13 /
tcp
-1296032851 | 2025-03-09T14:20:24.021056
\x01=\x01À\x06ÿÿ?"<ZDECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x01\x01
15 /
tcp
165188539 | 2025-03-21T09:10:58.493667
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
17 /
tcp
-1296032851 | 2025-03-21T22:48:23.272804
\x01=\x01À\x06ÿÿ?"<ZDECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x01\x01
19 /
tcp
408230060 | 2025-03-10T19:33:12.667725
\r\nSorry, that nickname format is invalid.\r\n
21 /
tcp
1564456597 | 2025-03-26T10:59:14.074933
220 Firewall Authentication required before proceeding with service
25 /
tcp
677934968 | 2025-03-10T14:25:32.350651
37 /
tcp
-394428255 | 2025-02-28T07:41:54.628150
49 /
tcp
1160472910 | 2025-03-13T02:07:15.722979
\xc2\xa5A\\x01,\\x02L\\x08Connectx\\x0857222
-2107996212 | 2025-03-12T05:10:27.129870
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
-1056270173 | 2025-03-20T00:39:42.748962
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
79 /
tcp
-1846450790 | 2025-03-28T10:05:10.726844
<html>
<head><title>400 Bad Request</title></head>
<body bgcolor="white">
<center><h1>400 Bad Request</h1></center>
<hr><center>nginx/1.4.7</center>
</body>
</html>
969451102 | 2025-03-22T20:22:00.549615
HTTP/1.1 302 Found
Date: Sat, 22 Mar 2025 20:22:00 GMT
Content-Type: text/html
Content-Length: 154
Connection: keep-alive
Location: https://120.79.62.103/
Via: HTTP/1.1 SLB.32
90 /
tcp
1911457608 | 2025-03-05T19:48:30.621307
\x00[\x00\x00\x00\x00\x00\x00
92 /
tcp
-1399940268 | 2025-03-06T21:51:17.557448
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
94 /
tcp
-2096652808 | 2025-02-26T14:40:55.428838
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
95 /
tcp
165188539 | 2025-03-07T08:15:33.338886
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
97 /
tcp
-274082663 | 2025-03-05T03:31:09.728246
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
101 /
tcp
-1888448627 | 2025-03-23T01:32:35.865126
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
102 /
tcp
819727972 | 2025-03-20T19:56:55.274634
SSH-2.0-OpenSSH_7.4
Vulnerabilities
104 /
tcp
-136006866 | 2025-03-28T09:25:45.579755
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
110 /
tcp
820958131 | 2025-03-27T20:26:58.761647
kjnkjabhbanc283ubcsbhdc72\x02
111 /
tcp
1370263973 | 2025-03-26T15:31:49.963065
141730637 | 2025-03-11T10:51:51.739493
HTTP/1.0 200 OK
Server: Proxy
121 /
tcp
-1327660293 | 2025-03-12T15:52:03.730869
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
135 /
tcp
1141948216 | 2025-03-15T02:43:40.221713
\\x05\\x00\r\\x03\\x10\\x00\\x00\\x00\\x18\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x04\\x00\\x01\\x05\\x00\\x00\\x00\\x00\n\nServerAlive2: \n IP1: DESKTOP-HL59G5J\n IP2: 169.254.93.199\n IP3: 175.180.100.187\n\nNTLMSSP:\nTarget_Name: DESKTOP-HL59G5J\nProduct_Version: 10.0.19041 Ntlm 15\nOS: Windows 10, Version 2004/Windows Server, Version 2004\nNetBIOS_Domain_Name: DESKTOP-HL59G5J\nNetBIOS_Computer_Name: DESKTOP-HL59G5J\nDNS_Domain_Name: DESKTOP-HL59G5J\nDNS_Computer_Name: DESKTOP-HL59G5J\nSystem_Time: 2024-01-22 06:04:34 +0000 UTC\n\nDCERPC Dump:\n954
139 /
tcp
-776850442 | 2025-03-09T11:44:00.372463
Version: 6.1Build 0\nTarget Name : GMAX\n
179 /
tcp
-399606100 | 2025-03-20T11:37:57.576609
BGP Message\nType: 3\nMajor error Code: 6\nMinor error Code: 5\n
190 /
tcp
1911457608 | 2025-03-17T15:17:54.849389
\x00[\x00\x00\x00\x00\x00\x00
-1839934832 | 2025-03-12T20:33:00.326197
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
195 /
tcp
819727972 | 2025-03-17T08:00:52.869599
SSH-2.0-OpenSSH_7.4
Vulnerabilities
221 /
tcp
1911457608 | 2025-03-22T15:31:23.648725
\x00[\x00\x00\x00\x00\x00\x00
264 /
tcp
-654288545 | 2025-03-11T18:49:46.749196
CheckPoint\nFirewall Host: lcm4cp\nSmartCenter Host: cpmanager.cminl.oa.guof3x\\x00\n
311 /
tcp
749429829 | 2025-03-26T16:02:09.806282
\xc3\xa3\r\n\r\n\\x01KvInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
347 /
tcp
-1996280214 | 2025-03-19T13:15:17.797457
427 /
tcp
1530390632 | 2025-03-26T23:50:37.653585
SAAdvert Response:\nVersion: 2\nFunction: SA Advertisement (11)\nURL: service:service-agent://127.0.0.1\nScopeList: default\nAttrributeList: \n\n\nserviceTypes:\nservice:ipmi\nservice:cdserver\nservice:fdserver\nservice:hdserver\nservice:adviser\nservice:lighttpd\nB://l:87/x\n\nResponse of service:ipmi SrvReq:\nVersion: 2\nFunction: Service Reply (2)\nErrorCode: SUCCESS (0)\nURL Entries:\n Lifetime: 65535\n URL: service:ipmi://(none):623\n Lifetime: 65535\n URL: service:ipmi://IEI9CC2C4135A27:623\n\n\nResponse of service:ipmi Attr
442 /
tcp
-1399940268 | 2025-03-19T03:17:01.279683
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-2090962452 | 2025-03-22T20:22:04.724091
HTTP/1.1 404 Not Found
Date: Sat, 22 Mar 2025 20:22:04 GMT
Content-Type: text/html
Content-Length: 548
Connection: keep-alive
Vary: Accept-Encoding
Vary: Accept-Encoding
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
5a:0f:23:6e:c6:76:6b:ad:eb:98:b7:7b
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=BE, O=GlobalSign nv-sa, CN=GlobalSign GCC R3 OV TLS CA 2024
Validity
Not Before: Mar 14 08:02:11 2025 GMT
Not After : May 4 05:11:08 2025 GMT
Subject: C=CN, ST=ZheJiang, L=HangZhou, O=Alibaba (China) Technology Co., Ltd., CN=*.rdc.aliyuncs.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:cf:42:7a:10:3f:7f:14:99:b3:3a:29:62:f4:15:
02:be:6c:45:3d:8a:41:6a:ac:6a:a4:3d:92:97:04:
7b:ba:26:eb:cb:62:4a:25:b4:48:59:df:b2:d4:57:
66:00:81:9f:ba:47:1b:b6:19:2a:f7:59:ed:d8:5d:
c3:33:03:0a:c7:0a:4c:9e:14:e5:9d:5d:f9:96:26:
c1:82:73:d5:dd:f3:00:6f:9d:dc:f5:6f:18:dd:d8:
d2:dd:3b:38:0c:14:ef:df:2a:b0:c1:f0:e2:c8:45:
f2:d8:30:b6:92:e9:2f:65:a7:cc:c0:8d:f5:ec:07:
68:dc:fa:14:04:eb:a4:a9:8a:74:b0:6c:69:ff:0e:
c8:b8:d6:b7:86:c0:a2:98:4d:e8:4b:45:3a:12:79:
1c:19:98:ca:33:93:86:9f:ee:4d:41:6a:46:ba:08:
aa:a8:b5:09:7c:bd:eb:fd:84:2d:ba:97:dc:01:67:
85:56:b8:08:94:30:dc:9d:0a:05:ad:d6:04:78:63:
46:72:f5:a0:06:8e:48:cc:67:69:78:df:29:02:e4:
56:d5:85:06:b0:e1:ec:2c:ac:41:17:bf:9d:5d:4a:
e9:fe:ba:e8:d3:ef:8f:1d:d1:3c:fe:0e:6a:c6:63:
2f:64:92:b5:f5:e0:ee:30:bc:7f:03:83:40:6f:69:
5c:5d
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature, Key Encipherment
X509v3 Basic Constraints: critical
CA:FALSE
Authority Information Access:
CA Issuers - URI:http://secure.globalsign.com/cacert/gsgccr3ovtlsca2024.crt
OCSP - URI:http://ocsp.globalsign.com/gsgccr3ovtlsca2024
X509v3 Certificate Policies:
Policy: 2.23.140.1.2.2
Policy: 1.3.6.1.4.1.4146.10.1.2
CPS: https://www.globalsign.com/repository/
X509v3 CRL Distribution Points:
Full Name:
URI:http://crl.globalsign.com/gsgccr3ovtlsca2024.crl
X509v3 Subject Alternative Name:
DNS:*.rdc.aliyuncs.com, DNS:rdc.aliyuncs.com
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Authority Key Identifier:
DA:D3:A8:08:48:0C:34:37:58:EE:E5:A7:75:2E:59:FC:D6:DC:3C:38
X509v3 Subject Key Identifier:
FF:DC:EF:5B:49:89:48:25:85:60:92:00:00:AD:94:D1:BA:B7:A6:35
CT Precertificate SCTs:
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : A2:E3:0A:E4:45:EF:BD:AD:9B:7E:38:ED:47:67:77:53:
D7:82:5B:84:94:D7:2B:5E:1B:2C:C4:B9:50:A4:47:E7
Timestamp : Mar 14 08:02:15.331 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:C0:AA:6B:4F:AC:6C:33:27:86:2A:21:
74:F8:83:FC:4B:C1:13:C3:92:7F:B8:AD:5D:FE:E1:71:
22:97:18:65:C2:02:20:30:FC:E5:B0:CD:0B:CF:FC:2C:
9F:3C:DB:82:D5:74:41:36:B2:3C:F8:46:EB:F4:2F:AD:
F1:5E:0A:D6:3B:71:C1
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 13:4A:DF:1A:B5:98:42:09:78:0C:6F:EF:4C:7A:91:A4:
16:B7:23:49:CE:58:57:6A:DF:AE:DA:A7:C2:AB:E0:22
Timestamp : Mar 14 08:02:15.458 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:46:02:21:00:F8:C1:5F:03:E6:23:7F:27:2F:2C:8C:
DD:0C:B3:6F:20:5A:BF:A1:F6:7F:75:9A:64:C6:F8:24:
59:5E:30:67:FC:02:21:00:C3:4F:49:BE:B3:F8:F4:96:
63:71:B9:E2:0D:DE:AE:DD:21:0D:7F:57:5A:9C:42:AD:
22:7B:B9:85:9C:1B:DB:D5
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 4E:75:A3:27:5C:9A:10:C3:38:5B:6C:D4:DF:3F:52:EB:
1D:F0:E0:8E:1B:8D:69:C0:B1:FA:64:B1:62:9A:39:DF
Timestamp : Mar 14 08:02:16.079 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:D6:7A:B7:E5:1F:12:4B:98:AD:58:40:
FD:1F:A7:79:90:8F:E3:57:CA:EA:22:44:BA:93:59:D9:
95:30:11:EE:FA:02:20:62:6A:23:DE:09:E8:97:1B:34:
5A:95:BA:D5:9B:04:9C:98:E3:97:8E:2D:D0:27:C0:06:
11:18:8D:2B:E1:56:D9
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
01:94:31:94:a2:05:c4:48:1d:d2:fb:03:2e:21:13:45:0a:30:
33:30:2e:d6:10:a5:5c:df:de:9d:b0:16:ee:6f:f4:fb:a0:1b:
f0:f7:29:27:34:f7:11:18:66:2a:61:01:2a:e3:bb:0c:fb:99:
3a:5b:16:82:6f:8e:cc:ad:cf:59:f9:3d:04:0b:61:68:be:47:
38:91:89:f4:41:35:3c:88:9c:9f:32:fd:e1:91:40:95:61:1a:
98:6e:4f:5b:08:8b:0f:85:58:d5:0c:cc:76:47:6b:83:c6:75:
e5:3c:e6:b7:c6:ca:2b:d9:b6:69:42:6c:61:f1:89:59:d2:12:
18:e8:e6:98:55:4d:11:c2:5d:99:42:c4:7c:cf:e2:1c:73:cf:
61:af:d1:90:9d:2d:f3:63:99:34:35:25:8e:2c:da:14:1e:14:
06:94:91:f3:35:7b:40:d2:6e:2f:49:fc:f0:7e:82:f0:a6:0b:
3f:ea:7c:64:2b:34:55:a5:3f:de:cd:d7:6c:47:b8:b3:cb:d1:
02:a5:bf:f9:c7:bb:7e:ad:9b:6b:9c:09:e3:f9:ca:4f:10:93:
ac:b1:ba:5a:a1:17:aa:48:02:eb:dc:32:19:2a:97:cf:71:95:
50:6c:c6:bd:9b:95:93:40:12:2d:49:9c:b5:40:64:dd:22:7d:
6a:9a:ba:a4
451 /
tcp
-1399940268 | 2025-03-19T00:11:31.139906
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
461 /
tcp
819727972 | 2025-03-27T22:31:07.987918
SSH-2.0-OpenSSH_7.4
Vulnerabilities
462 /
tcp
819727972 | 2025-03-25T13:25:57.027474
SSH-2.0-OpenSSH_7.4
Vulnerabilities
480 /
tcp
-1399940268 | 2025-03-11T20:11:40.992130
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
502 /
tcp
-2089734047 | 2025-03-18T18:38:15.158993
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
503 /
tcp
921225407 | 2025-03-13T16:44:42.314086
\x00\x00\x00\x04\x00\x00\x00\x00\x00
513 /
tcp
740837454 | 2025-02-26T14:59:50.943629
SSH-2.0-OpenSSH_5.3
Vulnerabilities
515 /
tcp
2087396567 | 2025-03-28T00:51:56.688225
kjnkjabhbanc283ubcsbhdc72
541 /
tcp
1497273505 | 2025-03-25T18:41:24.967568
\\x16\\x03\\x01\\x01P\\x01\\x00\\x01L\\x03\\x03\\x84L\\xcf\\x00\\x0e\xc4\x96Q\\xf3\\xb1\\x9f\\x88\\x08\\x92\\xd7S\\xf1\\xb7\\xc9\\xc79\\xcc\\xf6Tk\\x1dj\\xc6`\\x89\\x86\\xeb \\xbc\\xef\\xc3<\\xe5g\\x96\\xa4L\\x1c\\x1b]ea\\x81$D\\x99\\x92eH\\x85\\x82\\x1b*\\xc2*\\xaeb9n9\\x002\\x13\\x02\\x13\\x03\\x13\\x01\\x009\\x0
548 /
tcp
-969286897 | 2025-03-19T22:15:53.434245
Fast Copy: Yes\nExtended Sleep: Yes\nUUIDs: Yes\nUTF8 Server Name: Yes\nDirectory Services: Yes\nReconnect: No\nServer Notifications: Yes\nTCP/IP: Yes\nServer Signature: Yes\nServer Message: No\nPassword Saving Prohibited: No\nPassword Changing: No\nCopy File: Yes\nServer Name: TNAS-0E01\nMachine Type: \\x0eNetatalk3.1.12\nAFP Versions: AFP2.2, AFPX03, AFP3.1, AFP3.2, AFP3.3, AFP3.4\nUAMs: No User Authent\\x04,DHX2\t,DHCAST128\\x00\nServer Signature: 00000000008002000180030002800280
554 /
tcp
735639583 | 2025-03-19T11:22:59.155603
RTSP/1.0 200 OK
Server: H264DVR 1.0
Cseq: 1
Public: OPTIONS, DESCRIBE, SETUP, TEARDOWN, GET_PARAMETER, SET_PARAMETER, PLAY, PAUSE
1239199743 | 2025-03-25T23:35:28.948588
HTTP/1.1 400 Bad Request
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 9-24676686-0 0NNN RT(1705910221170 116) q(-1 -1 -1 -1) r(0 -1) b1
1300162323 | 2025-02-28T14:39:01.420416
HTTP/1.1 404 Not Found
Content-Type: text/plain; charset=utf-8
X-Content-Type-Options: nosniff
675 /
tcp
408230060 | 2025-03-11T02:13:13.461786
\r\nSorry, that nickname format is invalid.\r\n
-58765571 | 2025-03-18T17:07:15.222620
HTTP/1.1 302 Moved Temporarily
Content-Type: text/html
Connection: close
Server: Nginx
Expires: 0
Pragma: no-cache
Cache-Control: no-cache
Location: https://portal.ikuai8-wifi.com/templates/default/index.html?timestamp=1705534360&router_ver=3.2.4&firmware=IK-RouterOS&template=default&gwid=a7dea2d1ff2b46d582c814cbae2fb058&user_ip=*.*.*.*
743 /
tcp
819727972 | 2025-03-21T23:42:18.395988
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1282941221 | 2025-03-19T12:57:22.102073
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
-1346601424 | 2025-03-23T21:43:58.085132
HTTP/1.1 503 Service Unavailable
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 13-38977912-0 0NNN RT(1705905272179 0) q(0 -1 -1 -1) r(0 -1)
811 /
tcp
819727972 | 2025-03-24T09:21:32.620756
SSH-2.0-OpenSSH_7.4
Vulnerabilities
832 /
tcp
-1399940268 | 2025-03-17T10:15:10.238194
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
873 /
tcp
-1970692834 | 2025-03-19T08:02:22.673657
@RSYNCD: 31.0\n@RSYNCD: EXIT\n
886 /
tcp
819727972 | 2025-03-13T04:06:06.362988
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-936692830 | 2025-03-18T15:40:55.081394
HTTP/1.1 202 OK
Connection: Keep-Alive
Content-Type: text/html
Keep-Alive: timeout=15; max=19
993 /
tcp
-1189269828 | 2025-03-21T07:07:47.479404
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
1013 /
tcp
1911457608 | 2025-03-15T18:50:14.600486
\x00[\x00\x00\x00\x00\x00\x00
1282941221 | 2025-03-11T13:32:06.152081
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
1099 /
tcp
-1099385124 | 2025-03-18T10:11:16.498002
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
1153 /
tcp
