11 /
tcp
2087396567 | 2025-04-10T21:37:41.392993
kjnkjabhbanc283ubcsbhdc72
13 /
tcp
-1770051369 | 2025-04-07T11:19:32.155759
17 /
tcp
366084633 | 2025-04-06T10:29:49.863675
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
19 /
tcp
829384519 | 2025-03-23T17:59:14.734110
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefg
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUV
37 /
tcp
726777565 | 2025-04-15T19:43:15.516783
38 /
tcp
-1399940268 | 2025-04-08T07:34:39.380874
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
43 /
tcp
2121220663 | 2025-04-07T16:47:18.715699
51 /
tcp
-441419608 | 2025-04-05T14:05:24.760196
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
79 /
tcp
627290832 | 2025-03-28T18:47:16.386929
ÿû\x01SOYO_SIP VBNQyQSKc settings
Password:
86 /
tcp
401555314 | 2025-04-17T16:28:52.632022
93 /
tcp
-1810987450 | 2025-04-17T01:12:15.527683
102 /
tcp
-1399940268 | 2025-04-01T00:31:30.447574
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
110 /
tcp
819727972 | 2025-03-22T20:16:16.660232
SSH-2.0-OpenSSH_7.4
Vulnerabilities
111 /
tcp
1408744601 | 2025-03-27T01:31:44.851454
Portmap
Program Version Protocol Port
1846166383 1853121902 1949125733 1852273768
168430145 1667458419 1931494501 1852400996
543258465 2033060419 1869509733 1853107540
544499064 1949262953 1935896430 1852138356
113 /
tcp
2063598737 | 2025-04-02T04:27:48.465679
119 /
tcp
-1958992631 | 2025-03-19T15:09:11.969489
\\xd5\xca\xba\\xc5\\xc8\\xcf\xd6\xa4\xca\xa7\\xb0\\xdc ...\r\nIP \\xb5\\xd8\xd6\xb7: *.*.*.*\r\nMAC \\xb5\\xd8\xd6\xb7: \r\n\\xb7\\xfe\\xce\\xf1\\xb6\\xcb\xca\xb1\\xbc\\xe4: 2024-01-22 16:23:50\r\n\\xd1\\xe9\xd6\xa4\\xbd\\xe1\\xb9\\xfb: \\xce\\xde\xd0\xa7\\xd3\xc3\xbb\\xa7.
135 /
tcp
-646274631 | 2025-04-06T21:36:35.183246
\\x05\\x00\r\\x03\\x10\\x00\\x00\\x00\\x18\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x04\\x00\\x01\\x05\\x00\\x00\\x00\\x00\n\nServerAlive2: \n IP1: user-PC\n IP2: 192.168.1.104\n IP3: 220.129.89.73\n IP4: 2001:b011:3009:904e:d83e:3f80:66e3:747\n IP5: 2001:b011:3009:904e:901d:7e1d:524b:cf68\n IP6: 2001:b011:3009:ec00:d8a9:208f:6a7e:b9c3\n\nNTLMSSP:\nTarget_Name: USER-PC\nProduct_Version: 6.1.7601 Ntlm 15\nOS: Windows 7, Service Pack 1/Windows Server 2008 R2, Service Pack 1\nNetBIOS_Domain_Name: USER-PC\nNetBIOS_Computer_Name: USER-PC\nDNS_Domain_Name:
143 /
tcp
-858402222 | 2025-04-16T12:59:42.301454
* OK Waiting for authentication process to respond..\r\n
175 /
tcp
1332894250 | 2025-04-01T12:11:48.052831
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
179 /
tcp
-399606100 | 2025-04-12T05:38:55.696589
BGP Message\nType: 3\nMajor error Code: 6\nMinor error Code: 5\n
221 /
tcp
-1428621233 | 2025-03-23T01:37:55.305760
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
264 /
tcp
-1709030885 | 2025-04-03T16:03:49.374360
444 /
tcp
-1461540015 | 2025-03-20T00:58:11.717382
audio 0 RTP/AVP 18 4 3 8 0 101
a
-1013082686 | 2025-03-25T04:34:22.981689
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
502 /
tcp
-1399940268 | 2025-04-18T00:01:12.948046
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
503 /
tcp
-1399940268 | 2025-04-10T23:05:21.480145
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
515 /
tcp
-1248408558 | 2025-04-15T08:30:37.115554
220 MikroTik FTP server (MikroTik 6.44.3) ready
-1112304903 | 2025-03-25T12:11:21.902570
HTTP/1.1 403 Forbidden
Server: Apache/2.4.23 (Win64) OpenSSL/1.0.2h PHP/7.4.13
Content-Type: text/html; charset=iso-8859-1
771 /
tcp
-1399940268 | 2025-03-29T16:16:19.750704
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1175496255 | 2025-03-25T15:54:45.241050
HTTP/1.1 403 Forbidden
Server: sundray
Content-Type: text/html
Connection: keep-alive
-1166978945 | 2025-03-19T17:07:12.516264
HTTP/1.1 407 Proxy Authentication Required
Server: Proxy
Proxy-Authenticate: Basic realm="CCProxy Authorization"
Connection: Close
Proxy-Connection: Close
873 /
tcp
-992671574 | 2025-04-17T20:43:39.119997
886 /
tcp
321971019 | 2025-04-11T04:52:17.846368
-ERR client ip is not in whitelist\r
993 /
tcp
819727972 | 2025-03-24T20:31:14.744672
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1023 /
tcp
-1888448627 | 2025-03-28T09:33:16.308846
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
1282941221 | 2025-04-16T21:51:09.349286
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
1080 /
tcp
1362344524 | 2025-04-14T18:40:39.542518
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.7
1099 /
tcp
-1399940268 | 2025-03-21T21:47:33.589504
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1839934832 | 2025-03-25T18:28:25.761078
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
1195 /
tcp
-1327660293 | 2025-04-03T14:25:08.331786
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
1234 /
tcp
-1428621233 | 2025-04-17T10:13:56.229734
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
1292 /
tcp
669849225 | 2025-03-19T21:10:08.125935
SSH-98.60-SysaxSSH_81885..42\r\n
1337 /
tcp
1189133115 | 2025-03-22T00:14:08.418789
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
1414 /
tcp
-2140303521 | 2025-03-29T06:05:22.072035
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected\n
1433 /
tcp
49107754 | 2025-04-15T21:35:31.763602
MSSQL Server\nVersion: 134219767 (0x80007f7)\nSub-Build: 0\nEncryption:Not available\n\nMSSQL NTLM Info:\nProduct_Version: 5.2.3790 Ntlm 15\nOS: Windows Server 2003/Windows Server 2003 R2/Windows Server 2003, Service Pack 2\n
1460 /
tcp
-1399940268 | 2025-04-04T07:46:30.320210
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1515 /
tcp
1321679546 | 2025-03-22T19:49:13.158032
1604 /
tcp
-1730858130 | 2025-04-06T09:52:00.634124
RFB 003.008
VNC:
Protocol Version: 3.8
1800 /
tcp
-1399940268 | 2025-04-03T03:29:58.994748
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1801 /
tcp
-1139999322 | 2025-03-28T04:20:54.263756
\\x10Z\x0b\\x00LIOR<\\x02\\x00\\x00\\xff\\xff\\xff\\xff\\x00\\x00\\x12\\x00a36a0e421af47074\\xf2\\xdby\\x96\\xbb\\xb1LE\\xa1\\x1f.%\xd2\xbft\\xb692d3\\x10\\x03\\x00\\x00ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ
1980 /
tcp
-1986594217 | 2025-04-15T16:03:56.009363
"AP0F1D85"\r\nConnection: close\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD>\n<BODY BGCOLOR
2000 /
tcp
819727972 | 2025-03-27T22:33:23.323241
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2008 /
tcp
459162008 | 2025-04-17T10:31:05.803693
2016 /
tcp
1948301213 | 2025-03-24T21:34:18.498588
RFB 003.003
VNC:
Protocol Version: 3.3
2051 /
tcp
921225407 | 2025-04-07T09:13:07.690001
\x00\x00\x00\x04\x00\x00\x00\x00\x00
2072 /
tcp
-1399940268 | 2025-03-19T13:45:46.647187
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2081 /
tcp
119860953 | 2025-04-05T04:12:51.653454
* OK ArGoSoft Mail Server IMAP Module v.YW at
2085 /
tcp
-1036370807 | 2025-04-04T05:48:13.884177
2087 /
tcp
1308377066 | 2025-03-20T18:05:45.295675
2154 /
tcp
-1900404274 | 2025-04-12T19:07:26.211388
2223 /
tcp
-1888448627 | 2025-04-05T09:52:35.340798
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
2259 /
tcp
-1399940268 | 2025-03-28T14:57:48.946179
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2332 /
tcp
-314039103 | 2025-04-17T17:27:04.771924
Surnom.
