 /
tcp
1308377066 | 2025-02-27T12:36:50.350385
9204 /
tcp
1492413928 | 2025-03-13T05:56:27.280230
SSH-2.0-OpenSSH_7.5
Vulnerabilities
9209 /
tcp
1911457608 | 2025-03-11T11:44:31.160989
\x00[\x00\x00\x00\x00\x00\x00
1282941221 | 2025-03-05T11:24:15.779215
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
9241 /
tcp
-1327660293 | 2025-03-04T17:26:21.571227
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
9246 /
tcp
-1399940268 | 2025-02-23T13:13:26.062595
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9301 /
tcp
819727972 | 2025-02-19T01:44:25.769773
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2103111368 | 2025-03-12T16:39:03.320805
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
9309 /
tcp
307999478 | 2025-03-05T08:49:00.895830
unknown command \r\nunknown command \r\n
9313 /
tcp
-1737707071 | 2025-02-23T15:35:21.694679
\x00b\x00\x01\x00\x00\x00\x00x\x0b\x00\x00\x00\x00z\x00437
9387 /
tcp
1504401647 | 2025-02-24T06:09:21.274513
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
9389 /
tcp
-1487943323 | 2025-03-10T09:07:03.068177
431 Unable to negotiate secure command connection.\r\n
9398 /
tcp
2087396567 | 2025-03-08T19:33:19.865149
kjnkjabhbanc283ubcsbhdc72
9418 /
tcp
233634112 | 2025-02-25T19:15:32.901072
SSH-98.60-SysaxSSH_81885..42
9501 /
tcp
-1399940268 | 2025-03-05T15:54:38.018820
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9530 /
tcp
-345718689 | 2025-02-22T12:19:42.814113
9633 /
tcp
1542849631 | 2025-03-10T02:45:39.446260
* OK [CAPABILITY a2,M\] nBwXk2pPP IMAP4rev1 20qx at
9663 /
tcp
321971019 | 2025-03-10T14:37:56.605934
-ERR client ip is not in whitelist\r
9674 /
tcp
-653033013 | 2025-03-05T08:45:21.752440
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
9734 /
tcp
819727972 | 2025-02-21T03:09:08.126646
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9758 /
tcp
1208318993 | 2025-03-04T23:57:15.623970
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
9797 /
tcp
-2017887953 | 2025-03-10T14:26:10.718196
SSH-2.0-OpenSSH_7.9
Vulnerabilities
-1013082686 | 2025-02-27T04:25:28.076893
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
1127011450 | 2025-03-13T18:10:35.712665
HTTP/1.1 200
Vary: Origin
Vary: Access-Control-Request-Method
Vary: Access-Control-Request-Headers
Accept-Ranges: bytes
Content-Type: text/html;charset=utf-8
Content-Language: en
-414819019 | 2025-03-03T22:42:46.260103
HTTP/1.1 200 OK
Content-type: text/html
Connection: close
-659335736 | 2025-03-04T23:28:23.885822
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae2864_xyd119_11675-57009
9997 /
tcp
-1795027372 | 2025-03-11T23:37:58.307369
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
1637038794 | 2025-02-19T17:44:02.986018
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae2521_PS-PEK-015Wj25_25111-50596
10000 /
tcp
-1598265216 | 2025-02-22T19:25:32.953607
10001 /
tcp
1492413928 | 2025-03-11T20:29:27.284838
SSH-2.0-OpenSSH_7.5
Vulnerabilities
10002 /
tcp
-1399940268 | 2025-03-04T18:25:55.751354
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10013 /
tcp
-1399940268 | 2025-03-12T14:44:07.240786
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10015 /
tcp
1011407350 | 2025-02-25T20:11:29.435519
* OK GroupWise IMAP4rev1 Server Ready\r\n
10019 /
tcp
-1327660293 | 2025-03-04T09:23:48.921625
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
10025 /
tcp
-1713437100 | 2025-03-05T05:10:26.096953
\xc3\xbf\xc3\xbb\x01\r\nWelcome to NetLinx v94 Copyright AMX Corp. 34395-49007\r\n>
10045 /
tcp
1911457608 | 2025-02-22T00:56:06.851182
\x00[\x00\x00\x00\x00\x00\x00
10050 /
tcp
-653033013 | 2025-03-12T13:24:16.196347
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
10052 /
tcp
1911457608 | 2025-03-07T16:28:22.338821
\x00[\x00\x00\x00\x00\x00\x00
10080 /
tcp
1134517380 | 2025-02-20T17:56:39.931183
welcome to Pandora console!\r\n----------------------------\n-------------------------\n| Login Time | 2021-12-08 1...\n
1282941221 | 2025-03-05T09:06:54.782367
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
10134 /
tcp
-1399940268 | 2025-02-19T19:27:13.643350
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10201 /
tcp
-1399940268 | 2025-03-08T14:07:30.682303
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10209 /
tcp
1615193817 | 2025-03-13T12:59:29.257119
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
10250 /
tcp
677934968 | 2025-02-26T21:31:25.670101
10251 /
tcp
1208318993 | 2025-02-25T17:57:06.829123
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
10256 /
tcp
1911457608 | 2025-03-09T10:50:59.919950
\x00[\x00\x00\x00\x00\x00\x00
10324 /
tcp
366084633 | 2025-03-12T16:11:32.247763
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
1830697416 | 2025-02-24T22:26:16.066594
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
10911 /
tcp
-2096652808 | 2025-02-26T06:53:19.558180
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
11000 /
tcp
-1399940268 | 2025-03-12T08:30:27.084075
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
11001 /
tcp
-146605374 | 2025-03-06T19:07:23.180409
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
11002 /
tcp
-1399940268 | 2025-02-26T06:25:54.976543
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
11111 /
tcp
1278527606 | 2025-03-12T15:59:21.875084
11112 /
tcp
-1733645023 | 2025-02-25T01:29:40.999527
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
11211 /
tcp
-136006866 | 2025-03-06T03:31:14.091586
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