-1399940268 | 2025-03-24T08:39:32.655131
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1177 /
tcp
-971970408 | 2025-03-20T07:10:41.487690
-1717285112 | 2025-03-16T23:10:32.310006
HTTP/1.1 200 OK
Content-Type: text/xml; charset="utf-8"
Server: UPnP/1.0 DLNADOC/1.50 Platinum/1.0.5.13
1234 /
tcp
-1399940268 | 2025-03-20T18:52:23.672469
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1291 /
tcp
819727972 | 2025-03-19T09:58:10.986672
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1293 /
tcp
-1327660293 | 2025-03-24T15:21:22.150042
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
1337 /
tcp
1412519768 | 2025-03-28T03:01:23.345235
"AP0F1D85"
Connection: close
<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD>
<BODY BGCOLOR
1343 /
tcp
1504401647 | 2025-03-25T17:39:33.979783
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
1344 /
tcp
819727972 | 2025-03-21T06:17:51.474055
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1355 /
tcp
-375604792 | 2025-02-27T01:25:19.840762
220 Microsoft FTP Service
1370 /
tcp
-1399940268 | 2025-03-17T03:52:47.702110
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1414 /
tcp
-2089734047 | 2025-03-14T11:53:21.999202
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1444 /
tcp
504717326 | 2025-03-14T09:45:42.294648
SSH-2.0-OpenSSH_8.6
Vulnerabilities
1451 /
tcp
-1059554316 | 2025-03-20T07:13:35.976426
\xc2\xa5A\x00\x01\x00\x00\x00,\x00\x00\x00\x02\x00\x00\x00L\x00\x00\x00\x08Connect\x00\x00\x00\x00x\x00\x00\x00\x0857222\x00\x00\x00
1460 /
tcp
-2089734047 | 2025-03-21T03:29:34.195517
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
225472646 | 2025-03-08T19:14:59.940454
HTTP/1.1 200 OK
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8
Pragma: no-cache
Cache-Control: no-cache
Expires: 0
X-Frame-Options: SAMEORIGIN
1515 /
tcp
819727972 | 2025-03-27T14:37:37.203454
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1521 /
tcp
-1184558916 | 2025-03-12T02:54:28.318129
Version:11.2.0.4.0\n"\\x00\\x00Y(DESCRIPTION=(TMP=)(VSNNUM=186647552)(ERR=1189)(ERROR_STACK=(ERROR=(CODE=1189)(EMFI=4))))
1604 /
tcp
-971970408 | 2025-03-28T09:45:39.787258
1727667211 | 2025-03-21T19:58:47.075354
HTTP/1.1 503 Service Unavailable
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 7-120613361-0 0NNN RT(1701279697055 177) q(0 -1 -1 -1) r(0 -1)
1723 /
tcp
1103582599 | 2025-03-18T19:39:19.401680
Firmware: 1\nHostname: Vigor\nVendor: DrayTek\n
0 | 2025-03-21T12:19:42.212397
HTTP/1.1 408 Request Timeout
content-length: 0
1800 /
tcp
2098371729 | 2025-03-21T01:10:19.977194
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
1801 /
tcp
-1139999322 | 2025-03-21T14:45:31.980310
\\x10Z\x0b\\x00LIOR<\\x02\\x00\\x00\\xff\\xff\\xff\\xff\\x00\\x00\\x12\\x00a36a0e421af47074\\xf2\\xdby\\x96\\xbb\\xb1LE\\xa1\\x1f.%\xd2\xbft\\xb692d3\\x10\\x03\\x00\\x00ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ
1901 /
tcp
1363464823 | 2025-03-08T23:00:35.716992
-1013082686 | 2025-03-21T07:36:49.903429
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
1953 /
tcp
1308377066 | 2025-03-22T09:46:11.793263
1962 /
tcp
1911457608 | 2025-03-26T01:12:05.811019
\x00[\x00\x00\x00\x00\x00\x00
1968 /
tcp
-980525298 | 2025-02-26T14:07:34.954564
\x01\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
1970 /
tcp
-136006866 | 2025-03-21T22:36:26.944690
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
1976 /
tcp
-2089734047 | 2025-03-21T19:27:05.193363
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1977 /
tcp
632542934 | 2025-03-22T04:02:29.816165
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
1978 /
tcp
-1399940268 | 2025-03-10T16:59:20.552172
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1984 /
tcp
-42767839 | 2025-03-26T20:11:21.843380
RFB 005.000
VNC:
Protocol Version: 5.0
1990 /
tcp
1911457608 | 2025-03-11T10:49:55.942546
\x00[\x00\x00\x00\x00\x00\x00
2000 /
tcp
671605376 | 2025-03-19T06:35:53.381429
2002 /
tcp
-1730858130 | 2025-03-23T23:48:51.308997
RFB 003.008
VNC:
Protocol Version: 3.8
2008 /
tcp
2067064333 | 2025-03-12T11:05:21.863019
2012 /
tcp
1911457608 | 2025-03-12T23:54:04.382069
\x00[\x00\x00\x00\x00\x00\x00
2050 /
tcp
-2089734047 | 2025-03-19T03:01:48.304388
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
2053 /
tcp
-1399940268 | 2025-03-18T13:12:33.754978
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2064 /
tcp
819727972 | 2025-03-25T03:30:30.377428
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2066 /
tcp
-2089734047 | 2025-03-06T09:56:13.991959
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
-1230049476 | 2025-03-21T10:31:46.161298
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
2068 /
tcp
-42767839 | 2025-03-20T03:26:35.687085
RFB 005.000
VNC:
Protocol Version: 5.0
2077 /
tcp
819727972 | 2025-03-11T05:29:16.037053
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2081 /
tcp
-2089734047 | 2025-03-22T15:23:11.194071
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
2083 /
tcp
-746114901 | 2025-03-22T08:52:18.804036
2087 /
tcp
-746114901 | 2025-03-27T13:12:07.280890
2091 /
tcp
669849225 | 2025-03-14T07:42:06.636157
SSH-98.60-SysaxSSH_81885..42\r\n
2095 /
tcp
-2089734047 | 2025-03-24T09:29:02.455513
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
2103 /
tcp
826567260 | 2025-03-20T03:52:42.186281
\\x05\\x00\r\\x03\\x10\\x00\\x00\\x00\\x18\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x04\\x00\\x01\\x05\\x00\\x00\\x00\\x00
2108 /
tcp
632542934 | 2025-03-04T20:49:50.876523
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
2133 /
tcp
1574088840 | 2025-03-16T12:57:29.818264
">Application and Content Networking Software 3.9</a>)\n</BODY><
2150 /
tcp
-1399940268 | 2025-03-11T17:36:26.705473
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2154 /
tcp
171352214 | 2025-03-04T06:18:32.607772
-ERR client ip is not in whitelist
2181 /
tcp
546151771 | 2025-02-27T11:16:08.123576
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC
Clients:
/*.*.*.*:11264[0](queued=0,recved=1,sent=0)
Latency min/avg/max: 0/0.0/0
Received: 8557
Sent: 11410
Connections: 1
Outstanding: 0
Zxid: 0x332907ad3391
Mode: follower
Node count: 104618
2211 /
tcp
-122096153 | 2025-03-19T16:56:39.854585
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
1077013874 | 2025-03-09T16:54:06.927440
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
372433470 | 2025-03-24T21:03:34.561213
HTTP/1.1 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm=""
2327 /
tcp
51259122 | 2025-02-28T23:51:17.265597
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
2332 /
tcp
-1681927087 | 2025-03-27T04:43:58.130140
kjnkjabhbanc283ubcsbhdc72
2344 /
tcp
-1114821551 | 2025-03-13T13:56:21.371763
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
2345 /
tcp
1543809371 | 2025-03-22T00:42:00.827225
220 corpease.net Anti-spam GT for Coremail System (icmhosting[2\n0181212])
2351 /
tcp
45131230 | 2025-03-23T15:48:00.720607
inv2W\x04\x0f\x00\x00\x00\x01\x00\t\x00\x00\x00
2362 /
tcp
1332894250 | 2025-02-26T20:15:29.101546
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
1830697416 | 2025-03-11T20:03:44.878006
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
2382 /
tcp
575925250 | 2025-03-24T17:49:56.728766
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
114471724 | 2025-03-26T20:35:30.638307
HTTP/1.1 302
X-Frame-Options: SAMEORIGIN
Server: NSX
2453 /
tcp
-303199180 | 2025-03-26T12:41:31.876306
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
1617540835 | 2025-03-11T17:08:24.320620
HTTP/1.1 404 Not Found
Connection: close
2567 /
tcp
89142341 | 2025-03-15T00:07:28.573970
\x05\x00\x00\x00\x0b\x08\x05\x1a\x00
2570 /
tcp
-1399940268 | 2025-03-04T01:04:11.450119
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2628 /
tcp
819727972 | 2025-03-26T07:50:18.523349
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2709 /
tcp
819727972 | 2025-03-11T08:42:42.709906
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3001 /
tcp
398077695 | 2025-03-27T10:42:47.173875
3005 /
tcp
84112171 | 2025-03-13T16:59:03.580537
-1227409554 | 2025-03-25T16:48:10.845664
HTTP/1.1 500 Internal Server Error
Server: Zope/(2.13.23, python 1.7.18, linux2) ZServer/1.1
Content-Type: text/plain; charset=utf-8
Connection: close
587250289 | 2025-03-18T06:54:49.009012
HTTP/1.1 400 Bad Request
Server: nginx/1.18.11011 (Ubuntu)
Content-Type: text/plain; charset=utf-8
Connection: close
1282941221 | 2025-03-11T00:13:04.231257
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
3022 /
tcp
1278527606 | 2025-03-23T09:54:01.470045
3042 /
tcp
320677201 | 2025-02-28T22:45:41.433892
H\x00\x00\x00\xc3\xbfj\x04Host \'101.133.140.114\' is not allowed to \nconnect to this MySQL server
3050 /
tcp
-1399940268 | 2025-03-17T00:06:07.624319
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3051 /
tcp
820958131 | 2025-03-26T11:14:22.906820
kjnkjabhbanc283ubcsbhdc72\x02
3058 /
tcp
819727972 | 2025-03-14T13:52:39.773352
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3063 /
tcp
-358801646 | 2025-03-06T15:26:32.714580
3067 /
tcp
1911457608 | 2025-03-04T08:37:19.890212
\x00[\x00\x00\x00\x00\x00\x00
3070 /
tcp
1504401647 | 2025-03-06T21:58:59.860646
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
3076 /
tcp
945910976 | 2025-03-18T10:20:24.995162
* OK TeamXchange IMAP4rev1 server (otyUg) ready.\r\n
198844676 | 2025-03-11T11:45:23.547232
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3078 /
tcp
1911457608 | 2025-03-16T23:10:37.677809
\x00[\x00\x00\x00\x00\x00\x00
3082 /
tcp
-1399940268 | 2025-03-27T01:55:06.368236
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3096 /
tcp
103159425 | 2025-03-19T18:18:04.005704
3097 /
tcp
945910976 | 2025-03-26T14:24:55.445054
* OK TeamXchange IMAP4rev1 server (otyUg) ready.\r\n
3105 /
tcp
-1730858130 | 2025-03-22T01:34:40.086929
RFB 003.008
VNC:
Protocol Version: 3.8
3108 /
tcp
722711397 | 2025-03-10T04:08:38.498917
\x00[M\xc3\xba\xc3\x9a\x7f\x00\x00
3110 /
tcp
-1375131644 | 2025-03-09T04:23:50.089364
\x00[v\xc3\xbdC\x7f\x00\x00
3114 /
tcp
-1248408558 | 2025-02-28T23:12:14.512667
220 MikroTik FTP server (MikroTik 6.44.3) ready
3115 /
tcp
-2017887953 | 2025-03-11T09:03:44.417403
SSH-2.0-OpenSSH_7.9
Vulnerabilities
3119 /
tcp
1761482307 | 2025-03-18T19:17:40.370485
\x00[\xc2\xa5\t\xc2\xbe\x7f\x00\x00
3131 /
tcp
597764502 | 2025-03-21T22:05:00.227547
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
3135 /
tcp
1911457608 | 2025-03-09T17:04:45.332998
\x00[\x00\x00\x00\x00\x00\x00
3141 /
tcp
-832380282 | 2025-03-18T04:05:33.325146
lpd [@Boyk]: Print-services are not available to your host (aF2qXkQ2m).\n
3142 /
tcp
-1428621233 | 2025-03-15T19:20:16.047826
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
3148 /
tcp
819727972 | 2025-03-12T21:00:13.235088
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3151 /
tcp
117101543 | 2025-03-21T08:58:22.328825
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
3154 /
tcp
-1399940268 | 2025-03-24T11:13:19.882057
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3156 /
tcp
1208318993 | 2025-03-04T09:25:37.911062
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
3159 /
tcp
-1399940268 | 2025-02-28T02:38:35.583683
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1282941221 | 2025-03-27T23:53:12.948953
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
-1227409554 | 2025-03-09T18:08:02.969768
HTTP/1.1 500 Internal Server Error
Server: Zope/(2.13.23, python 1.7.18, linux2) ZServer/1.1
Content-Type: text/plain; charset=utf-8
Connection: close
3176 /
tcp
-1399940268 | 2025-03-27T10:55:55.344881
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3177 /
tcp
-358801646 | 2025-03-04T21:17:05.242308
3180 /
tcp
-345718689 | 2025-03-07T11:18:20.023941
3182 /
tcp
-1399940268 | 2025-03-23T08:49:10.584803
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3191 /
tcp
-407828767 | 2025-03-27T13:30:36.400433
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
3196 /
tcp
-1428621233 | 2025-03-14T19:33:48.257762
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
3197 /
tcp
1911457608 | 2025-03-21T14:11:36.268429
\x00[\x00\x00\x00\x00\x00\x00
3198 /
tcp
-1428621233 | 2025-03-23T18:46:28.292162
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
3256 /
tcp
-1392039491 | 2025-03-27T06:14:45.235831
"Broadband Router"
<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
3260 /
tcp
-271466677 | 2025-03-25T12:18:40.947300
RIFA\\x00\\x00\\x00\\x00\\x10\\x88\\x81\\x00\\x00\\x00\\x00\\x00\\x00\x0b\\x00\\x05\\x00\\x00\\x00:\\x00HD316\\x00\\x01\\x00
3268 /
tcp
-561021273 | 2025-03-25T22:52:47.260026
220 2.0.0 prod-cn-momentum2.webpowercn.local ESMTP ecelerity 4.2.1.51128 r(Core:4.2.1.5) Sun, 03 Dec 2023 10:04:37 +0800\r\n
3269 /
tcp
-904840257 | 2025-03-12T22:35:27.068728
572 Relay not authorized\r\n
3299 /
tcp
1741579575 | 2025-03-21T05:22:35.553505
3301 /
tcp
307999478 | 2025-03-24T14:21:11.107478
unknown command \r\nunknown command \r\n
3306 /
tcp
1673132866 | 2025-03-04T08:03:52.220649
I\\x00\\x00\\x01\\xffj\\x04Host \'*.*.*.*\' is not allowed to connect to this MariaDB server
