15 /
tcp
2087396567 | 2025-03-21T00:23:27.093839
kjnkjabhbanc283ubcsbhdc72
17 /
tcp
-1296032851 | 2025-02-23T16:48:11.933305
\x01=\x01À\x06ÿÿ?"<ZDECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x01\x01
81614701 | 2025-03-19T19:26:33.757291
HTTP/1.1 200 OK
Content-Type: text/html
Accept-Ranges: bytes
Server: Microsoft-IIS/10.0
X-Powered-By: ASP.NET
20 /
tcp
-1327660293 | 2025-02-28T16:56:56.652785
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
21 /
tcp
-731285715 | 2025-03-11T09:23:39.992699
23 /
tcp
-1816600103 | 2025-03-19T11:29:39.533091
24 /
tcp
51259122 | 2025-03-20T18:51:07.090536
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
25 /
tcp
-1399940268 | 2025-03-14T10:18:11.221456
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
43 /
tcp
819727972 | 2025-03-18T20:26:29.332081
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1909001798 | 2025-03-20T07:14:28.864614
HTTP/1.1 200 OK
Server:
X-Frame-Options: SAMEORIGIN
Content-type: text/html; charset=UTF-8
Last-modified: Tue, 21 Dec 2021 03:13:39 GMT
Accept-Ranges: bytes
Content-length: 580
Vary: Accept-Encoding
X-XSS-Protection: 1; mode=block
Strict-Transport-Security: max-age=0
X-Content-Type-Options: nosniff
53 /
tcp
1308081026 | 2025-02-27T02:47:34.231682
9
\x81\x80\x00\x01\x00\x02\x00\x00\x00\x00\x08clients1\x06google\x03com\x00\x00\x01\x00\x01\xc0\x00\x05\x00\x01\x00\x00\x00<\x00\x07clients\x01l\xc0\x15\xc01\x00\x01\x00\x01\x00\x00\x00R\x00\x04\xac٣.
\x00\x06\x81\x05\x00\x01\x00\x00\x00\x00\x00\x00\x
70 /
tcp
-833941849 | 2025-03-14T09:06:08.602569
\x1e\x06\xc2\x81
\x01\x07version\x04bind\x10\x03
79 /
tcp
-2101653054 | 2025-03-09T21:25:39.968152
"Magic:ActiveMQ
Version:12
\x01<\x01ActiveMQ\x01\x01*\x11TcpNoDelayEnabled\x01\x01\x12SizePrefixDisabled\x01 CacheSize\x05\x04ProviderName \x08ActiveMQ\x11StackTraceEnabled\x01\x01\x0fPlatformDetails \x04JavaCacheEnabled\x01\x01\x14TightEncodingEnabl
94 /
tcp
-1399940268 | 2025-03-16T04:00:28.501629
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
104 /
tcp
819727972 | 2025-03-17T08:23:58.555733
SSH-2.0-OpenSSH_7.4
Vulnerabilities
110 /
tcp
1911457608 | 2025-03-10T05:37:34.600068
\x00[\x00\x00\x00\x00\x00\x00
111 /
tcp
-2089734047 | 2025-02-28T17:11:31.802542
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
113 /
tcp
60948681 | 2025-03-11T12:43:00.575404
lpd [@Boyk]: Print-services are not available to your host (aF2qXkQ2m).
141730637 | 2025-03-18T03:52:43.837744
HTTP/1.0 200 OK
Server: Proxy
135 /
tcp
1483120365 | 2025-03-14T17:04:17.069112
\\x05\\x00\r\\x03\\x10\\x00\\x00\\x00\\x18\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x04\\x00\\x01\\x05\\x00\\x00\\x00\\x00\n\nServerAlive2: \n IP1: OP2\n IP2: 192.168.0.20\n IP3: 61.230.135.142\n IP4: 2001:b011:2006:c3ef:18c0:9e02:ef7:84c8\n\nNTLMSSP:\nTarget_Name: OP2\nProduct_Version: 6.1.7601 Ntlm 15\nOS: Windows 7, Service Pack 1/Windows Server 2008 R2, Service Pack 1\nNetBIOS_Domain_Name: OP2\nNetBIOS_Computer_Name: OP2\nDNS_Domain_Name: OP2\nDNS_Computer_Name: OP2\nSystem_Time: 2024-01-22 07:10:42 +0000 UTC\n\nDCERPC Dump:\n4b112204-0e19-11d3-b42b-