11288 /
tcp
-1099385124 | 2025-03-12T15:23:34.721747
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
11596 /
tcp
671605376 | 2025-03-10T06:20:03.125176
11601 /
tcp
1541211644 | 2025-03-07T12:45:53.084145
11681 /
tcp
-653033013 | 2025-03-10T07:27:53.036044
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
-1723613895 | 2025-03-09T20:13:09.871845
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae2232_PS-HAK-01h6h34_6336-63973
12056 /
tcp
-2089734047 | 2025-02-20T17:54:33.705709
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12109 /
tcp
921225407 | 2025-02-19T08:38:05.822347
\x00\x00\x00\x04\x00\x00\x00\x00\x00
12121 /
tcp
-2096652808 | 2025-03-10T04:29:26.514938
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12122 /
tcp
-345718689 | 2025-03-05T17:39:28.093915
12125 /
tcp
-1399940268 | 2025-03-08T20:46:42.442133
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12132 /
tcp
819727972 | 2025-03-06T03:06:59.517850
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12140 /
tcp
1991883981 | 2025-02-24T12:01:10.686987
B\x00\x00\x00\xc3\xbfn\x04Too many connections
12141 /
tcp
-2089734047 | 2025-03-05T22:22:53.024018
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12144 /
tcp
-303199180 | 2025-02-25T01:04:44.493657
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
12145 /
tcp
580340387 | 2025-03-06T08:50:24.267909
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
-2107996212 | 2025-02-20T07:01:23.740700
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
12169 /
tcp
-1399940268 | 2025-02-27T01:22:07.795714
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12175 /
tcp
937756010 | 2025-03-06T19:40:27.288375
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x01\x00\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12179 /
tcp
819727972 | 2025-03-09T15:41:21.443643
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12181 /
tcp
-2089734047 | 2025-03-10T14:20:23.448409
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12183 /
tcp
-1888448627 | 2025-03-04T16:58:51.397799
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12192 /
tcp
1212285915 | 2025-02-21T18:36:07.181015
\x00K\x00\x00\x02\x00\x00\x00%~)J/\\tHjU(IAGENT = (AGENT_VERSION = 2388790170)(RPC_VERSION = 5..722))
12205 /
tcp
1911457608 | 2025-03-08T16:34:48.360447
\x00[\x00\x00\x00\x00\x00\x00
12206 /
tcp
1761482307 | 2025-03-09T08:48:43.327445
\x00[\xc2\xa5\t\xc2\xbe\x7f\x00\x00
12209 /
tcp
-1730858130 | 2025-03-09T10:04:42.562470
RFB 003.008
VNC:
Protocol Version: 3.8
12215 /
tcp
-1105333987 | 2025-03-12T05:13:53.509979
12221 /
tcp
-2031152423 | 2025-02-20T17:58:20.189327
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
12223 /
tcp
-1399940268 | 2025-03-10T12:35:26.337082
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12237 /
tcp
117101543 | 2025-02-26T13:10:45.166969
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
12238 /
tcp
-1476017887 | 2025-03-06T14:34:25.340610
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
12249 /
tcp
945910976 | 2025-03-05T05:41:09.051194
* OK TeamXchange IMAP4rev1 server (otyUg) ready.\r\n
12251 /
tcp
-2089734047 | 2025-03-12T16:00:08.217758
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12270 /
tcp
677934968 | 2025-02-18T23:05:54.806388
12271 /
tcp
707919486 | 2025-03-05T05:13:57.615108
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
12297 /
tcp
1911457608 | 2025-03-11T21:18:33.933927
\x00[\x00\x00\x00\x00\x00\x00
12301 /
tcp
119860953 | 2025-02-26T10:22:17.688349
* OK ArGoSoft Mail Server IMAP Module v.YW at
12304 /
tcp
1911457608 | 2025-02-19T00:01:50.978157
\x00[\x00\x00\x00\x00\x00\x00
12310 /
tcp
-980525298 | 2025-02-25T22:40:30.040217
\x01\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12316 /
tcp
-1327660293 | 2025-03-11T11:17:43.013572
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
12326 /
tcp
-2096652808 | 2025-02-23T18:14:00.716305
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12327 /
tcp
-1399940268 | 2025-03-07T01:59:54.688550
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12329 /
tcp
1492413928 | 2025-02-24T09:29:29.417403
SSH-2.0-OpenSSH_7.5
Vulnerabilities
-1839934832 | 2025-02-18T01:52:50.262880
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
12334 /
tcp
819727972 | 2025-02-23T06:21:10.767966
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12336 /
tcp
1189133115 | 2025-03-05T18:13:06.201799
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
12338 /
tcp
-1399940268 | 2025-03-05T16:23:38.025437
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
265065882 | 2025-03-13T07:42:58.279636
HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
12350 /
tcp
1911457608 | 2025-02-25T03:19:53.296317
\x00[\x00\x00\x00\x00\x00\x00
12354 /
tcp
819727972 | 2025-02-27T11:58:23.078270
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12356 /
tcp
897328069 | 2025-03-07T10:12:24.488893
220 mail.scott000.com ESMTP
12358 /
tcp
-1399940268 | 2025-02-24T04:43:31.685169
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12365 /
tcp
1210754493 | 2025-02-25T11:09:06.594408
0\x0c\x02\x01\x01a\x07\n\x01\x00\x04\x00\x04\x00
12379 /
tcp
-1399940268 | 2025-02-24T20:29:50.705696
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12388 /
tcp
-1730858130 | 2025-03-11T00:30:34.410786
RFB 003.008
VNC:
Protocol Version: 3.8
12389 /
tcp
-1598265216 | 2025-02-21T19:15:45.213963
12395 /
tcp
-1733106930 | 2025-02-25T11:22:39.452295