3310 /
tcp
937756010 | 2025-03-27T13:27:55.098607
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x01\x00\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
3388 /
tcp
-1114821551 | 2025-03-24T03:21:02.619654
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
3389 /
tcp
623170236 | 2025-03-19T14:16:01.094384
Remote Desktop Protocol\n\\x03\\x00\\x00\\x13\\x0e\\xd0\\x00\\x00\\x124\\x00\\x02\\x1f\\x08\\x00\\x08\\x00\\x00\\x00\n\nFlag: PROTOCOL_HYBRID_EX\nTarget_Name: PC82139\nProduct_Version: 10.0.19041 Ntlm 15\nOS: Windows 10, Version 2004/Windows Server, Version 2004\nNetBIOS_Domain_Name: PC82139\nNetBIOS_Computer_Name: PC82139\nDNS_Domain_Name: PC82139\nDNS_Computer_Name: PC82139\nSystem_Time: 2024-01-19 08:39:46 +0000 UTC\n\n
3401 /
tcp
1911457608 | 2025-03-19T11:11:01.596302
\x00[\x00\x00\x00\x00\x00\x00
3402 /
tcp
-1399940268 | 2025-03-18T02:38:38.841683
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3405 /
tcp
-1399940268 | 2025-03-11T15:05:51.783855
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1282941221 | 2025-03-07T08:28:34.040227
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
3443 /
tcp
1911457608 | 2025-03-18T05:29:12.974780
\x00[\x00\x00\x00\x00\x00\x00
3521 /
tcp
-1399940268 | 2025-03-24T23:56:02.716705
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3530 /
tcp
599074451 | 2025-02-27T00:11:52.014843
3549 /
tcp
819727972 | 2025-03-07T18:11:09.272089
SSH-2.0-OpenSSH_7.4
Vulnerabilities
198844676 | 2025-03-28T10:37:50.354595
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3558 /
tcp
1278527606 | 2025-03-23T07:48:26.555312
3562 /
tcp
-1399940268 | 2025-03-10T11:23:16.470513
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3563 /
tcp
921225407 | 2025-03-25T02:33:01.039088
\x00\x00\x00\x04\x00\x00\x00\x00\x00
3790 /
tcp
-1641514916 | 2025-03-24T18:56:57.681684
* OK Merak 1dFUa2 IMAP4rev1
3842 /
tcp
669849225 | 2025-03-05T15:44:04.629397
SSH-98.60-SysaxSSH_81885..42\r\n
3922 /
tcp
819727972 | 2025-03-13T21:15:16.053493
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3950 /
tcp
-1399940268 | 2025-02-26T14:52:40.926595
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3954 /
tcp
1426971893 | 2025-03-24T11:49:52.350332
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
1300162323 | 2025-03-26T15:08:23.800368
HTTP/1.1 404 Not Found
Content-Type: text/plain; charset=utf-8
X-Content-Type-Options: nosniff
4001 /
tcp
1911457608 | 2025-02-27T11:32:41.260995
\x00[\x00\x00\x00\x00\x00\x00
4022 /
tcp
-1399940268 | 2025-03-14T00:04:49.071404
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4023 /
tcp
-1327660293 | 2025-03-05T10:19:34.117802
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
4064 /
tcp
-1399940268 | 2025-03-09T04:38:19.961541
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4103 /
tcp
1989907056 | 2025-02-27T16:27:31.096838
RTSP/1.0 453 Not Enough Bandwidth\r\nServer: AirTunes/7l_wZ\r\n\r\n
4150 /
tcp
-1399940268 | 2025-03-19T00:30:07.558707
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4155 /
tcp
1911457608 | 2025-03-13T00:22:55.448471
\x00[\x00\x00\x00\x00\x00\x00
4157 /
tcp
2087396567 | 2025-03-28T06:39:05.079963
kjnkjabhbanc283ubcsbhdc72
4200 /
tcp
1911457608 | 2025-03-18T04:18:30.830747
\x00[\x00\x00\x00\x00\x00\x00
4243 /
tcp
820958131 | 2025-02-27T14:27:38.129296
kjnkjabhbanc283ubcsbhdc72\x02
4282 /
tcp
-893477759 | 2025-03-16T00:25:08.228298
!versionbind7 t{RPowerDNS Recursor 410
4321 /
tcp
-1250504565 | 2025-03-17T03:45:00.220301
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x80\x00\x04\x00\x01\x00\x00\x00\x05\x00\xff\xff\xff\x00\x00\x04\x08\x00\x00\x00\x00\x00\x7f\xff\x00\x00\x00\x00\x08\x07\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01
4369 /
tcp
-1986594217 | 2025-03-16T03:48:37.743031
"AP0F1D85"\r\nConnection: close\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD>\n<BODY BGCOLOR
4431 /
tcp
819727972 | 2025-03-24T13:23:00.795674
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4433 /
tcp
-1375131644 | 2025-02-28T12:47:05.040570
\x00[v\xc3\xbdC\x7f\x00\x00
4434 /
tcp
1996932384 | 2025-03-15T12:26:29.237736
4439 /
tcp
-2031152423 | 2025-03-10T10:19:56.085111
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
4440 /
tcp
-1036370807 | 2025-03-22T22:16:26.619047
1140068775 | 2025-03-09T16:17:08.608466
HTTP/1.1 200 OK
Connection: Keep-Alive
Content-Type: text/html
X-Frame-Options: DENY
Name: VMware ESXi
FullName: VMware ESXi 6.7.0 build-8169922
Vendor: VMware, Inc.
Version: 6.7.0
Build: 8169922
LocaleVersion: INTL
LocaleBuild: 000
OsType: vmnix-x86
ProductLineId: embeddedEsx
ApiType: HostAgent
ApiVersion: 6.7
4445 /
tcp
819727972 | 2025-03-17T23:43:10.182687
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4451 /
tcp
1989907056 | 2025-03-10T17:27:20.500551
RTSP/1.0 453 Not Enough Bandwidth\r\nServer: AirTunes/7l_wZ\r\n\r\n
4500 /
tcp
-1626979812 | 2025-03-23T03:46:44.321486
220 Service ready for new user.
4520 /
tcp
455076604 | 2025-03-14T12:42:16.552673
!\x07version\x04bind7 t{RPowerDNS Recursor 410
4528 /
tcp
1830187220 | 2025-02-27T08:12:29.410330
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
4543 /
tcp
408230060 | 2025-03-14T03:10:30.396251
\r\nSorry, that nickname format is invalid.\r\n
4545 /
tcp
-1947777893 | 2025-03-04T08:16:30.990962
"Broadband Router"\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
4700 /
tcp
-1399940268 | 2025-03-28T09:42:42.042083
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4786 /
tcp
-891714208 | 2025-03-24T05:17:40.068806
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
4840 /
tcp
-1399940268 | 2025-03-05T11:11:45.146374
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4899 /
tcp
1261582754 | 2025-03-24T20:18:54.667564
unknown command
unknown command
4911 /
tcp
-1399940268 | 2025-03-09T11:37:18.203859
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4949 /
tcp
1690634669 | 2025-03-10T21:41:30.014475
4993 /
tcp
-801484042 | 2025-03-06T19:46:24.861998
4999 /
tcp
-1399940268 | 2025-03-05T17:18:52.117164
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5001 /
tcp
-653033013 | 2025-03-21T13:27:56.966104
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
5004 /
tcp
1911457608 | 2025-03-17T12:49:29.857766
\x00[\x00\x00\x00\x00\x00\x00
5007 /
tcp
-1399940268 | 2025-03-25T17:27:02.864881
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5010 /
tcp
1911457608 | 2025-03-23T08:39:45.611398
\x00[\x00\x00\x00\x00\x00\x00
5011 /
tcp
165188539 | 2025-03-04T04:06:35.140954
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
5025 /
tcp
1741579575 | 2025-03-27T15:47:01.134045
5100 /
tcp
-1810987450 | 2025-03-16T01:51:10.965495
378148627 | 2025-03-14T04:51:06.073006
HTTP/1.1 497 Http to Https
Server: nginx/1.20.1
Content-Type: text/html; charset=utf-8
Connection: close
5135 /
tcp
819727972 | 2025-02-28T05:46:18.122043
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1830697416 | 2025-03-12T20:50:24.082418
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
5172 /
tcp
-971970408 | 2025-03-18T20:02:24.487858
5201 /
tcp
1665283070 | 2025-03-18T23:44:22.312149
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x01\x00\x00\x10\x00\x00\n0\x03\x00\x00\x00\x01\x00\x05\x00\x00@\x00\x00\x06\x00\x00\x1f@
5222 /
tcp
-746114901 | 2025-03-10T10:32:33.672517
5224 /
tcp
1632932802 | 2025-03-20T05:45:00.257075
5229 /
tcp
-339084706 | 2025-03-03T18:24:42.018514
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
5242 /
tcp
-980525298 | 2025-02-28T17:47:50.043092
\x01\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
5249 /
tcp
-1399940268 | 2025-03-25T05:47:34.616091
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5267 /
tcp
-2089734047 | 2025-03-21T16:26:58.872493
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
-1074907534 | 2025-03-28T02:45:05.167423
HTTP/1.1 400 Bad Request
Server: CWAP-waf
Content-Type: text/html
Connection: close
WZWS-RAY: 1249-1705938603.82-w-waf02tjgt
5277 /
tcp
-891714208 | 2025-03-12T12:22:04.991714
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
5432 /
tcp
398077695 | 2025-03-05T00:22:23.384518
5435 /
tcp
-2089734047 | 2025-03-04T04:58:54.568145
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
-109488528 | 2025-02-26T15:31:02.085588
HTTP/1.1 200 OK
Connection: close
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
5456 /
tcp
597764502 | 2025-03-07T02:27:49.362281
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
5542 /
tcp
1911457608 | 2025-03-06T10:37:34.519290
\x00[\x00\x00\x00\x00\x00\x00
5558 /
tcp
1911457608 | 2025-03-15T16:14:45.024165
\x00[\x00\x00\x00\x00\x00\x00
5593 /
tcp
1911457608 | 2025-03-25T10:46:34.006588
\x00[\x00\x00\x00\x00\x00\x00
5599 /
tcp
575925250 | 2025-03-12T19:45:56.807218
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
5604 /
tcp
-1399940268 | 2025-03-23T17:04:31.357018
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5609 /
tcp
1919228981 | 2025-03-27T22:46:24.713914
\x00\x1e\x00\x06\xc2\x81\xc2\x85\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
5613 /
tcp
632542934 | 2025-03-10T03:27:40.825461
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
5620 /
tcp
1911457608 | 2025-03-13T19:22:36.973073
\x00[\x00\x00\x00\x00\x00\x00
5672 /
tcp
575925250 | 2025-03-15T22:21:40.416346
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
5673 /
tcp
-358801646 | 2025-03-16T21:07:35.749582
5696 /
tcp
-1327660293 | 2025-03-23T01:47:20.408129
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
5907 /
tcp
-445721795 | 2025-03-27T02:33:08.791192
\x00[\xc3\xaed\x1a\x7f\x00\x00
5911 /
tcp
-792826324 | 2025-03-05T22:43:15.285724
220 FTP server ready - login please
5919 /
tcp
1623746877 | 2025-03-06T09:20:00.943420
500 Permission denied - closing connection.\r\n
5938 /
tcp
819727972 | 2025-03-27T06:02:17.619702
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1999272906 | 2025-03-27T13:37:53.956968
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
5994 /
tcp
89142341 | 2025-03-20T15:32:25.927324
\x05\x00\x00\x00\x0b\x08\x05\x1a\x00
5996 /
tcp
-1399940268 | 2025-03-12T13:20:35.418269
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6000 /
tcp
120534451 | 2025-03-20T06:50:12.930775
6001 /
tcp
120534451 | 2025-03-26T22:12:00.213766
6003 /
tcp
321971019 | 2025-03-08T18:54:17.064241
-ERR client ip is not in whitelist\r
6005 /
tcp
-1329831334 | 2025-03-10T21:01:28.231781
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
6008 /
tcp
-1399940268 | 2025-03-26T04:39:22.748894
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6020 /
tcp
1911457608 | 2025-03-26T02:53:40.623967
\x00[\x00\x00\x00\x00\x00\x00
6022 /
tcp
819727972 | 2025-03-06T15:31:53.579008
SSH-2.0-OpenSSH_7.4
Vulnerabilities
6060 /
tcp
-1059554316 | 2025-03-08T14:12:12.054298
\xc2\xa5A\x00\x01\x00\x00\x00,\x00\x00\x00\x02\x00\x00\x00L\x00\x00\x00\x08Connect\x00\x00\x00\x00x\x00\x00\x00\x0857222\x00\x00\x00
6070 /
tcp
1911457608 | 2025-03-14T15:05:13.385186
\x00[\x00\x00\x00\x00\x00\x00
6102 /
tcp
-1327660293 | 2025-03-23T03:59:03.329089
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
6308 /
tcp
632542934 | 2025-03-21T18:33:29.858032
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
1077013874 | 2025-03-18T19:53:02.076439
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
6379 /
tcp
321971019 | 2025-03-21T04:21:12.575704
-ERR client ip is not in whitelist\r
6405 /
tcp
-616720387 | 2025-03-25T21:19:31.320111
6440 /
tcp
937756010 | 2025-03-17T13:52:09.629855
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x01\x00\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
6443 /
tcp
-653033013 | 2025-03-06T19:15:25.278453
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
6511 /
tcp
321971019 | 2025-03-13T08:22:05.975542
-ERR client ip is not in whitelist\r
6550 /
tcp
-653033013 | 2025-03-28T04:31:24.528499
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
6561 /
tcp
921225407 | 2025-03-23T15:46:41.938783
\x00\x00\x00\x04\x00\x00\x00\x00\x00
6581 /
tcp
1574088840 | 2025-03-16T03:45:19.492765
">Application and Content Networking Software 3.9</a>)\n</BODY><
6622 /
tcp
-274082663 | 2025-02-27T07:56:59.962798
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
6633 /
tcp
-1399940268 | 2025-03-26T22:57:50.119824
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4935895 | 2025-03-12T12:54:08.270493
HTTP/1.1 400 Bad Request
Server: CloudWAF
6667 /
tcp
-971970408 | 2025-03-23T23:35:11.639344
6668 /
tcp
1911457608 | 2025-03-26T02:43:18.467389
\x00[\x00\x00\x00\x00\x00\x00
6688 /
tcp
937756010 | 2025-02-27T01:09:27.668786
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x01\x00\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
6700 /
tcp
1363464823 | 2025-02-28T05:41:15.359105
6755 /
tcp
-2017887953 | 2025-03-06T06:08:54.470613
SSH-2.0-OpenSSH_7.9
Vulnerabilities
6775 /
tcp
401555314 | 2025-03-16T17:29:16.826534
6789 /
tcp
1911457608 | 2025-03-18T21:17:49.051121
\x00[\x00\x00\x00\x00\x00\x00
6799 /
tcp
1767345577 | 2025-03-24T13:54:16.304354
Hello, this is Quagga (version 0T).
