2 /
tcp
-1399940268 | 2025-03-01T01:02:56.491901
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1839934832 | 2025-03-22T05:31:27.617209
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
1024374118 | 2025-03-05T23:42:56.311674
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
17 /
tcp
1852418385 | 2025-03-15T08:40:58.517047
RTSP/1.0 453 Not Enough Bandwidth
Server: AirTunes/7l_wZ
19 /
tcp
829384519 | 2025-03-20T18:50:02.022976
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefg
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUV
21 /
tcp
2116898107 | 2025-02-21T17:12:12.338951
26 /
tcp
-1327660293 | 2025-02-26T13:02:43.343588
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
43 /
tcp
-971970408 | 2025-02-27T08:01:24.719533
49 /
tcp
-801484042 | 2025-03-20T00:00:03.113257
53 /
tcp
-1665400173 | 2025-03-21T11:08:25.197184
9\n\\x81\\x05\\x00\\x01\\x00\\x00\\x00\\x00\\x00\\x00\\x08clients1\\x06google\\x03com\\x00\\x00\\x01\\x00\\x01\n\\x00\\x06\\x81\\x05\\x00\\x01\\x00\\x00\\x00\\x00\\x00\\x00\\x07version\\x04bind\\x00\\x00\\x10\\x00\\x03
-1763883228 | 2025-03-18T22:28:54.810807
HTTP/1.1 400 Bad Request
Server: vista/0.7
Content-Type: text/html
Connection: close
79 /
tcp
627290832 | 2025-03-13T10:36:44.463297
ÿû\x01SOYO_SIP VBNQyQSKc settings
Password:
-1881993452 | 2025-03-12T07:45:02.583581
HTTP/1.1 403 Forbidden
Server: AliyunOSS
Date: Wed, 12 Mar 2025 07:45:02 GMT
Content-Type: application/xml
Content-Length: 348
Connection: keep-alive
x-oss-request-id: 67D13B7EA50D77333875CDF9
x-oss-server-time: 0
x-oss-ec: 0003-00001201
90 /
tcp
-1139539254 | 2025-03-04T19:04:29.159742
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
92 /
tcp
-358801646 | 2025-03-17T17:06:52.113334
102 /
tcp
819727972 | 2025-02-22T17:36:51.316292
SSH-2.0-OpenSSH_7.4
Vulnerabilities
110 /
tcp
119860953 | 2025-03-18T22:24:52.052574
* OK ArGoSoft Mail Server IMAP Module v.YW at
111 /
tcp
897328069 | 2025-03-20T02:29:48.224175
220 mail.scott000.com ESMTP
113 /
tcp
455076604 | 2025-03-18T00:04:05.054524
!\x07version\x04bind7 t{RPowerDNS Recursor 410
141730637 | 2025-03-10T12:37:35.790895
HTTP/1.0 200 OK
Server: Proxy
143 /
tcp
219070077 | 2025-03-18T07:06:55.871072
154 /
tcp
1911457608 | 2025-03-19T17:13:35.519877
\x00[\x00\x00\x00\x00\x00\x00
179 /
tcp
-399606100 | 2025-02-22T07:32:11.678250
BGP Message\nType: 3\nMajor error Code: 6\nMinor error Code: 5\n
189 /
tcp
-1538260461 | 2025-02-28T03:51:52.651596
195 /
tcp
585675468 | 2025-02-22T21:33:40.592515
199 /
tcp
639175818 | 2025-03-11T06:21:09.221011
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
221 /
tcp
408230060 | 2025-03-06T09:58:46.023635
\r\nSorry, that nickname format is invalid.\r\n
234 /
tcp
-1888448627 | 2025-02-26T12:49:12.489647
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
264 /
tcp
1672388472 | 2025-03-12T01:07:31.415379
CheckPoint\nFirewall Host: ADAPCN156FW02\nSmartCenter Host: adluprdfwmgt01..zjz4qa\\x00\n
285 /
tcp
-1261090339 | 2025-03-22T02:36:41.431164
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
602337838 | 2025-03-07T10:39:55.672379
HTTP/1.1 404 Not Found
Accept-Ranges: bytes
389 /
tcp
-1639129386 | 2025-03-21T01:00:11.537885
0%\\x02\\x01\\x01a \n\\x010\\x04\\x00\\x04\\x19anonymous bind disallowed
427 /
tcp
1801635450 | 2025-03-14T13:55:29.908292
SAAdvert Response:\nVersion: 2\nFunction: SA Advertisement (11)\nURL: service:service-agent://127.0.0.1\nScopeList: default\nAttrributeList: \n\n\nserviceTypes:\nservice:ipmi\nservice:cdserver\nservice:fdserver\nservice:hdserver\nservice:adviser\nservice:lighttpd\nB://l:87/x\n\nResponse of service:ipmi SrvReq:\nVersion: 2\nFunction: Service Reply (2)\nErrorCode: SUCCESS (0)\nURL Entries:\n Lifetime: 65535\n URL: service:ipmi://(none):623\n Lifetime: 65535\n URL: service:ipmi://IEI9CC2C40E4251:623\n\n\nResponse of service:ipmi Attr
2126432487 | 2025-03-19T14:51:10.614824
HTTP/1.1 403 Forbidden
Server: AliyunOSS
Date: Wed, 19 Mar 2025 14:51:10 GMT
Content-Type: application/xml
Content-Length: 348
Connection: keep-alive
x-oss-request-id: 67DAD9DEC3CC07393554801D
x-oss-server-time: 0
x-oss-ec: 0003-00001201
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
1d:16:e8:0a:e2:57:df:7f:53:49:ff:48
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=BE, O=GlobalSign nv-sa, CN=GlobalSign GCC R3 OV TLS CA 2024
Validity
Not Before: Jan 13 06:51:17 2025 GMT
Not After : Feb 14 06:51:16 2026 GMT
Subject: C=CN, ST=ZheJiang, L=HangZhou, O=Alibaba (China) Technology Co., Ltd., CN=cn-shanghai.oss.aliyuncs.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:bf:7d:9f:c7:ea:61:cc:2c:13:11:ec:32:85:ed:
85:b4:ed:71:62:c4:49:9e:e3:47:d3:13:5f:8b:44:
fe:bc:e7:64:27:a1:54:16:be:cd:2d:a1:f2:ef:46:
a9:81:b3:08:5a:03:44:ce:08:0a:a6:d0:f0:31:10:
61:32:f0:db:2e:5a:75:1f:c4:76:1c:02:00:26:2c:
b9:5b:1e:ca:86:a2:19:29:0e:16:e0:57:f5:b3:3d:
3c:04:90:5d:cc:34:0b:cc:e0:f4:03:9a:b8:51:68:
88:d9:61:3f:6b:f9:ef:01:59:f1:4a:b8:ff:92:70:
ce:0a:40:22:bd:58:21:d9:dd:91:0d:5f:6e:96:4d:
f5:bd:cb:96:8a:7c:f4:ef:67:e0:5e:30:ba:dd:bf:
b5:82:7c:d6:12:b4:6d:b7:67:93:c6:89:a9:57:af:
89:3d:4e:5c:96:50:ee:69:fb:dd:c2:b0:0c:c3:dc:
b4:1b:a5:03:f6:68:85:d7:c4:78:96:39:78:93:0a:
79:96:79:91:59:60:cc:33:5f:f9:53:73:55:02:3b:
b2:e8:5d:e4:7b:b5:89:bc:17:1a:38:9f:02:1e:58:
96:e1:10:c1:1b:24:86:dd:be:c1:06:6b:e2:37:5e:
1c:a0:2f:6e:e5:90:5a:13:c3:81:80:39:ee:27:0e:
7e:83
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature, Key Encipherment
X509v3 Basic Constraints: critical
CA:FALSE
Authority Information Access:
CA Issuers - URI:http://secure.globalsign.com/cacert/gsgccr3ovtlsca2024.crt
OCSP - URI:http://ocsp.globalsign.com/gsgccr3ovtlsca2024
X509v3 Certificate Policies:
Policy: 2.23.140.1.2.2
Policy: 1.3.6.1.4.1.4146.10.1.2
CPS: https://www.globalsign.com/repository/
X509v3 CRL Distribution Points:
Full Name:
URI:http://crl.globalsign.com/gsgccr3ovtlsca2024.crl
X509v3 Subject Alternative Name:
DNS:cn-shanghai.oss.aliyuncs.com, DNS:*.oss-enet-cm.aliyuncs.com, DNS:*.oss-cn-shanghai-finance-1-pub.aliyuncs.com, DNS:*.oss-cache-cn-shanghai-g.aliyuncs.com, DNS:*.oss-internal.aliyuncs.com, DNS:*.cn-shanghai.oss.aliyuncs.com, DNS:*.img-cn-shanghai.aliyuncs.com, DNS:*.oss-accelerate.aliyuncs.com, DNS:*.oss-cn-shanghai-finance-1-pub-internal.aliyuncs.com, DNS:*.oss-accelerate-overseas.aliyuncs.com, DNS:*.aliyuncs.com, DNS:*.oss.aliyuncs.com, DNS:*.img-cn-shanghai-internal.aliyuncs.com, DNS:*.oss-cn-shanghai-finance-1-internal.aliyuncs.com, DNS:*.oss-enet.aliyuncs.com, DNS:*.oss-enet-cu.aliyuncs.com, DNS:*.img-cn-shanghai-cross.aliyuncs.com, DNS:*.oss-enet-ct.aliyuncs.com, DNS:*.oss-cn-shanghai.aliyuncs.com, DNS:*.oss-cn-shanghai-internal.aliyuncs.com, DNS:*.oss-cn-shanghai-cross.aliyuncs.com, DNS:*.oss-cn-shanghai-finance-1.aliyuncs.com, DNS:*.vpc100-oss-cn-shanghai.aliyuncs.com, DNS:*.cn-shanghai-finance.oss.aliyuncs.com, DNS:*.oss-cache-cn-shanghai-g-cross.aliyuncs.com, DNS:*.cn-shanghai-dualstack.oss.aliyuncs.com, DNS:*.oss-enet-cn-east.aliyuncs.com, DNS:*.cn-shanghai-vpc.oss.aliyuncs.com, DNS:*.oss-accesspoint.aliyuncs.com, DNS:*.oss-cn-shanghai.oss-accesspoint.aliyuncs.com, DNS:*.oss-cn-shanghai-internal.oss-accesspoint.aliyuncs.com, DNS:*.cn-shanghai.oss-console.aliyuncs.com, DNS:*.s3.oss-cn-shanghai.aliyuncs.com, DNS:*.s3.oss-cn-shanghai-internal.aliyuncs.com, DNS:*.cn-shanghai.mgw.aliyuncs.com, DNS:*.oss.cn-shanghai.privatelink.aliyuncs.com, DNS:*.oss-cn-shanghai.oss-object-process.aliyuncs.com, DNS:*.oss-cn-shanghai-internal.oss-object-process.aliyuncs.com, DNS:*.s3.oss-accelerate.aliyuncs.com, DNS:*.s3.oss-accelerate-overseas.aliyuncs.com, DNS:*.cn-shanghai-cross.mgw.aliyuncs.com, DNS:*.cn-shanghai.oss-vpc.aliyuncs.com, DNS:cn-shanghai.oss-vpc.aliyuncs.com
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Authority Key Identifier:
DA:D3:A8:08:48:0C:34:37:58:EE:E5:A7:75:2E:59:FC:D6:DC:3C:38
X509v3 Subject Key Identifier:
EE:74:11:C5:EF:61:1F:BA:AE:9F:F7:21:19:CC:8E:CC:7E:C2:0B:52
CT Precertificate SCTs:
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 64:11:C4:6C:A4:12:EC:A7:89:1C:A2:02:2E:00:BC:AB:
4F:28:07:D4:1E:35:27:AB:EA:FE:D5:03:C9:7D:CD:F0
Timestamp : Jan 13 06:51:20.015 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:20:3E:2A:2D:3E:EC:96:50:4C:1A:C6:CA:16:
E2:B2:23:0F:5A:A4:F0:25:CC:BE:40:E6:FC:A2:D4:1F:
DA:91:7B:D1:02:21:00:A9:FC:D1:2A:36:DA:EA:3F:D1:
8F:31:22:16:9A:53:F7:DE:20:13:A9:6F:9B:40:01:C8:
AC:A8:91:20:AF:F1:39
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 0E:57:94:BC:F3:AE:A9:3E:33:1B:2C:99:07:B3:F7:90:
DF:9B:C2:3D:71:32:25:DD:21:A9:25:AC:61:C5:4E:21
Timestamp : Jan 13 06:51:19.998 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:20:71:A9:20:F6:06:42:7E:ED:23:B2:18:F8:
9F:FE:65:22:DE:5B:E0:FB:08:05:CA:25:D4:79:B2:B9:
BC:19:C7:8F:02:21:00:DE:D6:26:7A:B8:02:3B:C4:D8:
9B:E9:A7:C7:CD:56:41:35:C0:6C:A1:1B:A0:B4:97:CF:
EE:54:F9:14:71:3F:16
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 25:2F:94:C2:2B:29:E9:6E:9F:41:1A:72:07:2B:69:5C:
5B:52:FF:97:A9:0D:25:40:BB:FC:DC:51:EC:4D:EE:0B
Timestamp : Jan 13 06:51:20.043 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:44:02:20:14:80:AD:94:B3:BE:7B:9B:D9:A0:00:65:
A3:4F:2A:E4:4A:3F:D3:BE:F7:19:7F:EC:55:F6:AD:8D:
8B:21:A4:0C:02:20:07:4B:0E:C5:7D:13:45:D9:55:DF:
D0:17:4B:F3:EE:23:A5:AF:E9:4E:AB:E5:24:4D:CC:EE:
11:28:2A:94:F7:16
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
9f:af:bd:6e:7a:8e:c5:23:81:66:8f:76:9c:d6:b8:af:6b:c3:
c6:de:56:de:6c:0b:61:93:0d:c3:04:24:ab:1c:f3:5b:71:b1:
96:78:b4:b6:e4:47:75:d2:76:4e:a6:26:c5:e5:b6:e0:c0:0e:
3b:89:de:0d:f6:47:7b:c8:b6:05:3d:94:b3:aa:15:3c:22:9c:
f6:0a:b9:9c:00:a2:00:7a:4b:c2:d0:6c:09:81:e4:c3:15:c4:
90:10:dd:fd:12:11:33:37:08:26:84:26:3a:8d:90:c1:95:8a:
03:49:22:73:d2:4a:38:60:ed:66:85:fb:37:42:0e:fe:33:95:
54:61:79:e1:35:ed:97:67:4d:2c:dc:5c:b2:52:6b:82:25:4c:
37:0c:ee:02:37:aa:dc:bd:82:09:57:47:0c:71:a8:42:11:d5:
e9:3e:32:d4:6c:3f:f3:8a:1f:ef:d5:46:15:00:66:ec:08:08:
a8:1f:3d:f2:15:c3:e2:7e:e7:61:e2:36:68:0c:d3:85:d9:93:
55:cf:7c:86:fc:4b:63:56:af:9b:0c:82:e5:c9:4d:b5:48:34:
d3:15:3f:d4:4f:98:cf:f1:72:73:6a:95:5d:60:e9:a9:e7:81:
75:9f:e0:6e:83:e6:71:46:ab:1c:bf:03:a8:c8:a5:a0:be:a4:
4c:9d:35:32
444 /
tcp
819727972 | 2025-02-24T14:57:28.005033
SSH-2.0-OpenSSH_7.4
Vulnerabilities
446 /
tcp
165188539 | 2025-02-21T10:52:29.063860
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
452 /
tcp
1911457608 | 2025-03-20T04:09:52.594840