Mysql Version: 5.6.50-log\nN\n5.6.50-log\x14(\nG5se"tGE\xc3\xbf\xc3\xb7-\x02\x7f\xc2\x80\x15cB^3$Zwh$wM[mysql_native_password
12401 /
tcp
-1810987450 | 2025-03-06T04:34:02.113057
-1453516345 | 2025-03-04T14:18:28.439324
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
12407 /
tcp
819727972 | 2025-03-12T15:55:51.570378
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12409 /
tcp
-1140468363 | 2025-03-07T07:05:51.234587
12419 /
tcp
-1611764932 | 2025-02-18T07:45:43.414085
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
12422 /
tcp
-1888448627 | 2025-03-03T20:14:16.871178
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12423 /
tcp
-2096652808 | 2025-03-11T04:30:35.056139
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12432 /
tcp
820958131 | 2025-02-28T06:56:53.877369
kjnkjabhbanc283ubcsbhdc72\x02
12444 /
tcp
-1888448627 | 2025-03-06T10:04:21.542210
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12448 /
tcp
-454087041 | 2025-02-19T03:43:52.477720
\x1e\xc3\x80\x010\x02\x00\xc2\xa8\xc3\xa3\x00\x00\x00\x00
12457 /
tcp
1632932802 | 2025-03-04T10:12:44.774113
12460 /
tcp
-358801646 | 2025-03-10T07:28:14.570596
12461 /
tcp
-1733645023 | 2025-02-28T12:08:21.892658
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
12473 /
tcp
1911457608 | 2025-02-24T05:00:29.921940
\x00[\x00\x00\x00\x00\x00\x00
12475 /
tcp
819727972 | 2025-03-12T22:18:29.096968
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12476 /
tcp
819727972 | 2025-03-13T15:37:49.412388
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12484 /
tcp
-1036370807 | 2025-02-20T07:24:43.341682
12492 /
tcp
-1399940268 | 2025-02-19T15:38:42.436003
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12494 /
tcp
819727972 | 2025-03-10T21:46:52.926076
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12496 /
tcp
-1032713145 | 2025-02-24T17:07:36.491644
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
12501 /
tcp
1911457608 | 2025-03-05T10:42:57.337627
\x00[\x00\x00\x00\x00\x00\x00
12507 /
tcp
-805362002 | 2025-02-27T20:27:31.123666
ICAP/1.0 501 Other
Server: Traffic Spicer 7788179225
12512 /
tcp
632542934 | 2025-03-08T12:32:09.148174
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
12522 /
tcp
1911457608 | 2025-02-20T16:50:25.910302
\x00[\x00\x00\x00\x00\x00\x00
12536 /
tcp
1353260875 | 2025-02-21T18:39:03.301249
\x00[g\xc2\x95N\x7f\x00\x00
12555 /
tcp
921225407 | 2025-03-06T13:07:23.032879
\x00\x00\x00\x04\x00\x00\x00\x00\x00
12562 /
tcp
1911457608 | 2025-03-07T08:58:43.346347
\x00[\x00\x00\x00\x00\x00\x00
12571 /
tcp
-1399940268 | 2025-03-07T11:27:10.054193
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12579 /
tcp
-1779118422 | 2025-02-18T18:45:35.406281
\x00[\xc2\xae\xc2\x8d{\x7f\x00\x00
12586 /
tcp
307999478 | 2025-03-07T18:36:50.755287
unknown command \r\nunknown command \r\n
12587 /
tcp
-1779118422 | 2025-02-26T16:29:29.307109
\x00[\xc2\xae\xc2\x8d{\x7f\x00\x00
13000 /
tcp
-1730858130 | 2025-02-23T17:38:14.627423
RFB 003.008
VNC:
Protocol Version: 3.8
13780 /
tcp
-2096652808 | 2025-02-25T08:03:45.991507
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
14006 /
tcp
-1327660293 | 2025-03-12T19:22:10.161815
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
14024 /
tcp
1723769361 | 2025-03-10T13:54:49.081850
ELM Enterprise Manager _l\r\nCopyright \xc2\xa9 18668511-928641920 TNT Software, Inc.\r\n
14082 /
tcp
-1399940268 | 2025-02-25T07:51:44.775739
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
14147 /
tcp
-1399940268 | 2025-02-25T23:41:37.671831
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
14344 /
tcp
-980525298 | 2025-03-06T00:58:10.540704
\x01\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
14896 /
tcp
-1538260461 | 2025-03-11T18:06:24.856684
15006 /
tcp
-1399940268 | 2025-02-25T16:19:59.197194
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
15044 /
tcp
580340387 | 2025-03-10T03:52:48.419910
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
15082 /
tcp
819727972 | 2025-02-22T10:52:14.547561
SSH-2.0-OpenSSH_7.4
Vulnerabilities
16007 /
tcp
1911457608 | 2025-03-08T20:43:06.273424
\x00[\x00\x00\x00\x00\x00\x00
-147424911 | 2025-02-27T08:59:42.567290
HTTP/1.1 404 Not Found
Content Length: 0
16017 /
tcp
820958131 | 2025-02-18T16:30:26.496836
kjnkjabhbanc283ubcsbhdc72\x02
16038 /
tcp
1911457608 | 2025-02-27T17:11:05.935281
\x00[\x00\x00\x00\x00\x00\x00
16048 /
tcp
819727972 | 2025-03-05T23:45:02.278949
SSH-2.0-OpenSSH_7.4
Vulnerabilities
16049 /
tcp
819727972 | 2025-02-23T21:36:46.652294
SSH-2.0-OpenSSH_7.4
Vulnerabilities
16059 /
tcp
819727972 | 2025-02-25T06:01:15.753864
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2103111368 | 2025-03-10T21:56:43.980005
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
16085 /
tcp
-1399940268 | 2025-02-20T23:59:26.578502
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16086 /
tcp
1991883981 | 2025-03-09T19:35:34.356022
B\x00\x00\x00\xc3\xbfn\x04Too many connections
16087 /
tcp
-2089734047 | 2025-03-06T17:38:19.823916
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
16091 /
tcp
-1399940268 | 2025-03-05T10:06:45.687071
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16097 /
tcp
-1538260461 | 2025-03-09T09:32:13.073933
16311 /
tcp
937756010 | 2025-02-28T02:14:22.378997
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x01\x00\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
2103111368 | 2025-02-27T13:30:59.483209
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
16666 /
tcp
-1399940268 | 2025-02-21T12:12:28.958984