Copyright 1996-200
-1839934832 | 2025-03-20T21:57:38.465657
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
7001 /
tcp
-829704895 | 2025-03-15T12:34:46.746109
1282941221 | 2025-03-12T18:06:54.703839
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
7010 /
tcp
-136006866 | 2025-03-21T13:38:57.056104
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
7011 /
tcp
1911457608 | 2025-03-26T22:22:33.007238
\x00[\x00\x00\x00\x00\x00\x00
7020 /
tcp
-2096652808 | 2025-03-10T15:49:50.193750
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
7171 /
tcp
-1399940268 | 2025-03-27T06:51:14.069119
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7218 /
tcp
-1681927087 | 2025-03-05T18:57:49.827268
kjnkjabhbanc283ubcsbhdc72
7349 /
tcp
-445721795 | 2025-02-28T12:04:33.293092
\x00[\xc3\xaed\x1a\x7f\x00\x00
7415 /
tcp
-1036370807 | 2025-03-20T21:11:44.316046
1320285193 | 2025-03-12T14:10:04.669983
HTTP/1.1 404 Not Found
Server: CloudWAF
Content-Type: text/html
Connection: keep-alive
7445 /
tcp
632542934 | 2025-03-25T03:03:40.327947
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
7480 /
tcp
-980525298 | 2025-02-27T04:40:53.594172
\x01\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
7535 /
tcp
580340387 | 2025-03-20T03:50:28.068256
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
7537 /
tcp
321971019 | 2025-03-19T23:12:59.286075
-ERR client ip is not in whitelist\r
7548 /
tcp
-1730858130 | 2025-03-25T15:31:28.131575
RFB 003.008
VNC:
Protocol Version: 3.8
7603 /
tcp
-1626979812 | 2025-03-19T20:25:06.725892
220 Service ready for new user.
7634 /
tcp
550048729 | 2025-03-13T18:55:37.821632
7771 /
tcp
-1327660293 | 2025-03-27T23:48:26.888292
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
7773 /
tcp
-2096652808 | 2025-03-28T05:17:25.302658
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
7775 /
tcp
-2096652808 | 2025-03-24T19:12:54.446792
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
1391945995 | 2025-03-27T13:43:49.756373
HTTP/1.1 403 Forbidden
Content-Type: text/plain; charset=utf-8
Proxy-Authenticate: Basic realm=""
2103111368 | 2025-03-16T17:44:06.234541
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
8009 /
tcp
1741579575 | 2025-03-11T21:30:11.612539
8012 /
tcp
1911457608 | 2025-03-19T18:04:57.355605
\x00[\x00\x00\x00\x00\x00\x00
8017 /
tcp
-1399940268 | 2025-03-04T08:50:11.404703
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8018 /
tcp
-1737707071 | 2025-03-04T09:05:38.024361
\x00b\x00\x01\x00\x00\x00\x00x\x0b\x00\x00\x00\x00z\x00437
8022 /
tcp
819727972 | 2025-03-22T20:32:12.989949
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8029 /
tcp
1278527606 | 2025-03-25T16:27:04.108105
-2102434810 | 2025-03-05T22:07:10.672439
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
WZWS-RAY: 1249-1702720126.936-s7zzuc
-289739783 | 2025-03-09T10:50:24.594668
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 657ca3aa_PS-CTU-0151D49_22664-21642
8043 /
tcp
820958131 | 2025-03-16T14:27:32.170287
kjnkjabhbanc283ubcsbhdc72\x02
8057 /
tcp
-2089734047 | 2025-03-11T10:13:49.214309
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8066 /
tcp
-1399940268 | 2025-03-26T13:18:41.990639
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1077013874 | 2025-03-04T07:18:07.037290
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
8081 /
tcp
539065883 | 2025-03-13T07:42:46.037751
8082 /
tcp
1911457608 | 2025-03-11T14:14:36.864438
\x00[\x00\x00\x00\x00\x00\x00
8083 /
tcp
819727972 | 2025-03-27T12:16:56.330073
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8085 /
tcp
1842524259 | 2025-03-17T07:06:36.143858
8087 /
tcp
-1399940268 | 2025-03-24T23:02:42.458584
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8092 /
tcp
-1399940268 | 2025-03-16T23:03:01.497651
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1705528964 | 2025-03-17T17:18:42.433293
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae2160_hlj44_13881-60457
8101 /
tcp
-2089734047 | 2025-03-19T21:27:07.374820
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8119 /
tcp
-1399940268 | 2025-03-21T11:04:37.316754
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8122 /
tcp
819727972 | 2025-03-24T07:12:46.348688
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8126 /
tcp
2087396567 | 2025-03-22T08:39:52.967042
kjnkjabhbanc283ubcsbhdc72
8139 /
tcp
-971970408 | 2025-03-26T05:00:05.622142
8140 /
tcp
1767345577 | 2025-03-04T10:48:46.268451
Hello, this is Quagga (version 0T).
Copyright 1996-200
8144 /
tcp
1911457608 | 2025-02-28T00:29:47.584467
\x00[\x00\x00\x00\x00\x00\x00
8145 /
tcp
-1373613804 | 2025-03-08T16:25:31.532894
00970795:d7:smethod,6:shello,8:soptions,80:d10:shttp_port,368696:i1082,5:sname,5:sL_x,10:ssync_port,5:i00469,10:stimestamp,3190459:f920.7251553166,8:sversion,6262522:sl4X,
8149 /
tcp
-303199180 | 2025-03-21T15:18:50.240083
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
8153 /
tcp
-1399940268 | 2025-03-04T06:15:30.735533
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8154 /
tcp
-358801646 | 2025-03-14T09:26:43.803643
8155 /
tcp
-1399940268 | 2025-03-25T11:53:35.360289
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8168 /
tcp
-136006866 | 2025-03-26T17:30:21.194563
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
8171 /
tcp
-375604792 | 2025-03-11T11:28:00.160759
220 Microsoft FTP Service
8175 /
tcp
1370263973 | 2025-03-13T12:29:22.529848
-1230049476 | 2025-03-06T07:53:01.046245
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
8181 /
tcp
104385780 | 2025-03-20T18:21:34.379868
8184 /
tcp
-2089734047 | 2025-03-22T13:33:00.419411
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8186 /
tcp
-1399940268 | 2025-03-27T10:45:40.119475
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8187 /
tcp
-1399940268 | 2025-03-05T12:07:27.962372
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8189 /
tcp
-2089734047 | 2025-03-09T13:36:23.044762
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8196 /
tcp
-1099385124 | 2025-03-16T16:26:23.432184
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
-1015019981 | 2025-03-16T19:59:17.850324
HTTP/1.1 200 OK
Content-Type: text/html
Connection: close
Server: DLNADOC/1.50 UPnP/1.0 MiniDLNA/1.1.4
EXT:
8251 /
tcp
-1399940268 | 2025-03-04T09:58:03.249233
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8291 /
tcp
-1947777893 | 2025-03-25T20:40:56.176230
"Broadband Router"\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
1096654864 | 2025-03-27T15:40:31.779365
HTTP/1.0 200 OK
Server: httpd/2.0
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
Content-Type: text/html
Connection: close
8381 /
tcp
165188539 | 2025-03-24T03:37:57.350694
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8412 /
tcp
819727972 | 2025-03-20T01:06:22.320492
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8413 /
tcp
-1399940268 | 2025-03-27T21:32:30.862008
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8415 /
tcp
1519486042 | 2025-03-05T16:14:39.498893
<KU_goodbye>Protocol Error: XML data is not well-formed.</KU_goodbye>
-1839934832 | 2025-02-27T22:27:06.632052
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
8421 /
tcp
165188539 | 2025-03-25T08:57:20.137025
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8423 /
tcp
1762042191 | 2025-03-17T09:48:28.154345
8433 /
tcp
-1399940268 | 2025-03-10T06:17:22.285495
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8440 /
tcp
819727972 | 2025-03-23T17:04:25.203177
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8442 /
tcp
-2089734047 | 2025-03-07T13:04:21.330616
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1273248176 | 2025-03-14T14:38:35.886973
HTTP/1.1 303 See Other
Server: sw-cp-server
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Expires: Fri, 28 May 1999 00:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
P3P: CP="NON COR CURa ADMa OUR NOR UNI COM NAV STA"
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Location: https://61.219.16.209:8443/login.php
8454 /
tcp
1278527606 | 2025-03-19T23:02:57.779488
-1453516345 | 2025-03-23T08:09:54.740918
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
8467 /
tcp
819727972 | 2025-03-10T08:35:40.380533
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8472 /
tcp
819727972 | 2025-03-22T02:03:54.969532
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-918002969 | 2025-03-18T20:46:30.423718
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae1f0c_CS-000-01n4m185_5018-27088
8505 /
tcp
1911457608 | 2025-03-17T05:18:27.316072
\x00[\x00\x00\x00\x00\x00\x00
8524 /
tcp
1426971893 | 2025-03-08T19:05:17.216002
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
8525 /
tcp
1426971893 | 2025-03-04T09:36:06.194284
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
8536 /
tcp
-1888448627 | 2025-03-19T08:18:02.703848
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8545 /
tcp
-653033013 | 2025-03-19T04:29:06.906121
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
8549 /
tcp
1948301213 | 2025-03-26T16:16:04.082566
RFB 003.003
VNC:
Protocol Version: 3.3
8554 /
tcp
2087396567 | 2025-03-17T21:55:14.962322
kjnkjabhbanc283ubcsbhdc72
8556 /
tcp
-585940771 | 2025-03-06T13:11:19.603368
8569 /
tcp
819727972 | 2025-03-28T12:42:08.479613
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8575 /
tcp
819727972 | 2025-03-16T00:21:33.966526
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8576 /
tcp
-1375131644 | 2025-03-09T16:46:43.669253
\x00[v\xc3\xbdC\x7f\x00\x00
8583 /
tcp
819727972 | 2025-03-10T00:24:22.390298
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8585 /
tcp
1370263973 | 2025-02-27T02:58:11.804650
8586 /
tcp
-1399940268 | 2025-02-28T00:10:11.615833
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8589 /
tcp
1308377066 | 2025-03-07T18:07:22.096511
8591 /
tcp
-1399940268 | 2025-03-25T10:16:11.850832
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-2107996212 | 2025-02-28T19:05:08.983782
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
8598 /
tcp
597764502 | 2025-03-17T22:59:06.912246
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
89906503 | 2025-03-26T13:53:58.103079
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
WZWS-RAY: 1249-1705939051.204-w-waf01shgt2
8605 /
tcp
-1399940268 | 2025-03-23T11:56:33.792878
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8607 /
tcp
-1399940268 | 2025-03-24T05:14:38.562308
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1489954473 | 2025-03-18T20:21:56.679371
HTTP/1.1 410 Gone
Server: openresty
Transfer-Encoding: chunked
Connection: keep-alive
Via: 1.1 google
8686 /
tcp
599074451 | 2025-02-27T16:10:22.744949
759471293 | 2025-03-07T15:24:44.458226
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ab5970_PS-TSN-013H1106_29882-55521
-802143704 | 2025-02-27T12:37:54.577461
HTTP/1.0 500 Internal Server Error
D
Connection: close
Command server error
8728 /
tcp
1911457608 | 2025-03-19T17:08:38.274294
\x00[\x00\x00\x00\x00\x00\x00
8766 /
tcp
-2089734047 | 2025-03-16T02:55:00.887102
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8791 /
tcp
-1737707071 | 2025-03-18T20:21:46.316104
\x00b\x00\x01\x00\x00\x00\x00x\x0b\x00\x00\x00\x00z\x00437
1282941221 | 2025-03-22T14:35:35.102935
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
8815 /
tcp
103159425 | 2025-03-09T06:14:00.598366
8826 /
tcp
-2096652808 | 2025-03-22T05:17:03.799638
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
-1839934832 | 2025-03-22T18:12:07.567717
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
8832 /
tcp
-1019343788 | 2025-03-14T16:48:09.641344
8834 /
tcp
2087396567 | 2025-03-18T22:45:08.843549
kjnkjabhbanc283ubcsbhdc72
8838 /
tcp
897328069 | 2025-03-26T14:17:22.842171
220 mail.scott000.com ESMTP
8843 /
tcp
2098371729 | 2025-03-04T15:06:08.809659
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
8845 /
tcp
165188539 | 2025-03-14T06:19:03.968069
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8848 /
tcp
-358801646 | 2025-03-26T05:05:28.721262
8851 /
tcp
-2089734047 | 2025-03-10T12:48:27.803982
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8852 /
tcp
15018106 | 2025-03-13T16:27:17.573143
\x00\x19\x02\x00\x02\x00\x07\x00Protocol version mismatch\x00
8866 /
tcp
-1297953727 | 2025-03-18T18:09:15.098964
\x02\x00\x00\x00\x00\x00\x06\x04\x00\x00\x00\x00\x00\x0c\x00\x00\n0\x00\x1c
8870 /
tcp
-1810987450 | 2025-03-13T07:15:08.280062
8880 /
tcp
-1476017887 | 2025-03-24T02:06:03.147038
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
8884 /
tcp
1948301213 | 2025-03-11T14:32:42.753219
RFB 003.003
VNC:
Protocol Version: 3.3
8899 /
tcp
474736340 | 2025-03-15T15:32:26.306401
431 Unable to negotiate secure command connection.
8900 /
tcp
-2046514463 | 2025-02-27T16:25:01.102740
8901 /
tcp
-1730858130 | 2025-02-28T08:13:52.707212
RFB 003.008
VNC:
Protocol Version: 3.8
8902 /
tcp
-339084706 | 2025-03-06T00:59:32.091228
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
8907 /
tcp
1543809371 | 2025-03-14T07:06:36.563040
220 corpease.net Anti-spam GT for Coremail System (icmhosting[2\n0181212])
8911 /
tcp
-142686627 | 2025-03-18T11:29:21.503402
\x00[\xc2\xba\x7fs\x7f\x00\x00
-1013082686 | 2025-03-26T18:48:16.988222
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
8980 /
tcp
921225407 | 2025-03-17T13:55:05.562132
\x00\x00\x00\x04\x00\x00\x00\x00\x00
8988 /
tcp
321971019 | 2025-03-22T16:14:05.019186
-ERR client ip is not in whitelist\r
9001 /
tcp
-1026951088 | 2025-03-27T17:48:44.797463
9002 /
tcp
504717326 | 2025-03-14T02:35:11.786561
SSH-2.0-OpenSSH_8.6
Vulnerabilities
9006 /
tcp
1492413928 | 2025-02-27T02:49:48.507663
SSH-2.0-OpenSSH_7.5
Vulnerabilities
9008 /
tcp
-1375131644 | 2025-03-17T07:17:52.006909
\x00[v\xc3\xbdC\x7f\x00\x00
9011 /
tcp
1492413928 | 2025-03-13T16:18:25.026846
SSH-2.0-OpenSSH_7.5
Vulnerabilities
9017 /
tcp
-1399940268 | 2025-03-04T09:53:19.756422
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9022 /
tcp
-1470145161 | 2025-03-10T08:09:16.238474
9026 /
tcp
-1795027372 | 2025-03-23T16:38:48.970194
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
9032 /
tcp
-1399940268 | 2025-03-19T17:09:15.936322
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9035 /
tcp
580340387 | 2025-03-12T05:35:18.698400
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
9036 /
tcp
1615193817 | 2025-03-26T23:26:31.197353
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
9037 /
tcp
366084633 | 2025-03-10T13:05:08.712575
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
9039 /
tcp
-407828767 | 2025-03-26T12:57:07.458166
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
9051 /
tcp
1978059005 | 2025-03-09T13:31:10.277615
Sorry, that nickname format is invalid.
9054 /
tcp
-1476017887 | 2025-03-12T00:24:33.802105
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
9074 /
tcp
-1888448627 | 2025-03-27T02:40:17.613827
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9078 /
tcp
-1399940268 | 2025-03-19T18:54:09.115920
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9081 /
tcp
-1399940268 | 2025-03-19T08:26:08.446602
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9087 /
tcp
-1399940268 | 2025-03-23T20:33:39.036994
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9091 /
tcp
1544300041 | 2025-03-28T12:22:58.119762
SSH-25453-Cisco-3524665.35
9093 /
tcp
-1888448627 | 2025-03-25T22:58:54.433679
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9095 /
tcp
539065883 | 2025-03-20T16:18:03.191112
9096 /
tcp
575925250 | 2025-03-20T04:27:15.533714
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
9097 /
tcp
-1327660293 | 2025-03-17T09:31:12.647858
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
-1914711518 | 2025-03-16T00:21:18.658649
HTTP/1.1 400 Bad Request
Connection: close
Server: Lego Server
9105 /
tcp
1996932384 | 2025-03-28T00:14:43.676278
9108 /
tcp
1655023012 | 2025-03-25T21:12:00.000497
athinfod: invalid query.\n
81614701 | 2025-03-17T23:14:26.625194
HTTP/1.1 200 OK
Content-Type: text/html
Accept-Ranges: bytes
Server: Microsoft-IIS/10.0
X-Powered-By: ASP.NET
9111 /
tcp
-1327660293 | 2025-03-04T14:01:45.509515
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
9116 /
tcp
819727972 | 2025-03-25T12:11:04.696066
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9137 /
tcp
-1148066627 | 2025-03-23T18:27:38.072920
\x00[\xc2\x84\xc2\x86\xc3\xb2\x7f\x00\x00
9139 /
tcp
-445721795 | 2025-03-11T08:25:31.428814
\x00[\xc3\xaed\x1a\x7f\x00\x00
9140 /
tcp
307999478 | 2025-03-22T03:51:39.130368
unknown command \r\nunknown command \r\n
9141 /
tcp
-249504111 | 2025-02-27T22:14:58.296093
9151 /
tcp
1880683805 | 2025-03-06T06:50:19.851070
9159 /
tcp
1911457608 | 2025-03-23T07:47:49.246226
\x00[\x00\x00\x00\x00\x00\x00
9160 /
tcp
-2089734047 | 2025-03-12T22:27:59.684672
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9172 /
tcp
-1399940268 | 2025-03-27T12:28:27.385381
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9187 /
tcp
1208318993 | 2025-03-27T17:07:03.790874
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
9192 /
tcp
-1399940268 | 2025-03-20T23:27:42.990711
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9193 /
tcp
1332894250 | 2025-03-25T11:44:44.558151
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
9201 /
tcp
632542934 | 2025-03-15T18:48:29.831140
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
9202 /
tcp
165188539 | 2025-03-10T13:00:12.537283
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
9207 /
tcp
1615193817 | 2025-03-21T14:50:18.938387
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
9219 /
tcp
1975288991 | 2025-03-11T09:31:31.726599
9221 /
tcp
-2096652808 | 2025-03-11T16:41:26.486069
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
9226 /
tcp
1975288991 | 2025-03-25T03:54:25.425396
9244 /
tcp
165188539 | 2025-03-15T21:55:30.657704
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
9253 /
tcp
-1399940268 | 2025-03-17T00:04:41.550630
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9273 /
tcp
1615193817 | 2025-03-22T20:28:42.012479
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
9304 /
tcp
671605376 | 2025-03-27T03:32:34.270996
9306 /
tcp
-303199180 | 2025-03-12T16:23:17.737598
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
-1839934832 | 2025-03-18T17:17:19.805747
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
9333 /
tcp
-1327660293 | 2025-03-21T09:11:39.314605
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
9353 /
tcp
1911457608 | 2025-03-18T10:26:30.108086
\x00[\x00\x00\x00\x00\x00\x00
9398 /
tcp
1544300041 | 2025-03-21T10:00:58.592905
SSH-25453-Cisco-3524665.35
1529351907 | 2025-03-22T21:55:33.324727
HTTP/1.1 407 OK
Content-Type: text/plain; charset=utf-8
Connection: keep-alive
please add white ip *.*.*.*
9446 /
tcp
1011407350 | 2025-03-08T15:27:07.149686
* OK GroupWise IMAP4rev1 Server Ready\r\n
9454 /
tcp
-2089734047 | 2025-03-05T23:11:10.281471
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9456 /
tcp
-1399940268 | 2025-03-21T07:42:47.642714
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9488 /
tcp
-1399940268 | 2025-03-03T21:51:54.995423
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9501 /
tcp
-653033013 | 2025-03-16T21:44:51.569071
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
9513 /
tcp
1911457608 | 2025-03-21T01:22:07.252388
\x00[\x00\x00\x00\x00\x00\x00
9530 /
tcp
-1888448627 | 2025-03-19T05:11:20.991390
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9600 /
tcp
740837454 | 2025-03-22T20:26:42.057745
SSH-2.0-OpenSSH_5.3
Vulnerabilities
9611 /
tcp
-358801646 | 2025-03-19T22:41:41.261901
9633 /
tcp
-971970408 | 2025-03-15T19:17:32.346440
9734 /
tcp
-1399940268 | 2025-03-05T10:01:33.731200
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9761 /
tcp
321971019 | 2025-03-21T09:44:39.843185
-ERR client ip is not in whitelist\r
9804 /
tcp
-1399940268 | 2025-03-25T10:26:21.734906
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9876 /
tcp
-1709563712 | 2025-03-19T11:46:49.669277
\\x00\\x00\\x01+\\x00\\x00\\x00_{"code":0,"flag":1,"language":"JAVA","opaque":0,"serializeTypeCurrentRPC":"JSON","version":433}{"brokerAddrTable":{"broker-a":{"brokerAddrs":{0:"62.118.54.92:10911"},"brokerName":"broker-a","cluster":"DefaultCluster","enableActingMaster":false}},"clusterAddrTable":{"DefaultCluster":["broker-a"]}}
9899 /
tcp
1911457608 | 2025-03-23T23:55:17.558521
\x00[\x00\x00\x00\x00\x00\x00
-414819019 | 2025-03-26T10:26:14.362515
HTTP/1.1 200 OK
Content-type: text/html
Connection: close
9909 /
tcp
-2089734047 | 2025-03-25T16:38:23.899180
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9919 /
tcp
-1795027372 | 2025-03-20T04:38:42.931962
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
9922 /
tcp
819727972 | 2025-03-21T10:26:34.960269
SSH-2.0-OpenSSH_7.4
Vulnerabilities
491999737 | 2025-03-10T19:46:24.994936
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
WZWS-RAY: 1249-1705935095.837-s5jhg
9944 /
tcp
401555314 | 2025-03-28T01:14:47.605517
9950 /
tcp
-1399940268 | 2025-03-11T00:00:42.830402
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9966 /
tcp
1911457608 | 2025-03-07T03:22:43.648071
\x00[\x00\x00\x00\x00\x00\x00
9993 /
tcp
-2089734047 | 2025-02-28T10:07:27.843535
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
-1223770960 | 2025-03-20T04:40:28.963070
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae28e5_PS-PEK-01Whk40_31773-63705
9999 /
tcp
1161309183 | 2025-03-23T04:00:01.641490
10001 /
tcp
1492413928 | 2025-03-28T02:46:31.805494
SSH-2.0-OpenSSH_7.5
Vulnerabilities
10011 /
tcp
-784071826 | 2025-03-17T19:48:18.146947
SSH-2.0-OpenSSH_8.0
Vulnerabilities
10015 /
tcp
-358801646 | 2025-03-11T18:24:41.484970
10019 /
tcp
-1399940268 | 2025-03-12T05:37:43.901809
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10023 /
tcp
-1327660293 | 2025-03-15T22:41:25.243974
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
10030 /
tcp
401555314 | 2025-03-05T20:51:25.522283
10037 /
tcp
-303199180 | 2025-03-08T13:49:57.065060
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
1830697416 | 2025-03-12T14:38:53.672903
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
10041 /
tcp
921225407 | 2025-03-22T05:09:09.692987
\x00\x00\x00\x04\x00\x00\x00\x00\x00
10042 /
tcp
-1327660293 | 2025-03-21T13:51:23.887088
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
10050 /
tcp
740837454 | 2025-03-27T03:59:31.813238
SSH-2.0-OpenSSH_5.3
Vulnerabilities
10051 /
tcp
819727972 | 2025-03-25T19:28:49.917601
SSH-2.0-OpenSSH_7.4
Vulnerabilities
10068 /
tcp
-1375131644 | 2025-02-28T00:25:29.780986
\x00[v\xc3\xbdC\x7f\x00\x00
10071 /
tcp
1911457608 | 2025-03-20T12:13:50.769877
\x00[\x00\x00\x00\x00\x00\x00
10080 /
tcp
1911457608 | 2025-03-25T09:24:22.345679
\x00[\x00\x00\x00\x00\x00\x00
10086 /
tcp
-1399940268 | 2025-03-20T13:52:38.161613
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10089 /
tcp
117101543 | 2025-03-13T00:26:56.191292
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
10134 /
tcp
410249975 | 2025-03-21T19:24:36.181675
10180 /
tcp
698877129 | 2025-02-28T16:06:28.830930
\\x00[\'\\xc4\\xc0\\xa8X\\xfd
10200 /
tcp
819727972 | 2025-03-04T13:05:48.228091
SSH-2.0-OpenSSH_7.4
Vulnerabilities
10250 /
tcp
-747911285 | 2025-02-27T17:43:57.290920
10256 /
tcp
921225407 | 2025-03-24T20:08:23.440033
\x00\x00\x00\x04\x00\x00\x00\x00\x00
10283 /
tcp
-1888448627 | 2025-02-28T11:49:46.430195
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
10533 /
tcp
-2140303521 | 2025-03-27T10:09:07.521259
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected\n
10554 /
tcp
539065883 | 2025-03-15T07:35:37.117751
10894 /
tcp
-1399940268 | 2025-03-19T12:05:17.789675
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
11112 /
tcp
-358801646 | 2025-03-21T12:57:15.004618
11210 /
tcp
-2017887953 | 2025-03-12T15:46:10.900465
SSH-2.0-OpenSSH_7.9
Vulnerabilities
11288 /
tcp
-1729629024 | 2025-03-28T10:37:48.474133
11300 /
tcp
-1746074029 | 2025-03-17T18:53:15.544142
11602 /
tcp
1911457608 | 2025-03-13T10:07:17.565972
\x00[\x00\x00\x00\x00\x00\x00
12000 /
tcp
-457235091 | 2025-03-20T14:45:24.330279
audio 0 RTP/AVP 18 4 3 8 0 101\r\na
12104 /
tcp
-1399940268 | 2025-03-22T11:08:47.679872
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12110 /
tcp
819727972 | 2025-03-18T14:36:12.374448
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12115 /
tcp
2063598737 | 2025-03-24T22:04:21.758509
12117 /
tcp
307999478 | 2025-03-18T20:36:35.515122
unknown command \r\nunknown command \r\n
12128 /
tcp
165188539 | 2025-03-24T06:30:57.828546
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12134 /
tcp
1911457608 | 2025-03-04T23:44:20.692832
\x00[\x00\x00\x00\x00\x00\x00
-288825733 | 2025-03-24T14:27:38.687205
HTTP/1.1 200 OK
Connection: close
Content-Length: 2619
Accept-Ranges: bytes
Access-Control-Allow-Credentials: true
Access-Control-Allow-Headers: authorization,Content-Type
Access-Control-Allow-Methods: POST, GET, OPTIONS, PUT, HEAD, DELETE
Content-Type: text/html
Server: Jetty(9.4.14.v20181114)
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1
12142 /
tcp
-2089734047 | 2025-03-23T21:21:43.092504
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12146 /
tcp
380146262 | 2025-03-19T18:40:28.590160
12155 /
tcp
819727972 | 2025-02-26T14:30:06.524061
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12168 /
tcp
-1399940268 | 2025-03-23T21:25:13.921958
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12177 /
tcp
740837454 | 2025-03-20T12:00:06.863522
SSH-2.0-OpenSSH_5.3
Vulnerabilities
12179 /
tcp
-784071826 | 2025-03-27T17:59:06.628642
SSH-2.0-OpenSSH_8.0
Vulnerabilities
12183 /
tcp
165188539 | 2025-03-27T21:22:59.423346
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12201 /
tcp
1134517380 | 2025-03-27T13:33:42.212576
welcome to Pandora console!\r\n----------------------------\n-------------------------\n| Login Time | 2021-12-08 1...\n