\x00[\x00\x00\x00\x00\x00\x00
453 /
tcp
-2089734047 | 2025-02-22T00:44:08.179406
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
462 /
tcp
-1032713145 | 2025-03-17T22:39:33.548344
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
465 /
tcp
897328069 | 2025-03-13T17:57:05.610719
220 mail.scott000.com ESMTP
502 /
tcp
-1248408558 | 2025-03-22T06:53:51.714049
220 MikroTik FTP server (MikroTik 6.44.3) ready
515 /
tcp
-1399940268 | 2025-03-07T10:43:40.053755
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
541 /
tcp
-269727450 | 2025-03-17T09:07:54.337171
\\x16\\x03\\x01\\x01K\\x01\\x00\\x01G\\x03\\x03\\xa1\\xb0\\xcf\\xc9\\xc2X\\x037P\\xe0\\x8d\\xd7\\x1d_N\\x87&\\xa7U.^\\x19_K\\x13\\xed\\xe9L|\n\\xec\\x9e -\\xc23\\x1e\\x94\\xb3\\xe6|\x0c\\xaco|\\xe1\xc6\xa5V\\xd0\\x1d\\xf7Uf<\\xabgV=)\\xf2\\x86\\xc4\\x18\x0c\\x00"\\x13\\x02\\x13\\x03\\x13\\x01\\x00k\\x00=\\xc00\\xc0,\\xc
548 /
tcp
1445639302 | 2025-03-14T00:05:47.588791
Fast Copy: Yes\nExtended Sleep: Yes\nUUIDs: Yes\nUTF8 Server Name: Yes\nDirectory Services: Yes\nReconnect: No\nServer Notifications: Yes\nTCP/IP: Yes\nServer Signature: Yes\nServer Message: No\nPassword Saving Prohibited: No\nPassword Changing: No\nCopy File: Yes\nServer Name: DS218sikeer\nMachine Type: \\x0eNetatalk3.1.12\nAFP Versions: AFP2.2, AFPX03, AFP3.1, AFP3.2, AFP3.3, AFP3.4\nUAMs: Cleartxt Passwrd\\x04,DHX2\t,DHCAST128\\x00\nServer Signature: 00000000008002000180030002800280
554 /
tcp
285770450 | 2025-03-04T10:21:43.670715
RTSP/1.0 401 Unauthorized
CSeq: 1
593 /
tcp
1308377066 | 2025-03-21T04:07:35.265994
602 /
tcp
819727972 | 2025-03-12T21:00:20.307922
SSH-2.0-OpenSSH_7.4
Vulnerabilities
636 /
tcp
-1036370807 | 2025-03-20T01:27:48.562355
1300162323 | 2025-03-17T08:27:51.422922
HTTP/1.1 404 Not Found
Content-Type: text/plain; charset=utf-8
X-Content-Type-Options: nosniff
675 /
tcp
-1399940268 | 2025-03-20T08:19:11.559184
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1298735494 | 2025-03-16T18:10:20.635947
HTTP/1.1 200 OK
Server: openresty/1.11.2.4(dyss/1.3.2 Jul 17 2020 17:25:16)
Content-Type: text/plain
Connection: keep-alive
789 /
tcp
320677201 | 2025-03-06T17:27:58.898737
H\x00\x00\x00\xc3\xbfj\x04Host \'101.133.140.114\' is not allowed to \nconnect to this MySQL server
801 /
tcp
707919486 | 2025-03-13T19:39:24.057590
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
-1839934832 | 2025-03-15T15:21:16.043376
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
-1166978945 | 2025-03-18T14:17:40.338484
HTTP/1.1 407 Proxy Authentication Required
Server: Proxy
Proxy-Authenticate: Basic realm="CCProxy Authorization"
Connection: Close
Proxy-Connection: Close
873 /
tcp
-1970692834 | 2025-03-15T07:17:49.218244
@RSYNCD: 31.0\n@RSYNCD: EXIT\n
902 /
tcp
1956828827 | 2025-03-05T14:04:40.879498
220 VMware Authentication Daemon Version 1.10: SSL Required, Se
rverDaemonProtocol:SOAP, MKSDisplayProtocol:VNC , , NFCSSL supported/t
953 /
tcp
-2089734047 | 2025-03-21T18:58:20.840450
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
-1718295362 | 2025-03-16T09:59:44.006355
HTTP/1.1 400 Bad Request
Content-Type: text/plain; charset=utf-8
993 /
tcp
819727972 | 2025-03-22T22:46:27.966296
SSH-2.0-OpenSSH_7.4
Vulnerabilities
995 /
tcp
-1199842642 | 2025-03-15T09:22:32.236183
+OK Welcome to RaidenMAILD POP3 SSL service v4902, Mon, 22 Jan 2024 14:24:46 +0800, (C)2001-2023 <1044592421@raidenmaild>\r\n
1025 /
tcp
-1329831334 | 2025-02-21T20:45:51.153503
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
1080 /
tcp
1362344524 | 2025-03-17T22:15:46.633311
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.7
1099 /
tcp
-1399940268 | 2025-03-22T11:12:35.707623
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1153 /
tcp
307999478 | 2025-03-04T06:40:46.779053
unknown command \r\nunknown command \r\n
1200 /
tcp
178736976 | 2025-03-11T23:43:54.385899
1292 /
tcp
320677201 | 2025-03-06T18:58:42.227914
H\x00\x00\x00\xc3\xbfj\x04Host \'101.133.140.114\' is not allowed to \nconnect to this MySQL server
1337 /
tcp
1690634669 | 2025-02-23T18:02:21.958998
1366 /
tcp
1911457608 | 2025-03-13T15:37:45.772044
\x00[\x00\x00\x00\x00\x00\x00
0 | 2025-03-10T02:03:06.135880
HTTP/1.1 408 Request Timeout
content-length: 0
1414 /
tcp
-2096652808 | 2025-03-06T06:02:59.938799
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
1433 /
tcp
-325802316 | 2025-03-11T11:25:00.285348
MSSQL Server\nVersion: 134219767 (0x80007f7)\nSub-Build: 0\nEncryption:Not available\n\nMSSQL NTLM Info:\nTarget_Name: PC-20150816MQOM\nProduct_Version: 6.1.7601 Ntlm 15\nOS: Windows 7, Service Pack 1/Windows Server 2008 R2, Service Pack 1\nNetBIOS_Domain_Name: PC-20150816MQOM\nNetBIOS_Computer_Name: PC-20150816MQOM\nDNS_Domain_Name: PC-20150816MQOM\nDNS_Computer_Name: PC-20150816MQOM\nMsvAvFlags: 01000000\nSystem_Time: 2024-01-22 04:03:26 +0000 UTC\n\n
1444 /
tcp
1911457608 | 2025-03-16T16:11:56.672271
\x00[\x00\x00\x00\x00\x00\x00
1451 /
tcp
205347087 | 2025-03-06T07:49:35.281249
SSH-25453-Cisco-3524665.35\n
1459 /
tcp
1911457608 | 2025-03-01T00:09:44.437476
\x00[\x00\x00\x00\x00\x00\x00
1494 /
tcp
-42767839 | 2025-03-17T17:34:48.584754
RFB 005.000
VNC:
Protocol Version: 5.0
1515 /
tcp
1842524259 | 2025-03-16T10:01:08.632303
1521 /
tcp
1975288991 | 2025-03-19T05:00:40.251417
1599 /
tcp
-971970408 | 2025-03-17T04:35:34.070116
1604 /
tcp
1267517148 | 2025-02-25T17:52:26.203498
=Àÿÿ?"<ZDECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6
1723 /
tcp
-1608241410 | 2025-03-21T22:36:42.297328
Firmware: 1\nHostname: local\nVendor: linux\n
1800 /
tcp
15018106 | 2025-03-21T09:55:37.102000
\x00\x19\x02\x00\x02\x00\x07\x00Protocol version mismatch\x00
-912640263 | 2025-03-16T06:55:21.453151
HTTP/1.1 200 OK\r\ncontent-type: application/json; charset=UTF-8\r\ncontent-encoding: gzip\r\ncontent-length: 171\r\n\r\n\x1f?\x08\x00???b\x02?u?;\x0e?0\x10D{??\x1a,?\x18\x12s\x02?4(U@\x14Q?"V,??G\x10\x10wg\x03??n?=?hO\x0f2@g?@vd\x02c\xdc\x95,IL]?\x11??`?k????3z?v\x15TD??V\xc8\x8e\x00{V\x07?6??LRl?\xd0\x8e\x07?>h?\x05?\x00????#?]?\t\x01\x17\x05\x17e?\x7fB??\x04?({??\x02\xd0
1926 /
tcp
-641479109 | 2025-03-05T12:15:58.500496
1962 /
tcp
1911457608 | 2025-03-19T17:13:56.412267
\x00[\x00\x00\x00\x00\x00\x00
1964 /
tcp
819727972 | 2025-03-09T05:20:21.246230
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1967 /
tcp
-1399940268 | 2025-03-16T07:42:07.234609
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1987 /
tcp
1620329124 | 2025-03-01T00:14:12.422463
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\x01\xc3\xbf\xc3\xbb\x03\xc3\xbf\xc3\xbd\x01\xc3\xbf\xc3\xbe\x01Username:
2000 /
tcp
-891714208 | 2025-03-15T15:14:37.467665
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
2001 /
tcp
-2096652808 | 2025-03-04T16:49:00.988409
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
2002 /
tcp
-1609150592 | 2025-03-18T06:04:36.564381
2003 /
tcp
-1399940268 | 2025-03-13T23:56:21.350505
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2008 /
tcp
2087396567 | 2025-03-21T12:40:11.741930
kjnkjabhbanc283ubcsbhdc72
2048 /
tcp
1623746877 | 2025-02-21T22:06:16.020053
500 Permission denied - closing connection.\r\n
2050 /
tcp
1623746877 | 2025-02-25T16:38:13.429477
500 Permission denied - closing connection.\r\n
1077013874 | 2025-03-04T13:34:59.951406
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
2052 /
tcp
-2017887953 | 2025-02-27T18:42:36.811284
SSH-2.0-OpenSSH_7.9
Vulnerabilities
2060 /
tcp
-1032713145 | 2025-03-09T23:46:07.305555
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
2062 /
tcp
-1329831334 | 2025-03-04T14:30:19.074277
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
2067 /
tcp
-1996280214 | 2025-02-26T21:31:26.387672
2081 /
tcp
-1737707071 | 2025-03-13T21:19:12.697657
\x00b\x00\x01\x00\x00\x00\x00x\x0b\x00\x00\x00\x00z\x00437
-1839934832 | 2025-03-19T19:28:29.991557
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
2087 /
tcp
1690634669 | 2025-03-13T15:03:21.521840
2090 /
tcp
-1888448627 | 2025-03-13T18:04:29.936357
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
372433470 | 2025-03-22T17:26:46.298510
HTTP/1.1 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm=""
2126 /
tcp
1224463279 | 2025-03-12T21:02:34.804398
\\x10\\x06\\x80\\x08\\x00\\x00\\x00\\x1c\\x00\\x14\x0b\\x01EJ0_CBR8_001\\x00\\x00\\x00\\x00
2150 /
tcp
-1399940268 | 2025-03-20T17:07:36.334464
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2154 /
tcp
1690634669 | 2025-03-21T01:29:44.769563
2156 /
tcp
1996932384 | 2025-03-22T07:10:00.785459
2181 /
tcp
546151771 | 2025-03-06T17:01:55.437551
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC
Clients:
/*.*.*.*:11264[0](queued=0,recved=1,sent=0)
Latency min/avg/max: 0/0.0/0
Received: 8557
Sent: 11410
Connections: 1
Outstanding: 0
Zxid: 0x332907ad3391
Mode: follower
Node count: 104618
-1230049476 | 2025-02-27T03:26:37.465564
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
2211 /
tcp
-1399940268 | 2025-03-18T14:55:03.650157
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
372433470 | 2025-03-14T10:08:37.888039
HTTP/1.1 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm=""
2271 /
tcp
-1399940268 | 2025-03-12T02:11:52.318418
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2327 /
tcp
819727972 | 2025-03-21T15:47:29.992461
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2332 /
tcp
1887224352 | 2025-02-22T21:51:31.942729
2345 /
tcp
-1399940268 | 2025-02-23T18:44:57.052287
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2362 /
tcp
1308377066 | 2025-03-19T03:49:39.303119
2363 /
tcp
-1399940268 | 2025-03-12T22:58:55.544108
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2404 /
tcp
-2089734047 | 2025-03-17T15:44:01.748401
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
2455 /
tcp
2087396567 | 2025-02-21T12:58:17.611980
kjnkjabhbanc283ubcsbhdc72
2560 /
tcp
1189133115 | 2025-02-21T20:14:02.114812
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
2628 /
tcp
-222277909 | 2025-02-21T05:33:26.838355
2709 /
tcp
321971019 | 2025-03-17T21:21:27.259404
-ERR client ip is not in whitelist\r
2761 /
tcp
-1996280214 | 2025-03-16T16:26:38.473602
2762 /
tcp
-1059554316 | 2025-03-18T09:11:01.325252
\xc2\xa5A\x00\x01\x00\x00\x00,\x00\x00\x00\x02\x00\x00\x00L\x00\x00\x00\x08Connect\x00\x00\x00\x00x\x00\x00\x00\x0857222\x00\x00\x00
3001 /
tcp
2087396567 | 2025-03-17T20:44:03.443475
kjnkjabhbanc283ubcsbhdc72