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16667 /
tcp
-358801646 | 2025-02-26T22:02:55.458558
17084 /
tcp
-2089734047 | 2025-02-24T02:02:32.239267
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
17100 /
tcp
-358801646 | 2025-02-27T07:18:38.427243
17182 /
tcp
819727972 | 2025-03-12T00:58:49.581882
SSH-2.0-OpenSSH_7.4
Vulnerabilities
17775 /
tcp
-1399940268 | 2025-02-25T18:37:50.247220
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18019 /
tcp
1911457608 | 2025-03-09T22:16:26.597652
\x00[\x00\x00\x00\x00\x00\x00
18021 /
tcp
-1399940268 | 2025-02-23T02:19:12.581392
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18030 /
tcp
639175818 | 2025-02-20T18:48:04.963225
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
18033 /
tcp
165188539 | 2025-02-25T01:06:57.146919
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
18056 /
tcp
-1399940268 | 2025-02-28T11:32:46.015385
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18059 /
tcp
-2089734047 | 2025-02-26T05:31:43.858089
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
18078 /
tcp
410249975 | 2025-02-24T13:56:58.445803
18107 /
tcp
-1327660293 | 2025-03-04T16:46:47.837930
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
18112 /
tcp
-1598265216 | 2025-03-12T10:47:15.436457
18182 /
tcp
-249504111 | 2025-03-04T10:34:14.242749
18765 /
tcp
-1435414831 | 2025-02-21T16:43:58.559904
18888 /
tcp
-1399940268 | 2025-02-20T08:45:33.015271
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
19000 /
tcp
-1399940268 | 2025-02-20T23:43:01.979179
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
19016 /
tcp
-747911285 | 2025-02-22T01:59:42.796085
19222 /
tcp
740837454 | 2025-02-21T15:48:23.392198
SSH-2.0-OpenSSH_5.3
Vulnerabilities
20020 /
tcp
-1399940268 | 2025-02-26T13:44:05.248343
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
20050 /
tcp
-2089734047 | 2025-03-11T20:34:43.808674
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
20121 /
tcp
1332894250 | 2025-02-20T14:40:42.552878
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
20151 /
tcp
819727972 | 2025-02-20T03:11:02.786717
SSH-2.0-OpenSSH_7.4
Vulnerabilities
20256 /
tcp
-956469251 | 2025-03-04T15:29:30.232665
20880 /
tcp
1370263973 | 2025-03-08T14:33:08.632545
21002 /
tcp
-1036370807 | 2025-02-26T23:37:34.739981
21025 /
tcp
-984990168 | 2025-02-22T01:38:34.207063
21234 /
tcp
1996932384 | 2025-03-13T06:39:00.097229
21243 /
tcp
-1373613804 | 2025-03-05T10:22:55.137482
00970795:d7:smethod,6:shello,8:soptions,80:d10:shttp_port,368696:i1082,5:sname,5:sL_x,10:ssync_port,5:i00469,10:stimestamp,3190459:f920.7251553166,8:sversion,6262522:sl4X,
21244 /
tcp
1911457608 | 2025-03-06T05:51:37.376221
\x00[\x00\x00\x00\x00\x00\x00
21248 /
tcp
1208318993 | 2025-03-05T03:00:30.450543
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
21253 /
tcp
-1399940268 | 2025-02-21T21:19:50.237795
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21264 /
tcp
-1327660293 | 2025-02-28T16:18:49.559919
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
21265 /
tcp
-1099385124 | 2025-03-10T18:57:00.897688
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
21268 /
tcp
-1399940268 | 2025-03-10T00:36:05.525179
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21274 /
tcp
-1327660293 | 2025-03-10T14:43:30.607995
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
21277 /
tcp
493955023 | 2025-02-23T20:08:54.461009
\x00\x00\x0c\x04\x00\x00\x00\x00\x00\x00\x04\x00\x10\x00\x00\x00\n0\x05\x00\x00@\x00
21282 /
tcp
669849225 | 2025-02-20T22:36:18.005820
SSH-98.60-SysaxSSH_81885..42\r\n
21284 /
tcp
165188539 | 2025-03-08T22:20:42.933024
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
21288 /
tcp
921225407 | 2025-02-23T18:15:13.669002
\x00\x00\x00\x04\x00\x00\x00\x00\x00
21289 /
tcp
1911457608 | 2025-02-25T03:38:42.794918
\x00[\x00\x00\x00\x00\x00\x00
21292 /
tcp
-358801646 | 2025-02-21T22:12:32.475099
21304 /
tcp
-1399940268 | 2025-02-20T01:18:39.287945
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21326 /
tcp
165188539 | 2025-03-13T03:36:37.450929
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
21327 /
tcp
819727972 | 2025-02-19T16:24:09.909549
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21379 /
tcp
-1986594217 | 2025-03-08T19:59:11.416030
"AP0F1D85"\r\nConnection: close\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD>\n<BODY BGCOLOR
22107 /
tcp
-1399940268 | 2025-03-04T13:29:28.261398
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
22206 /
tcp
-2089734047 | 2025-03-12T09:29:16.099156
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
22380 /
tcp
671605376 | 2025-03-08T18:47:37.788505
22403 /
tcp
-1899074860 | 2025-03-09T19:12:57.603396
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00\x00\x00\n03\x00\x00\x00d\x00\x04\x00\x01\x00\x00\x00\x00\x04\x08\x00\x00\x00\n
22556 /
tcp
-2080784861 | 2025-02-25T05:05:12.697892
GBPK\xc3\xbb\xc3\xb7n\xc2\x93W\xc2\xaf\xc2\x86\xc2\x93x@\xc2\xa9\x0e\xc3\x8a*\xc2\x9bS\x00
23182 /
tcp
-1399940268 | 2025-02-22T01:30:20.151721
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
25001 /
tcp
819727972 | 2025-03-13T05:41:27.436102
SSH-2.0-OpenSSH_7.4
Vulnerabilities
25010 /
tcp
-136006866 | 2025-03-04T18:38:30.475006
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
25565 /
tcp
-1996280214 | 2025-03-09T08:42:01.985588
26656 /
tcp
1308377066 | 2025-03-13T07:00:37.174248
26657 /
tcp
1767345577 | 2025-03-12T03:25:07.256587
Hello, this is Quagga (version 0T).
