Last Seen: 2025-04-24

GeneralInformation

shog3509n881244h5.1688.com
laoken.en.alibaba.com
13 / tcp
-1770051369 | 2025-04-23T18:11:38.907302
15 / tcp
-358801646 | 2025-03-25T16:46:47.363999
19 / tcp
829384519 | 2025-04-12T15:11:41.476792
20 / tcp
-345718689 | 2025-04-05T22:00:06.813355
23 / tcp
-23362551 | 2025-04-22T07:09:30.355783
37 / tcp
-1624690781 | 2025-03-28T17:10:08.018159
70 / tcp
-1385078233 | 2025-03-26T12:47:50.370461
79 / tcp
268196945 | 2025-04-23T16:00:48.699734
80 / tcp
-1523605528 | 2025-04-12T09:35:05.947164
102 / tcp
1911457608 | 2025-04-12T22:09:39.591197
179 / tcp
-399606100 | 2025-04-14T21:32:22.247514
195 / tcp
1492413928 | 2025-04-01T18:49:26.684119
443 / tcp
1638645179 | 2025-03-26T08:50:22.843094
503 / tcp
-832380282 | 2025-04-24T12:48:15.646790
541 / tcp
-1299118573 | 2025-04-17T08:46:58.330775
548 / tcp
155249582 | 2025-04-03T16:03:50.888829
636 / tcp
1650594030 | 2025-04-19T18:47:11.984076
666 / tcp
1300162323 | 2025-04-10T00:20:14.959231
811 / tcp
15018106 | 2025-04-08T20:12:32.660522
873 / tcp
-976882525 | 2025-04-21T16:57:22.877211
993 / tcp
-2096652808 | 2025-04-16T19:11:08.107225
995 / tcp
934210070 | 2025-04-12T14:46:55.719854
1080 / tcp
1362344524 | 2025-04-06T13:36:49.538459
1099 / tcp
-1399940268 | 2025-04-06T05:58:24.290898
1200 / tcp
-1399940268 | 2025-04-15T08:32:36.791747
1400 / tcp
0 | 2025-03-29T02:22:55.844370
1414 / tcp
575925250 | 2025-04-22T16:34:39.984652
1443 / tcp
-1715152554 | 2025-03-26T08:50:19.965623
1515 / tcp
-1733645023 | 2025-04-16T11:37:22.653821
1604 / tcp
2087396567 | 2025-04-09T11:19:31.361728
1800 / tcp
321971019 | 2025-04-18T14:48:02.396314
1981 / tcp
1911457608 | 2025-04-05T08:17:51.729219
1989 / tcp
-1399940268 | 2025-03-27T23:20:40.084016
2000 / tcp
-1032713145 | 2025-03-28T07:55:17.375688
2008 / tcp
2087396567 | 2025-04-16T09:29:00.453673
2080 / tcp
410249975 | 2025-04-11T18:44:17.858431
2081 / tcp
-136006866 | 2025-04-11T14:27:44.118845
2083 / tcp
-1990350878 | 2025-03-29T09:59:37.476755
2087 / tcp
1463575827 | 2025-04-19T21:40:42.244237
2121 / tcp
141730637 | 2025-04-16T21:20:43.094300
2154 / tcp
398077695 | 2025-04-24T07:50:00.477613
2222 / tcp
372433470 | 2025-04-15T00:04:11.893666
2332 / tcp
-1839934832 | 2025-04-01T04:31:20.571208
2376 / tcp
2087396567 | 2025-04-02T11:33:40.907017
2404 / tcp
-1888448627 | 2025-04-16T20:44:32.366904
2628 / tcp
819727972 | 2025-04-16T02:45:08.536316
2761 / tcp
-2096652808 | 2025-04-12T06:31:30.221950
2762 / tcp
-1279886438 | 2025-03-26T17:25:20.695362
3001 / tcp
-138733098 | 2025-04-19T23:35:10.339055
3062 / tcp
-358801646 | 2025-04-15T03:29:02.869575
3076 / tcp
-1733645023 | 2025-04-06T07:22:09.306266
3083 / tcp
-1733645023 | 2025-03-29T20:48:49.480096
3256 / tcp
819727972 | 2025-04-06T10:46:58.300587
3260 / tcp
-271466677 | 2025-04-15T05:39:46.074646
3269 / tcp
-358801646 | 2025-04-18T19:56:41.123837
3310 / tcp
580340387 | 2025-04-12T08:02:33.797148
3389 / tcp
623170236 | 2025-03-26T19:17:16.778476
3551 / tcp
198844676 | 2025-04-21T04:18:42.463838