143 /
tcp
-100373866 | 2025-03-06T23:04:24.498481
* OK TurboMail IMAP4 Service ready\r\n
175 /
tcp
-1626979812 | 2025-03-14T22:39:02.298361
220 Service ready for new user.
177 /
tcp
-1399940268 | 2025-03-04T17:05:33.767267
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
179 /
tcp
-399606100 | 2025-03-18T07:22:15.451071
BGP Message\nType: 3\nMajor error Code: 6\nMinor error Code: 5\n
190 /
tcp
-2089734047 | 2025-03-06T11:38:00.686611
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
195 /
tcp
171352214 | 2025-03-21T00:15:49.672124
-ERR client ip is not in whitelist
234 /
tcp
-1399940268 | 2025-02-28T10:35:45.045425
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
602337838 | 2025-03-08T21:23:29.271006
HTTP/1.1 404 Not Found
Accept-Ranges: bytes
114471724 | 2025-02-25T00:52:23.458267
HTTP/1.1 302
X-Frame-Options: SAMEORIGIN
Server: NSX
389 /
tcp
-1907080992 | 2025-02-26T12:07:22.710864
0\x0c\\x02\\x01\\x01a\\x07\n\\x01\\x00\\x04\\x00\\x04\\x00
427 /
tcp
1530390632 | 2025-03-04T23:16:27.050443
SAAdvert Response:\nVersion: 2\nFunction: SA Advertisement (11)\nURL: service:service-agent://127.0.0.1\nScopeList: default\nAttrributeList: \n\n\nserviceTypes:\nservice:ipmi\nservice:cdserver\nservice:fdserver\nservice:hdserver\nservice:adviser\nservice:lighttpd\nB://l:87/x\n\nResponse of service:ipmi SrvReq:\nVersion: 2\nFunction: Service Reply (2)\nErrorCode: SUCCESS (0)\nURL Entries:\n Lifetime: 65535\n URL: service:ipmi://(none):623\n Lifetime: 65535\n URL: service:ipmi://IEI9CC2C4135A27:623\n\n\nResponse of service:ipmi Attr
440 /
tcp
-1399940268 | 2025-03-20T18:07:34.754524
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
444 /
tcp
-358801646 | 2025-03-17T23:46:53.749490
446 /
tcp
1975288991 | 2025-03-14T12:29:49.229428
447 /
tcp
1308377066 | 2025-03-20T11:58:53.922005
452 /
tcp
-1399940268 | 2025-02-27T22:58:19.244857
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
462 /
tcp
-1835475271 | 2025-03-21T16:32:28.083078
200 NOD32SS 99 (3318497116)\r\n
503 /
tcp
1911457608 | 2025-03-18T07:46:44.822650
\x00[\x00\x00\x00\x00\x00\x00
513 /
tcp
-1399940268 | 2025-03-20T02:22:49.116595
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
515 /
tcp
-754988795 | 2025-03-11T08:18:06.694990
541 /
tcp
-1724505569 | 2025-03-17T11:43:24.069700
\\x16\\x03\\x01\\x018\\x01\\x00\\x014\\x03\\x03\\x92\\xbc;\\xc1\'-E\\xf4\\xde82\\x93\\x93 \\xabY\\xcd&\\xc3%\\xcco\\xda^\\xef\\xc2!Ut\\xbe\\xb8\\xb6 \\x0f\\xeb\\x00\\xe7b5\\xaf\\xea>/\\xa0{\\xd6\\x8b\r\t\\x85\\xbd\\x06\xc9\x9bH\\x8f\\x85?~\\xbbGdz9\\xf4\\x00"\\x13\\x02\\x13\\x03\\x13\\x01\\x00k\\x00=\\xc00\\xc0,\\xc
548 /
tcp
-773160241 | 2025-03-05T13:47:29.256764