Sorry, that nickname format is invalid.
2344 /
tcp
-1329831334 | 2025-04-01T17:23:17.377096
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
2345 /
tcp
819727972 | 2025-04-16T18:50:52.467418
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2423 /
tcp
165188539 | 2025-04-15T14:09:20.005960
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
2435 /
tcp
-2089734047 | 2025-04-02T04:39:13.497810
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
-288825733 | 2025-03-28T07:54:19.181982
HTTP/1.1 200 OK
Connection: close
Content-Length: 2619
Accept-Ranges: bytes
Access-Control-Allow-Credentials: true
Access-Control-Allow-Headers: authorization,Content-Type
Access-Control-Allow-Methods: POST, GET, OPTIONS, PUT, HEAD, DELETE
Content-Type: text/html
Server: Jetty(9.4.14.v20181114)
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1
2525 /
tcp
-832380282 | 2025-04-16T22:07:56.383085
lpd [@Boyk]: Print-services are not available to your host (aF2qXkQ2m).\n
2628 /
tcp
2087396567 | 2025-03-22T08:48:40.450473
kjnkjabhbanc283ubcsbhdc72
2701 /
tcp
1944032451 | 2025-04-18T05:23:25.278113
K\\x02%~)J/\\tHjU(IAGENT = (AGENT_VERSION = 2388790170)(RPC_VERSION = 5..722))
2761 /
tcp
-1105333987 | 2025-04-07T05:48:09.314634
2762 /
tcp
740837454 | 2025-04-10T23:02:01.057177
SSH-2.0-OpenSSH_5.3
Vulnerabilities
2850 /
tcp
-1399940268 | 2025-03-21T15:28:20.623255
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2995 /
tcp
819727972 | 2025-03-25T22:03:05.035438
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3001 /
tcp
1996932384 | 2025-04-08T21:53:36.746373
3012 /
tcp
819727972 | 2025-04-15T19:51:45.202400
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3050 /
tcp
-1399940268 | 2025-04-15T15:15:34.673024
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3067 /
tcp
1911457608 | 2025-04-09T16:46:16.169403
\x00[\x00\x00\x00\x00\x00\x00
3092 /
tcp
819727972 | 2025-04-02T06:51:53.393404
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3105 /
tcp
-1399940268 | 2025-04-07T16:36:28.635843
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1045760528 | 2025-03-21T21:01:54.933020
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
3116 /
tcp
-2089734047 | 2025-04-17T19:17:54.066707
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3118 /
tcp
-1099385124 | 2025-04-11T13:26:55.383579
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
3160 /
tcp
-2096652808 | 2025-04-06T10:32:01.651279
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
3192 /
tcp
-1399940268 | 2025-03-24T22:47:14.719189
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3260 /
tcp
1135752610 | 2025-04-10T17:12:48.026150
Login Response Success(0x0000)\nKey/Value Pairs\nAuthMethod=None
3268 /
tcp
-561021273 | 2025-04-07T08:49:33.220559
220 2.0.0 prod-cn-momentum2.webpowercn.local ESMTP ecelerity 4.2.1.51128 r(Core:4.2.1.5) Sun, 03 Dec 2023 10:04:37 +0800\r\n
3299 /
tcp
-1316491703 | 2025-03-24T07:05:54.610984
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready
3301 /
tcp
1911457608 | 2025-04-02T20:12:37.556991
\x00[\x00\x00\x00\x00\x00\x00
3306 /
tcp
-1230509234 | 2025-03-23T16:35:13.498891
J\\x00\\x00\\x00\\xffj\\x04Host \'*.*.*.*\' is not allowed to connect to this MariaDB server
3310 /
tcp
1381121983 | 2025-04-15T23:07:43.967474
3389 /
tcp
521595461 | 2025-03-27T22:45:57.106467
Remote Desktop Protocol\n\\x03\\x00\\x00\\x13\\x0e\\xd0\\x00\\x00\\x124\\x00\\x03\\x00\\x08\\x00\\x02\\x00\\x00\\x00\n\nGuess_OS:Windows Server 2003 or 2008\nFlag: PROTOCOL_HYBRID\n
3550 /
tcp
-1399940268 | 2025-03-23T21:38:43.440436
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
198844676 | 2025-04-06T18:32:57.941268
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3568 /
tcp
-1996280214 | 2025-03-25T20:36:24.081182
3790 /
tcp
-375604792 | 2025-04-07T20:50:53.517346
220 Microsoft FTP Service
470305186 | 2025-03-24T20:20:22.187492
HTTP/1.1 200 OK
Content-Type: text/html
Accept-Ranges: bytes
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
4010 /
tcp
1911457608 | 2025-03-28T14:17:26.698644
\x00[\x00\x00\x00\x00\x00\x00
4022 /
tcp
-2089734047 | 2025-04-11T10:03:51.158265
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
4064 /
tcp
-2096652808 | 2025-04-16T08:17:39.420249
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
4085 /
tcp
-1399940268 | 2025-04-18T06:22:07.516205
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4157 /
tcp
550048729 | 2025-04-08T13:39:20.656910
-1914158197 | 2025-04-12T11:49:08.709535
HTTP/1.1 500 Internal Server Error
Server: nginx/1.18.11011 (Ubuntu)
Content-Type: text/plain; charset=utf-8
Connection: close
4282 /
tcp
1544300041 | 2025-04-11T06:12:28.543105
SSH-25453-Cisco-3524665.35
4321 /
tcp
-1250504565 | 2025-04-07T10:39:18.648016
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x80\x00\x04\x00\x01\x00\x00\x00\x05\x00\xff\xff\xff\x00\x00\x04\x08\x00\x00\x00\x00\x00\x7f\xff\x00\x00\x00\x00\x08\x07\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01
2069201278 | 2025-04-17T19:11:12.776279
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html
Connection: keep-alive
Set-Cookie: login_err_num=0; path=/; secure=true; httponly=true
Set-Cookie: topsecsvportalstyle=style1; path=/; secure=true; httponly=true
Set-Cookie: topsecsvportallogodir=default; path=/; secure=true; httponly=true
Set-Cookie: topsecsvportalname=default; path=/; secure=true; httponly=true
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
Strict-Transport-Security: max-age=31536000; includeSubDomains
X-XSS-Protectio
4463 /
tcp
819727972 | 2025-04-07T21:19:29.067835
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1453516345 | 2025-04-03T19:05:20.935407
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
-2107996212 | 2025-04-12T15:03:56.521663