3790 / tcp
-407828767 | 2025-04-18T23:17:06.534940
4000 / tcp
1123187653 | 2025-04-18T07:53:35.963207
4022 / tcp
819727972 | 2025-04-10T06:44:17.057323
4063 / tcp
-1990350878 | 2025-04-19T05:25:07.156413
4150 / tcp
1911457608 | 2025-03-26T13:42:04.018503
4157 / tcp
585675468 | 2025-04-22T13:51:58.872458
4282 / tcp
-375604792 | 2025-04-15T18:12:14.345164
4321 / tcp
-1250504565 | 2025-04-10T03:38:09.003756
4369 / tcp
165188539 | 2025-04-24T00:20:01.150992
4433 / tcp
2087396567 | 2025-04-16T21:07:48.178230
4500 / tcp
937756010 | 2025-04-05T09:14:39.480314
4899 / tcp
398077695 | 2025-04-22T04:06:32.853929
5001 / tcp
-441419608 | 2025-04-08T09:41:46.404658
5006 / tcp
2087396567 | 2025-03-25T16:36:53.326070
5010 / tcp
819727972 | 2025-04-23T14:56:57.983301
5172 / tcp
-1013082686 | 2025-04-02T23:37:13.407427
5201 / tcp
-2089734047 | 2025-04-23T20:29:33.335331
5235 / tcp
-1399940268 | 2025-04-03T16:39:29.258490
5269 / tcp
756886313 | 2025-03-28T11:04:46.449518
5432 / tcp
-2096652808 | 2025-04-06T05:06:33.195517
5435 / tcp
-2089734047 | 2025-04-02T22:46:24.606638
5858 / tcp
1741579575 | 2025-04-08T20:38:33.985526
5938 / tcp
-2096652808 | 2025-04-24T12:06:31.291524
5986 / tcp
-1013082686 | 2025-04-04T15:00:59.864192
6001 / tcp
-1019343788 | 2025-04-08T12:59:13.464534
6379 / tcp
321971019 | 2025-04-16T02:37:38.092487
6561 / tcp
1948301213 | 2025-04-04T05:22:51.557061
6633 / tcp
639175818 | 2025-04-19T21:28:32.599158
6667 / tcp
539065883 | 2025-03-28T17:04:54.074618
6697 / tcp
1911457608 | 2025-04-07T09:30:56.804813
7415 / tcp
-1733106930 | 2025-04-21T16:09:47.339509
7434 / tcp
-971970408 | 2025-04-10T23:27:02.501811
7548 / tcp
2087396567 | 2025-03-28T23:23:41.400056
7634 / tcp
-971970408 | 2025-04-07T20:12:33.249593
8200 / tcp
1320285193 | 2025-03-29T22:28:45.916680
8333 / tcp
134472555 | 2025-04-09T12:29:40.058550
8505 / tcp
-1538260461 | 2025-04-17T00:11:26.103233
8545 / tcp
-971970408 | 2025-04-09T04:54:04.176696
8554 / tcp
1286504516 | 2025-04-22T00:51:48.679383
8575 / tcp
745343730 | 2025-04-05T06:06:06.597951
8598 / tcp
1911457608 | 2025-03-31T19:44:25.224033
8865 / tcp
-1399940268 | 2025-04-08T22:29:42.593042
8889 / tcp
2087396567 | 2025-04-20T16:07:28.105437
9002 / tcp
819727972 | 2025-04-17T16:17:10.914504
9042 / tcp
-1681927087 | 2025-04-17T04:06:44.834764
9063 / tcp
-2031152423 | 2025-04-12T19:08:50.565154
9160 / tcp
307999478 | 2025-03-25T18:39:39.622041
9184 / tcp
-1399940268 | 2025-04-18T21:58:44.388564
9203 / tcp
-1399940268 | 2025-04-09T23:21:38.915433
9209 / tcp
1830697416 | 2025-04-15T07:13:04.615304
9306 / tcp
819727972 | 2025-04-16T23:13:36.634672
9333 / tcp
-2096652808 | 2025-04-21T14:16:46.778645
9376 / tcp
307999478 | 2025-03-29T17:11:03.864377
9418 / tcp
1529351907 | 2025-04-21T03:10:08.211582
9633 / tcp
1741579575 | 2025-04-18T21:17:49.221110
9734 / tcp
-1099385124 | 2025-04-02T18:12:23.442395
9761 / tcp
-2089734047 | 2025-04-22T01:00:56.042052
9876 / tcp
-255236012 | 2025-04-17T02:34:36.182749
9943 / tcp
1712606111 | 2025-03-26T16:10:53.709863