Copyright 1996-200
27015 /
tcp
-80321085 | 2025-03-07T14:01:51.271386
Command: None
Size: 1802398315
ID: 1751277930
Type: 1668178274
28080 /
tcp
1741579575 | 2025-03-11T01:29:02.044640
28443 /
tcp
455076604 | 2025-02-23T16:02:08.301606
!\x07version\x04bind7 t{RPowerDNS Recursor 410
30003 /
tcp
128380719 | 2025-02-26T17:21:21.887081
30019 /
tcp
921225407 | 2025-03-05T10:58:01.079501
\x00\x00\x00\x04\x00\x00\x00\x00\x00
30113 /
tcp
921225407 | 2025-03-10T03:33:27.343934
\x00\x00\x00\x04\x00\x00\x00\x00\x00
30122 /
tcp
2087396567 | 2025-03-11T04:45:34.793243
kjnkjabhbanc283ubcsbhdc72
30422 /
tcp
819727972 | 2025-03-13T12:41:30.039307
SSH-2.0-OpenSSH_7.4
Vulnerabilities
30473 /
tcp
-457235091 | 2025-02-22T02:00:18.387840
audio 0 RTP/AVP 18 4 3 8 0 101\r\na
30522 /
tcp
-1559123399 | 2025-03-12T15:07:32.659205
500 Permission denied - closing connection.
30622 /
tcp
-971970408 | 2025-03-12T11:19:52.143120
30822 /
tcp
819727972 | 2025-03-12T20:11:56.007069
SSH-2.0-OpenSSH_7.4
Vulnerabilities
30922 /
tcp
2087396567 | 2025-03-12T09:42:16.188030
kjnkjabhbanc283ubcsbhdc72
31017 /
tcp
632542934 | 2025-03-06T05:28:26.877814
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
31122 /
tcp
171352214 | 2025-03-09T13:01:43.348375
-ERR client ip is not in whitelist
31210 /
tcp
-1399940268 | 2025-02-27T20:52:26.956458
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-147424911 | 2025-02-27T05:57:13.848484
HTTP/1.1 404 Not Found
Content Length: 0
31422 /
tcp
104385780 | 2025-03-13T03:13:06.431569
31443 /
tcp
2087396567 | 2025-03-12T19:21:13.820659
kjnkjabhbanc283ubcsbhdc72
31522 /
tcp
117101543 | 2025-03-13T02:03:51.470064
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
31622 /
tcp
-2096652808 | 2025-03-13T00:06:30.771079
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
31722 /
tcp
-971970408 | 2025-03-12T22:45:37.901907
31822 /
tcp
539065883 | 2025-03-12T08:01:30.828105
31922 /
tcp
-445721795 | 2025-03-11T06:23:26.111434
\x00[\xc3\xaed\x1a\x7f\x00\x00
32102 /
tcp
165188539 | 2025-02-26T03:32:27.295055
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
32122 /
tcp
474736340 | 2025-03-09T22:39:41.800635
431 Unable to negotiate secure command connection.
32222 /
tcp
-1810987450 | 2025-03-09T08:01:10.741347
32422 /
tcp
117101543 | 2025-03-09T15:00:37.052887
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
33060 /
tcp
2087396567 | 2025-03-07T05:10:57.595044
kjnkjabhbanc283ubcsbhdc72
33122 /
tcp
1690634669 | 2025-03-04T14:49:00.561709
33222 /
tcp
-345718689 | 2025-03-09T19:51:09.294750
33389 /
tcp
-1399940268 | 2025-02-18T02:55:03.309062
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
33422 /
tcp
-2031152423 | 2025-03-09T09:35:59.635002
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
33522 /
tcp
2087396567 | 2025-02-26T16:57:42.493742
kjnkjabhbanc283ubcsbhdc72
33622 /
tcp
1082732927 | 2025-03-08T20:02:38.928001
STAT pid 1660
STAT uptime 28884
STAT time 1641290377
STAT version 1.2.1
STAT pointer_size 32
STAT curr_items 14
STAT total_items 3533
STAT bytes 30524
STAT curr_connections 1
STAT total_connections 3542
STAT connection_structures 3
STAT cmd_get 3533
STAT cmd_set 3533
STAT get_hits 3519
STAT get_misses 14
STAT bytes_read 7927780
STAT bytes_written 7848552
STAT limit_maxbytes 67108864
END
33722 /
tcp
2087396567 | 2025-03-08T18:21:22.976439
kjnkjabhbanc283ubcsbhdc72
33922 /
tcp
-971970408 | 2025-03-08T11:53:56.176322
34422 /
tcp
-971970408 | 2025-02-28T05:13:51.020377
34522 /
tcp
1690634669 | 2025-03-05T06:34:07.297793
34622 /
tcp
842535728 | 2025-03-04T18:19:46.447635
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>
A<!DOCTYPE GANGLIA_XML [
<!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...
34722 /
tcp
539065883 | 2025-03-04T00:28:39.727849
35000 /
tcp
-2089734047 | 2025-03-10T19:37:53.426803
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
35004 /
tcp
671605376 | 2025-03-06T17:56:13.772379
35422 /
tcp
1308377066 | 2025-02-28T08:44:32.605650
35522 /
tcp
-1392039491 | 2025-03-04T04:30:58.391575
"Broadband Router"
<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
35722 /
tcp
-1872120160 | 2025-02-28T06:58:21.915825
">Application and Content Networking Software 3.9</a>)
</BODY><
36122 /
tcp
-2031152423 | 2025-03-13T10:40:22.472805
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
36501 /
tcp
1504401647 | 2025-03-06T17:19:18.648447
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
36522 /
tcp
-375604792 | 2025-02-28T21:17:02.253317
220 Microsoft FTP Service
36622 /
tcp
-971970408 | 2025-02-27T11:56:18.133398
36984 /
tcp
117101543 | 2025-03-13T20:50:35.595850
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
37422 /
tcp
2087396567 | 2025-02-28T19:22:51.727662
kjnkjabhbanc283ubcsbhdc72
37622 /
tcp
1991883981 | 2025-02-28T14:09:13.776229
B\x00\x00\x00\xc3\xbfn\x04Too many connections
37777 /
tcp
1011407350 | 2025-03-11T09:33:03.427233
* OK GroupWise IMAP4rev1 Server Ready\r\n
38022 /
tcp
2087396567 | 2025-02-27T13:39:06.867053
kjnkjabhbanc283ubcsbhdc72
38122 /
tcp
1690634669 | 2025-02-19T23:24:16.398555
38222 /
tcp
-971970408 | 2025-03-10T21:27:41.246295
38422 /
tcp
-1990350878 | 2025-02-18T21:08:07.410871
38522 /
tcp
-971970408 | 2025-02-21T15:44:50.425338
38822 /
tcp
819727972 | 2025-03-03T21:35:11.048323
SSH-2.0-OpenSSH_7.4
Vulnerabilities
38922 /
tcp
1286504516 | 2025-03-13T15:39:48.925317
CP2E Control Console
Connected to Host: gZI
39022 /
tcp
171352214 | 2025-02-22T06:32:17.849043
-ERR client ip is not in whitelist
39122 /
tcp
291723434 | 2025-03-13T19:08:50.461179
Lantronix MSS100 Version V118/523(045538937)
Type HELP at the 'Local_61349> ' prompt for assistance.