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
4506 /
tcp
-1999117212 | 2025-03-22T16:56:32.001062
4524 /
tcp
-1888448627 | 2025-03-26T08:05:02.764874
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
4543 /
tcp
-1435414831 | 2025-03-20T19:51:09.596159
4840 /
tcp
1278527606 | 2025-03-25T00:09:01.013532
4899 /
tcp
819727972 | 2025-04-17T06:43:29.581622
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4949 /
tcp
-1031019485 | 2025-03-21T02:00:45.102904
5001 /
tcp
-445721795 | 2025-03-22T18:46:14.953633
\x00[\xc3\xaed\x1a\x7f\x00\x00
5006 /
tcp
-893477759 | 2025-04-09T19:50:15.878705
!versionbind7 t{RPowerDNS Recursor 410
5009 /
tcp
1472866667 | 2025-04-02T05:28:32.955388
5025 /
tcp
-1730858130 | 2025-03-22T22:28:20.521451
RFB 003.008
VNC:
Protocol Version: 3.8
-2107996212 | 2025-04-03T13:55:22.193777
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
5201 /
tcp
-1888448627 | 2025-04-08T05:36:54.215880
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
5209 /
tcp
597764502 | 2025-04-18T03:30:11.427688
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
5222 /
tcp
-971970408 | 2025-04-15T18:58:57.661847
5243 /
tcp
575925250 | 2025-04-01T03:25:43.554326
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
5260 /
tcp
-1036370807 | 2025-04-05T19:14:26.561811
5267 /
tcp
-1036370807 | 2025-04-11T22:34:06.264099
564972781 | 2025-03-28T17:01:34.687863
HTTP/1.1 400 Bad Request
Server: CWAP-waf
Content-Type: text/html
Connection: close
WZWS-RAY: 1249-1705937967.102-w-waf03tjgt
5274 /
tcp
819727972 | 2025-04-07T01:07:12.476012
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5432 /
tcp
819727972 | 2025-04-02T16:33:46.768863
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1023953321 | 2025-04-07T07:17:51.961173
HTTP/1.0 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm="proxy"
Connection: close
Content-type: text/html; charset=utf-8
5592 /
tcp
-1399940268 | 2025-04-03T04:38:22.373874
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5596 /
tcp
366084633 | 2025-03-25T23:25:04.445564
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
5609 /
tcp
1830187220 | 2025-04-15T07:01:04.036453
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
5672 /
tcp
575925250 | 2025-04-05T21:49:38.629505
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
5904 /
tcp
-1399940268 | 2025-04-17T12:30:15.001890
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1249500036 | 2025-04-05T16:12:43.093465
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html
Connection: keep-alive
Accept-Ranges: bytes
5908 /
tcp
-1399940268 | 2025-03-19T21:05:30.761616
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-916278850 | 2025-03-24T17:46:36.175822
HTTP/1.1 302 Moved Temporarily
Server: nginx
Content-Type: text/html
Connection: keep-alive
Location: https://60.169.174.64:5910/webclient
5918 /
tcp
-303199180 | 2025-03-22T03:36:13.740509
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
5919 /
tcp
-358801646 | 2025-04-06T22:00:26.672316
5938 /
tcp
-1626979812 | 2025-04-18T03:01:18.215614
220 Service ready for new user.
5986 /
tcp
-409020351 | 2025-04-18T01:55:41.370106
NPC Telnet permit one connection.
But One connection() already keep alive.
Good Bye !!
6000 /
tcp
-1399940268 | 2025-04-17T23:56:53.502361
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6001 /
tcp
-1996280214 | 2025-03-23T03:08:23.613931
6002 /
tcp
1423431314 | 2025-03-22T16:42:17.005538
6004 /
tcp
-454087041 | 2025-03-27T00:42:20.358744
\x1e\xc3\x80\x010\x02\x00\xc2\xa8\xc3\xa3\x00\x00\x00\x00
662263152 | 2025-04-07T01:46:06.932739
HTTP/1.1 404 Not Found
Connection: keep-alive
Vary: Origin
Vary: Access-Control-Request-Method
Vary: Access-Control-Request-Headers
Transfer-Encoding: chunked
Content-Type: application/json
6379 /
tcp
321971019 | 2025-03-24T05:37:32.623159
-ERR client ip is not in whitelist\r
6603 /
tcp
1911457608 | 2025-04-16T05:15:29.199783
\x00[\x00\x00\x00\x00\x00\x00
6633 /
tcp
165188539 | 2025-03-26T00:06:45.292542
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
6653 /
tcp
632542934 | 2025-03-24T03:41:56.603532
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
6667 /
tcp
1741579575 | 2025-03-19T16:51:41.218322
6668 /
tcp
-2089734047 | 2025-03-31T07:30:01.172831
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
6697 /
tcp
-1140468363 | 2025-04-03T14:47:11.284627
-575114016 | 2025-04-08T21:52:47.861454
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
WZWS-RAY: 1249-1705940762.578-w-waf03tjgt
7001 /
tcp
-829704895 | 2025-04-11T03:12:22.391863
7011 /
tcp
669849225 | 2025-04-12T22:10:54.927803
SSH-98.60-SysaxSSH_81885..42\r\n
7018 /
tcp
1623746877 | 2025-04-17T00:15:56.026175
500 Permission denied - closing connection.\r\n
7078 /
tcp
-2089734047 | 2025-04-09T23:13:52.678416
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
369374303 | 2025-04-17T21:41:04.439743
HTTP/1.1 503 Service Unavailable
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 8-24092400-0 0NNN RT(1705910686935 0) q(0 -1 -1 -1) r(0 -1)
7173 /
tcp
-303199180 | 2025-04-02T14:44:15.260227
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
7373 /
tcp
-1641514916 | 2025-04-04T01:16:48.213999
* OK Merak 1dFUa2 IMAP4rev1
-1839934832 | 2025-04-15T09:53:07.657139
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
7403 /
tcp
-1810987450 | 2025-03-19T18:13:52.760079
7415 /
tcp
-146605374 | 2025-03-19T22:36:07.496924
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
7434 /
tcp
1741579575 | 2025-04-09T02:22:18.761425
1612309769 | 2025-04-12T23:56:51.435501
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae28e1_CS-000-01SZh112_7344-42222
470305186 | 2025-04-03T06:11:00.403259
HTTP/1.1 200 OK
Content-Type: text/html
Accept-Ranges: bytes