Fast Copy: Yes\nExtended Sleep: Yes\nUUIDs: Yes\nUTF8 Server Name: Yes\nDirectory Services: Yes\nReconnect: Yes\nServer Notifications: Yes\nTCP/IP: Yes\nServer Signature: Yes\nServer Message: No\nPassword Saving Prohibited: No\nPassword Changing: Yes\nCopy File: Yes\nServer Name: murphys-airport-time-capsule\nMachine Type: \\x10TimeCapsule8,119\nAFP Versions: AFP3.3, AFP3.2, AFP3.1\nUAMs: DHCAST128\\x04,DHX2\\x03,SRP\\x06,Recon1C\nServer Signature: 4338365332344c58463948350069672d
554 /
tcp
1060450357 | 2025-03-22T20:43:29.600868
RTSP/1.0 200 OK
CSeq: 1
Keep-Alive: timeout=10, max=1000
Public: DESCRIBE, SETUP, TEARDOWN, PLAY, PAUSE, SET_PARAMETER, GET_PARAMETER
Connection: Keep-Alive
587 /
tcp
1332630808 | 2025-03-04T10:23:30.819490
220 ESMTP MAIL Server\r\n250-mail.kyoeisha.com.tw\r\n250-PIPELINING\r\n250-SIZE 20480000\r\n250-VRFY\r\n250-ETRN\r\n250-STARTTLS\r\n250-AUTH PLAIN LOGIN\r\n250-ENHANCEDSTATUSCODES\r\n250-8BITMIME\r\n250-DSN\r\n250-SMTPUTF8\r\n250 CHUNKING\r\n502 5.5.2 Error: command not recognized\r\n
593 /
tcp
1308377066 | 2025-03-22T23:53:01.899358
1239199743 | 2025-03-18T07:06:26.732445
HTTP/1.1 400 Bad Request
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 9-24676686-0 0NNN RT(1705910221170 116) q(-1 -1 -1 -1) r(0 -1) b1
646 /
tcp
467396528 | 2025-02-23T14:28:39.356854
\\x00\\x01\\x00\\x1c\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x01\\x00\\x12\\x00\\x00\\x7f\\xe8\\x03\\x00\\x00\n\\x80\\x00\\x00\\x03\\x00\\x00\\x00\\x00\\x00\\x00
689 /
tcp
677934968 | 2025-03-05T11:31:36.518103
771 /
tcp
45131230 | 2025-02-28T04:10:54.031256
inv2W\x04\x0f\x00\x00\x00\x01\x00\t\x00\x00\x00
806 /
tcp
-249504111 | 2025-02-28T13:44:59.475346
831 /
tcp
-1399940268 | 2025-03-09T16:44:57.422424
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
832 /
tcp
1911457608 | 2025-02-23T01:56:03.510491
\x00[\x00\x00\x00\x00\x00\x00
902 /
tcp
1956828827 | 2025-03-05T03:06:56.660535
220 VMware Authentication Daemon Version 1.10: SSL Required, Se
rverDaemonProtocol:SOAP, MKSDisplayProtocol:VNC , , NFCSSL supported/t
-1242315829 | 2025-02-24T03:55:33.619940
HTTP/1.1 302 Found
Content-Type: text/html; charset=utf-8
Location: /app/
Permissions-Policy: autoplay=(), camera=(), microphone=(), usb=()
Referrer-Policy: same-origin
Vary: Origin
X-Content-Type-Options: nosniff
X-Frame-Options: DENY
993 /
tcp
408230060 | 2025-03-22T23:46:09.494705
\r\nSorry, that nickname format is invalid.\r\n
995 /
tcp
689999346 | 2025-03-04T21:53:36.961677
+OK The Microsoft Exchange POP3 service is ready. [SgBIADAAUABSADAAMQBDAEEAMAAwADUAMgAuAGEAcABjAHAAcgBkADAAMQAuAHAAcgBvAGQALgBlAHgAYwBoAGEAbgBnAGUAbABhAGIAcwAuAGMAbwBtAA==]\r\n
998 /
tcp
-1114821551 | 2025-03-15T17:46:13.060842
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
1013 /
tcp
-1261090339 | 2025-03-04T15:20:36.575291
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
1022 /
tcp
819727972 | 2025-03-09T21:40:57.603124
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1023 /