12202 /
tcp
-1399940268 | 2025-02-26T23:06:15.581343
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12207 /
tcp
-2096652808 | 2025-03-26T22:06:16.393221
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12211 /
tcp
-345718689 | 2025-03-25T08:40:33.950703
12214 /
tcp
-1888448627 | 2025-03-16T16:27:00.396813
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12218 /
tcp
15018106 | 2025-03-14T22:51:08.095746
\x00\x19\x02\x00\x02\x00\x07\x00Protocol version mismatch\x00
12221 /
tcp
819727972 | 2025-03-11T04:35:42.101208
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12222 /
tcp
819727972 | 2025-03-23T08:56:33.752612
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12226 /
tcp
-358801646 | 2025-03-26T02:04:00.537643
12232 /
tcp
-1399940268 | 2025-03-12T05:05:08.344112
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12238 /
tcp
-1019343788 | 2025-02-27T17:22:47.278860
12239 /
tcp
1911457608 | 2025-03-26T23:09:17.900964
\x00[\x00\x00\x00\x00\x00\x00
12243 /
tcp
1911457608 | 2025-03-26T08:06:44.584766
\x00[\x00\x00\x00\x00\x00\x00
12247 /
tcp
-1399940268 | 2025-03-22T07:10:15.963255
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12258 /
tcp
-1648456501 | 2025-03-17T18:55:50.068676
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
12264 /
tcp
819727972 | 2025-03-27T08:21:25.248079
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-147424911 | 2025-03-06T02:30:59.956955
HTTP/1.1 404 Not Found
Content Length: 0
12271 /
tcp
1911457608 | 2025-03-09T09:08:01.749229
\x00[\x00\x00\x00\x00\x00\x00
12296 /
tcp
1762042191 | 2025-03-06T23:25:38.983411
12301 /
tcp
-1399940268 | 2025-02-28T05:24:52.698568
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12308 /
tcp
-1399940268 | 2025-03-14T18:11:39.717988
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1839934832 | 2025-03-09T12:47:57.658767
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
12320 /
tcp
1911457608 | 2025-02-27T05:18:54.768096
\x00[\x00\x00\x00\x00\x00\x00
12322 /
tcp
-1327660293 | 2025-03-28T08:08:41.758498
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
296364507 | 2025-03-25T02:02:56.067866
HTTP/1.1 500 Internal Server Error
SERVER: Trend Chip UPnP/1.0 DMS
CONNECTION: close
CONTENT-LENGTH: 60
CONTENT-TYPE: text/html
12352 /
tcp
1911457608 | 2025-03-10T15:11:30.812598
\x00[\x00\x00\x00\x00\x00\x00
12353 /
tcp
677934968 | 2025-03-19T19:07:08.798066
12355 /
tcp
-1399940268 | 2025-03-18T16:23:21.423939
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12358 /
tcp
-358801646 | 2025-03-21T19:25:36.872058
12367 /
tcp
-1139539254 | 2025-03-13T06:25:39.646688
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
12368 /
tcp
-1399940268 | 2025-03-27T20:27:53.634259
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12371 /
tcp
165188539 | 2025-03-19T22:34:43.995124
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12375 /
tcp
677934968 | 2025-03-06T18:31:33.754476
12377 /
tcp
1911457608 | 2025-03-21T06:08:16.514015
\x00[\x00\x00\x00\x00\x00\x00
12392 /
tcp
-904840257 | 2025-03-25T04:48:39.947591
572 Relay not authorized\r\n
1282941221 | 2025-02-26T13:39:10.089583
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
12401 /
tcp
-2089734047 | 2025-03-17T13:11:19.425050
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12404 /
tcp
819727972 | 2025-02-26T22:17:41.495368
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12407 /
tcp
580340387 | 2025-03-13T05:02:05.096465
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
12418 /
tcp
-1399940268 | 2025-03-21T19:50:31.000621
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12428 /
tcp
-1105333987 | 2025-03-17T19:22:59.928125
12431 /
tcp
1996932384 | 2025-03-08T22:48:59.040841
12449 /
tcp
632542934 | 2025-03-16T23:01:04.983432
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
12451 /
tcp
1308377066 | 2025-02-27T10:17:52.493529
12476 /
tcp
-891714208 | 2025-03-23T10:26:57.886429
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
12481 /
tcp
580340387 | 2025-03-25T17:07:27.039383
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
12486 /
tcp
-1598265216 | 2025-03-21T02:17:52.420571
12488 /
tcp
-339084706 | 2025-03-12T04:24:07.893725
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
12493 /
tcp
632542934 | 2025-03-06T14:14:49.725539
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
12503 /
tcp
410249975 | 2025-03-25T17:32:43.630688
12508 /
tcp
-1730858130 | 2025-03-11T04:46:01.662348
RFB 003.008
VNC:
Protocol Version: 3.8
12510 /
tcp
-1730858130 | 2025-03-22T02:31:36.218478
RFB 003.008
VNC:
Protocol Version: 3.8
1282941221 | 2025-03-17T10:18:58.928632
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
12526 /
tcp
1989907056 | 2025-03-15T10:14:36.481520
RTSP/1.0 453 Not Enough Bandwidth\r\nServer: AirTunes/7l_wZ\r\n\r\n
12531 /
tcp
401555314 | 2025-03-17T09:17:11.693210
12543 /
tcp
-407828767 | 2025-03-13T08:35:48.133814
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
12546 /
tcp
-2033111675 | 2025-03-25T16:19:14.160643
12553 /
tcp
-1888448627 | 2025-03-15T13:21:45.583323
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12557 /
tcp
1911457608 | 2025-03-26T00:15:06.488765
\x00[\x00\x00\x00\x00\x00\x00
12559 /
tcp
819727972 | 2025-03-15T17:21:11.495450
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12560 /
tcp
-1399940268 | 2025-03-18T08:27:43.641656
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12565 /
tcp
380146262 | 2025-03-10T21:26:52.828449
12570 /
tcp
2063598737 | 2025-03-08T22:00:02.019604
12577 /
tcp
819727972 | 2025-03-11T02:14:31.565487
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12586 /
tcp
-1996280214 | 2025-03-14T16:45:29.617448
12588 /
tcp
-1399940268 | 2025-03-25T16:36:45.476498
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12589 /
tcp
2098371729 | 2025-03-06T01:50:53.268030
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
13047 /
tcp
-971970408 | 2025-03-27T07:59:45.142542
14084 /
tcp
-1032713145 | 2025-03-15T15:50:40.688655
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
14265 /
tcp
152496789 | 2025-03-23T07:00:42.237232
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC
14344 /
tcp
321971019 | 2025-03-11T23:16:57.609322
-ERR client ip is not in whitelist\r
14524 /
tcp
165188539 | 2025-03-20T19:06:50.808777
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
14825 /
tcp
819727972 | 2025-03-04T10:20:28.662462
SSH-2.0-OpenSSH_7.4
Vulnerabilities
14895 /
tcp
-2140303521 | 2025-03-05T02:52:35.302929
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected\n
14896 /
tcp
-1399940268 | 2025-02-28T23:23:29.491164
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-942457744 | 2025-03-10T02:24:03.340094
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae2b2f_PS-KWE-013ZZ60_26763-44971
15084 /
tcp
1911457608 | 2025-03-20T13:15:01.454316
\x00[\x00\x00\x00\x00\x00\x00
15443 /
tcp
1208318993 | 2025-03-14T05:18:38.938841
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
15502 /
tcp
-1986594217 | 2025-03-06T09:31:03.705773
"AP0F1D85"\r\nConnection: close\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD>\n<BODY BGCOLOR
15503 /
tcp
-1399940268 | 2025-02-28T21:49:14.094127
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16001 /
tcp
-2089734047 | 2025-03-26T04:42:43.331774
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
16003 /
tcp
-1399940268 | 2025-03-26T19:55:23.338891
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16010 /
tcp
-2031152423 | 2025-03-21T01:46:36.080982
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
16017 /
tcp
-2089734047 | 2025-03-08T15:56:47.937029
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
16023 /
tcp
-1399940268 | 2025-03-12T22:16:09.858628
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16044 /
tcp
1911457608 | 2025-03-13T22:05:00.903493
\x00[\x00\x00\x00\x00\x00\x00
16052 /
tcp
1519486042 | 2025-03-19T05:08:59.551724
<KU_goodbye>Protocol Error: XML data is not well-formed.</KU_goodbye>
16056 /
tcp
-1730858130 | 2025-03-22T14:15:21.107113
RFB 003.008
VNC:
Protocol Version: 3.8
16058 /
tcp
-653033013 | 2025-03-21T08:19:17.187039
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
16069 /
tcp
819727972 | 2025-03-21T23:55:44.903166
SSH-2.0-OpenSSH_7.4
Vulnerabilities
16072 /
tcp
-1888448627 | 2025-03-21T23:15:04.894581
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
16093 /
tcp
819727972 | 2025-03-10T15:46:03.141410
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1282941221 | 2025-03-13T11:54:11.904712
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
16099 /
tcp
1541211644 | 2025-02-26T18:49:43.163227
16104 /
tcp
-2089734047 | 2025-03-25T08:59:10.652748
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
16402 /
tcp
1655023012 | 2025-03-25T03:13:50.935767
athinfod: invalid query.\n
16667 /
tcp
-1626979812 | 2025-03-05T07:29:11.276256
220 Service ready for new user.
16800 /
tcp
-2089734047 | 2025-03-14T06:10:10.027512
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
16992 /
tcp
-1900404274 | 2025-03-22T17:15:51.309092
16993 /
tcp
2087396567 | 2025-03-22T15:49:07.283330
kjnkjabhbanc283ubcsbhdc72
17000 /
tcp
-1810987450 | 2025-03-26T00:39:24.842597
17443 /
tcp
-358801646 | 2025-02-27T07:08:06.712623
17773 /
tcp
-1835475271 | 2025-03-24T17:11:24.803896
200 NOD32SS 99 (3318497116)\r\n
17779 /
tcp
165188539 | 2025-03-15T01:58:08.255077
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
17780 /
tcp
-1399940268 | 2025-03-15T13:20:50.499137
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18004 /
tcp
455076604 | 2025-03-24T10:20:56.284016
!\x07version\x04bind7 t{RPowerDNS Recursor 410
18012 /
tcp
-438503381 | 2025-03-13T18:55:12.549666
WORLD OF WARCRAFT CONNECTION - SERVER TO CLIENT - V2
18014 /
tcp
1911457608 | 2025-02-28T04:09:33.746769
\x00[\x00\x00\x00\x00\x00\x00
18016 /
tcp
-1399940268 | 2025-02-27T10:53:15.973287
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18019 /
tcp
-1428621233 | 2025-03-05T08:16:22.092289
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
18020 /
tcp
819727972 | 2025-03-15T20:06:36.116138
SSH-2.0-OpenSSH_7.4
Vulnerabilities
18022 /
tcp
1911457608 | 2025-03-05T14:15:32.745301
\x00[\x00\x00\x00\x00\x00\x00
18026 /
tcp
-1399940268 | 2025-03-14T15:56:21.693091
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18031 /
tcp
1911457608 | 2025-03-19T18:30:02.858372
\x00[\x00\x00\x00\x00\x00\x00
18038 /
tcp
-1888448627 | 2025-03-18T02:04:50.585451
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
18039 /
tcp
165188539 | 2025-03-04T20:18:04.132635
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
18051 /
tcp
-2089734047 | 2025-03-12T13:53:42.339494
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
18054 /
tcp
740837454 | 2025-03-11T09:12:51.356384
SSH-2.0-OpenSSH_5.3
Vulnerabilities
18056 /
tcp
-1399940268 | 2025-03-16T01:50:00.666671
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18063 /
tcp
819727972 | 2025-03-07T16:27:20.537704
SSH-2.0-OpenSSH_7.4
Vulnerabilities
18073 /
tcp
1208318993 | 2025-03-14T07:55:04.304683
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
18080 /
tcp
819727972 | 2025-03-17T15:49:39.351449
SSH-2.0-OpenSSH_7.4
Vulnerabilities
18081 /
tcp
2087396567 | 2025-03-26T19:25:05.207957
kjnkjabhbanc283ubcsbhdc72
18084 /
tcp
-1730858130 | 2025-03-20T15:03:38.455404
RFB 003.008
VNC:
Protocol Version: 3.8
18095 /
tcp
-441419608 | 2025-03-12T09:03:16.086954
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
18098 /
tcp
-653033013 | 2025-03-16T20:28:01.649476
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
18099 /
tcp
-1399940268 | 2025-03-08T13:35:59.453741
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1244815577 | 2025-03-27T07:07:17.788215
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65a113f7_PSfjfzdx2uz86_11849-49268
18104 /
tcp
366084633 | 2025-03-16T09:30:41.132842
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
18107 /
tcp
366084633 | 2025-03-27T01:14:27.632733
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
18239 /
tcp
632542934 | 2025-03-15T13:47:29.097085
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
18245 /
tcp
2087396567 | 2025-03-21T19:13:44.131599
kjnkjabhbanc283ubcsbhdc72
18553 /
tcp
-971970408 | 2025-03-26T21:28:42.636488
19000 /
tcp
-1399940268 | 2025-03-25T00:11:34.258134
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
19016 /
tcp
1624217396 | 2025-03-27T07:45:48.211997
HELO:10.3.6.0.false\nAS:2048\nHL:19
19080 /
tcp
-1399940268 | 2025-03-12T12:20:21.087956
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
19090 /
tcp
-1399940268 | 2025-03-21T23:35:08.599345
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
19200 /
tcp
-138733098 | 2025-03-27T19:17:36.687435
19443 /
tcp
-358801646 | 2025-03-24T18:08:58.421105
19930 /
tcp
2087396567 | 2025-03-26T17:22:55.831793
kjnkjabhbanc283ubcsbhdc72
1900503736 | 2025-03-27T01:35:44.362124
HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-HTTPAPI/2.0
-1839934832 | 2025-03-21T05:45:27.052108
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
20053 /
tcp
321971019 | 2025-03-20T11:44:14.749881
-ERR client ip is not in whitelist\r
20080 /
tcp
1911457608 | 2025-02-28T08:41:14.804003
\x00[\x00\x00\x00\x00\x00\x00
20087 /