Username>
39222 /
tcp
-1887823886 | 2025-03-13T17:24:57.683027
K%~)J/\tHjU(IAGENT = (AGENT_VERSION = 2388790170)(RPC_VERSION = 5..722))
39322 /
tcp
819727972 | 2025-02-18T17:14:05.674501
SSH-2.0-OpenSSH_7.4
Vulnerabilities
39522 /
tcp
-358801646 | 2025-03-11T09:48:27.627868
39622 /
tcp
-1681927087 | 2025-02-20T04:42:20.478944
kjnkjabhbanc283ubcsbhdc72
39722 /
tcp
1492413928 | 2025-03-05T04:49:19.688234
SSH-2.0-OpenSSH_7.5
Vulnerabilities
39922 /
tcp
-971970408 | 2025-02-26T17:46:46.793795
40022 /
tcp
-441419608 | 2025-03-09T11:28:59.264380
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
40070 /
tcp
1948301213 | 2025-03-04T08:41:32.607429
RFB 003.003
VNC:
Protocol Version: 3.3
40122 /
tcp
2087396567 | 2025-02-26T14:20:57.739530
kjnkjabhbanc283ubcsbhdc72
1282941221 | 2025-03-08T21:46:25.409689
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
40622 /
tcp
2087396567 | 2025-02-26T12:37:41.996344
kjnkjabhbanc283ubcsbhdc72
40722 /
tcp
819727972 | 2025-03-08T16:02:01.175331
SSH-2.0-OpenSSH_7.4
Vulnerabilities
41522 /
tcp
1984588611 | 2025-03-04T21:51:36.186129
41822 /
tcp
104385780 | 2025-03-07T18:16:46.007764
41922 /
tcp
819727972 | 2025-03-07T16:34:08.990392
SSH-2.0-OpenSSH_7.4
Vulnerabilities
42022 /
tcp
-1428621233 | 2025-03-04T17:08:45.414318
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
42122 /
tcp
-971970408 | 2025-03-05T03:05:46.807765
42222 /
tcp
-1139539254 | 2025-03-04T23:55:20.773766
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
42422 /
tcp
-2096652808 | 2025-03-04T20:03:30.824144
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
42443 /
tcp
-2096652808 | 2025-03-10T01:59:07.378344
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
42922 /
tcp
2087396567 | 2025-02-28T15:51:12.370960
kjnkjabhbanc283ubcsbhdc72
43422 /
tcp
2087396567 | 2025-02-27T21:14:57.168152
kjnkjabhbanc283ubcsbhdc72
43522 /
tcp
1984588611 | 2025-02-25T21:48:50.065216
43622 /
tcp
-1428621233 | 2025-02-21T19:41:11.165222
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
43722 /
tcp
1332894250 | 2025-02-27T04:36:15.862042
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
43822 /
tcp
-2096652808 | 2025-02-23T05:50:20.900500
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
43922 /
tcp
1189133115 | 2025-02-27T10:16:01.866421
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
44022 /
tcp
-784071826 | 2025-02-26T21:50:50.438261
SSH-2.0-OpenSSH_8.0
Vulnerabilities
44122 /
tcp
2087396567 | 2025-02-26T22:56:41.129893
kjnkjabhbanc283ubcsbhdc72
44158 /
tcp
-433302150 | 2025-03-05T16:09:58.116285
44222 /
tcp
-971970408 | 2025-03-11T00:24:52.585738
-2107996212 | 2025-02-26T03:10:35.028164
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
44345 /
tcp
1911457608 | 2025-02-18T20:43:56.674950
\x00[\x00\x00\x00\x00\x00\x00
44520 /
tcp
-1327660293 | 2025-02-27T04:35:46.582578
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
44522 /
tcp
2087396567 | 2025-02-26T07:28:39.549350
kjnkjabhbanc283ubcsbhdc72
44622 /
tcp
-358801646 | 2025-02-23T04:05:51.006959
44722 /
tcp
-971970408 | 2025-02-26T06:28:51.848763
44818 /
tcp
-1399940268 | 2025-03-04T08:40:04.752601
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-2107996212 | 2025-02-26T04:12:28.681344
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
45005 /
tcp
-1399940268 | 2025-02-23T14:41:42.911494
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
45022 /
tcp
-1477838366 | 2025-03-10T16:30:11.084649
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
45122 /
tcp
2087396567 | 2025-02-24T07:52:01.052378
kjnkjabhbanc283ubcsbhdc72
45222 /
tcp
599074451 | 2025-02-25T19:45:54.203475
45322 /
tcp
-971970408 | 2025-02-25T18:07:15.176255
45522 /
tcp
1492413928 | 2025-02-25T16:37:11.300308
SSH-2.0-OpenSSH_7.5
Vulnerabilities
45667 /
tcp
1911457608 | 2025-03-06T22:05:10.360341
\x00[\x00\x00\x00\x00\x00\x00
45668 /
tcp
-345718689 | 2025-02-26T23:41:04.969421
45822 /
tcp
-971970408 | 2025-03-10T13:01:52.021759
45922 /
tcp
-971970408 | 2025-03-10T15:21:34.620106
46122 /
tcp
-905685638 | 2025-02-24T13:02:36.171716
46222 /
tcp
897328069 | 2025-02-24T23:28:05.580426
220 mail.scott000.com ESMTP
46622 /
tcp
-1730858130 | 2025-02-24T04:24:09.014401
RFB 003.008
VNC:
Protocol Version: 3.8
46862 /
tcp
-1996280214 | 2025-03-06T17:57:02.995457
46922 /
tcp
1620329124 | 2025-02-24T00:56:07.468737
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\x01\xc3\xbf\xc3\xbb\x03\xc3\xbf\xc3\xbd\x01\xc3\xbf\xc3\xbe\x01Username:
47122 /
tcp
1975288991 | 2025-02-23T23:11:58.219110
47222 /
tcp
-1311598826 | 2025-02-23T21:48:39.728822
AMQP:
cluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local
copyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.