9999 / tcp
1161309183 | 2025-04-05T11:53:15.227949
10051 / tcp
-653033013 | 2025-04-06T11:11:52.081489
10134 / tcp
1332894250 | 2025-04-21T03:59:12.831987
10250 / tcp
1741579575 | 2025-04-20T02:49:02.705386
10443 / tcp
0 | 2025-04-18T22:15:34.422582
10554 / tcp
2087396567 | 2025-04-17T15:53:29.269511
11000 / tcp
-980525298 | 2025-03-31T07:38:32.440049
11300 / tcp
1723769361 | 2025-04-12T08:12:38.648426
11481 / tcp
-1013082686 | 2025-04-12T20:31:33.628918
12164 / tcp
1911457608 | 2025-03-31T11:37:03.002803
12260 / tcp
321971019 | 2025-04-21T17:25:29.810933
12318 / tcp
-1399940268 | 2025-04-17T19:07:49.894004
12345 / tcp
296364507 | 2025-04-19T04:42:27.264396
12410 / tcp
819727972 | 2025-04-09T19:45:19.510845
12443 / tcp
-1399940268 | 2025-04-12T21:33:09.312053
12539 / tcp
921225407 | 2025-04-20T07:27:04.731940
14147 / tcp
-1327660293 | 2025-04-02T04:01:38.171798
14344 / tcp
-1737707071 | 2025-04-23T00:14:24.412701
17000 / tcp
-1810987450 | 2025-04-03T18:31:19.588803
18080 / tcp
1741579575 | 2025-03-29T01:56:34.180219
18245 / tcp
-2089734047 | 2025-04-15T05:32:28.639863
18443 / tcp
-222277909 | 2025-03-28T20:41:01.342035
18553 / tcp
-1810987450 | 2025-04-06T21:57:05.316164
19200 / tcp
-2031152423 | 2025-04-04T03:06:51.961849
20000 / tcp
1900503736 | 2025-03-28T20:44:31.086069
20087 / tcp
171352214 | 2025-04-13T00:54:49.671817
20547 / tcp
1975288991 | 2025-04-12T21:11:16.556284
21259 / tcp
-2096652808 | 2025-04-23T03:45:12.675529
21307 / tcp
-2096652808 | 2025-04-04T21:19:32.680669
21379 / tcp
-971970408 | 2025-04-03T11:48:26.177625
22067 / tcp
-1059554316 | 2025-03-27T17:48:11.420148
22222 / tcp
-358801646 | 2025-04-03T09:52:26.861836
22705 / tcp
-358801646 | 2025-04-20T08:34:48.226455
24245 / tcp
2103111368 | 2025-03-26T04:52:21.278699
25001 / tcp
-1399940268 | 2025-04-17T21:50:17.545530
25565 / tcp
-288825733 | 2025-04-12T15:41:43.735082
26656 / tcp
539065883 | 2025-03-29T00:03:21.868378
27015 / tcp
1850902677 | 2025-04-12T14:19:11.682056
27016 / tcp
171352214 | 2025-03-29T09:44:40.442849
27017 / tcp
422524323 | 2025-04-12T06:50:48.927310
27036 / tcp
2087396567 | 2025-04-03T02:07:23.692104
28015 / tcp
117101543 | 2025-04-09T15:11:00.357409
28017 / tcp
-79865617 | 2025-04-12T02:13:06.807366
30009 / tcp
401555314 | 2025-04-01T20:52:35.826380
30222 / tcp
-1032713145 | 2025-03-25T15:55:26.063304
30301 / tcp
1308377066 | 2025-04-09T06:44:26.594267
30303 / tcp
2087396567 | 2025-03-31T22:57:15.210172
30522 / tcp
1642597142 | 2025-04-06T05:30:29.208127
30722 / tcp
398077695 | 2025-04-05T05:26:36.434179
30922 / tcp
291723434 | 2025-04-05T23:05:32.204292
31022 / tcp
-2096652808 | 2025-04-05T17:38:15.439574
31222 / tcp
819727972 | 2025-04-05T08:50:12.852336
31622 / tcp
-1839934832 | 2025-04-04T15:06:42.114428
31722 / tcp
-1626979812 | 2025-04-04T23:51:36.400994
31822 / tcp
2087396567 | 2025-04-04T13:23:58.636981
31922 / tcp
410249975 | 2025-04-05T02:17:36.238928
32400 / tcp
-2096652808 | 2025-04-12T04:22:46.125689
32422 / tcp
104385780 | 2025-04-04T19:58:29.142415