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
7776 /
tcp
-1399940268 | 2025-04-02T19:02:25.358299
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7788 /
tcp
-441419608 | 2025-03-21T17:53:43.098349
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
7900 /
tcp
671605376 | 2025-04-17T09:53:56.152712
7946 /
tcp
-2096652808 | 2025-03-27T16:41:37.049856
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8011 /
tcp
504717326 | 2025-04-16T17:13:13.916116
SSH-2.0-OpenSSH_8.6
Vulnerabilities
-99290876 | 2025-04-01T20:12:20.851463
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65adfce8_PS-WDS-01hQz46_5490-3384
8022 /
tcp
819727972 | 2025-04-01T20:18:49.478949
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8024 /
tcp
103159425 | 2025-03-23T04:49:20.756540
8068 /
tcp
1830187220 | 2025-03-23T18:30:30.626971
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
2143387245 | 2025-04-04T12:13:02.453111
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
8083 /
tcp
1492413928 | 2025-04-07T07:06:31.081454
SSH-2.0-OpenSSH_7.5
Vulnerabilities
8084 /
tcp
165188539 | 2025-04-15T19:47:57.874231
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
-1416565584 | 2025-04-03T17:18:00.901823
HTTP/1.1 500 Internal Server Error
Content-Type: text/html
X-Frame-Options: SAMEORIGIN
X-Content-Type-Options: nosniff
X-XSS-Protection: 1
Connection: close
8128 /
tcp
1948301213 | 2025-04-15T04:08:26.579217
RFB 003.003
VNC:
Protocol Version: 3.3
8140 /
tcp
-1733645023 | 2025-04-01T09:13:32.057164
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
8149 /
tcp
401555314 | 2025-04-01T17:48:28.478004
8150 /
tcp
1911457608 | 2025-04-11T08:41:26.715140
\x00[\x00\x00\x00\x00\x00\x00
8160 /
tcp
1911457608 | 2025-04-12T01:15:53.432168
\x00[\x00\x00\x00\x00\x00\x00
1077013874 | 2025-03-28T03:35:04.621384
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
8165 /
tcp
50497985 | 2025-04-15T01:20:27.368923
\x00[\xc3\x88\xc3\x9dS\x7f\x00\x00
8167 /
tcp
1911457608 | 2025-04-12T18:49:35.553486
\x00[\x00\x00\x00\x00\x00\x00
8236 /
tcp
-441419608 | 2025-04-17T17:57:33.359049
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
8241 /
tcp
1911457608 | 2025-04-05T23:41:11.363590
\x00[\x00\x00\x00\x00\x00\x00
8291 /
tcp
819727972 | 2025-04-05T04:42:19.153179
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8322 /
tcp
-1329831334 | 2025-03-25T22:18:08.459935
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
8333 /
tcp
134472555 | 2025-04-09T10:56:27.677034
K\x02%~)J/\tHjU(IAGENT = (AGENT_VERSION = 2388790170)(RPC_VERSION = 5..722))
8350 /
tcp
-1399940268 | 2025-03-24T15:04:31.866852
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8384 /
tcp
2087396567 | 2025-04-04T05:59:34.130387
kjnkjabhbanc283ubcsbhdc72
8414 /
tcp
575925250 | 2025-04-07T18:42:19.300158
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
8428 /
tcp
-1036370807 | 2025-04-11T21:24:06.738402
8440 /
tcp
-445721795 | 2025-04-13T00:47:44.853691
\x00[\xc3\xaed\x1a\x7f\x00\x00
8450 /
tcp
1762042191 | 2025-04-02T20:08:02.650064
8461 /
tcp
-1399940268 | 2025-04-16T03:37:31.154656
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8525 /
tcp
1620329124 | 2025-03-26T10:44:14.336530
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\x01\xc3\xbf\xc3\xbb\x03\xc3\xbf\xc3\xbd\x01\xc3\xbf\xc3\xbe\x01Username:
8545 /
tcp
2063598737 | 2025-04-17T09:00:41.578109
8548 /
tcp
-1261090339 | 2025-04-09T22:57:36.433914
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
8554 /
tcp
820958131 | 2025-03-29T19:51:54.267856
kjnkjabhbanc283ubcsbhdc72\x02
-1230049476 | 2025-04-08T18:38:00.142359
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
8576 /
tcp
-2089734047 | 2025-04-18T01:35:21.283647
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8605 /
tcp
-1399940268 | 2025-03-23T00:49:46.778734
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8623 /
tcp
165188539 | 2025-04-02T11:33:53.564802
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
-802143704 | 2025-04-06T10:12:09.854817
HTTP/1.0 500 Internal Server Error
D
Connection: close
Command server error
1282941221 | 2025-04-03T02:58:54.920060
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
8803 /
tcp
1996932384 | 2025-04-07T19:43:30.729531
8808 /
tcp
-1399940268 | 2025-04-12T00:12:02.334778
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8825 /
tcp
-1399940268 | 2025-04-01T07:16:45.809509
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8827 /
tcp
1911457608 | 2025-04-07T10:06:03.224789
\x00[\x00\x00\x00\x00\x00\x00
8836 /
tcp
-1399940268 | 2025-04-11T20:26:27.277911
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8845 /
tcp
-2089734047 | 2025-04-10T19:32:40.702493
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8849 /
tcp
-1399940268 | 2025-04-16T03:55:59.257531
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8852 /
tcp
-1399940268 | 2025-04-07T20:27:32.526073
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8876 /
tcp
677934968 | 2025-03-28T21:02:18.395326
8877 /
tcp
1911457608 | 2025-04-16T07:33:20.607132
\x00[\x00\x00\x00\x00\x00\x00
8880 /
tcp
-971970408 | 2025-03-28T22:10:54.573462
8881 /
tcp
-1399940268 | 2025-04-06T14:51:46.526046
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8935 /
tcp
740837454 | 2025-04-16T18:47:28.882595
SSH-2.0-OpenSSH_5.3
Vulnerabilities
9001 /
tcp
-1026951088 | 2025-03-29T04:29:55.544760
9010 /
tcp
1911457608 | 2025-04-07T03:42:58.365565
\x00[\x00\x00\x00\x00\x00\x00
9016 /
tcp
2098371729 | 2025-04-02T05:21:50.291322
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
9041 /
tcp
819727972 | 2025-04-12T21:37:36.658803
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9042 /
tcp
676476721 | 2025-03-24T22:36:05.890294
ELM Enterprise Manager _l
Copyright © 18668511-928641920 TNT Software, Inc.