tcp
-79865617 | 2025-03-21T20:14:20.541888
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com
mit-revprops depth log-revprops partial-replay ) ) )
1025 /
tcp
-1888448627 | 2025-03-08T12:29:14.498056
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
1080 /
tcp
1362344524 | 2025-03-18T06:37:32.743281
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.7
1099 /
tcp
1210754493 | 2025-03-23T08:14:08.495123
0\x0c\x02\x01\x01a\x07\n\x01\x00\x04\x00\x04\x00
1153 /
tcp
1911457608 | 2025-03-15T03:53:40.880383
\x00[\x00\x00\x00\x00\x00\x00
1337 /
tcp
2087396567 | 2025-03-18T06:47:12.136712
kjnkjabhbanc283ubcsbhdc72
1355 /
tcp
819727972 | 2025-02-28T07:16:31.576621
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1414 /
tcp
-1036370807 | 2025-03-21T07:56:16.772227
1452 /
tcp
1989907056 | 2025-02-26T16:21:31.488528
RTSP/1.0 453 Not Enough Bandwidth\r\nServer: AirTunes/7l_wZ\r\n\r\n
1515 /
tcp
2087396567 | 2025-03-15T01:48:02.981881
kjnkjabhbanc283ubcsbhdc72
1521 /
tcp
1975288991 | 2025-03-14T07:19:17.740855
1599 /
tcp
2087396567 | 2025-03-23T01:28:00.212670
kjnkjabhbanc283ubcsbhdc72
1077013874 | 2025-03-04T13:54:20.669853
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
1723 /
tcp
-1608241410 | 2025-03-19T03:19:26.438594
Firmware: 1\nHostname: local\nVendor: linux\n
1800 /
tcp
-457235091 | 2025-03-12T22:13:53.207163
audio 0 RTP/AVP 18 4 3 8 0 101\r\na
1801 /
tcp
-1139999322 | 2025-03-23T01:36:47.672754
\\x10Z\x0b\\x00LIOR<\\x02\\x00\\x00\\xff\\xff\\xff\\xff\\x00\\x00\\x12\\x00a36a0e421af47074\\xf2\\xdby\\x96\\xbb\\xb1LE\\xa1\\x1f.%\xd2\xbft\\xb692d3\\x10\\x03\\x00\\x00ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ
1883 /
tcp
-1032713145 | 2025-03-22T18:05:15.509030
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
1911 /
tcp
1208318993 | 2025-03-16T03:08:25.292299
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
1926 /
tcp
1984588611 | 2025-02-27T14:45:01.145161
1959 /
tcp
-339084706 | 2025-03-10T07:02:13.578991
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
1977 /
tcp
-1428621233 | 2025-02-23T04:35:06.521093
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
1984 /
tcp
-42767839 | 2025-03-07T17:13:49.982012
RFB 005.000
VNC:
Protocol Version: 5.0
1987 /
tcp
1911457608 | 2025-02-21T20:02:19.435672
\x00[\x00\x00\x00\x00\x00\x00
2000 /
tcp
-1399940268 | 2025-03-21T21:15:43.072646
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2001 /
tcp
2098371729 | 2025-03-17T00:14:26.643202
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
2002 /
tcp
-1681927087 | 2025-02-28T10:23:43.438538
kjnkjabhbanc283ubcsbhdc72
2003 /
tcp
-1399940268 | 2025-03-19T08:36:23.358553
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2008 /
tcp
1978059005 | 2025-03-21T20:02:46.513001
Sorry, that nickname format is invalid.