information:Licensed under the MPL 2.0. Website: https://rabbitmq.com
platform:Erlang/OTP 24.1
product:RabbitMQ
version:3.9.7
Capabilities:
publisher_confirms:true
exchange_exchange_bindings:true
basic.nack:true
consumer_cancel_notify:true
connection.blocked:true
consumer_priorities:true
authentication_failure_close:true
per_consumer_qos:true
direct_reply_to:tru
47322 /
tcp
2087396567 | 2025-02-25T04:39:07.625665
kjnkjabhbanc283ubcsbhdc72
47522 /
tcp
-971970408 | 2025-02-25T10:49:05.296722
47622 /
tcp
2087396567 | 2025-02-25T04:13:35.173342
kjnkjabhbanc283ubcsbhdc72
47722 /
tcp
-1026951088 | 2025-03-10T12:44:41.127359
47922 /
tcp
660175493 | 2025-03-10T08:00:08.884601
47990 /
tcp
1778988322 | 2025-03-11T21:45:55.696477
* OK GroupWise IMAP4rev1 Server Ready
48000 /
tcp
-2031152423 | 2025-02-20T20:07:10.698139
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
48022 /
tcp
-2096652808 | 2025-03-07T11:28:35.302268
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
48222 /
tcp
819727972 | 2025-03-10T04:44:28.828096
SSH-2.0-OpenSSH_7.4
Vulnerabilities
48322 /
tcp
2087396567 | 2025-03-10T02:54:53.263343
kjnkjabhbanc283ubcsbhdc72
48722 /
tcp
2087396567 | 2025-02-24T16:25:24.375985
kjnkjabhbanc283ubcsbhdc72
48822 /
tcp
1778988322 | 2025-02-23T09:19:12.672800
* OK GroupWise IMAP4rev1 Server Ready
48888 /
tcp
165188539 | 2025-02-26T05:05:16.387432
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
48922 /
tcp
472902042 | 2025-02-19T19:50:56.183093
"Magic:ActiveMQ
Version:12
<ActiveMQ*TcpNoDelayEnabledSizePrefixDisabled CacheSizeProviderName ActiveMQStackTraceEnabledPlatformDetails JavaCacheEnabledTightEncodingEnabledMaxFrameSize@MaxInac
49122 /
tcp
2087396567 | 2025-02-21T06:51:30.010217
kjnkjabhbanc283ubcsbhdc72
49222 /
tcp
-971970408 | 2025-02-23T00:35:17.219378
49322 /
tcp
-146605374 | 2025-02-20T22:08:04.670454
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
49422 /
tcp
-952165951 | 2025-02-23T02:20:34.826419
49522 /
tcp
-971970408 | 2025-02-21T05:14:15.479331
49622 /
tcp
2087396567 | 2025-02-22T14:30:56.221496
kjnkjabhbanc283ubcsbhdc72
49722 /
tcp
2087396567 | 2025-02-22T23:31:19.480829
kjnkjabhbanc283ubcsbhdc72
49822 /
tcp
1948301213 | 2025-02-22T21:02:51.893845
RFB 003.003
VNC:
Protocol Version: 3.3
49922 /
tcp
89282912 | 2025-02-22T19:17:28.611139
220 VMware Authentication Daemon Version 1.0, ServerDaemonProto
col:SOAP, MKSDisplayProtocol:VNC , ,
50000 /
tcp
2087396567 | 2025-03-13T14:16:41.061554
kjnkjabhbanc283ubcsbhdc72
50011 /
tcp
-457235091 | 2025-02-20T00:25:06.251836
audio 0 RTP/AVP 18 4 3 8 0 101\r\na
50014 /
tcp
-1399940268 | 2025-03-10T07:35:08.606716
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
50022 /
tcp
819727972 | 2025-02-20T11:59:03.608435
SSH-2.0-OpenSSH_7.4
Vulnerabilities
50042 /
tcp
-2140303521 | 2025-02-26T01:43:27.678850
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected\n
50085 /
tcp
165188539 | 2025-03-12T11:43:34.245236
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
50104 /
tcp
-358801646 | 2025-03-03T18:22:27.048422
50105 /
tcp
819727972 | 2025-02-25T17:56:11.233292
SSH-2.0-OpenSSH_7.4
Vulnerabilities
50106 /
tcp
165188539 | 2025-03-07T13:42:21.976279
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
50113 /
tcp
1767345577 | 2025-03-12T23:32:46.625573
Hello, this is Quagga (version 0T).
Copyright 1996-200
50202 /
tcp
-1399940268 | 2025-03-13T00:42:14.417480
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
50422 /
tcp
1741579575 | 2025-02-22T05:21:13.431721
50443 /
tcp
-1189269828 | 2025-02-27T15:32:25.267360
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
50622 /
tcp
-971970408 | 2025-02-21T20:15:15.148774
50722 /
tcp
-971970408 | 2025-02-20T23:53:08.262435
50822 /
tcp
-971970408 | 2025-02-20T20:45:27.766668
50997 /
tcp
1948301213 | 2025-02-25T16:33:40.439146
RFB 003.003
VNC:
Protocol Version: 3.3
51007 /
tcp
1911457608 | 2025-03-06T14:28:19.774633
\x00[\x00\x00\x00\x00\x00\x00
51235 /
tcp
410249975 | 2025-02-25T22:00:15.116199
51443 /
tcp
2087396567 | 2025-03-12T02:02:16.013061
kjnkjabhbanc283ubcsbhdc72
51922 /
tcp
-146605374 | 2025-02-20T09:59:46.515652
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
52010 /
tcp
1504401647 | 2025-02-28T05:19:17.458986
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
52022 /
tcp
841014058 | 2025-03-07T01:12:37.331137
Hello, this is FRRouting (version 4.0).