9043 /
tcp
-2089734047 | 2025-03-26T15:37:59.510469
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9059 /
tcp
-1399940268 | 2025-04-05T22:13:35.051322
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9060 /
tcp
819727972 | 2025-03-31T11:42:28.694849
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9081 /
tcp
-358801646 | 2025-04-07T23:49:28.133656
9091 /
tcp
2087396567 | 2025-04-07T04:28:56.078892
kjnkjabhbanc283ubcsbhdc72
9092 /
tcp
45131230 | 2025-04-07T17:19:18.474532
inv2W\x04\x0f\x00\x00\x00\x01\x00\t\x00\x00\x00
9095 /
tcp
-2096652808 | 2025-04-15T13:15:56.005540
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
9097 /
tcp
-2096652808 | 2025-03-21T23:30:58.702380
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
-1839934832 | 2025-04-06T23:11:11.840959
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
9113 /
tcp
-1399940268 | 2025-04-02T19:09:33.351601
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9121 /
tcp
1911457608 | 2025-04-17T16:06:13.842471
\x00[\x00\x00\x00\x00\x00\x00
9129 /
tcp
-1399940268 | 2025-04-17T05:22:19.591814
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-2107996212 | 2025-03-25T18:50:07.574700
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
9138 /
tcp
-1327660293 | 2025-03-25T21:16:43.010277
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
9151 /
tcp
660175493 | 2025-04-18T02:37:02.573952
9159 /
tcp
-1399940268 | 2025-04-05T02:08:35.692085
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9160 /
tcp
819727972 | 2025-04-07T20:49:56.215620
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9188 /
tcp
-1888448627 | 2025-04-05T14:39:41.568372
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9192 /
tcp
-1730858130 | 2025-03-28T19:14:33.144379
RFB 003.008
VNC:
Protocol Version: 3.8
9211 /
tcp
-1888448627 | 2025-03-28T16:36:59.609112
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9215 /
tcp
165188539 | 2025-03-26T20:18:39.944190
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
9216 /
tcp
321971019 | 2025-04-02T20:36:11.347468
-ERR client ip is not in whitelist\r
9283 /
tcp
-1399940268 | 2025-04-11T15:58:08.650353
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9307 /
tcp
493955023 | 2025-04-11T20:28:31.803897
\x00\x00\x0c\x04\x00\x00\x00\x00\x00\x00\x04\x00\x10\x00\x00\x00\n0\x05\x00\x00@\x00
9333 /
tcp
1543809371 | 2025-04-07T07:39:39.732004
220 corpease.net Anti-spam GT for Coremail System (icmhosting[2\n0181212])
-1839934832 | 2025-03-23T22:33:21.014987
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
9447 /
tcp
-1399940268 | 2025-04-04T15:38:40.881323
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-2107996212 | 2025-03-20T18:18:18.665463
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
9488 /
tcp
-1297953727 | 2025-03-21T23:11:33.288546
\x02\x00\x00\x00\x00\x00\x06\x04\x00\x00\x00\x00\x00\x0c\x00\x00\n0\x00\x1c
9505 /
tcp
-274082663 | 2025-04-05T21:53:47.854725
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
9532 /
tcp
819727972 | 2025-03-22T17:54:49.633277
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9600 /
tcp
819727972 | 2025-04-07T08:07:14.372180
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9633 /
tcp
1975288991 | 2025-04-06T00:42:38.787912
9773 /
tcp
-1059554316 | 2025-03-21T16:29:55.413205
\xc2\xa5A\x00\x01\x00\x00\x00,\x00\x00\x00\x02\x00\x00\x00L\x00\x00\x00\x08Connect\x00\x00\x00\x00x\x00\x00\x00\x0857222\x00\x00\x00
9803 /
tcp
1911457608 | 2025-03-29T06:29:34.751815
\x00[\x00\x00\x00\x00\x00\x00
9811 /
tcp
-1399940268 | 2025-04-11T23:00:34.159203
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9888 /
tcp
-1399940268 | 2025-04-08T21:21:21.562032
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1320285193 | 2025-03-29T08:37:26.477149
HTTP/1.1 404 Not Found
Server: CloudWAF
Content-Type: text/html
Connection: keep-alive
9909 /
tcp
1911457608 | 2025-04-12T06:50:26.552292
\x00[\x00\x00\x00\x00\x00\x00
-1901729922 | 2025-03-28T06:14:00.435086
HTTP/1.1 404
Vary: Origin
Vary: Access-Control-Request-Method
Vary: Access-Control-Request-Headers
Content-Type: application/json
Transfer-Encoding: chunked
9999 /
tcp
1161309183 | 2025-04-17T19:08:41.844526
10000 /
tcp
-1779118422 | 2025-03-21T00:44:04.039280
\x00[\xc2\xae\xc2\x8d{\x7f\x00\x00
10001 /
tcp
1492413928 | 2025-04-11T13:20:56.526141
SSH-2.0-OpenSSH_7.5
Vulnerabilities
10050 /
tcp
1761482307 | 2025-03-27T03:34:00.082239
\x00[\xc2\xa5\t\xc2\xbe\x7f\x00\x00
10051 /
tcp
819727972 | 2025-03-26T15:21:30.668463
SSH-2.0-OpenSSH_7.4
Vulnerabilities
10068 /
tcp
1911457608 | 2025-04-04T03:06:22.354113
\x00[\x00\x00\x00\x00\x00\x00
10205 /
tcp
1492413928 | 2025-04-12T09:00:16.623594
SSH-2.0-OpenSSH_7.5
Vulnerabilities
10249 /
tcp
921225407 | 2025-04-02T11:30:53.640780
\x00\x00\x00\x04\x00\x00\x00\x00\x00
10250 /
tcp
1741579575 | 2025-03-26T10:29:42.605329
-1453516345 | 2025-03-28T17:05:15.534278
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
10909 /
tcp
819727972 | 2025-04-12T01:20:14.358308
SSH-2.0-OpenSSH_7.4
Vulnerabilities
10911 /
tcp
-1810987450 | 2025-03-31T17:44:19.938540
11000 /
tcp
-2096652808 | 2025-03-21T22:09:18.938090
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
11180 /
tcp
-1888448627 | 2025-04-14T22:11:25.826419
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
11288 /
tcp
-1032713145 | 2025-03-25T01:38:55.445262
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
11480 /
tcp
819727972 | 2025-04-04T23:11:35.083371
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-446385447 | 2025-04-14T18:30:46.718023
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae1efa_PS-CKG-01vQy48_16235-38870
12101 /
tcp
632542934 | 2025-04-03T23:30:12.845575
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
12103 /
tcp
165188539 | 2025-04-07T14:20:49.473095
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12155 /
tcp
1308377066 | 2025-04-10T19:39:04.134384
12171 /
tcp
-358801646 | 2025-04-16T14:20:03.769055
971933601 | 2025-04-12T07:41:40.283569
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
12185 /
tcp
-303199180 | 2025-04-16T09:15:16.353248