32722 / tcp
-2096652808 | 2025-04-04T10:04:51.585391
32764 / tcp
-314039103 | 2025-04-18T11:30:21.764710
33338 / tcp
722711397 | 2025-04-02T18:08:07.528682
37777 / tcp
2087396567 | 2025-04-11T09:03:13.341033
38333 / tcp
-358801646 | 2025-04-07T14:21:03.491106
41794 / tcp
819727972 | 2025-04-11T11:47:56.130317
47808 / tcp
-2096652808 | 2025-03-31T10:46:32.715179
48899 / tcp
660175493 | 2025-04-11T06:41:18.828362
49152 / tcp
179092512 | 2025-03-31T20:22:07.380774
50000 / tcp
671605376 | 2025-04-11T01:31:35.048203
50050 / tcp
2087396567 | 2025-04-10T23:42:29.346584
50070 / tcp
1492413928 | 2025-04-10T15:48:43.163105
50100 / tcp
-2031152423 | 2025-04-24T00:40:46.972755
51106 / tcp
819727972 | 2025-03-29T20:27:28.469225
51235 / tcp
-1311598826 | 2025-04-01T20:10:17.297548
51443 / tcp
1975288991 | 2025-04-07T02:06:12.930703
52869 / tcp
-949565575 | 2025-04-10T14:26:53.534600
54444 / tcp
165188539 | 2025-04-07T23:29:33.157472
55350 / tcp
1189133115 | 2025-03-29T16:32:56.978055
55442 / tcp
-2096652808 | 2025-04-10T01:18:54.173527
55553 / tcp
1741579575 | 2025-04-10T03:03:43.581911
55554 / tcp
1282941221 | 2025-04-01T10:30:42.089568
60129 / tcp
472902042 | 2025-04-07T19:24:16.812678
61616 / tcp
1212921144 | 2025-04-07T21:44:14.423668
63257 / tcp
-1428621233 | 2025-04-06T22:12:39.715833
63260 / tcp
2033888749 | 2025-03-28T08:02:56.586959
64738 / tcp
2087396567 | 2025-04-09T21:49:49.608678

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2025(1)
CVE-2025-26465
6.8A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
2023(4)
CVE-2023-51767
7.0OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
CVE-2023-51385
6.5In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
CVE-2023-48795
5.9The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
CVE-2023-38408
9.8The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
2021(2)
CVE-2021-41617
7.0sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
CVE-2021-36368
3.7An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass, since nothing is being bypassed.
2020(2)
CVE-2020-15778
7.8scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
CVE-2020-14145
5.9The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
2019(3)
CVE-2019-6111
5.9An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
CVE-2019-6110
6.8In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
CVE-2019-6109
6.8An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
2018(3)
CVE-2018-20685
5.3In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
CVE-2018-15919
5.3Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
CVE-2018-15473
5.3OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
2017(1)
CVE-2017-15906
5.3The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
2016(1)
CVE-2016-20012
5.3OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
2008(1)
CVE-2008-3844
9.3Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
2007(1)
CVE-2007-2768
4.3OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.



Contact Us

Shodan ® - All rights reserved