tcp
546151771 | 2025-03-26T11:13:25.975290
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC
Clients:
/*.*.*.*:11264[0](queued=0,recved=1,sent=0)
Latency min/avg/max: 0/0.0/0
Received: 8557
Sent: 11410
Connections: 1
Outstanding: 0
Zxid: 0x332907ad3391
Mode: follower
Node count: 104618
20100 /
tcp
707919486 | 2025-03-17T21:35:34.441829
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
20121 /
tcp
1620329124 | 2025-03-05T03:19:12.693765
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\x01\xc3\xbf\xc3\xbb\x03\xc3\xbf\xc3\xbd\x01\xc3\xbf\xc3\xbe\x01Username:
20151 /
tcp
599074451 | 2025-03-28T08:50:51.637578
-2107996212 | 2025-03-24T00:25:39.278319
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
20880 /
tcp
1370263973 | 2025-03-12T22:33:50.422052
21025 /
tcp
1842524259 | 2025-03-15T08:39:11.095211
-1839934832 | 2025-03-26T23:07:28.707418
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
21230 /
tcp
-1399940268 | 2025-03-24T01:24:26.939547
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21238 /
tcp
-1399940268 | 2025-03-20T03:41:33.403505
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21244 /
tcp
-1399940268 | 2025-03-13T11:24:50.717569
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21249 /
tcp
-122096153 | 2025-03-09T10:45:31.224159
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
21253 /
tcp
-2089734047 | 2025-03-16T14:58:09.404837
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
21255 /
tcp
-358801646 | 2025-02-28T14:23:00.641098
21261 /
tcp
1011407350 | 2025-03-25T12:54:57.177560
* OK GroupWise IMAP4rev1 Server Ready\r\n
21264 /
tcp
-1329831334 | 2025-03-25T20:51:24.171090
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
1077013874 | 2025-02-27T05:59:13.031809
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
21278 /
tcp
1919228981 | 2025-03-11T03:27:13.008113
\x00\x1e\x00\x06\xc2\x81\xc2\x85\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
21279 /
tcp
921225407 | 2025-03-07T05:21:36.981174
\x00\x00\x00\x04\x00\x00\x00\x00\x00
21280 /
tcp
-1399940268 | 2025-03-16T09:22:13.057658
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21284 /
tcp
-2089734047 | 2025-03-13T11:58:59.771188
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
21303 /
tcp
897328069 | 2025-03-21T21:36:02.298578
220 mail.scott000.com ESMTP
21311 /
tcp
819727972 | 2025-03-13T21:44:40.788064
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21330 /
tcp
-1487943323 | 2025-03-16T12:02:20.877743
431 Unable to negotiate secure command connection.\r\n
21379 /
tcp
597764502 | 2025-03-24T17:03:02.512276
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
21443 /
tcp
1911457608 | 2025-03-21T05:09:53.375353
\x00[\x00\x00\x00\x00\x00\x00
21500 /
tcp
580340387 | 2025-03-21T07:14:27.084515
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
22000 /
tcp
-971970408 | 2025-03-27T12:20:29.950423
22001 /
tcp
1842524259 | 2025-03-27T21:05:22.639801
22070 /
tcp
819727972 | 2025-03-27T15:44:19.584298
SSH-2.0-OpenSSH_7.4
Vulnerabilities
22082 /
tcp
1911457608 | 2025-03-25T17:57:12.491681
\x00[\x00\x00\x00\x00\x00\x00
22222 /
tcp
-358801646 | 2025-03-26T10:58:05.517210
-1045760528 | 2025-03-10T11:32:21.589385
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
22556 /
tcp
-1730858130 | 2025-03-18T22:20:23.294788
RFB 003.008
VNC:
Protocol Version: 3.8
22705 /
tcp
-142686627 | 2025-03-19T02:12:45.001029
\x00[\xc2\xba\x7fs\x7f\x00\x00
23023 /
tcp
-1142844482 | 2025-03-21T17:57:56.952144
ÿûSOYO_SIP VBNQyQSKc settings
Password:
23182 /
tcp
1189133115 | 2025-03-26T06:08:35.124147
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
23424 /
tcp
-653033013 | 2025-03-24T22:07:52.370418
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
24082 /
tcp
-2096652808 | 2025-03-05T12:09:21.936327
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
24084 /
tcp
321971019 | 2025-03-27T03:54:36.793840
-ERR client ip is not in whitelist\r
-1045760528 | 2025-03-14T13:47:07.569711
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
24442 /
tcp
-1399940268 | 2025-03-05T12:36:14.446661
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
24472 /
tcp
1911457608 | 2025-03-01T01:34:53.002993
\x00[\x00\x00\x00\x00\x00\x00
25004 /
tcp
-1733645023 | 2025-03-18T19:30:03.135083
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
25007 /
tcp
-1399940268 | 2025-02-27T22:50:44.430259
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
25008 /
tcp
1278527606 | 2025-03-07T06:19:40.874152
1282941221 | 2025-03-22T20:25:50.883368
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
25565 /
tcp
-1648456501 | 2025-03-26T23:58:57.120339
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
26657 /
tcp
1519486042 | 2025-03-12T02:20:37.039651
<KU_goodbye>Protocol Error: XML data is not well-formed.</KU_goodbye>
27015 /
tcp
599074451 | 2025-03-25T12:20:50.811726
27016 /
tcp
1690634669 | 2025-03-25T14:30:43.564234
27017 /
tcp
422524323 | 2025-03-25T10:38:57.542405
{
"Version": "3.4.18",
"VersionArray": [
3,
4,
18,
0
],
"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",
"OpenSSLVersion": "",
"SysInfo": "",
"Bits": 64,
"Debug": false,
"MaxObjectSize": 16777216
}
27036 /
tcp
-2096652808 | 2025-03-25T08:41:26.124174
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
28015 /
tcp
1911457608 | 2025-03-25T12:48:29.936146
\x00[\x00\x00\x00\x00\x00\x00
28080 /
tcp
-1888448627 | 2025-03-19T04:42:06.706997
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
28818 /
tcp
-1888448627 | 2025-03-15T15:23:03.923166
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
29840 /
tcp
-585940771 | 2025-03-19T20:59:22.704705
30001 /
tcp
-653033013 | 2025-03-17T08:29:53.490136
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
30002 /
tcp
-1681927087 | 2025-03-25T17:32:47.740677
kjnkjabhbanc283ubcsbhdc72
30003 /
tcp
-321444299 | 2025-03-24T07:41:01.981685
:dircproxy NOTICE AUTH :Looking up your hostname...
:dircproxy NOTICE AUTH :Got your hostname.
30011 /
tcp
1996932384 | 2025-02-27T14:18:48.714197
30022 /
tcp
1412519768 | 2025-03-18T22:00:14.374559
"AP0F1D85"
Connection: close
<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD>
<BODY BGCOLOR
30023 /
tcp
-1538260461 | 2025-03-16T20:12:53.575383
30029 /
tcp
1948301213 | 2025-03-21T22:49:26.554042
RFB 003.003
VNC:
Protocol Version: 3.3
30110 /
tcp
1911457608 | 2025-02-27T01:05:09.025058
\x00[\x00\x00\x00\x00\x00\x00
30112 /
tcp
366084633 | 2025-03-14T22:26:39.239520
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
30122 /
tcp
1830187220 | 2025-03-11T04:02:55.258982
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
2103111368 | 2025-03-25T16:42:10.568796
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
30301 /
tcp
1741579575 | 2025-03-15T19:54:38.014426
30303 /
tcp
1830187220 | 2025-03-19T22:13:10.421972
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
30422 /
tcp
-971970408 | 2025-03-13T11:38:08.833964
30522 /
tcp
171352214 | 2025-03-12T14:22:48.390391
-ERR client ip is not in whitelist
30622 /
tcp
1353260875 | 2025-03-12T10:49:23.563208
\x00[g\xc2\x95N\x7f\x00\x00
30701 /
tcp
-1888448627 | 2025-03-19T20:12:40.763982
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
30718 /
tcp
1974928000 | 2025-03-22T11:36:59.359829
LH\xdb\xc6\xdd\xf6g\x10\x19\x00\x00\x00\x18\x00\x01\x02\x00\x10\x00\x04\x00\x00\x00\x016\x8a\xc3\xd3#=)D\xef\x8f\x82\x8b<\x7f*
30722 /
tcp
1741579575 | 2025-03-24T23:54:41.340888
30822 /
tcp
1887224352 | 2025-03-25T21:04:37.555695
30922 /
tcp
819727972 | 2025-03-20T22:27:02.154813
SSH-2.0-OpenSSH_7.4
Vulnerabilities
31022 /
tcp
104385780 | 2025-03-24T11:55:09.767116
31122 /
tcp
2087396567 | 2025-03-25T17:52:30.038680
kjnkjabhbanc283ubcsbhdc72
31222 /
tcp
1690634669 | 2025-03-24T02:11:26.331848
31322 /
tcp
-2096652808 | 2025-03-25T05:14:47.619312
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
1024374118 | 2025-03-18T02:21:00.921836
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
31422 /
tcp
2033888749 | 2025-03-25T04:14:33.827237
Content-Type: text/rude-rejection
Content-Length: 24
Access Denied, go away.
Content-Type: text/disconnect-notice
C...
-1839934832 | 2025-03-12T17:49:59.995193
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
31622 /
tcp
2087396567 | 2025-03-23T09:53:28.895743
kjnkjabhbanc283ubcsbhdc72
31722 /
tcp
819727972 | 2025-03-12T21:49:40.584914
SSH-2.0-OpenSSH_7.4
Vulnerabilities
31822 /
tcp
539065883 | 2025-03-20T18:51:25.726755
31922 /
tcp
-971970408 | 2025-03-24T05:41:35.153784
32022 /
tcp
1541211644 | 2025-03-23T19:02:35.859971
32122 /
tcp
2087396567 | 2025-03-20T03:07:58.605306
kjnkjabhbanc283ubcsbhdc72
32222 /
tcp
1231376952 | 2025-03-23T17:21:25.665351
1396488228 | 2025-03-16T14:46:59.722997
HTTP/1.1 200 OK
Content-Length: 2037
Cache-Control: private, max-age=300
Content-Type: text/html
32400 /
tcp
1690634669 | 2025-03-23T15:21:54.074735
32422 /
tcp
171352214 | 2025-03-23T13:34:30.029880
-ERR client ip is not in whitelist
32522 /
tcp
-1810987450 | 2025-03-08T16:04:35.679056
32622 /
tcp
-321444299 | 2025-03-21T03:57:54.834805
:dircproxy NOTICE AUTH :Looking up your hostname...
:dircproxy NOTICE AUTH :Got your hostname.
32722 /
tcp
504717326 | 2025-03-23T05:24:01.997391
SSH-2.0-OpenSSH_8.6
Vulnerabilities
32764 /
tcp
1690634669 | 2025-03-21T02:13:53.455544
32922 /
tcp
117101543 | 2025-03-23T01:45:36.579667
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
33022 /
tcp
1741579575 | 2025-03-23T00:01:19.878810
33060 /
tcp
2087396567 | 2025-03-16T11:16:06.581574
kjnkjabhbanc283ubcsbhdc72
-1839934832 | 2025-03-19T23:41:03.633946
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
33322 /
tcp
-1477838366 | 2025-03-22T08:07:42.553670
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
33422 /
tcp
2087396567 | 2025-03-19T17:09:17.680043
kjnkjabhbanc283ubcsbhdc72
1077013874 | 2025-03-20T13:44:11.126000
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
33622 /
tcp
1082732927 | 2025-03-21T05:13:34.758171
STAT pid 1660
STAT uptime 28884
STAT time 1641290377
STAT version 1.2.1
STAT pointer_size 32
STAT curr_items 14
STAT total_items 3533
STAT bytes 30524
STAT curr_connections 1
STAT total_connections 3542
STAT connection_structures 3
STAT cmd_get 3533
STAT cmd_set 3533
STAT get_hits 3519
STAT get_misses 14
STAT bytes_read 7927780
STAT bytes_written 7848552
STAT limit_maxbytes 67108864
END
33722 /
tcp
-971970408 | 2025-03-18T04:09:09.260562
33822 /
tcp
2087396567 | 2025-03-18T11:08:22.437188
kjnkjabhbanc283ubcsbhdc72
33922 /
tcp
-358801646 | 2025-03-18T02:22:23.827297
34022 /
tcp
2087396567 | 2025-03-20T17:09:17.906316
kjnkjabhbanc283ubcsbhdc72
34122 /
tcp
957278843 | 2025-03-20T15:26:30.688260
34222 /
tcp
-971970408 | 2025-03-20T01:24:00.674639
34322 /
tcp
-1641514916 | 2025-03-19T18:25:06.088573
* OK Merak 1dFUa2 IMAP4rev1
34422 /
tcp
1741579575 | 2025-03-15T00:44:50.759612
34522 /
tcp
819727972 | 2025-03-19T11:22:18.092483
SSH-2.0-OpenSSH_7.4
Vulnerabilities
34622 /
tcp
1852418385 | 2025-03-19T09:39:01.518840
RTSP/1.0 453 Not Enough Bandwidth
Server: AirTunes/7l_wZ
34722 /
tcp
2087396567 | 2025-03-19T07:57:59.219333
kjnkjabhbanc283ubcsbhdc72
34822 /
tcp
-1392039491 | 2025-03-19T06:14:37.934639
"Broadband Router"
<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
34922 /
tcp
2087396567 | 2025-03-18T19:44:07.425768
kjnkjabhbanc283ubcsbhdc72
35022 /
tcp
-971970408 | 2025-03-04T01:38:57.180126
35122 /
tcp
1830187220 | 2025-03-19T00:56:08.862498
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
35222 /
tcp
50497985 | 2025-03-18T09:24:12.356483
\x00[\xc3\x88\xc3\x9dS\x7f\x00\x00
35322 /
tcp
2087396567 | 2025-03-17T08:33:12.769659
kjnkjabhbanc283ubcsbhdc72
35422 /
tcp
2087396567 | 2025-03-19T00:19:47.925127
kjnkjabhbanc283ubcsbhdc72
35522 /
tcp
1492413928 | 2025-03-17T00:55:59.843983
SSH-2.0-OpenSSH_7.5
Vulnerabilities
35622 /
tcp
-971970408 | 2025-03-18T08:04:00.640122
35822 /
tcp
2087396567 | 2025-03-17T17:39:56.542463
kjnkjabhbanc283ubcsbhdc72
35922 /
tcp
1690634669 | 2025-03-16T21:18:13.077431
36022 /
tcp
2087396567 | 2025-03-17T21:05:46.345864
kjnkjabhbanc283ubcsbhdc72
36322 /
tcp
2087396567 | 2025-03-17T12:59:12.160262
kjnkjabhbanc283ubcsbhdc72
36422 /
tcp
233634112 | 2025-03-15T08:23:53.972889
SSH-98.60-SysaxSSH_81885..42
36522 /
tcp
-2031152423 | 2025-03-18T16:17:39.082294
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
36622 /
tcp
2087396567 | 2025-03-16T07:59:07.871200
kjnkjabhbanc283ubcsbhdc72
36722 /
tcp
-1681927087 | 2025-03-17T05:01:00.820340
kjnkjabhbanc283ubcsbhdc72
36822 /
tcp
1741579575 | 2025-03-18T14:34:13.213984
37122 /
tcp
2087396567 | 2025-03-16T23:06:24.976354
kjnkjabhbanc283ubcsbhdc72
37222 /
tcp
-1733645023 | 2025-03-14T19:30:59.520134
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
37322 /
tcp
1887224352 | 2025-02-28T23:14:23.489917
37422 /
tcp
-641479109 | 2025-03-15T11:57:17.356097
37522 /
tcp
671605376 | 2025-03-16T09:36:27.511181
37622 /
tcp
-345718689 | 2025-03-16T01:57:20.800168
37722 /
tcp
539065883 | 2025-03-16T00:44:04.518497
37777 /
tcp
-1059554316 | 2025-03-17T09:00:00.223642
\xc2\xa5A\x00\x01\x00\x00\x00,\x00\x00\x00\x02\x00\x00\x00L\x00\x00\x00\x08Connect\x00\x00\x00\x00x\x00\x00\x00\x0857222\x00\x00\x00
37822 /
tcp
-321444299 | 2025-02-28T02:54:53.925332
:dircproxy NOTICE AUTH :Looking up your hostname...