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
12189 /
tcp
1996932384 | 2025-04-07T20:45:24.686432
12190 /
tcp
-358801646 | 2025-03-24T16:01:45.802743
12227 /
tcp
-1399940268 | 2025-03-25T16:03:24.897257
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12237 /
tcp
-2089734047 | 2025-04-15T02:51:15.282594
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12238 /
tcp
1991883981 | 2025-04-05T19:57:16.388763
B\x00\x00\x00\xc3\xbfn\x04Too many connections
12251 /
tcp
-653033013 | 2025-04-06T16:36:11.172991
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
12272 /
tcp
745343730 | 2025-03-27T19:54:43.685749
220 smtp.qq.com Esmtp QQ Mail Server
12273 /
tcp
-1265999252 | 2025-04-05T19:12:01.015316
220 VMware Authentication Daemon Version 1.0, ServerDaemonProto\ncol:SOAP, MKSDisplayProtocol:VNC , ,
12274 /
tcp
-832380282 | 2025-04-04T06:56:35.411041
lpd [@Boyk]: Print-services are not available to your host (aF2qXkQ2m).\n
12279 /
tcp
-2089734047 | 2025-04-08T22:54:06.916988
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12281 /
tcp
-1399940268 | 2025-04-07T17:04:13.480302
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1282941221 | 2025-04-06T17:54:21.803486
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
12286 /
tcp
165188539 | 2025-04-15T14:09:37.901690
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12288 /
tcp
-1114821551 | 2025-03-20T04:52:54.486220
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
12336 /
tcp
165188539 | 2025-04-17T11:00:33.738673
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
296364507 | 2025-03-28T01:54:26.774546
HTTP/1.1 500 Internal Server Error
SERVER: Trend Chip UPnP/1.0 DMS
CONNECTION: close
CONTENT-LENGTH: 60
CONTENT-TYPE: text/html
12361 /
tcp
-1399940268 | 2025-04-15T07:51:16.286469
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12363 /
tcp
-1888448627 | 2025-03-21T22:51:32.324203
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
-2107996212 | 2025-04-05T00:54:39.095714
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
12394 /
tcp
819727972 | 2025-03-19T14:31:41.219484
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1230049476 | 2025-03-24T10:33:50.413422
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
12400 /
tcp
-2096652808 | 2025-04-01T03:09:59.883171
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12402 /
tcp
820958131 | 2025-03-27T15:51:37.100210
kjnkjabhbanc283ubcsbhdc72\x02
12416 /
tcp
-1032713145 | 2025-04-05T19:57:31.294683
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
12442 /
tcp
-1399940268 | 2025-03-25T14:40:48.388919
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12456 /
tcp
-1477838366 | 2025-04-02T15:19:58.431046
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
12471 /
tcp
-1399940268 | 2025-04-16T16:47:24.698902
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12490 /
tcp
632542934 | 2025-04-03T04:34:58.866701
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
12531 /
tcp
1655023012 | 2025-04-02T10:08:56.108353
athinfod: invalid query.\n
12578 /
tcp
1492413928 | 2025-03-31T18:05:01.517710
SSH-2.0-OpenSSH_7.5
Vulnerabilities
12587 /
tcp
-1888448627 | 2025-03-19T11:36:13.773211
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12588 /
tcp
1761482307 | 2025-04-15T12:17:02.523787
\x00[\xc2\xa5\t\xc2\xbe\x7f\x00\x00
13082 /
tcp
1911457608 | 2025-03-27T22:28:15.956336
\x00[\x00\x00\x00\x00\x00\x00
-1839934832 | 2025-03-26T22:33:19.956876
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
14344 /
tcp
819727972 | 2025-04-12T16:32:10.535441
SSH-2.0-OpenSSH_7.4
Vulnerabilities
14402 /
tcp
-1327660293 | 2025-04-05T09:47:06.050985
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
14407 /
tcp
-1399940268 | 2025-04-12T23:21:44.628308
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
14897 /
tcp
740837454 | 2025-04-15T14:02:06.746362
SSH-2.0-OpenSSH_5.3
Vulnerabilities
14901 /
tcp
632542934 | 2025-04-11T16:48:53.452481
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
14909 /
tcp
1911457608 | 2025-04-06T08:14:35.119277
\x00[\x00\x00\x00\x00\x00\x00
15443 /
tcp
-905685638 | 2025-04-06T23:26:18.680897
-147424911 | 2025-04-17T10:34:17.986150
HTTP/1.1 404 Not Found
Content Length: 0
16033 /
tcp
119860953 | 2025-03-25T16:43:36.691706
* OK ArGoSoft Mail Server IMAP Module v.YW at
16036 /
tcp
-1036370807 | 2025-04-15T20:29:50.511526
16045 /
tcp
-358801646 | 2025-04-12T12:57:20.389517
16060 /
tcp
-1399940268 | 2025-04-04T03:25:04.612563
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16066 /
tcp
599074451 | 2025-03-29T19:28:52.103632
16090 /
tcp
1911457608 | 2025-04-05T18:46:37.127577
\x00[\x00\x00\x00\x00\x00\x00
16464 /
tcp
171352214 | 2025-04-02T09:14:59.156065
-ERR client ip is not in whitelist
16888 /
tcp
819727972 | 2025-04-06T05:37:49.998426
SSH-2.0-OpenSSH_7.4
Vulnerabilities
16992 /
tcp
-1840324437 | 2025-03-22T16:29:55.739754
16993 /
tcp
740837454 | 2025-03-31T23:38:24.615799
SSH-2.0-OpenSSH_5.3
Vulnerabilities
17000 /
tcp
-1810987450 | 2025-04-03T18:41:23.887325
17102 /
tcp
-1810987450 | 2025-03-29T21:51:57.424859
17780 /
tcp
-1795027372 | 2025-04-06T20:15:35.518644
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
18006 /
tcp
-136006866 | 2025-04-09T21:57:58.821837
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
18007 /
tcp
669849225 | 2025-04-15T16:27:55.833933
SSH-98.60-SysaxSSH_81885..42\r\n
18008 /
tcp
-2031152423 | 2025-04-10T20:40:07.850373
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
18028 /
tcp
-375604792 | 2025-03-29T20:56:47.444232
220 Microsoft FTP Service
18036 /
tcp
1492413928 | 2025-03-25T04:23:08.871192
SSH-2.0-OpenSSH_7.5
Vulnerabilities
-1839934832 | 2025-04-12T13:50:42.683274
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
18042 /
tcp
1911457608 | 2025-04-10T16:56:15.493158
\x00[\x00\x00\x00\x00\x00\x00
18044 /
tcp
740837454 | 2025-03-20T11:38:43.749210
SSH-2.0-OpenSSH_5.3
Vulnerabilities
18048 /
tcp
-2089734047 | 2025-04-06T00:43:53.156826
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
18066 /
tcp
51259122 | 2025-04-15T20:03:06.869090