3002 /
tcp
1911457608 | 2025-02-21T09:36:46.867685
\x00[\x00\x00\x00\x00\x00\x00
3005 /
tcp
-2130839571 | 2025-03-07T12:16:02.271117
SSH-2.0-OpenSSH_8.9p1 Ubuntu-3\n
3010 /
tcp
819727972 | 2025-03-11T19:45:06.413380
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3012 /
tcp
819727972 | 2025-03-14T22:30:18.715876
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1568680103 | 2025-02-24T06:32:20.822908
HTTP/1.1 301 Moved Permanently
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3014 /
tcp
307999478 | 2025-03-22T18:43:34.697417
unknown command \r\nunknown command \r\n
3047 /
tcp
-1399940268 | 2025-03-13T10:09:58.636287
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3075 /
tcp
-1888448627 | 2025-03-22T19:42:15.623650
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
198844676 | 2025-03-13T22:52:21.009823
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3088 /
tcp
307999478 | 2025-03-17T02:50:03.062081
unknown command \r\nunknown command \r\n
3108 /
tcp
1911457608 | 2025-03-04T06:38:12.457700
\x00[\x00\x00\x00\x00\x00\x00
3117 /
tcp
-1399940268 | 2025-03-15T21:38:21.151560
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3119 /
tcp
-1888448627 | 2025-03-11T16:08:56.414131
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
3120 /
tcp
-445721795 | 2025-03-21T20:49:59.980289
\x00[\xc3\xaed\x1a\x7f\x00\x00
3137 /
tcp
-2089734047 | 2025-03-16T21:46:43.872636
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3139 /
tcp
45131230 | 2025-03-13T08:13:21.367515
inv2W\x04\x0f\x00\x00\x00\x01\x00\t\x00\x00\x00
3143 /
tcp
819727972 | 2025-03-07T17:51:12.776463
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3144 /
tcp
1911457608 | 2025-03-11T12:49:32.183532
\x00[\x00\x00\x00\x00\x00\x00
3148 /
tcp
-1399940268 | 2025-02-26T01:12:37.330789
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3152 /
tcp
401555314 | 2025-03-17T13:54:47.340182
3156 /
tcp
945910976 | 2025-03-15T23:14:06.968660
* OK TeamXchange IMAP4rev1 server (otyUg) ready.\r\n
3186 /
tcp
-1399940268 | 2025-03-22T01:53:35.871706
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3190 /
tcp
-441419608 | 2025-02-25T08:14:45.905045
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
3192 /
tcp
921225407 | 2025-03-20T05:57:26.851648
\x00\x00\x00\x04\x00\x00\x00\x00\x00
3256 /
tcp
1353260875 | 2025-03-14T16:39:01.771806
\x00[g\xc2\x95N\x7f\x00\x00
-1341662640 | 2025-03-17T18:24:21.485962
HTTP/1.1 301 Moved Permanently
Server: Zope/(2.13.23, python 1.7.18, linux2) ZServer/1.1
Content-Type: text/plain; charset=utf-8
Connection: close
-1547976805 | 2025-03-21T17:01:57.184393
HTTP/1.1 403 Forbidden
Server: nginx
Content-Type: text/html
Connection: close
3269 /
tcp
-1428621233 | 2025-03-15T21:04:25.740081
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
3299 /
tcp
-314039103 | 2025-03-19T17:02:15.791713
Surnom.
Sorry, that nickname format is invalid.
3306 /
tcp
-1230509234 | 2025-02-21T18:05:15.231412
J\\x00\\x00\\x00\\xffj\\x04Host \'*.*.*.*\' is not allowed to connect to this MariaDB server
3349 /
tcp
-1810987450 | 2025-03-22T06:48:07.447960
3388 /
tcp
-1399940268 | 2025-03-06T20:23:38.744161
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1227409554 | 2025-03-10T07:08:15.041714
HTTP/1.1 500 Internal Server Error
Server: Zope/(2.13.23, python 1.7.18, linux2) ZServer/1.1
Content-Type: text/plain; charset=utf-8
Connection: close
3406 /
tcp
1911457608 | 2025-03-13T12:51:43.113676
\x00[\x00\x00\x00\x00\x00\x00
3479 /
tcp
1504401647 | 2025-03-04T14:05:30.491039
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
3522 /
tcp
165188539 | 2025-03-18T03:23:38.627328
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
3531 /
tcp
103159425 | 2025-03-11T15:07:02.795408
198844676 | 2025-03-14T06:02:50.484343
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3552 /
tcp
-1399940268 | 2025-02-21T10:35:22.118967
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3566 /
tcp
321971019 | 2025-03-06T16:57:15.525142
-ERR client ip is not in whitelist\r
-1227409554 | 2025-02-22T01:09:59.823230
HTTP/1.1 500 Internal Server Error
Server: Zope/(2.13.23, python 1.7.18, linux2) ZServer/1.1
Content-Type: text/plain; charset=utf-8
Connection: close
3790 /
tcp
-1559123399 | 2025-03-05T09:08:41.173833
500 Permission denied - closing connection.
3951 /
tcp
89142341 | 2025-03-07T12:09:28.855346
\x05\x00\x00\x00\x0b\x08\x05\x1a\x00
4000 /
tcp
-1148803158 | 2025-03-15T18:22:25.277982
Mysql Version: 8.0.34 \r\nJ\\x00\\x00\\x00\n8.0.34\\x009L\\x01\\x00NJSz;\\x01\\x19y\\x00\\xff\\xff!\\x02\\x00\\xff\\xdf\\x15\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00k\\x13VT\\x10\\x14YfV~^z\\x00caching_sha2_password\\x00
4022 /
tcp
1991883981 | 2025-03-18T11:28:36.340877
B\x00\x00\x00\xc3\xbfn\x04Too many connections
4063 /
tcp
539065883 | 2025-03-11T10:52:36.279952
4064 /
tcp
410249975 | 2025-03-13T03:03:49.169066
4104 /
tcp
-1399940268 | 2025-03-13T12:08:05.475776
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4150 /
tcp
-1888448627 | 2025-03-14T04:26:11.918059
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
4157 /
tcp
1850902677 | 2025-03-15T17:14:22.670623
-1879056922 | 2025-02-21T15:59:09.465662
HTTP/1.1 403 Forbidden
Server: Apache/2.4.41 (Unix) OpenSSL/1.1.1d TST PHP/7.3.11
Content-Type: text/plain; charset=utf-8
Connection: close
4282 /
tcp
1321679546 | 2025-03-19T13:22:55.806632
4321 /
tcp
-269926141 | 2025-03-12T16:18:39.606673
\\x00\\x00\\x12\\x04\\x00\\x00\\x00\\x00\\x00\\x00\\x03\\x00\\x00\\x00\\x80\\x00\\x04\\x00\\x01\\x00\\x00\\x00\\x05\\x00\\xff\\xff\\xff\\x00\\x00\\x04\\x08\\x00\\x00\\x00\\x00\\x00\\x7f\\xff\\x00\\x00\\x00\\x00\\x08\\x07\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x01
4433 /
tcp
660175493 | 2025-02-25T20:53:16.409321
4434 /
tcp
171352214 | 2025-03-09T09:23:49.863328
-ERR client ip is not in whitelist
4436 /
tcp
-1399940268 | 2025-03-17T13:12:38.323710
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4438 /
tcp
921225407 | 2025-03-15T16:36:22.238570
\x00\x00\x00\x04\x00\x00\x00\x00\x00
-1060562267 | 2025-03-15T02:27:02.919999
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae29b6_PS-NKG-01Aqo82_2892-58968
4444 /
tcp
-303199180 | 2025-03-19T09:45:14.137828
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
4477 /
tcp
-1327660293 | 2025-03-16T20:06:36.126380
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
4499 /
tcp
-2089734047 | 2025-03-05T17:48:39.209157
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
4500 /
tcp
380146262 | 2025-03-19T02:46:10.336153
4506 /
tcp
2087396567 | 2025-03-09T21:28:00.203296
kjnkjabhbanc283ubcsbhdc72
4520 /
tcp
-407828767 | 2025-03-15T01:30:48.720073
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
4700 /
tcp
307999478 | 2025-02-24T14:55:14.223896
unknown command \r\nunknown command \r\n
4734 /
tcp
819727972 | 2025-03-10T16:57:29.080878
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4911 /
tcp
-1699556818 | 2025-02-28T19:49:38.420466
\x01remshd: Kerberos Authentication not enabled.\n
5001 /
tcp
-1810987450 | 2025-03-20T01:59:26.227053
5007 /
tcp
307999478 | 2025-02-23T17:39:56.086287
unknown command \r\nunknown command \r\n
5010 /
tcp
-1189269828 | 2025-03-14T09:39:07.741431
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
5025 /
tcp
171352214 | 2025-03-06T06:21:12.447425
-ERR client ip is not in whitelist
5053 /
tcp
1911457608 | 2025-03-10T01:50:34.204951
\x00[\x00\x00\x00\x00\x00\x00
5061 /
tcp
321971019 | 2025-03-12T02:08:42.959115
-ERR client ip is not in whitelist\r
-1839934832 | 2025-03-06T06:08:39.349098
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
1830697416 | 2025-03-13T06:28:39.949927
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
5140 /
tcp
-1399940268 | 2025-03-06T14:53:58.522377
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5201 /
tcp
-1648456501 | 2025-03-22T01:39:38.765605
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
5222 /
tcp
1778988322 | 2025-03-04T00:23:34.359255
* OK GroupWise IMAP4rev1 Server Ready
5229 /
tcp
321971019 | 2025-03-05T02:24:38.466380
-ERR client ip is not in whitelist\r
5230 /
tcp
-2017887953 | 2025-03-05T04:54:40.758535
SSH-2.0-OpenSSH_7.9
Vulnerabilities
5240 /
tcp
1426971893 | 2025-03-22T15:31:23.198752
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
5259 /
tcp
493955023 | 2025-03-19T21:03:15.676011
\x00\x00\x0c\x04\x00\x00\x00\x00\x00\x00\x04\x00\x10\x00\x00\x00\n0\x05\x00\x00@\x00
1743272246 | 2025-02-21T20:33:37.533804
HTTP/1.1 400 Bad Request
Server: CWAP-waf
Content-Type: text/html
Connection: close
WZWS-RAY: 1249-1705940324.547-w-waf01nbzt
5271 /
tcp
-1888448627 | 2025-03-16T01:30:18.587882
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
5432 /
tcp
-2096652808 | 2025-02-25T09:16:24.071153
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
5435 /
tcp
-653033013 | 2025-02-25T18:33:53.920985
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
5503 /
tcp
677934968 | 2025-02-24T16:27:01.468499
5592 /
tcp
-1032713145 | 2025-03-19T17:45:10.941981
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
5593 /
tcp
-1795027372 | 2025-03-09T09:19:29.095355
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
5602 /
tcp
819727972 | 2025-03-14T00:12:34.539501
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1230049476 | 2025-03-06T08:23:14.591269
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
5672 /
tcp
575925250 | 2025-03-12T09:52:21.027744
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
5721 /
tcp
-616720387 | 2025-03-14T06:24:33.254936
5858 /
tcp
1463575827 | 2025-03-19T20:32:23.128139
5902 /
tcp
-1730858130 | 2025-03-10T23:01:59.882407
RFB 003.008
VNC:
Protocol Version: 3.8
5917 /
tcp
-1428621233 | 2025-02-22T21:08:17.414358
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
5938 /
tcp
-2089734047 | 2025-03-05T23:34:24.559627
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
5993 /
tcp
-992671574 | 2025-02-25T19:46:51.948282
5994 /
tcp
-1746074029 | 2025-03-21T08:36:38.417240
5995 /
tcp
-992671574 | 2025-03-19T09:37:59.967982
6000 /
tcp
-438503381 | 2025-03-10T21:51:27.662131
WORLD OF WARCRAFT CONNECTION - SERVER TO CLIENT - V2
6001 /
tcp
-1835475271 | 2025-03-07T06:55:15.042386
200 NOD32SS 99 (3318497116)\r\n
6002 /
tcp
-454087041 | 2025-03-10T22:57:58.755518
\x1e\xc3\x80\x010\x02\x00\xc2\xa8\xc3\xa3\x00\x00\x00\x00
6011 /
tcp
1911457608 | 2025-02-28T15:46:18.056487