:dircproxy NOTICE AUTH :Got your hostname.
37922 /
tcp
-1760806421 | 2025-03-18T00:48:55.729268
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected
38022 /
tcp
745343730 | 2025-03-17T23:00:20.151213
220 smtp.qq.com Esmtp QQ Mail Server
38222 /
tcp
-971970408 | 2025-03-10T21:21:52.569870
38333 /
tcp
1741579575 | 2025-03-15T21:02:03.675237
38522 /
tcp
-1598265216 | 2025-03-13T23:48:48.058359
38622 /
tcp
996960436 | 2025-03-14T09:40:46.797633
38722 /
tcp
1541211644 | 2025-03-07T05:40:55.458062
38822 /
tcp
2087396567 | 2025-03-12T16:32:11.040456
kjnkjabhbanc283ubcsbhdc72
38922 /
tcp
2087396567 | 2025-03-13T15:04:59.971556
kjnkjabhbanc283ubcsbhdc72
39001 /
tcp
165188539 | 2025-03-12T20:04:23.682126
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
39122 /
tcp
410249975 | 2025-03-13T18:34:59.959293
39322 /
tcp
-527005584 | 2025-03-11T10:59:39.293270
39522 /
tcp
819727972 | 2025-03-11T09:13:25.626680
SSH-2.0-OpenSSH_7.4
Vulnerabilities
39722 /
tcp
819727972 | 2025-03-05T05:57:22.070409
SSH-2.0-OpenSSH_7.4
Vulnerabilities
39922 /
tcp
1723769361 | 2025-02-26T17:13:06.646740
ELM Enterprise Manager _l\r\nCopyright \xc2\xa9 18668511-928641920 TNT Software, Inc.\r\n
40122 /
tcp
-2081419599 | 2025-02-26T14:20:45.075930
40222 /
tcp
-2080784861 | 2025-03-04T10:37:20.889365
GBPK\xc3\xbb\xc3\xb7n\xc2\x93W\xc2\xaf\xc2\x86\xc2\x93x@\xc2\xa9\x0e\xc3\x8a*\xc2\x9bS\x00
40322 /
tcp
-1990350878 | 2025-03-08T21:24:33.915517
40522 /
tcp
-79865617 | 2025-03-04T07:05:37.837606
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com
mit-revprops depth log-revprops partial-replay ) ) )
40722 /
tcp
1690634669 | 2025-03-08T14:28:08.042339
41022 /
tcp
2087396567 | 2025-03-08T23:06:04.232838
kjnkjabhbanc283ubcsbhdc72
41122 /
tcp
707919486 | 2025-02-27T14:46:41.852675
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
41222 /
tcp
-893477759 | 2025-03-05T01:20:18.803252
!versionbind7 t{RPowerDNS Recursor 410
41443 /
tcp
-2096652808 | 2025-03-14T03:17:44.663151
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
41794 /
tcp
597764502 | 2025-03-23T20:49:58.090952
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
41822 /
tcp
-1428621233 | 2025-03-07T18:03:43.563441
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
41922 /
tcp
2087396567 | 2025-03-07T15:59:07.351559
kjnkjabhbanc283ubcsbhdc72
42022 /
tcp
-801484042 | 2025-03-04T16:08:16.408481
42222 /
tcp
-358801646 | 2025-03-04T23:11:48.553250
42422 /
tcp
-1729629024 | 2025-03-04T20:52:07.925257
42922 /
tcp
-971970408 | 2025-02-28T15:25:59.240766
43008 /
tcp
165188539 | 2025-03-26T03:33:19.550500
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
43080 /
tcp
-805362002 | 2025-03-04T13:20:34.148381
ICAP/1.0 501 Other
Server: Traffic Spicer 7788179225
43322 /
tcp
-1248408558 | 2025-02-27T22:28:19.029839
220 MikroTik FTP server (MikroTik 6.44.3) ready
43422 /
tcp
740837454 | 2025-02-27T19:58:34.624911
SSH-2.0-OpenSSH_5.3
Vulnerabilities
43522 /
tcp
2087396567 | 2025-02-27T19:08:28.387330
kjnkjabhbanc283ubcsbhdc72
1077013874 | 2025-02-27T03:30:59.557485
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
43822 /
tcp
996960436 | 2025-02-27T03:44:21.002852
43922 /
tcp
-2017887953 | 2025-02-27T09:42:01.263897
SSH-2.0-OpenSSH_7.9
Vulnerabilities
44022 /
tcp
1690634669 | 2025-02-27T08:17:41.074670
44158 /
tcp
-433302150 | 2025-03-06T09:25:17.700503
44222 /
tcp
-358801646 | 2025-03-10T22:33:42.765004
44300 /
tcp
-1888448627 | 2025-03-16T19:54:01.426104
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
44305 /
tcp
1911457608 | 2025-03-22T11:50:51.323079
\x00[\x00\x00\x00\x00\x00\x00
44306 /
tcp
321971019 | 2025-03-05T22:21:21.682347
-ERR client ip is not in whitelist\r
44309 /
tcp
1911457608 | 2025-03-16T12:20:27.410291
\x00[\x00\x00\x00\x00\x00\x00
44345 /
tcp
-1428621233 | 2025-03-08T18:53:32.032125
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
44818 /
tcp
660175493 | 2025-03-24T20:22:32.630997
45002 /
tcp
-1996280214 | 2025-03-25T00:48:20.526520
45022 /
tcp
1842524259 | 2025-03-10T15:55:42.074781
45039 /
tcp
165188539 | 2025-03-08T17:55:46.612445
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
45677 /
tcp
-1399940268 | 2025-03-05T02:52:48.916374
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
45777 /
tcp
-1399940268 | 2025-02-27T02:47:39.071798
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
45822 /
tcp
-1598265216 | 2025-03-10T12:35:36.703124
1282941221 | 2025-03-15T22:58:25.361859
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
-1839934832 | 2025-03-10T07:16:52.107895
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
48022 /
tcp
2087396567 | 2025-03-07T10:53:59.853492
kjnkjabhbanc283ubcsbhdc72
48222 /
tcp
-971970408 | 2025-03-10T03:49:21.808711
1830697416 | 2025-03-10T00:21:17.906989
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
48522 /
tcp
-358801646 | 2025-03-09T22:44:28.463247
48899 /
tcp
2087396567 | 2025-03-22T05:35:24.662862
kjnkjabhbanc283ubcsbhdc72
130818875 | 2025-03-20T08:24:31.893469
HTTP/1.1 500 Internal Server Error
CONTENT-LENGTH: 411
CONTENT-TYPE: text/xml; charset="utf-8"
DATE: Mon, 22 Jan 2024 16:06:03 GMT
EXT:
SERVER: Linux/4.9.118, UPnP/1.0, Portable SDK for UPnP devices/1.6.18
X-User-Agent: redsonic
<s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">
<s:Body>
<s:Fault>
<faultcode>s:Client</faultcode>
<faultstring>UPnPError</faultstring>
<detail>
<UPnPError xmlns="urn:schemas-upnp-org:control-1-0">
49443 /
tcp
1363464823 | 2025-03-27T20:00:35.854634
49690 /
tcp
-1399940268 | 2025-03-11T04:26:54.651466
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
50000 /
tcp
2087396567 | 2025-03-22T09:21:55.795627
kjnkjabhbanc283ubcsbhdc72
50002 /
tcp
-2017887953 | 2025-03-22T14:36:43.862773
SSH-2.0-OpenSSH_7.9
Vulnerabilities
50009 /
tcp
1519486042 | 2025-03-20T14:18:00.415307
<KU_goodbye>Protocol Error: XML data is not well-formed.</KU_goodbye>
50022 /
tcp
819727972 | 2025-03-28T06:28:34.022760
SSH-2.0-OpenSSH_7.4
Vulnerabilities
50050 /
tcp
819727972 | 2025-03-16T13:03:35.146232
SSH-2.0-OpenSSH_7.4
Vulnerabilities
50070 /
tcp
1690634669 | 2025-03-22T00:22:05.789896
50100 /
tcp
-1598265216 | 2025-03-21T22:43:10.929641
-1230049476 | 2025-03-11T18:27:06.048102
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
50106 /
tcp
321971019 | 2025-03-10T02:39:24.559717
-ERR client ip is not in whitelist\r
50443 /
tcp
-1399940268 | 2025-03-13T21:59:28.750590
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
50999 /
tcp
897328069 | 2025-03-04T23:56:09.614426
220 mail.scott000.com ESMTP
51002 /
tcp
819727972 | 2025-03-22T16:44:00.667885
SSH-2.0-OpenSSH_7.4
Vulnerabilities
51004 /
tcp
1208318993 | 2025-03-04T19:24:19.240330
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
51106 /
tcp
2087396567 | 2025-03-20T10:20:22.772962
kjnkjabhbanc283ubcsbhdc72
51235 /
tcp
-653033013 | 2025-03-21T17:56:56.509269
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
51443 /
tcp
1984588611 | 2025-03-12T00:35:28.476906
52010 /
tcp
-249504111 | 2025-03-27T21:06:06.979455
53483 /
tcp
401555314 | 2025-03-11T09:36:33.523100
53805 /
tcp
165188539 | 2025-03-23T21:54:57.343179
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
53806 /
tcp
1911457608 | 2025-03-25T20:54:56.668192
\x00[\x00\x00\x00\x00\x00\x00
54138 /
tcp
539065883 | 2025-03-21T08:44:57.295472
55022 /
tcp
-971970408 | 2025-03-07T04:40:17.476103
55222 /
tcp
-2096652808 | 2025-03-07T02:20:05.153314
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
55350 /
tcp
-2096652808 | 2025-03-23T15:31:32.085941
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
55422 /
tcp
104385780 | 2025-03-06T17:45:24.881298
55442 /
tcp
2087396567 | 2025-03-20T20:34:24.149415
kjnkjabhbanc283ubcsbhdc72
55443 /
tcp
1353260875 | 2025-03-13T00:47:13.019800
\x00[g\xc2\x95N\x7f\x00\x00
55522 /
tcp
-971970408 | 2025-03-06T22:54:19.651809
55553 /
tcp
819727972 | 2025-03-27T02:10:35.189185
SSH-2.0-OpenSSH_7.4
Vulnerabilities
55554 /
tcp
1741579575 | 2025-03-20T09:04:08.144861
55722 /
tcp
1741579575 | 2025-03-06T19:43:02.283206
57022 /
tcp
-1392039491 | 2025-03-06T14:24:55.856041
"Broadband Router"
<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
57522 /
tcp
401555314 | 2025-03-06T12:42:21.763938
57782 /
tcp
-2089734047 | 2025-03-28T07:44:28.647608
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
57783 /
tcp
-1598265216 | 2025-03-20T14:26:27.191470
57786 /
tcp
165188539 | 2025-03-23T12:25:47.808766
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
57822 /
tcp
1852418385 | 2025-03-06T06:10:22.248355
RTSP/1.0 453 Not Enough Bandwidth
Server: AirTunes/7l_wZ
57922 /
tcp
2087396567 | 2025-03-06T04:28:02.040657
kjnkjabhbanc283ubcsbhdc72
58222 /
tcp
1620329124 | 2025-03-06T00:59:51.906697
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\x01\xc3\xbf\xc3\xbb\x03\xc3\xbf\xc3\xbd\x01\xc3\xbf\xc3\xbe\x01Username:
58322 /
tcp
1690634669 | 2025-03-05T23:36:26.944821
58422 /
tcp
-1261090339 | 2025-03-05T21:30:06.116965
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
58522 /
tcp
1690634669 | 2025-03-05T19:48:21.638036
58822 /
tcp
-1779118422 | 2025-03-05T17:05:42.276533
\x00[\xc2\xae\xc2\x8d{\x7f\x00\x00
59022 /
tcp
-971970408 | 2025-03-05T12:54:59.788474
59122 /
tcp
1426971893 | 2025-03-05T11:12:30.394072
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
59222 /
tcp
2087396567 | 2025-03-05T09:28:25.035674
kjnkjabhbanc283ubcsbhdc72
59322 /
tcp
-971970408 | 2025-03-05T07:43:04.976078
60001 /
tcp
1212921144 | 2025-03-15T05:18:49.916813
60021 /
tcp
-792826324 | 2025-03-07T17:49:20.954659
220 FTP server ready - login please
60099 /
tcp
-1888448627 | 2025-03-04T04:49:45.121109
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
60129 /
tcp
171352214 | 2025-03-28T00:18:17.436603
-ERR client ip is not in whitelist
61613 /
tcp
1623746877 | 2025-03-26T17:57:37.141776
500 Permission denied - closing connection.\r\n
61616 /
tcp
-2031152423 | 2025-03-26T22:58:18.611413
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
61617 /
tcp
-1888448627 | 2025-03-23T03:56:41.071476
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
62016 /
tcp
1011407350 | 2025-03-17T22:42:20.969265
* OK GroupWise IMAP4rev1 Server Ready\r\n
62078 /
tcp
-575085326 | 2025-03-20T12:01:32.188852
62443 /
tcp
1996932384 | 2025-03-16T06:00:54.974308
63210 /
tcp
597764502 | 2025-03-14T22:58:50.402939
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
63256 /
tcp
1082732927 | 2025-03-21T21:15:22.861643
STAT pid 1660
STAT uptime 28884
STAT time 1641290377
STAT version 1.2.1
STAT pointer_size 32
STAT curr_items 14
STAT total_items 3533
STAT bytes 30524
STAT curr_connections 1
STAT total_connections 3542
STAT connection_structures 3
STAT cmd_get 3533
STAT cmd_set 3533
STAT get_hits 3519
STAT get_misses 14
STAT bytes_read 7927780
STAT bytes_written 7848552
STAT limit_maxbytes 67108864
END
63260 /
tcp
1353260875 | 2025-03-28T08:01:39.721679
\x00[g\xc2\x95N\x7f\x00\x00
64738 /
tcp
1308377066 | 2025-03-15T04:36:50.498192