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
2103111368 | 2025-03-24T16:28:55.749481
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
18070 /
tcp
819727972 | 2025-03-22T20:18:03.880906
SSH-2.0-OpenSSH_7.4
Vulnerabilities
18072 /
tcp
-1399940268 | 2025-03-25T17:25:14.411091
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1839934832 | 2025-04-08T06:38:26.938142
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
18080 /
tcp
921225407 | 2025-04-17T15:06:33.600138
\x00\x00\x00\x04\x00\x00\x00\x00\x00
18081 /
tcp
104385780 | 2025-04-09T08:06:08.709289
18082 /
tcp
1353260875 | 2025-03-27T22:26:21.201557
\x00[g\xc2\x95N\x7f\x00\x00
18094 /
tcp
-1399940268 | 2025-04-10T17:10:02.883729
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18095 /
tcp
-891714208 | 2025-04-18T03:09:14.133289
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
18098 /
tcp
-1399940268 | 2025-04-15T20:22:11.092910
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18109 /
tcp
408230060 | 2025-04-07T03:46:56.945679
\r\nSorry, that nickname format is invalid.\r\n
18245 /
tcp
1189133115 | 2025-04-03T23:40:06.739504
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
18553 /
tcp
-971970408 | 2025-03-26T20:55:51.088490
18888 /
tcp
1911457608 | 2025-04-17T07:28:43.341986
\x00[\x00\x00\x00\x00\x00\x00
19000 /
tcp
945910976 | 2025-04-08T13:41:50.948083
* OK TeamXchange IMAP4rev1 server (otyUg) ready.\r\n
19090 /
tcp
-1810987450 | 2025-03-23T17:27:56.619137
19100 /
tcp
921225407 | 2025-03-22T06:25:56.600130
\x00\x00\x00\x04\x00\x00\x00\x00\x00
19200 /
tcp
539065883 | 2025-03-27T18:58:55.404798
1900503736 | 2025-03-19T18:16:25.066777
HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-HTTPAPI/2.0
20060 /
tcp
-358801646 | 2025-04-07T15:18:47.549643
20070 /
tcp
-1099385124 | 2025-03-31T14:15:57.551509
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
-2107996212 | 2025-04-07T04:30:51.738602
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
20547 /
tcp
2087396567 | 2025-04-12T20:58:39.321606
kjnkjabhbanc283ubcsbhdc72
21025 /
tcp
799468586 | 2025-04-12T22:38:21.236659
21027 /
tcp
539065883 | 2025-04-04T09:06:52.118017
21244 /
tcp
1989907056 | 2025-04-16T16:10:23.999218
RTSP/1.0 453 Not Enough Bandwidth\r\nServer: AirTunes/7l_wZ\r\n\r\n
21303 /
tcp
819727972 | 2025-04-03T20:43:14.668088
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21379 /
tcp
104385780 | 2025-04-03T10:24:21.905136
21381 /
tcp
165188539 | 2025-04-15T04:31:05.369783
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
22000 /
tcp
1690634669 | 2025-04-01T18:09:32.509727
22001 /
tcp
171352214 | 2025-04-04T04:14:34.655920
-ERR client ip is not in whitelist
22069 /
tcp
819727972 | 2025-04-01T05:10:04.089044
SSH-2.0-OpenSSH_7.4
Vulnerabilities
22070 /
tcp
-1032713145 | 2025-04-04T00:41:17.514137
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
22206 /
tcp
-358801646 | 2025-04-06T19:38:12.136840
23023 /
tcp
-971970408 | 2025-04-12T11:52:11.088491
23424 /
tcp
1741579575 | 2025-03-24T23:03:53.155995
24245 /
tcp
-2096652808 | 2025-04-06T06:51:19.695787
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
25082 /
tcp
-1947777893 | 2025-03-31T15:19:29.941919
"Broadband Router"\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
25105 /
tcp
677934968 | 2025-04-03T05:05:47.174355
25565 /
tcp
-971970408 | 2025-04-12T15:13:40.511768
26657 /
tcp
103159425 | 2025-04-07T14:24:20.694482
27015 /
tcp
2087396567 | 2025-04-12T13:26:14.691300
kjnkjabhbanc283ubcsbhdc72
27016 /
tcp
539065883 | 2025-04-11T21:06:23.592600
27017 /
tcp
1763259671 | 2025-04-06T16:12:02.437523
{\n"Version": "3.4.18",\n"VersionArray": [\n3,\n4,\n18,\n0\n],\n"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",\n"OpenSSLVersion": "",\n"SysInfo": "",\n"Bits": 64,\n"Debug": false,\n"MaxObjectSize": 16777216\n}\n\n
27036 /
tcp
-1641514916 | 2025-04-12T04:52:26.855538
* OK Merak 1dFUa2 IMAP4rev1
-1013082686 | 2025-03-22T12:03:13.848251
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
28015 /
tcp
-1399940268 | 2025-03-23T19:26:52.599634
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
28017 /
tcp
-441419608 | 2025-03-24T15:11:44.820423
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
28080 /
tcp
1082732927 | 2025-03-28T04:00:13.730541
STAT pid 1660
STAT uptime 28884
STAT time 1641290377
STAT version 1.2.1
STAT pointer_size 32
STAT curr_items 14
STAT total_items 3533
STAT bytes 30524
STAT curr_connections 1
STAT total_connections 3542
STAT connection_structures 3
STAT cmd_get 3533
STAT cmd_set 3533
STAT get_hits 3519
STAT get_misses 14
STAT bytes_read 7927780
STAT bytes_written 7848552
STAT limit_maxbytes 67108864
END
30002 /
tcp
-1681927087 | 2025-03-21T01:16:10.608287
kjnkjabhbanc283ubcsbhdc72
30003 /
tcp
1261582754 | 2025-04-12T20:21:49.810904
unknown command
unknown command
30010 /
tcp
1911457608 | 2025-03-25T01:21:12.768669
\x00[\x00\x00\x00\x00\x00\x00
30083 /
tcp
1726594447 | 2025-03-26T16:18:31.790679
\r\n\nLantronix MSS100 Version V118/523(045538937)\n\r\nType HELP at the \'Local_61349> \' prompt for assistance.\n\r\n\r\n\nUsername>
30301 /
tcp
1690634669 | 2025-04-09T06:46:52.528317
30303 /
tcp
2087396567 | 2025-03-31T22:17:46.535128
kjnkjabhbanc283ubcsbhdc72
30322 /
tcp
2087396567 | 2025-03-24T14:27:58.972203
kjnkjabhbanc283ubcsbhdc72
30522 /
tcp
-616720387 | 2025-04-06T05:08:20.817006
30718 /
tcp
-1429370566 | 2025-04-11T19:23:15.888802
LH\xdb\xc6\xdd\xf6g\x10\x19\x00\x00\x00\x18\x00\x01\x02\x00\x10\x00\x04\x00\x00\x00\x01y\x9cV\x85\x1bv\xb2\xfd\x92uz\xf1F\xc3P\xc8
30894 /
tcp
119860953 | 2025-03-29T17:22:55.731376
* OK ArGoSoft Mail Server IMAP Module v.YW at
30922 /
tcp
103159425 | 2025-04-05T22:03:49.122365
31337 /
tcp
2022369556 | 2025-04-03T13:29:49.837162
220 VMware Authentication Daemon Version 1.10: SSL Required, ServerDaemonProtocol:SOAP, MKSDisplayProtocol:VNC , VMXARGS supported, NFCSSL supported/t
-1453516345 | 2025-03-25T03:06:49.626913
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
31443 /
tcp
841014058 | 2025-03-28T16:26:32.298201
Hello, this is FRRouting (version 4.0).
Copyright 19
96-2005 Kunihiro Ishiguro, et al.
Use...