\x00[\x00\x00\x00\x00\x00\x00
6050 /
tcp
1911457608 | 2025-03-07T10:35:05.490639
\x00[\x00\x00\x00\x00\x00\x00
-1839934832 | 2025-02-26T23:53:38.712215
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
6379 /
tcp
321971019 | 2025-03-15T22:55:27.309732
-ERR client ip is not in whitelist\r
6443 /
tcp
1542849631 | 2025-02-21T15:18:19.221716
* OK [CAPABILITY a2,M\] nBwXk2pPP IMAP4rev1 20qx at
6488 /
tcp
-1399940268 | 2025-03-22T22:30:11.200892
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6503 /
tcp
-616720387 | 2025-03-17T00:08:19.425641
6514 /
tcp
921225407 | 2025-03-19T11:20:38.177955
\x00\x00\x00\x04\x00\x00\x00\x00\x00
6544 /
tcp
165188539 | 2025-03-20T07:08:42.395827
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
6560 /
tcp
-1399940268 | 2025-02-21T19:01:20.217167
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6603 /
tcp
1911457608 | 2025-02-21T00:28:48.902370
\x00[\x00\x00\x00\x00\x00\x00
6653 /
tcp
-2096652808 | 2025-03-22T03:59:43.488765
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
372433470 | 2025-03-19T16:32:18.329482
HTTP/1.1 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm=""
6667 /
tcp
-971970408 | 2025-03-13T09:46:56.119099
6668 /
tcp
-1399940268 | 2025-02-27T22:41:30.777765
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6688 /
tcp
-2089734047 | 2025-03-20T22:05:58.440501
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1770729856 | 2025-02-24T18:28:46.365050
HTTP/1.1 200 OK
Server: thttpd/2.24 26oct2003
Content-Type: text/html; charset=iso-8859-1
Accept-Ranges: bytes
Connection: close
-579195550 | 2025-02-25T03:27:39.524884
HTTP/1.1 407 Proxy Authentication Required
Content-Type: text/plain; charset=utf-8
Proxy-Authenticate: Basic realm="proxy"
265065882 | 2025-03-21T17:23:44.781760
HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
7011 /
tcp
-1399940268 | 2025-03-18T18:36:17.586064
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7057 /
tcp
-303199180 | 2025-03-06T00:39:14.071289
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
7079 /
tcp
819727972 | 2025-03-19T10:21:43.932602
SSH-2.0-OpenSSH_7.4
Vulnerabilities
7085 /
tcp
819727972 | 2025-03-06T23:03:24.907502
SSH-2.0-OpenSSH_7.4
Vulnerabilities
7171 /
tcp
819727972 | 2025-03-19T03:04:03.285556
SSH-2.0-OpenSSH_7.4
Vulnerabilities
7373 /
tcp
1911457608 | 2025-03-07T08:03:46.733127
\x00[\x00\x00\x00\x00\x00\x00
-1839934832 | 2025-03-16T03:23:03.253355
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
7434 /
tcp
1948301213 | 2025-03-12T17:19:52.603892
RFB 003.003
VNC:
Protocol Version: 3.3
1320285193 | 2025-03-05T10:52:47.047121
HTTP/1.1 404 Not Found
Server: CloudWAF
Content-Type: text/html
Connection: keep-alive
1077013874 | 2025-02-26T21:23:48.412124
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
7548 /
tcp
863754335 | 2025-03-13T09:26:14.535467
7603 /
tcp
-1648456501 | 2025-02-26T20:01:12.854124
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
7634 /
tcp
1824169301 | 2025-03-20T02:39:54.792395
HÿjHost '101.133.140.114' is not allowed to
connect to this MySQL server
1391945995 | 2025-03-15T05:32:09.023446
HTTP/1.1 403 Forbidden
Content-Type: text/plain; charset=utf-8
Proxy-Authenticate: Basic realm=""
7799 /
tcp
-2096652808 | 2025-03-14T21:09:26.188720
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
7887 /
tcp
-1986594217 | 2025-02-23T06:03:01.004224
"AP0F1D85"\r\nConnection: close\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD>\n<BODY BGCOLOR
7980 /
tcp
921225407 | 2025-02-24T17:05:09.235882
\x00\x00\x00\x04\x00\x00\x00\x00\x00
8000 /
tcp
-1036370807 | 2025-03-16T03:11:24.838950
2103111368 | 2025-03-16T15:52:46.957524
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
8005 /
tcp
-1399940268 | 2025-03-21T11:21:00.964302
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8009 /
tcp
1363464823 | 2025-03-18T01:36:36.334756
8012 /
tcp
-1399940268 | 2025-03-03T20:19:30.343617
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8016 /
tcp
-1888448627 | 2025-03-14T19:46:37.854828
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8022 /
tcp
819727972 | 2025-03-06T02:22:39.359788
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8025 /
tcp
-1888448627 | 2025-03-15T05:41:27.267270
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8027 /
tcp
1911457608 | 2025-03-04T08:30:42.954668
\x00[\x00\x00\x00\x00\x00\x00
8029 /
tcp
-2096652808 | 2025-03-22T00:37:24.373890
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
1328303401 | 2025-03-15T18:00:13.007359
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 657cf4ca_jindianxin102_11881-50977
8035 /
tcp
1911457608 | 2025-02-22T15:01:22.685194
\x00[\x00\x00\x00\x00\x00\x00
8041 /
tcp
671605376 | 2025-02-25T06:49:49.698779
8066 /
tcp
1332894250 | 2025-03-05T15:19:43.019247
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
8083 /
tcp
-1114821551 | 2025-03-22T23:36:13.980573
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
8085 /
tcp
-971970408 | 2025-03-18T12:32:36.337473
8089 /
tcp
707919486 | 2025-03-22T09:37:26.120610
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
-1013082686 | 2025-03-18T20:29:38.066224
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
8097 /
tcp
-1399940268 | 2025-03-19T20:47:26.510442
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8100 /
tcp
-891714208 | 2025-02-23T02:16:55.556424
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
8103 /
tcp
740837454 | 2025-03-11T13:14:05.729623
SSH-2.0-OpenSSH_5.3
Vulnerabilities
8106 /
tcp
-1399940268 | 2025-03-15T16:39:46.257112
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8118 /
tcp
408230060 | 2025-02-28T04:18:39.016427
\r\nSorry, that nickname format is invalid.\r\n
8126 /
tcp
-1142844482 | 2025-03-19T11:18:37.454807
ÿûSOYO_SIP VBNQyQSKc settings
Password:
8133 /
tcp
709622286 | 2025-03-04T15:14:33.405201
OK Welcome <299685> on DirectUpdate server 7286\r\n
8155 /
tcp
1911457608 | 2025-03-04T03:55:44.326005
\x00[\x00\x00\x00\x00\x00\x00
8157 /
tcp
-1189269828 | 2025-03-14T20:47:14.940729
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8161 /
tcp
-1032713145 | 2025-03-16T06:22:12.378198
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
8163 /
tcp
1911457608 | 2025-02-28T15:13:49.831885
\x00[\x00\x00\x00\x00\x00\x00
8174 /
tcp
-1099385124 | 2025-02-27T06:55:45.985442
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
8178 /
tcp
632542934 | 2025-02-21T15:27:44.782517
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
1593236539 | 2025-02-25T21:19:24.364960
HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=UTF-8
8291 /
tcp
1632932802 | 2025-03-15T08:35:46.456001
-734440417 | 2025-02-24T21:54:43.190016
HTTP/1.1 400 Bad Request
Content-Type: text/html
Connection: close
Server: nginx/1.17.3
8316 /
tcp
-2096652808 | 2025-03-22T16:16:24.964465
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
1335782347 | 2025-03-19T12:22:14.309674
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
WZWS-RAY: 1249-1705940700.09-waf02bjtp3
8415 /
tcp
-747911285 | 2025-03-14T23:04:27.693111
8419 /
tcp
-1399940268 | 2025-03-22T22:18:49.867013
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8422 /
tcp
-1399940268 | 2025-02-28T08:37:01.053768
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8440 /
tcp
165188539 | 2025-03-11T04:38:13.313867
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8442 /
tcp
165188539 | 2025-02-26T05:41:54.902041
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
1096654864 | 2025-03-17T03:37:49.170905
HTTP/1.0 200 OK
Server: httpd/2.0
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
Content-Type: text/html
Connection: close
8448 /
tcp
1308377066 | 2025-03-12T20:38:22.539004
8451 /
tcp
-891714208 | 2025-03-21T16:09:47.713129
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
8458 /
tcp
-1795027372 | 2025-03-21T10:38:35.182699
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
8460 /
tcp
1126993057 | 2025-03-01T01:24:01.154756
* OK [CAPABILITY a2,M\\] nBwXk2pPP IMAP4rev1 20qx at
8470 /
tcp
-891714208 | 2025-03-07T09:02:44.481912
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
8500 /
tcp
1662811133 | 2025-03-12T11:39:43.548434
MudNames 77 - (C) 1997-2001 Ragnar Hojland Espinosa <ragnar@ragnar-hojland.com>
8510 /
tcp
-1888448627 | 2025-02-26T00:20:59.023242
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8531 /
tcp
1911457608 | 2025-02-26T17:28:29.088703
\x00[\x00\x00\x00\x00\x00\x00
8545 /
tcp
1011407350 | 2025-03-07T05:30:25.675063
* OK GroupWise IMAP4rev1 Server Ready\r\n
8554 /
tcp
660175493 | 2025-02-21T17:43:39.362858
8563 /
tcp
819727972 | 2025-02-27T20:55:51.189106
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8564 /
tcp
117101543 | 2025-03-06T20:08:56.979889
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
8573 /
tcp
-1399940268 | 2025-03-10T17:45:33.850455
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8575 /
tcp
1911457608 | 2025-03-20T16:21:57.901912
\x00[\x00\x00\x00\x00\x00\x00
8576 /
tcp
-1730858130 | 2025-03-15T03:28:36.900126
RFB 003.008
VNC:
Protocol Version: 3.8
8577 /
tcp
-407828767 | 2025-03-20T22:30:06.167408
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
8582 /
tcp
-1399940268 | 2025-03-10T11:24:42.043020
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8622 /
tcp
-1810987450 | 2025-03-04T09:26:53.059604
1489954473 | 2025-03-20T02:17:49.119880
HTTP/1.1 410 Gone
Server: openresty
Transfer-Encoding: chunked
Connection: keep-alive
Via: 1.1 google
8702 /
tcp
740837454 | 2025-03-08T16:48:43.509362
SSH-2.0-OpenSSH_5.3
Vulnerabilities
8707 /
tcp
-1888448627 | 2025-03-17T23:51:21.075598
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8728 /
tcp
-1399940268 | 2025-03-21T00:33:07.321056
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8767 /
tcp
-1297953727 | 2025-03-20T22:20:55.173450
\x02\x00\x00\x00\x00\x00\x06\x04\x00\x00\x00\x00\x00\x0c\x00\x00\n0\x00\x1c
8805 /
tcp
-1746074029 | 2025-02-23T00:38:39.635907
8808 /
tcp
493955023 | 2025-02-22T05:52:56.101905
\x00\x00\x0c\x04\x00\x00\x00\x00\x00\x00\x04\x00\x10\x00\x00\x00\n0\x05\x00\x00@\x00
8815 /
tcp
632542934 | 2025-03-16T19:28:21.880192
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
8825 /
tcp
632542934 | 2025-03-22T01:38:37.348343
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
8827 /
tcp
1911457608 | 2025-03-01T00:26:31.923925
\x00[\x00\x00\x00\x00\x00\x00
8828 /