2055 /
tcp
1504401647 | 2025-03-13T18:14:59.809931
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
2060 /
tcp
-1611764932 | 2025-03-18T21:18:26.052750
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
2063 /
tcp
398077695 | 2025-03-09T10:03:15.599853
2067 /
tcp
819727972 | 2025-03-23T08:38:30.860157
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2069 /
tcp
-1996280214 | 2025-03-04T10:18:00.509621
2077 /
tcp
-2089734047 | 2025-03-23T01:37:50.998607
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
2079 /
tcp
1278527606 | 2025-02-25T20:27:29.333333
2081 /
tcp
-2089734047 | 2025-03-22T01:05:33.663077
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
2083 /
tcp
1189133115 | 2025-02-27T17:51:15.684448
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
2087 /
tcp
539065883 | 2025-02-28T19:31:00.441214
2090 /
tcp
819727972 | 2025-03-22T20:41:31.851059
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2096 /
tcp
1541211644 | 2025-03-10T21:59:59.765242
2101 /
tcp
1213931722 | 2025-03-19T18:53:03.364111
ICAP/1.0 501 Other\r\nServer: Traffic Spicer 7788179225\r\n
2103 /
tcp
826567260 | 2025-03-15T07:25:07.481398
\\x05\\x00\r\\x03\\x10\\x00\\x00\\x00\\x18\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x04\\x00\\x01\\x05\\x00\\x00\\x00\\x00
2107 /
tcp
-1399940268 | 2025-03-23T12:57:21.361833
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2121 /
tcp
2047379038 | 2025-02-26T03:18:45.976164
220 RS820Plus FTP server ready.
2154 /
tcp
1948301213 | 2025-03-14T03:34:37.655917
RFB 003.003
VNC:
Protocol Version: 3.3
2181 /
tcp
546151771 | 2025-03-10T02:25:53.679992
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC
Clients:
/*.*.*.*:11264[0](queued=0,recved=1,sent=0)
Latency min/avg/max: 0/0.0/0
Received: 8557
Sent: 11410
Connections: 1
Outstanding: 0
Zxid: 0x332907ad3391
Mode: follower
Node count: 104618
2195 /
tcp
-146605374 | 2025-02-28T17:09:05.393923
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
2201 /
tcp
-358801646 | 2025-03-21T02:53:23.729358
2202 /
tcp
819727972 | 2025-03-05T19:02:34.083549
SSH-2.0-OpenSSH_7.4
Vulnerabilities
372433470 | 2025-03-22T13:39:41.351512
HTTP/1.1 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm=""
2250 /
tcp
-1730858130 | 2025-03-05T15:15:19.540222
RFB 003.008
VNC:
Protocol Version: 3.8
1662205251 | 2025-02-22T12:16:30.063570
HTTP/1.0 404 FAIL
Content-length:5
Connection:Close
2344 /
tcp
165188539 | 2025-03-04T04:46:48.923945
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
2345 /
tcp
-1888448627 | 2025-03-05T03:39:05.924961
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
-1013082686 | 2025-03-06T17:02:40.326859
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
2404 /
tcp
-2031152423 | 2025-03-21T14:22:58.069994
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
2443 /
tcp
-1810987450 | 2025-03-20T12:10:29.140733
-1839934832 | 2025-03-23T04:24:14.296968
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
-1839934832 | 2025-03-17T15:14:49.156649
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
2506 /
tcp
366084633 | 2025-03-20T16:28:29.419597
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
2601 /
tcp
-345718689 | 2025-03-22T18:23:23.826844
2628 /
tcp
1741579575 | 2025-03-20T21:36:40.411082
2762 /
tcp
1911457608 | 2025-03-17T01:51:05.316732
\x00[\x00\x00\x00\x00\x00\x00
3001 /
tcp
-971970408 | 2025-03-17T02:43:29.448053
3008 /
tcp
820958131 | 2025-03-20T16:44:07.545373
kjnkjabhbanc283ubcsbhdc72\x02
3009 /
tcp
1911457608 | 2025-03-22T04:36:11.032253
\x00[\x00\x00\x00\x00\x00\x00
3010 /
tcp
1911457608 | 2025-03-05T05:40:10.909175
\x00[\x00\x00\x00\x00\x00\x00
3050 /
tcp