31522 /
tcp
1642597142 | 2025-04-04T21:42:05.348596
\x00y\xc3\x90\x02\xc3\xbf\xc3\xbf\x00s\x12L\x00\x06\x11I\x00\x08\x00N\x11S\x00\xc3\x93
31622 /
tcp
2087396567 | 2025-03-23T09:28:00.764643
kjnkjabhbanc283ubcsbhdc72
31822 /
tcp
-1779118422 | 2025-03-20T18:31:07.882119
\x00[\xc2\xae\xc2\x8d{\x7f\x00\x00
31922 /
tcp
472902042 | 2025-04-05T01:16:19.168725
"Magic:ActiveMQ
Version:12
<ActiveMQ*TcpNoDelayEnabledSizePrefixDisabled CacheSizeProviderName ActiveMQStackTraceEnabledPlatformDetails JavaCacheEnabledTightEncodingEnabledMaxFrameSize@MaxInac
32022 /
tcp
-68075478 | 2025-03-23T19:03:27.709961
32400 /
tcp
-1139539254 | 2025-03-31T12:17:14.425479
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
32722 /
tcp
1690634669 | 2025-04-04T09:32:46.738747
32764 /
tcp
2087396567 | 2025-04-02T20:18:57.800786
kjnkjabhbanc283ubcsbhdc72
32922 /
tcp
819727972 | 2025-03-23T01:56:09.027981
SSH-2.0-OpenSSH_7.4
Vulnerabilities
33060 /
tcp
1794594071 | 2025-04-11T18:33:29.221805
33122 /
tcp
1690634669 | 2025-03-22T22:55:22.373745
33338 /
tcp
2087396567 | 2025-04-02T16:52:50.973682
kjnkjabhbanc283ubcsbhdc72
33422 /
tcp
-321444299 | 2025-03-19T16:23:37.292062
:dircproxy NOTICE AUTH :Looking up your hostname...
:dircproxy NOTICE AUTH :Got your hostname.
33522 /
tcp
291723434 | 2025-03-20T13:26:33.172001
Lantronix MSS100 Version V118/523(045538937)
Type HELP at the 'Local_61349> ' prompt for assistance.
Username>
34222 /
tcp
410249975 | 2025-03-20T01:03:56.510429
34322 /
tcp
-1681927087 | 2025-03-19T18:04:06.012271
kjnkjabhbanc283ubcsbhdc72
34522 /
tcp
808560482 | 2025-03-19T11:17:59.156204
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP
: USERID : UNIX : Cr8
34622 /
tcp
677934968 | 2025-03-19T09:36:41.949289
35100 /
tcp
-1810987450 | 2025-03-23T12:33:53.799578
37215 /
tcp
-1392039491 | 2025-04-11T12:31:46.682920
"Broadband Router"
<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
37777 /
tcp
-146605374 | 2025-03-23T11:20:14.420443
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
40000 /
tcp
320677201 | 2025-03-22T12:28:31.083365
H\x00\x00\x00\xc3\xbfj\x04Host \'101.133.140.114\' is not allowed to \nconnect to this MySQL server
41443 /
tcp
-358801646 | 2025-04-07T20:08:15.034180
42194 /
tcp
15018106 | 2025-04-08T16:53:47.228570
\x00\x19\x02\x00\x02\x00\x07\x00Protocol version mismatch\x00
42235 /
tcp
165188539 | 2025-03-27T09:27:08.694703
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
42443 /
tcp
-1399940268 | 2025-04-10T22:40:39.944086
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
44100 /
tcp
1426971893 | 2025-04-02T04:44:31.633693
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
44158 /
tcp
2054287019 | 2025-04-12T22:40:30.679700
44303 /
tcp
921225407 | 2025-04-05T22:35:09.159458
\x00\x00\x00\x04\x00\x00\x00\x00\x00
44345 /
tcp
1623746877 | 2025-04-15T15:08:09.690988
500 Permission denied - closing connection.\r\n
44818 /
tcp
1763259671 | 2025-04-04T18:09:54.659470
{\n"Version": "3.4.18",\n"VersionArray": [\n3,\n4,\n18,\n0\n],\n"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",\n"OpenSSLVersion": "",\n"SysInfo": "",\n"Bits": 64,\n"Debug": false,\n"MaxObjectSize": 16777216\n}\n\n
48899 /
tcp
1741579575 | 2025-03-22T05:22:28.153224
-726970723 | 2025-03-31T19:52:20.664090
HTTP/1.1 500 Internal Server Error
CONTENT-LENGTH: 411
CONTENT-TYPE: text/xml; charset="utf-8"
DATE: Mon, 22 Jan 2024 16:46:55 GMT
EXT:
SERVER: Linux/3.18.20, UPnP/1.0, Portable SDK for UPnP devices/1.6.18
X-User-Agent: redsonic
<s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">
<s:Body>
<s:Fault>
<faultcode>s:Client</faultcode>
<faultstring>UPnPError</faultstring>
<detail>
<UPnPError xmlns="urn:schemas-upnp-org:control-1-0">
49153 /
tcp
819727972 | 2025-04-02T08:03:36.942652
SSH-2.0-OpenSSH_7.4
Vulnerabilities
49200 /
tcp
-136006866 | 2025-04-02T18:37:40.365404
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
50000 /
tcp
-1036370807 | 2025-03-26T06:53:18.063828
50070 /
tcp
819727972 | 2025-04-10T15:23:48.606563
SSH-2.0-OpenSSH_7.4
Vulnerabilities
50085 /
tcp
1911457608 | 2025-03-21T20:50:48.565212
\x00[\x00\x00\x00\x00\x00\x00
50100 /
tcp
-971970408 | 2025-04-10T20:47:32.436919
50996 /
tcp
597764502 | 2025-03-25T03:41:54.894320
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
51106 /
tcp
2087396567 | 2025-03-29T19:57:47.042396
kjnkjabhbanc283ubcsbhdc72
51235 /
tcp
-2096652808 | 2025-03-26T17:49:02.654144
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
51443 /
tcp
-1114821551 | 2025-04-07T01:19:35.447652
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
-207391021 | 2025-03-21T13:32:24.456380
HTTP/1.1 401 Unauthorized
Server: Transmission
Content-Type: text/html; charset=ISO-8859-1
53400 /
tcp
819727972 | 2025-04-18T00:06:23.837177
SSH-2.0-OpenSSH_7.4
Vulnerabilities
53413 /
tcp
819727972 | 2025-04-10T08:27:45.025323
SSH-2.0-OpenSSH_7.4
Vulnerabilities
53490 /
tcp
-1888448627 | 2025-04-10T22:13:28.138411
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
54138 /
tcp
-1248408558 | 2025-04-01T16:14:21.105116
220 MikroTik FTP server (MikroTik 6.44.3) ready
54984 /
tcp
1208318993 | 2025-03-28T21:54:09.575932
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
55442 /
tcp
-971970408 | 2025-03-29T21:42:46.594446
55481 /
tcp
380146262 | 2025-04-04T19:31:49.892420
55553 /
tcp
2087396567 | 2025-04-08T07:28:34.170050
kjnkjabhbanc283ubcsbhdc72
55554 /
tcp
2087396567 | 2025-04-09T23:52:12.598553
kjnkjabhbanc283ubcsbhdc72
60000 /
tcp
-1399940268 | 2025-04-01T02:16:52.879877
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
61613 /
tcp
921225407 | 2025-04-03T12:52:03.496864
\x00\x00\x00\x04\x00\x00\x00\x00\x00
63045 /
tcp
119860953 | 2025-04-17T22:50:06.845229
* OK ArGoSoft Mail Server IMAP Module v.YW at
63210 /
tcp
842535728 | 2025-03-29T18:09:59.213366
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>
A<!DOCTYPE GANGLIA_XML [
<!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...
63256 /
tcp
-1730858130 | 2025-04-07T03:07:11.530340
RFB 003.008
VNC:
Protocol Version: 3.8
63260 /
tcp
2087396567 | 2025-03-28T07:40:25.563043
kjnkjabhbanc283ubcsbhdc72