tcp
1161309183 | 2025-02-28T21:20:03.170085
8834 /
tcp
819727972 | 2025-02-24T08:49:56.028569
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8835 /
tcp
1308377066 | 2025-03-06T03:14:27.165620
8860 /
tcp
165188539 | 2025-03-15T09:26:11.182302
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8871 /
tcp
-2089734047 | 2025-03-13T08:55:20.172377
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8882 /
tcp
-1399940268 | 2025-03-22T09:52:22.183566
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8887 /
tcp
1504401647 | 2025-03-11T13:01:42.468846
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
8889 /
tcp
819727972 | 2025-03-09T20:48:19.665792
SSH-2.0-OpenSSH_7.4
Vulnerabilities
372433470 | 2025-03-15T14:54:30.963070
HTTP/1.1 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm=""
8907 /
tcp
50497985 | 2025-03-13T02:24:12.828534
\x00[\xc3\x88\xc3\x9dS\x7f\x00\x00
8911 /
tcp
-136006866 | 2025-03-20T09:00:44.751939
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
9000 /
tcp
1119676909 | 2025-03-19T02:31:50.027922
M\\xc4\xc5\xb1\\xfa\\xde\\xc8)W\\xad\\xaf\\xb8\\xb5\\x05\\x89\\x9f\\xa2\\x82\\xf2j7
9001 /
tcp
-1026951088 | 2025-02-28T23:14:15.761603
9002 /
tcp
1690634669 | 2025-03-19T08:29:40.712609
9012 /
tcp
-1019343788 | 2025-03-21T23:20:24.866029
9018 /
tcp
1332894250 | 2025-02-22T20:56:03.076592
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
9036 /
tcp
1726594447 | 2025-03-18T22:09:32.424183
\r\n\nLantronix MSS100 Version V118/523(045538937)\n\r\nType HELP at the \'Local_61349> \' prompt for assistance.\n\r\n\r\n\nUsername>
-1839934832 | 2025-03-20T02:53:50.267648
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
9048 /
tcp
1989907056 | 2025-03-10T22:43:10.086549
RTSP/1.0 453 Not Enough Bandwidth\r\nServer: AirTunes/7l_wZ\r\n\r\n
9051 /
tcp
-905685638 | 2025-03-06T14:00:04.315141
9052 /
tcp
-2033111675 | 2025-03-19T05:10:17.432985
9055 /
tcp
-1399940268 | 2025-02-27T22:07:57.610513
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9060 /
tcp
-1399940268 | 2025-03-22T06:19:24.548249
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9062 /
tcp
-441419608 | 2025-03-15T20:53:16.992123
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
9063 /
tcp
632542934 | 2025-02-27T05:53:57.768791
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
9069 /
tcp
165188539 | 2025-03-21T02:45:34.128457
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
9073 /
tcp
-1036370807 | 2025-03-19T01:20:54.198039
9086 /
tcp
-1730858130 | 2025-03-22T14:58:51.699214
RFB 003.008
VNC:
Protocol Version: 3.8
9095 /
tcp
119860953 | 2025-02-27T17:18:25.391600
* OK ArGoSoft Mail Server IMAP Module v.YW at
9100 /
tcp
819727972 | 2025-03-22T20:17:31.171024
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9103 /
tcp
1011407350 | 2025-03-13T18:56:56.388461
* OK GroupWise IMAP4rev1 Server Ready\r\n
9111 /
tcp
677934968 | 2025-02-22T01:44:45.773251
9114 /
tcp
-616720387 | 2025-02-26T09:07:40.116704
9134 /
tcp
-1399940268 | 2025-02-21T17:01:03.542142
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9151 /
tcp
-1316398834 | 2025-02-25T20:08:34.754163
9160 /
tcp
921225407 | 2025-03-15T00:52:11.218260
\x00\x00\x00\x04\x00\x00\x00\x00\x00
9164 /
tcp
-1399940268 | 2025-03-11T10:30:13.961363
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9179 /
tcp
-303199180 | 2025-03-20T14:27:04.406638
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
9180 /
tcp
-1810987450 | 2025-03-13T15:59:24.453813
9181 /
tcp
921225407 | 2025-02-24T09:12:54.247933
\x00\x00\x00\x04\x00\x00\x00\x00\x00
9189 /
tcp
-2031152423 | 2025-03-09T07:44:26.655672
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
9193 /
tcp
1911457608 | 2025-03-12T18:14:26.391504
\x00[\x00\x00\x00\x00\x00\x00
9194 /
tcp
321971019 | 2025-02-23T16:40:28.888281
-ERR client ip is not in whitelist\r
9199 /
tcp
921225407 | 2025-03-22T02:10:50.076127
\x00\x00\x00\x04\x00\x00\x00\x00\x00
1396488228 | 2025-02-24T16:05:01.134188
HTTP/1.1 200 OK
Content-Length: 2037
Cache-Control: private, max-age=300
Content-Type: text/html
1396488228 | 2025-03-04T03:27:14.702227
HTTP/1.1 200 OK
Content-Length: 2037
Cache-Control: private, max-age=300
Content-Type: text/html
9211 /
tcp
-1399940268 | 2025-02-25T04:11:46.744459
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9212 /
tcp
-1399940268 | 2025-03-11T15:34:37.387562
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9216 /
tcp
1911457608 | 2025-03-15T16:27:43.957574
\x00[\x00\x00\x00\x00\x00\x00
9220 /
tcp
-1329831334 | 2025-03-11T21:42:16.264827
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
9244 /
tcp
-1737707071 | 2025-02-21T19:31:39.633993
\x00b\x00\x01\x00\x00\x00\x00x\x0b\x00\x00\x00\x00z\x00437
9245 /
tcp
455076604 | 2025-03-18T01:48:56.037700
!\x07version\x04bind7 t{RPowerDNS Recursor 410
9253 /
tcp
819727972 | 2025-03-21T07:04:56.346669
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9306 /
tcp
819727972 | 2025-03-21T13:25:33.667567
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9333 /
tcp
-1399940268 | 2025-03-11T04:23:35.053434
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9389 /
tcp
-1399940268 | 2025-03-16T00:24:35.134534
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9393 /
tcp
-1888448627 | 2025-03-22T02:02:02.063965
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
-1839934832 | 2025-03-14T11:17:05.560384
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
9399 /
tcp
321971019 | 2025-02-25T06:44:19.084708
-ERR client ip is not in whitelist\r
1529351907 | 2025-02-21T11:39:12.846561
HTTP/1.1 407 OK
Content-Type: text/plain; charset=utf-8
Connection: keep-alive
please add white ip *.*.*.*
9433 /
tcp
-1730858130 | 2025-02-25T22:55:01.031745
RFB 003.008
VNC:
Protocol Version: 3.8
9444 /
tcp
-2096652808 | 2025-02-26T03:34:48.221994
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
9447 /
tcp
-2096652808 | 2025-03-18T21:00:00.296766
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
9530 /
tcp
-1888448627 | 2025-03-17T18:53:49.262458
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9600 /
tcp
632542934 | 2025-03-19T20:28:19.867002
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
9674 /
tcp
1363464823 | 2025-03-17T21:18:47.497915
9700 /
tcp
165188539 | 2025-03-17T05:28:45.298276
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
9704 /
tcp
-2096652808 | 2025-03-04T20:23:26.781672
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
9743 /
tcp
-1476017887 | 2025-02-26T03:20:01.218883
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
9761 /
tcp
1370263973 | 2025-03-12T23:20:42.920982
9803 /
tcp
-1399940268 | 2025-03-12T12:16:06.127807
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-2107996212 | 2025-03-11T16:35:47.647550
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
1977569953 | 2025-03-04T23:59:48.716303
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae2987_PS-SHA-01Jtm19_12756-43634
9899 /
tcp
1665283070 | 2025-03-14T03:16:55.517642
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x01\x00\x00\x10\x00\x00\n0\x03\x00\x00\x00\x01\x00\x05\x00\x00@\x00\x00\x06\x00\x00\x1f@
9919 /
tcp
103159425 | 2025-02-24T02:47:41.300820
9939 /
tcp
921225407 | 2025-03-13T23:59:42.154579
\x00\x00\x00\x04\x00\x00\x00\x00\x00
1833368189 | 2025-03-09T21:29:00.677182
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae18b9_dong118_31397-16667
0 | 2025-03-14T18:04:43.672950
HTTP/1.1 408 Request Timeout
Content-Length: 0
-1340128872 | 2025-03-06T01:32:14.737404
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae25d2_PS-PEK-010xV14_15533-12109
10000 /
tcp
2087396567 | 2025-03-16T13:37:46.134943
kjnkjabhbanc283ubcsbhdc72
10001 /
tcp
1492413928 | 2025-03-22T07:36:23.994426
SSH-2.0-OpenSSH_7.5
Vulnerabilities
-2107996212 | 2025-03-14T16:26:09.173114
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
10006 /
tcp
-1399940268 | 2025-02-27T16:58:42.389146
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10012 /
tcp
-1380608668 | 2025-03-10T18:44:47.562251
\\x00[\'\\x1c\\xc0\\xa8X\\xfd
10020 /
tcp
-1399940268 | 2025-02-23T14:20:22.707488
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10035 /
tcp
1911457608 | 2025-02-24T12:56:07.495665
\x00[\x00\x00\x00\x00\x00\x00
10042 /
tcp
455076604 | 2025-02-26T20:21:55.935313
!\x07version\x04bind7 t{RPowerDNS Recursor 410
10045 /
tcp
639175818 | 2025-03-17T14:49:19.900224
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
10050 /
tcp
1208318993 | 2025-03-12T12:03:37.828417
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
10051 /
tcp
1231376952 | 2025-03-14T15:19:30.969137
10071 /
tcp
-1399940268 | 2025-03-21T05:07:56.551478
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10075 /
tcp
1911457608 | 2025-03-22T08:25:26.127028
\x00[\x00\x00\x00\x00\x00\x00
10101 /
tcp
-1189269828 | 2025-03-11T05:29:17.029103
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
10134 /
tcp
-1888448627 | 2025-03-14T06:01:36.563950
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
10180 /
tcp
830745946 | 2025-03-22T08:37:17.951047
\\x00[\'\\xc4\\xc0\\xa8Y\\xfd
10250 /
tcp
2087396567 | 2025-03-21T16:01:09.966994
kjnkjabhbanc283ubcsbhdc72
10480 /
tcp
-2089734047 | 2025-03-10T09:32:56.477706
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
10554 /
tcp
-971970408 | 2025-03-11T11:12:53.724327
10909 /
tcp
-457235091 | 2025-02-26T15:04:47.380621
audio 0 RTP/AVP 18 4 3 8 0 101\r\na
10911 /
tcp
307999478 | 2025-03-18T18:47:24.044563
unknown command \r\nunknown command \r\n
11000 /
tcp
819727972 | 2025-02-21T20:40:44.175920
SSH-2.0-OpenSSH_7.4
Vulnerabilities
11027 /
tcp
-122096153 | 2025-02-28T15:32:59.138112
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
11065 /
tcp
1726594447 | 2025-02-22T21:32:18.878102
\r\n\nLantronix MSS100 Version V118/523(045538937)\n\r\nType HELP at the \'Local_61349> \' prompt for assistance.\n\r\n\r\n\nUsername>
11075 /
tcp
-358801646 | 2025-03-09T21:36:16.813147
11084 /
tcp
921225407 | 2025-03-09T12:42:41.226993
\x00\x00\x00\x04\x00\x00\x00\x00\x00
11112 /
tcp
165188539 | 2025-03-04T19:15:26.005223
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
11184 /
tcp
819727972 | 2025-03-11T23:52:27.702910
SSH-2.0-OpenSSH_7.4
Vulnerabilities
11210 /
tcp
740837454 | 2025-03-10T20:03:25.407018
SSH-2.0-OpenSSH_5.3
Vulnerabilities
11211 /
tcp
-136006866 | 2025-03-22T23:58:27.685770
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