Copyright 19
96-2005 Kunihiro Ishiguro, et al.
Use...
52122 /
tcp
819727972 | 2025-02-20T08:13:31.677437
SSH-2.0-OpenSSH_7.4
Vulnerabilities
52322 /
tcp
-784071826 | 2025-02-20T06:52:38.700355
SSH-2.0-OpenSSH_8.0
Vulnerabilities
52522 /
tcp
842535728 | 2025-02-19T09:15:27.856659
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>
A<!DOCTYPE GANGLIA_XML [
<!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...
52822 /
tcp
-1455684014 | 2025-02-19T21:37:46.617766
\xff\xfb\x01\xff\xfb\x03\xff\xfc'\xff\xfe\x01\xff\xfd\x03\xff\xfe"\xff\xfd'\xff\xfd\x18\xff\xfe\x1fUsername: GET / HTTP/1.1
Password:
welcome
>Accept: */*
>
>
53022 /
tcp
-2081419599 | 2025-03-07T07:54:51.612979
53322 /
tcp
-1316491703 | 2025-02-19T17:08:37.565745
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready
53481 /
tcp
921225407 | 2025-02-23T16:50:30.341502
\x00\x00\x00\x04\x00\x00\x00\x00\x00
53522 /
tcp
1741579575 | 2025-02-19T15:12:35.299555
53922 /
tcp
957278843 | 2025-02-19T07:30:48.297992
54022 /
tcp
-2031152423 | 2025-02-19T05:45:29.576715
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
54138 /
tcp
-653033013 | 2025-02-28T07:23:31.391963
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
54322 /
tcp
1308377066 | 2025-02-19T00:16:50.922836
54422 /
tcp
-1779118422 | 2025-02-18T22:30:39.165250
\x00[\xc2\xae\xc2\x8d{\x7f\x00\x00
54522 /
tcp
171352214 | 2025-02-18T19:01:20.676540
-ERR client ip is not in whitelist
1077013874 | 2025-02-18T11:39:13.045841
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
54922 /
tcp
-971970408 | 2025-03-07T09:44:59.851150
55022 /
tcp
-971970408 | 2025-03-07T04:34:40.280403
55200 /
tcp
-358801646 | 2025-02-28T13:56:22.405642
55222 /
tcp
-971970408 | 2025-03-07T02:50:12.424719
55322 /
tcp
2087396567 | 2025-02-18T04:25:04.693389
kjnkjabhbanc283ubcsbhdc72
55422 /
tcp
819727972 | 2025-03-06T18:20:22.040924
SSH-2.0-OpenSSH_7.4
Vulnerabilities
55481 /
tcp
-1947777893 | 2025-02-23T22:49:46.544503
"Broadband Router"\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
55522 /
tcp
-1730858130 | 2025-03-06T23:29:36.223967
RFB 003.008
VNC:
Protocol Version: 3.8
55553 /
tcp
290819026 | 2025-03-07T14:19:31.310324
welcome to Pandora console!
----------------------------
-------------------------
| Login Time | 2021-12-08 1...
55554 /
tcp
-1399940268 | 2025-03-07T06:35:29.793862
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
55622 /
tcp
290819026 | 2025-03-06T16:36:38.248856
welcome to Pandora console!
----------------------------
-------------------------
| Login Time | 2021-12-08 1...
55722 /
tcp
-905685638 | 2025-03-06T20:47:56.446992
55922 /
tcp
1690634669 | 2025-02-18T02:36:13.569399
56022 /
tcp
-1111515360 | 2025-02-18T00:45:09.055969
remshd: Kerberos Authentication not enabled.
57522 /
tcp
1308377066 | 2025-03-06T13:16:14.981026
57722 /
tcp
-2096652808 | 2025-03-06T08:56:07.509235
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
57783 /
tcp
-832380282 | 2025-03-04T05:25:31.344883
lpd [@Boyk]: Print-services are not available to your host (aF2qXkQ2m).\n
57822 /
tcp
1741579575 | 2025-03-06T07:09:56.673195
1830697416 | 2025-03-06T05:03:17.430775
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
58122 /
tcp
-1810987450 | 2025-03-06T03:20:44.502825
58222 /
tcp
2087396567 | 2025-03-06T01:50:03.391967
kjnkjabhbanc283ubcsbhdc72
58422 /
tcp
819727972 | 2025-03-05T22:46:32.262746
SSH-2.0-OpenSSH_7.4
Vulnerabilities
58522 /
tcp
-358801646 | 2025-03-05T20:22:08.970416
58722 /
tcp
1991883981 | 2025-03-05T18:39:28.310542
B\x00\x00\x00\xc3\xbfn\x04Too many connections
58822 /
tcp
1426971893 | 2025-03-05T17:01:52.316539
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
58922 /
tcp
539065883 | 2025-03-05T15:11:40.162060
59022 /
tcp
1741579575 | 2025-03-05T13:53:54.679520
59222 /
tcp
-2096652808 | 2025-03-05T10:26:04.087270
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
59443 /
tcp
1911457608 | 2025-03-12T20:58:40.302547
\x00[\x00\x00\x00\x00\x00\x00
60129 /
tcp
2087396567 | 2025-02-18T06:44:05.787998
kjnkjabhbanc283ubcsbhdc72
61613 /
tcp
1911457608 | 2025-03-01T01:16:48.626633
\x00[\x00\x00\x00\x00\x00\x00
61616 /
tcp
-786044033 | 2025-03-12T23:55:09.398300
OK Welcome <299685> on DirectUpdate server 7286
61619 /
tcp
2098371729 | 2025-02-20T02:01:33.848614
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
62078 /
tcp
-860824904 | 2025-03-09T12:18:55.724959
62080 /
tcp
-441419608 | 2025-02-24T09:28:19.607192
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
63210 /
tcp
1887224352 | 2025-03-04T22:27:07.773865
63256 /
tcp
897328069 | 2025-03-05T19:49:23.729853
220 mail.scott000.com ESMTP
64683 /
tcp
-1399940268 | 2025-03-10T14:16:27.065445
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02