11288 /
tcp
1911457608 | 2025-03-19T14:27:46.527061
\x00[\x00\x00\x00\x00\x00\x00
11443 /
tcp
599074451 | 2025-03-07T01:26:18.584558
-2107996212 | 2025-03-21T21:20:09.612039
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
11920 /
tcp
-358801646 | 2025-03-16T12:24:22.205208
12001 /
tcp
-1399940268 | 2025-02-25T15:58:56.404137
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12113 /
tcp
1911457608 | 2025-03-14T03:32:48.376363
\x00[\x00\x00\x00\x00\x00\x00
12126 /
tcp
-801484042 | 2025-03-10T12:00:03.958297
12131 /
tcp
1574088840 | 2025-03-06T06:17:55.192400
">Application and Content Networking Software 3.9</a>)\n</BODY><
12135 /
tcp
-2140303521 | 2025-03-21T08:54:47.672390
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected\n
12141 /
tcp
-2031152423 | 2025-03-06T01:21:22.134263
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
12142 /
tcp
-1399940268 | 2025-03-13T18:05:33.137267
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12144 /
tcp
-1399940268 | 2025-02-23T19:15:56.558440
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12145 /
tcp
-1730858130 | 2025-03-13T15:36:47.867373
RFB 003.008
VNC:
Protocol Version: 3.8
12148 /
tcp
-1375131644 | 2025-03-04T03:15:08.469061
\x00[v\xc3\xbdC\x7f\x00\x00
12167 /
tcp
1381121983 | 2025-02-25T20:43:55.905099
12187 /
tcp
-1795027372 | 2025-03-12T02:14:48.776297
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
12193 /
tcp
-303199180 | 2025-03-20T19:49:58.555018
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
12195 /
tcp
-303199180 | 2025-02-26T15:22:04.998292
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
12197 /
tcp
-1099385124 | 2025-03-12T22:46:44.740185
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
12212 /
tcp
1911457608 | 2025-03-14T22:41:24.901340
\x00[\x00\x00\x00\x00\x00\x00
12217 /
tcp
1911457608 | 2025-02-28T18:04:44.350704
\x00[\x00\x00\x00\x00\x00\x00
12219 /
tcp
1911457608 | 2025-02-27T11:59:05.863403
\x00[\x00\x00\x00\x00\x00\x00
12221 /
tcp
307999478 | 2025-03-11T18:03:42.026128
unknown command \r\nunknown command \r\n
-2107996212 | 2025-03-18T19:06:55.759867
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
12236 /
tcp
-1399940268 | 2025-03-10T16:30:09.402163
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12250 /
tcp
-784071826 | 2025-03-08T22:11:37.291435
SSH-2.0-OpenSSH_8.0
Vulnerabilities
12252 /
tcp
321971019 | 2025-02-21T12:56:13.387067
-ERR client ip is not in whitelist\r
12258 /
tcp
-1114821551 | 2025-03-13T08:34:06.556559
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
12262 /
tcp
-1476017887 | 2025-03-15T12:36:02.298738
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
12271 /
tcp
921225407 | 2025-03-06T14:23:13.375143
\x00\x00\x00\x04\x00\x00\x00\x00\x00
12278 /
tcp
-2089734047 | 2025-02-24T16:26:06.441292
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12280 /
tcp
-1399940268 | 2025-03-12T10:43:18.605065
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12281 /
tcp
-1399940268 | 2025-03-21T22:21:41.964827
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12290 /
tcp
-904840257 | 2025-03-18T10:41:30.881468
572 Relay not authorized\r\n
12291 /
tcp
-1399940268 | 2025-02-26T14:00:02.261483
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12311 /
tcp
819727972 | 2025-03-10T11:09:55.671064
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12324 /
tcp
-2096652808 | 2025-02-23T01:39:35.289844
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12325 /
tcp
-2096652808 | 2025-03-16T18:25:05.301475
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
-1839934832 | 2025-03-22T04:38:18.772601
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
12338 /
tcp
-1996280214 | 2025-03-21T23:36:01.575172
296364507 | 2025-02-21T19:00:27.487034
HTTP/1.1 500 Internal Server Error
SERVER: Trend Chip UPnP/1.0 DMS
CONNECTION: close
CONTENT-LENGTH: 60
CONTENT-TYPE: text/html
12354 /
tcp
-1399940268 | 2025-02-24T01:46:02.324226
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12357 /
tcp
-1399940268 | 2025-03-12T05:01:27.310389
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12362 /
tcp
1308377066 | 2025-03-22T09:44:54.835390
12367 /
tcp
-1399940268 | 2025-03-18T04:56:57.428463
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12369 /
tcp
1911457608 | 2025-03-14T20:28:37.188578
\x00[\x00\x00\x00\x00\x00\x00
12385 /
tcp
504717326 | 2025-02-28T21:36:36.030439
SSH-2.0-OpenSSH_8.6
Vulnerabilities
12389 /
tcp
1989907056 | 2025-03-04T06:15:08.403357
RTSP/1.0 453 Not Enough Bandwidth\r\nServer: AirTunes/7l_wZ\r\n\r\n
12399 /
tcp
677934968 | 2025-03-15T22:14:03.257988
12413 /
tcp
-1888448627 | 2025-03-19T09:37:15.919230
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12416 /
tcp
1911457608 | 2025-03-06T21:08:09.242836
\x00[\x00\x00\x00\x00\x00\x00
12421 /
tcp
-1399940268 | 2025-03-05T15:10:25.731443
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12428 /
tcp
-1139539254 | 2025-02-23T18:31:24.815729
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
12432 /
tcp
1911457608 | 2025-03-19T10:05:17.253032
\x00[\x00\x00\x00\x00\x00\x00
12436 /
tcp
-1399940268 | 2025-03-12T21:25:59.576129
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12448 /
tcp
1911457608 | 2025-03-19T22:08:23.252302
\x00[\x00\x00\x00\x00\x00\x00
12457 /
tcp
-358801646 | 2025-02-26T17:56:16.397589
12467 /
tcp
740837454 | 2025-02-28T11:33:18.932373
SSH-2.0-OpenSSH_5.3
Vulnerabilities
12468 /
tcp
1911457608 | 2025-03-15T16:05:02.845747
\x00[\x00\x00\x00\x00\x00\x00
12480 /
tcp
1911457608 | 2025-03-22T02:53:36.268475
\x00[\x00\x00\x00\x00\x00\x00
12512 /
tcp
819727972 | 2025-03-21T23:36:56.408414
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12514 /
tcp
1911457608 | 2025-03-20T08:33:53.262538
\x00[\x00\x00\x00\x00\x00\x00
12524 /
tcp
671605376 | 2025-02-24T17:50:05.153946
12530 /
tcp
-303199180 | 2025-03-17T04:53:40.929232
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
12543 /
tcp
401555314 | 2025-03-16T15:10:35.013923
12547 /
tcp
307999478 | 2025-03-15T04:14:47.031879
unknown command \r\nunknown command \r\n
12565 /
tcp
-303199180 | 2025-03-22T22:08:28.485348
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
12572 /
tcp
307999478 | 2025-02-26T19:09:02.626977
unknown command \r\nunknown command \r\n
12573 /
tcp
1615193817 | 2025-02-21T23:04:04.178828
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
1830697416 | 2025-03-18T18:40:29.448395
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
14026 /
tcp
1911457608 | 2025-03-19T04:58:31.110953
\x00[\x00\x00\x00\x00\x00\x00
14130 /
tcp
897328069 | 2025-03-17T07:27:37.050457
220 mail.scott000.com ESMTP
14265 /
tcp
-1977675824 | 2025-02-27T10:20:35.954133
1282941221 | 2025-03-06T03:09:17.296993
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
14344 /
tcp
-1399940268 | 2025-03-16T04:13:35.871932
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
14407 /
tcp
1911457608 | 2025-03-20T00:08:19.518130
\x00[\x00\x00\x00\x00\x00\x00
14873 /
tcp
-891714208 | 2025-03-17T20:04:43.890292
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
14905 /
tcp
-2096652808 | 2025-03-16T13:43:09.387026
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
15001 /
tcp
-1279886438 | 2025-03-08T22:25:39.504431
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
15443 /
tcp
539065883 | 2025-03-14T04:15:11.482778
15555 /
tcp
504717326 | 2025-02-24T19:13:05.518710
SSH-2.0-OpenSSH_8.6
Vulnerabilities
15831 /
tcp
-2089734047 | 2025-03-12T05:10:46.933509
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
16001 /
tcp
-1399940268 | 2025-03-21T00:56:38.490870
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16002 /
tcp
1911457608 | 2025-03-22T16:28:15.643318
\x00[\x00\x00\x00\x00\x00\x00
16005 /
tcp
-2033111675 | 2025-03-05T03:40:05.740923
16006 /
tcp
819727972 | 2025-03-15T08:35:08.830035
SSH-2.0-OpenSSH_7.4
Vulnerabilities
16010 /
tcp
819727972 | 2025-03-21T00:55:38.463647
SSH-2.0-OpenSSH_7.4
Vulnerabilities
16017 /
tcp
-1399940268 | 2025-03-16T06:46:49.250692
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16036 /
tcp
819727972 | 2025-02-26T02:09:06.525756
SSH-2.0-OpenSSH_7.4
Vulnerabilities
16039 /
tcp
819727972 | 2025-03-15T17:01:19.799461
SSH-2.0-OpenSSH_7.4
Vulnerabilities
16042 /
tcp
1911457608 | 2025-03-17T07:39:17.061646
\x00[\x00\x00\x00\x00\x00\x00
16045 /
tcp
-1733106930 | 2025-02-25T11:02:46.137783
Mysql Version: 5.6.50-log\nN\n5.6.50-log\x14(\nG5se"tGE\xc3\xbf\xc3\xb7-\x02\x7f\xc2\x80\x15cB^3$Zwh$wM[mysql_native_password
16046 /
tcp
-339084706 | 2025-03-11T07:04:14.119149
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
16050 /
tcp
165188539 | 2025-02-25T17:05:52.686748
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
16056 /
tcp
410249975 | 2025-03-09T19:01:25.969590
16062 /
tcp
398077695 | 2025-03-18T02:52:58.499863
16089 /
tcp
1911457608 | 2025-03-22T20:48:39.059349
\x00[\x00\x00\x00\x00\x00\x00
16100 /
tcp
819727972 | 2025-03-22T19:33:15.484576
SSH-2.0-OpenSSH_7.4
Vulnerabilities
16401 /
tcp
410249975 | 2025-03-17T16:29:21.362525
16888 /
tcp
819727972 | 2025-02-25T03:28:29.906220
SSH-2.0-OpenSSH_7.4
Vulnerabilities
16993 /
tcp
1741579575 | 2025-03-22T14:27:02.897263
17000 /
tcp
-1810987450 | 2025-03-20T21:28:48.392709
17070 /
tcp
455076604 | 2025-03-21T13:30:03.459666
!\x07version\x04bind7 t{RPowerDNS Recursor 410
18002 /
tcp
819727972 | 2025-03-18T08:15:03.143310
SSH-2.0-OpenSSH_7.4
Vulnerabilities
18008 /
tcp
-345718689 | 2025-03-14T02:27:01.425011
18015 /
tcp
-1099385124 | 2025-03-14T15:34:01.206054
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
18017 /
tcp
-2096652808 | 2025-03-12T14:48:04.374183
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
18018 /
tcp
-1598265216 | 2025-03-18T02:25:28.497911
18022 /
tcp
1332894250 | 2025-03-04T09:20:18.328928
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
18023 /
tcp
-1476017887 | 2025-03-21T22:10:18.273201
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
18031 /
tcp
-1327660293 | 2025-02-25T22:35:24.654152
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
-1839934832 | 2025-02-26T20:24:07.414096
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
18038 /
tcp
-784071826 | 2025-03-10T15:22:49.421638
SSH-2.0-OpenSSH_8.0
Vulnerabilities
18041 /
tcp
-1105333987 | 2025-02-21T02:00:18.277249
18049 /
tcp
321971019 | 2025-03-17T11:18:45.997033
-ERR client ip is not in whitelist\r
18053 /
tcp
165188539 | 2025-02-26T13:46:29.360891
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
18057 /
tcp
819727972 | 2025-03-12T05:08:57.135712
SSH-2.0-OpenSSH_7.4
Vulnerabilities
18063 /
tcp
-1399940268 | 2025-03-03T20:09:37.587955
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18079 /
tcp
-2089734047 | 2025-02-24T05:34:53.144316
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
18081 /
tcp
677934968 | 2025-03-17T06:04:18.678403
18083 /
tcp
937756010 | 2025-03-10T08:44:56.586145
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x01\x00\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
18098 /
tcp
-1399940268 | 2025-03-17T03:56:14.574899
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18108 /
tcp
165188539 | 2025-03-15T15:59:26.625875
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
18109 /
tcp
504717326 | 2025-03-06T02:20:06.704532
SSH-2.0-OpenSSH_8.6
Vulnerabilities
18110 /
tcp
937756010 | 2025-02-24T21:51:57.679414
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x01\x00\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
18113 /
tcp
-457235091 | 2025-03-21T01:44:54.042421
audio 0 RTP/AVP 18 4 3 8 0 101\r\na
18182 /
tcp
819727972 | 2025-03-13T00:55:12.671133
SSH-2.0-OpenSSH_7.4
Vulnerabilities
18245 /
tcp
-1477838366 | 2025-03-04T05:03:51.732250
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
19000 /
tcp
1911457608 | 2025-03-10T15:44:26.810607
\x00[\x00\x00\x00\x00\x00\x00
19013 /
tcp
-122096153 | 2025-03-13T17:49:39.546934
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
19015 /
tcp
1623746877 | 2025-02-23T03:07:07.843655
500 Permission denied - closing connection.\r\n
19017 /
tcp
-1538260461 | 2025-02-25T02:55:19.697905
19082 /
tcp
1911457608 | 2025-02-28T03:14:17.106317
\x00[\x00\x00\x00\x00\x00\x00
19100 /
tcp
1911457608 | 2025-02-26T19:27:53.780542
\x00[\x00\x00\x00\x00\x00\x00
19443 /
tcp
1911457608 | 2025-03-19T10:57:47.098288
\x00[\x00\x00\x00\x00\x00\x00
19930 /
tcp
2087396567 | 2025-03-14T09:42:26.500013
kjnkjabhbanc283ubcsbhdc72
1900503736 | 2025-03-18T17:21:44.548503
HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-HTTPAPI/2.0
20050 /
tcp
-358801646 | 2025-03-14T18:14:15.636386
20070 /
tcp
599074451 | 2025-03-22T02:03:14.958774
20256 /
tcp
819727972 | 2025-03-06T23:25:27.466819
SSH-2.0-OpenSSH_7.4
Vulnerabilities
20547 /
tcp
1134517380 | 2025-03-16T03:33:40.800208
welcome to Pandora console!\r\n----------------------------\n-------------------------\n| Login Time | 2021-12-08 1...\n
20880 /
tcp
1370263973 | 2025-03-19T14:40:46.455435
20894 /
tcp
1726594447 | 2025-03-22T05:08:06.478037
\r\n\nLantronix MSS100 Version V118/523(045538937)\n\r\nType HELP at the \'Local_61349> \' prompt for assistance.\n\r\n\r\n\nUsername>
21001 /
tcp
-1032713145 | 2025-03-10T12:43:55.942052
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
21084 /
tcp
-1730858130 | 2025-03-19T12:18:46.978664
RFB 003.008
VNC:
Protocol Version: 3.8
21234 /
tcp
819727972 | 2025-03-16T05:26:57.211284
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21236 /
tcp
493955023 | 2025-03-15T23:10:09.634116
\x00\x00\x0c\x04\x00\x00\x00\x00\x00\x00\x04\x00\x10\x00\x00\x00\n0\x05\x00\x00@\x00
21240 /
tcp
-585940771 | 2025-02-27T18:26:45.542565
21245 /
tcp
1278527606 | 2025-03-06T13:02:14.800871
21251 /
tcp
-805362002 | 2025-03-21T12:00:10.021289
ICAP/1.0 501 Other
Server: Traffic Spicer 7788179225
21282 /
tcp
1911457608 | 2025-02-26T02:31:35.222891
\x00[\x00\x00\x00\x00\x00\x00
21289 /
tcp
1911457608 | 2025-02-23T17:59:39.361894
\x00[\x00\x00\x00\x00\x00\x00
21308 /
tcp
1911457608 | 2025-02-21T02:26:16.714420
\x00[\x00\x00\x00\x00\x00\x00
21317 /
tcp
-1399940268 | 2025-03-05T06:17:48.192825
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21379 /
tcp
1574088840 | 2025-03-13T23:44:20.467357
">Application and Content Networking Software 3.9</a>)\n</BODY><
21443 /
tcp
1911457608 | 2025-02-23T12:17:23.202533
\x00[\x00\x00\x00\x00\x00\x00
22082 /
tcp
321971019 | 2025-02-27T04:28:54.799045
-ERR client ip is not in whitelist\r
23023 /
tcp
-1233952399 | 2025-03-21T02:08:58.517414
24245 /
tcp
539065883 | 2025-03-14T13:00:31.745598
24510 /
tcp
-274082663 | 2025-03-12T15:46:20.920811
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
24808 /
tcp
165188539 | 2025-03-20T17:41:03.879383
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
25000 /
tcp
-2017887953 | 2025-02-24T18:59:00.851460
SSH-2.0-OpenSSH_7.9
Vulnerabilities
25001 /
tcp
-1399940268 | 2025-03-22T10:26:09.815644
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
25565 /
tcp
1830187220 | 2025-03-19T22:32:34.901620
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
26656 /
tcp
2087396567 | 2025-03-13T05:41:31.835848
kjnkjabhbanc283ubcsbhdc72
27015 /
tcp
-360253951 | 2025-03-14T15:21:24.441477
Command: None
Size: 1702233889
ID: 1869181810
Type: 1768031342
27017 /
tcp
1763259671 | 2025-03-19T15:47:41.368773
{\n"Version": "3.4.18",\n"VersionArray": [\n3,\n4,\n18,\n0\n],\n"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",\n"OpenSSLVersion": "",\n"SysInfo": "",\n"Bits": 64,\n"Debug": false,\n"MaxObjectSize": 16777216\n}\n\n
28015 /
tcp
1911457608 | 2025-03-21T02:09:11.171335
\x00[\x00\x00\x00\x00\x00\x00
28443 /
tcp
632542934 | 2025-03-16T05:05:45.104853
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
29798 /
tcp
1948301213 | 2025-03-17T09:13:49.508280
RFB 003.003
VNC:
Protocol Version: 3.3
30003 /
tcp
819727972 | 2025-03-07T09:35:07.152859
SSH-2.0-OpenSSH_7.4
Vulnerabilities
30005 /
tcp
1541211644 | 2025-02-24T04:24:54.301625
30008 /
tcp
-616720387 | 2025-02-23T08:42:17.583142
30013 /
tcp
119860953 | 2025-03-11T14:29:39.967132
* OK ArGoSoft Mail Server IMAP Module v.YW at
30021 /
tcp
-2033111675 | 2025-03-15T16:57:21.157669
30022 /
tcp
2087396567 | 2025-03-18T20:40:52.885902
kjnkjabhbanc283ubcsbhdc72
30101 /
tcp
1492413928 | 2025-03-15T09:11:49.264396
SSH-2.0-OpenSSH_7.5
Vulnerabilities
30113 /
tcp
-1032713145 | 2025-03-16T17:09:02.416298
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
30122 /
tcp
2087396567 | 2025-03-19T19:22:40.559595
kjnkjabhbanc283ubcsbhdc72
30301 /
tcp
104385780 | 2025-03-15T18:16:38.397279
30303 /
tcp
1741579575 | 2025-03-19T22:08:38.647530
30522 /
tcp
819727972 | 2025-03-12T13:44:06.089506
SSH-2.0-OpenSSH_7.4
Vulnerabilities
31022 /
tcp
2087396567 | 2025-03-13T07:18:27.648460
kjnkjabhbanc283ubcsbhdc72
-1013082686 | 2025-03-09T11:48:04.401687
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
31222 /
tcp
819727972 | 2025-03-13T04:10:26.573752
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-147424911 | 2025-02-22T13:29:56.668671
HTTP/1.1 404 Not Found
Content Length: 0
31422 /
tcp
-971970408 | 2025-03-13T01:50:28.588187
31443 /
tcp
-358801646 | 2025-03-12T16:59:50.368052
31622 /
tcp
819727972 | 2025-03-12T22:58:51.749654
SSH-2.0-OpenSSH_7.4
Vulnerabilities
31722 /
tcp
2087396567 | 2025-03-21T14:51:09.178664
kjnkjabhbanc283ubcsbhdc72
32022 /
tcp
-971970408 | 2025-03-12T03:16:21.212928
32202 /
tcp
-1641514916 | 2025-03-08T12:24:54.393844
* OK Merak 1dFUa2 IMAP4rev1
32322 /
tcp
2087396567 | 2025-03-09T16:47:59.246351
kjnkjabhbanc283ubcsbhdc72
32422 /
tcp
-1990350878 | 2025-03-09T13:23:16.968903
32522 /
tcp
-747911285 | 2025-03-22T03:36:18.935921
32622 /
tcp
-971970408 | 2025-03-11T18:46:29.113349
32764 /
tcp
2087396567 | 2025-03-17T13:26:26.386772
kjnkjabhbanc283ubcsbhdc72
33022 /
tcp
1991883981 | 2025-03-22T23:21:46.642843
B\x00\x00\x00\xc3\xbfn\x04Too many connections
33122 /
tcp
-893477759 | 2025-03-04T13:19:12.456419
!versionbind7 t{RPowerDNS Recursor 410
33389 /
tcp
1353260875 | 2025-02-27T20:37:15.091450
\x00[g\xc2\x95N\x7f\x00\x00
33422 /
tcp
1984588611 | 2025-03-19T15:58:39.263047
33522 /
tcp
1690634669 | 2025-03-20T12:57:26.705161
33622 /
tcp
740837454 | 2025-03-21T04:26:34.230181
SSH-2.0-OpenSSH_5.3
Vulnerabilities
33722 /
tcp
-2096652808 | 2025-03-18T03:21:10.867525
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
33822 /
tcp
539065883 | 2025-03-18T10:23:35.858783
33922 /
tcp
-616720387 | 2025-03-18T01:45:48.090125
1830697416 | 2025-03-20T03:19:00.007102
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
34225 /
tcp
632542934 | 2025-03-06T01:22:19.624467
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
34422 /
tcp
996960436 | 2025-03-14T23:56:43.332768
34522 /
tcp
104385780 | 2025-03-19T10:34:28.545182
34622 /
tcp
-1729629024 | 2025-03-19T08:52:21.002261
34822 /
tcp
474736340 | 2025-03-19T05:28:17.668821
431 Unable to negotiate secure command connection.
35000 /
tcp
1213931722 | 2025-03-18T05:49:58.293428
ICAP/1.0 501 Other\r\nServer: Traffic Spicer 7788179225\r\n
35322 /
tcp
-2096652808 | 2025-03-17T07:47:13.465132
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
35422 /
tcp
2087396567 | 2025-02-28T07:21:22.748830
kjnkjabhbanc283ubcsbhdc72
35522 /
tcp
1261582754 | 2025-03-17T00:18:04.195542
unknown command
unknown command
35622 /
tcp
-971970408 | 2025-03-04T11:54:57.518268
35822 /
tcp
1741579575 | 2025-03-17T16:53:28.900409
36022 /
tcp
1741579575 | 2025-03-17T20:19:24.501568
36322 /
tcp
1636811864 | 2025-03-17T11:13:50.796139
36522 /
tcp
-358801646 | 2025-02-28T19:45:18.021148
36622 /
tcp
-1032713145 | 2025-03-16T07:05:01.421674
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
36722 /
tcp
-1559123399 | 2025-03-17T04:51:59.344379
500 Permission denied - closing connection.
36922 /
tcp
1690634669 | 2025-03-18T12:05:11.581809
-1453516345 | 2025-03-16T18:35:15.091216
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
37122 /
tcp
842535728 | 2025-03-16T22:18:36.341739
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>
A<!DOCTYPE GANGLIA_XML [
<!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...
37222 /
tcp
-653033013 | 2025-03-14T18:54:50.203732
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
37322 /
tcp
-971970408 | 2025-03-16T10:57:58.485730
37422 /
tcp
1261582754 | 2025-03-15T11:11:36.189222
unknown command
unknown command
37822 /
tcp
-971970408 | 2025-02-28T02:08:51.543942
37922 /
tcp
841014058 | 2025-03-17T23:44:59.167124
Hello, this is FRRouting (version 4.0).
Copyright 19
96-2005 Kunihiro Ishiguro, et al.
Use...
38122 /
tcp
-971970408 | 2025-03-15T16:41:49.064052
38333 /
tcp
-952165951 | 2025-03-15T21:06:16.823418
38522 /
tcp
-321444299 | 2025-03-13T23:01:25.129204
:dircproxy NOTICE AUTH :Looking up your hostname...
:dircproxy NOTICE AUTH :Got your hostname.
38622 /
tcp
1741579575 | 2025-03-14T07:52:45.267542
38822 /
tcp
1690634669 | 2025-03-12T15:15:59.039332
38922 /
tcp
-1900404274 | 2025-03-13T14:23:26.671983
39001 /
tcp
-653033013 | 2025-03-11T19:00:23.314895
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
39522 /
tcp
2087396567 | 2025-03-11T08:36:47.887714
kjnkjabhbanc283ubcsbhdc72
39722 /
tcp
1741579575 | 2025-03-05T03:31:50.528827
39822 /
tcp
380146262 | 2025-03-12T04:56:37.906183
39922 /
tcp
1690634669 | 2025-02-26T16:26:22.940019
40022 /
tcp
1426971893 | 2025-03-09T11:33:50.813176
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
40122 /
tcp
50497985 | 2025-02-26T13:00:25.365806
\x00[\xc3\x88\xc3\x9dS\x7f\x00\x00
40471 /
tcp
-1399940268 | 2025-03-17T08:39:06.085815
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
40622 /
tcp
-2031152423 | 2025-02-26T11:17:48.621608
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
40722 /
tcp
671605376 | 2025-03-08T13:35:12.445044
41522 /
tcp
660175493 | 2025-03-04T20:25:52.844574
41800 /
tcp
1948301213 | 2025-03-10T18:01:29.388872
RFB 003.003
VNC:
Protocol Version: 3.3
42122 /
tcp
2087396567 | 2025-03-05T02:53:36.439562
kjnkjabhbanc283ubcsbhdc72
42222 /
tcp
2087396567 | 2025-03-04T22:11:21.776924
kjnkjabhbanc283ubcsbhdc72
1282941221 | 2025-02-23T13:37:42.544594
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
42422 /
tcp
-438503381 | 2025-03-04T22:02:38.929947
WORLD OF WARCRAFT CONNECTION - SERVER TO CLIENT - V2
-1839934832 | 2025-02-28T14:29:52.077361
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
43008 /
tcp
740837454 | 2025-03-07T12:19:19.024983
SSH-2.0-OpenSSH_5.3
Vulnerabilities
43222 /
tcp
-746114901 | 2025-03-01T00:14:22.807337
43322 /
tcp
-1810987450 | 2025-02-27T20:55:41.086316
43422 /
tcp
-971970408 | 2025-02-27T20:41:10.567911
43622 /
tcp
-971970408 | 2025-02-21T17:08:42.388980
43722 /
tcp
1332894250 | 2025-02-27T02:44:29.304365
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
43822 /
tcp
-952165951 | 2025-02-27T00:58:47.132881
44022 /
tcp
1690634669 | 2025-02-26T21:03:18.112323
44122 /
tcp
660175493 | 2025-02-26T21:36:07.793813
44158 /
tcp
-433302150 | 2025-03-18T03:58:42.581154
44305 /
tcp
321971019 | 2025-03-10T14:54:34.333719
-ERR client ip is not in whitelist\r
44306 /
tcp
1911457608 | 2025-03-04T20:35:52.544156
\x00[\x00\x00\x00\x00\x00\x00
44322 /
tcp
-1559123399 | 2025-02-26T09:36:57.872772
500 Permission denied - closing connection.
44337 /
tcp
1911457608 | 2025-03-19T09:53:55.576858
\x00[\x00\x00\x00\x00\x00\x00
-1013082686 | 2025-02-25T23:30:18.878485
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
-1453516345 | 2025-03-20T07:04:04.328729
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
44818 /
tcp
-407828767 | 2025-02-23T21:51:42.794674
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
44922 /
tcp
2087396567 | 2025-02-26T02:47:20.563084
kjnkjabhbanc283ubcsbhdc72
45022 /
tcp
1492413928 | 2025-03-10T15:09:39.837785
SSH-2.0-OpenSSH_7.5
Vulnerabilities
45222 /
tcp
-1641514916 | 2025-02-25T19:06:26.333634
* OK Merak 1dFUa2 IMAP4rev1
45322 /
tcp
819727972 | 2025-02-25T17:39:54.771334
SSH-2.0-OpenSSH_7.4
Vulnerabilities
45444 /
tcp
-2089734047 | 2025-03-10T15:21:29.518089
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
45522 /
tcp
1741579575 | 2025-02-25T15:25:27.515777
45555 /
tcp
819727972 | 2025-03-19T10:50:41.823032
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1830697416 | 2025-03-16T04:12:06.064274
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
45786 /
tcp
-2096652808 | 2025-02-21T14:22:34.526939
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
46000 /
tcp
1911457608 | 2025-03-03T22:39:17.771804
\x00[\x00\x00\x00\x00\x00\x00
46122 /
tcp
-971970408 | 2025-02-25T05:30:12.827860
46222 /
tcp
1632932802 | 2025-02-24T22:38:22.003655
46622 /
tcp
819727972 | 2025-02-24T03:03:10.196215
SSH-2.0-OpenSSH_7.4
Vulnerabilities
46922 /
tcp
1308377066 | 2025-02-23T23:32:30.028833
47080 /
tcp
1761482307 | 2025-03-11T09:52:42.545000
\x00[\xc2\xa5\t\xc2\xbe\x7f\x00\x00
47122 /
tcp
-1810987450 | 2025-02-23T22:17:05.079796
47222 /
tcp
-971970408 | 2025-02-23T20:05:03.617196
47322 /
tcp
-971970408 | 2025-02-23T18:20:26.836709
47422 /
tcp
-1476017887 | 2025-02-25T00:00:35.994070
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
47522 /
tcp
740837454 | 2025-02-25T08:29:23.365601
SSH-2.0-OpenSSH_5.3
Vulnerabilities
47722 /
tcp
2087396567 | 2025-03-10T09:57:24.200868
kjnkjabhbanc283ubcsbhdc72
47922 /
tcp
103159425 | 2025-03-10T06:30:01.590337
47990 /
tcp
819727972 | 2025-03-14T04:34:09.775760
SSH-2.0-OpenSSH_7.4
Vulnerabilities
48018 /
tcp
-1888448627 | 2025-03-17T18:41:29.473698
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
48022 /
tcp
1544300041 | 2025-03-07T10:07:32.083352
SSH-25453-Cisco-3524665.35
48122 /
tcp
-1441741890 | 2025-03-10T06:19:12.324945
220 corpease.net Anti-spam GT for Coremail System (icmhosting[2
0181212])
48322 /
tcp
1975288991 | 2025-03-10T01:27:26.885099
48422 /
tcp
-971970408 | 2025-03-09T23:34:51.379812
48522 /
tcp
819727972 | 2025-03-09T21:52:07.154736
SSH-2.0-OpenSSH_7.4
Vulnerabilities
48622 /
tcp
819727972 | 2025-02-24T18:32:14.579395
SSH-2.0-OpenSSH_7.4
Vulnerabilities
48722 /
tcp
-1476017887 | 2025-02-24T15:04:16.393233
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
48822 /
tcp
2087396567 | 2025-02-24T17:02:33.565133
kjnkjabhbanc283ubcsbhdc72
48888 /
tcp
-1435414831 | 2025-03-10T13:18:47.727010
48899 /
tcp
-971970408 | 2025-03-22T04:45:55.113980
49022 /
tcp
2087396567 | 2025-03-07T13:30:01.902576
kjnkjabhbanc283ubcsbhdc72
49222 /
tcp
2087396567 | 2025-02-22T23:24:02.606706
kjnkjabhbanc283ubcsbhdc72
49502 /
tcp
-1399940268 | 2025-03-04T21:33:15.967641
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
49690 /
tcp
165188539 | 2025-03-11T07:44:46.735195
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
1282941221 | 2025-03-21T00:49:34.842580
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
49822 /
tcp
1741579575 | 2025-02-22T19:39:41.583200
50000 /
tcp
-952165951 | 2025-03-22T08:40:10.637803
50002 /
tcp
165188539 | 2025-03-17T10:53:34.866398
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
50004 /
tcp
-1538260461 | 2025-03-04T21:10:58.191496
-147424911 | 2025-03-15T16:57:41.084427
HTTP/1.1 404 Not Found
Content Length: 0
50008 /
tcp
-1327660293 | 2025-03-11T16:34:34.628562
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
50014 /
tcp
-1399940268 | 2025-03-06T05:53:08.161845
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
50070 /
tcp
291723434 | 2025-03-21T23:38:04.935394
Lantronix MSS100 Version V118/523(045538937)
Type HELP at the 'Local_61349> ' prompt for assistance.
Username>
50100 /
tcp
740837454 | 2025-03-21T22:29:13.124828
SSH-2.0-OpenSSH_5.3
Vulnerabilities
50105 /
tcp
-1399940268 | 2025-02-23T17:54:29.608644
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
50122 /
tcp
-527005584 | 2025-02-22T08:17:22.200967
50222 /
tcp
1690634669 | 2025-02-22T06:32:04.370621
50443 /
tcp
1911457608 | 2025-03-10T22:35:00.517097
\x00[\x00\x00\x00\x00\x00\x00
50522 /
tcp
2087396567 | 2025-02-21T22:21:15.550389
kjnkjabhbanc283ubcsbhdc72
50922 /
tcp
171352214 | 2025-02-21T15:48:02.481625
-ERR client ip is not in whitelist
50995 /
tcp
-1399940268 | 2025-03-20T21:07:57.017656
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
51004 /
tcp
1308377066 | 2025-03-21T04:54:49.587119
51007 /
tcp
1911457608 | 2025-02-21T23:18:01.822383
\x00[\x00\x00\x00\x00\x00\x00
51106 /
tcp
2033888749 | 2025-03-20T11:05:18.310567
Content-Type: text/rude-rejection
Content-Length: 24
Access Denied, go away.
Content-Type: text/disconnect-notice
C...
51201 /
tcp
819727972 | 2025-03-07T11:17:11.948371
SSH-2.0-OpenSSH_7.4
Vulnerabilities
51235 /
tcp
1504401647 | 2025-02-24T03:59:10.728903
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
51443 /
tcp
-1032713145 | 2025-03-12T00:28:21.120090
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
52340 /
tcp
-2096652808 | 2025-03-06T09:31:40.548942
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
52869 /
tcp
-949565575 | 2025-03-21T13:06:44.646903
\x19\x02\x02\x07Protocol version mismatch
53022 /
tcp
171352214 | 2025-03-07T06:35:05.830104
-ERR client ip is not in whitelist
53482 /
tcp
677934968 | 2025-03-11T19:04:25.907670
53806 /
tcp
-1399940268 | 2025-03-13T09:21:27.883200
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
54138 /
tcp
-1611764932 | 2025-03-20T01:07:49.203511
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
55000 /
tcp
709622286 | 2025-03-10T18:57:17.775590
OK Welcome <299685> on DirectUpdate server 7286\r\n
55442 /
tcp
1767345577 | 2025-03-20T20:35:42.948672
Hello, this is Quagga (version 0T).
Copyright 1996-200
55553 /
tcp
1741579575 | 2025-03-21T12:37:40.761811
-147424911 | 2025-03-22T05:59:46.778125
HTTP/1.1 404 Not Found
Content Length: 0
55822 /
tcp
-79865617 | 2025-03-06T20:24:31.451034
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com
mit-revprops depth log-revprops partial-replay ) ) )
57022 /
tcp
-971970408 | 2025-03-06T14:09:49.986583
57522 /
tcp
-1729629024 | 2025-03-06T11:56:44.903413
57622 /
tcp
-1729629024 | 2025-03-06T09:09:19.723042
57722 /
tcp
-1428621233 | 2025-03-06T07:06:09.616032
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
58122 /
tcp
1842524259 | 2025-03-06T01:56:19.401384
58392 /
tcp
1615193817 | 2025-03-11T12:14:51.834140
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
58422 /
tcp
-971970408 | 2025-03-05T20:43:01.195382
58443 /
tcp
-1399940268 | 2025-03-13T11:40:43.242063
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
58522 /
tcp
-653033013 | 2025-03-05T19:09:37.762438
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
58822 /
tcp
2033888749 | 2025-03-05T15:34:38.982651
Content-Type: text/rude-rejection
Content-Length: 24
Access Denied, go away.
Content-Type: text/disconnect-notice
C...
59322 /
tcp
2087396567 | 2025-03-05T06:55:21.023931
kjnkjabhbanc283ubcsbhdc72
59522 /
tcp
2087396567 | 2025-03-03T17:52:51.456133
kjnkjabhbanc283ubcsbhdc72
-2118655245 | 2025-03-21T21:46:42.298019
HTTP/1.0 500 Internal Server Error
Content-Length: 20
60129 /
tcp
660175493 | 2025-03-19T15:18:42.871825
61613 /
tcp
-1139539254 | 2025-02-21T08:29:26.892808
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
61616 /
tcp
-971970408 | 2025-02-22T22:01:50.178684
62078 /
tcp
-1113435755 | 2025-03-11T12:05:06.129261
/1.1 404 Not Found
Content Length: 0
62080 /
tcp
819727972 | 2025-02-23T13:59:49.411221
SSH-2.0-OpenSSH_7.4
Vulnerabilities
62865 /
tcp
709622286 | 2025-03-13T10:05:49.925983
OK Welcome <299685> on DirectUpdate server 7286\r\n
63210 /
tcp
-2096652808 | 2025-03-14T22:11:44.807498
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
63256 /
tcp
380146262 | 2025-03-21T20:00:45.781120
63260 /
tcp
819727972 | 2025-03-13T20:49:27.216411
SSH-2.0-OpenSSH_7.4
Vulnerabilities
64738 /
tcp
171352214 | 2025-03-15T04:00:27.015463
-ERR client ip is not in whitelist
1121806355 | 2025-03-15T13:47:48.029148
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 657d0752_gwt27_33224-20260