1911457608 | 2025-03-19T08:45:20.129196
\x00[\x00\x00\x00\x00\x00\x00
3051 /
tcp
921225407 | 2025-02-24T22:47:19.926079
\x00\x00\x00\x04\x00\x00\x00\x00\x00
3062 /
tcp
1911457608 | 2025-02-27T06:34:51.361837
\x00[\x00\x00\x00\x00\x00\x00
3063 /
tcp
1632932802 | 2025-02-28T17:20:11.898677
3088 /
tcp
-2031152423 | 2025-03-16T15:57:54.496230
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
3091 /
tcp
671605376 | 2025-03-15T02:27:52.455719
3108 /
tcp
-2031152423 | 2025-03-22T01:49:48.380435
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
3118 /
tcp
-1986594217 | 2025-03-18T02:42:42.303584
"AP0F1D85"\r\nConnection: close\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD>\n<BODY BGCOLOR
3120 /
tcp
819727972 | 2025-03-21T21:08:34.993005
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3129 /
tcp
-2089734047 | 2025-03-21T22:26:54.324628
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3147 /
tcp
-1327660293 | 2025-03-14T22:44:50.181868
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
3163 /
tcp
1911457608 | 2025-03-15T14:32:50.031184
\x00[\x00\x00\x00\x00\x00\x00
3177 /
tcp
-1399940268 | 2025-03-14T19:54:21.068347
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3180 /
tcp
740837454 | 2025-02-26T07:06:46.180183
SSH-2.0-OpenSSH_5.3
Vulnerabilities
3183 /
tcp
740837454 | 2025-02-27T08:52:04.656198
SSH-2.0-OpenSSH_5.3
Vulnerabilities
3192 /
tcp
1189133115 | 2025-03-04T13:20:12.300811
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
3256 /
tcp
2087396567 | 2025-03-14T17:07:02.144344
kjnkjabhbanc283ubcsbhdc72
198844676 | 2025-02-25T19:54:59.620839
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3269 /
tcp
103159425 | 2025-03-20T22:43:18.562271
3299 /
tcp
1741579575 | 2025-02-27T02:10:36.258542
3301 /
tcp
-1399940268 | 2025-03-20T18:21:11.456130
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3306 /
tcp
-1230509234 | 2025-03-15T18:30:51.935597
J\\x00\\x00\\x00\\xffj\\x04Host \'*.*.*.*\' is not allowed to connect to this MariaDB server
3310 /
tcp
-1795027372 | 2025-03-21T04:22:56.718855
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
3342 /
tcp
-1399940268 | 2025-02-27T06:39:50.708674
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3349 /
tcp
-832380282 | 2025-03-19T05:54:29.853658
lpd [@Boyk]: Print-services are not available to your host (aF2qXkQ2m).\n
3388 /
tcp
1911457608 | 2025-03-21T02:26:56.546428
\x00[\x00\x00\x00\x00\x00\x00
3389 /
tcp
521595461 | 2025-03-13T23:44:24.112987
Remote Desktop Protocol\n\\x03\\x00\\x00\\x13\\x0e\\xd0\\x00\\x00\\x124\\x00\\x03\\x00\\x08\\x00\\x02\\x00\\x00\\x00\n\nGuess_OS:Windows Server 2003 or 2008\nFlag: PROTOCOL_HYBRID\n
3403 /
tcp
321971019 | 2025-03-11T06:20:08.440135
-ERR client ip is not in whitelist\r
3405 /
tcp
-1730858130 | 2025-03-18T21:38:27.485208
RFB 003.008
VNC:
Protocol Version: 3.8
3521 /
tcp
-2089734047 | 2025-03-04T04:46:51.854041
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3523 /
tcp
819727972 | 2025-03-05T17:16:33.233199
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3550 /
tcp
-1399940268 | 2025-02-28T21:13:04.990260
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
198844676 | 2025-03-12T02:55:57.279571
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3552 /
tcp
-345718689 | 2025-03-20T21:33:51.301596
3690 /
tcp
-891714208 | 2025-02-22T14:24:16.824919
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
3780 /
tcp
842535728 | 2025-03-19T02:13:55.457716
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>
A<!DOCTYPE GANGLIA_XML [
<!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...
3790 /
tcp
104385780 | 2025-03-20T23:13:56.174447
3794 /
tcp
-1399940268 | 2025-03-23T08:51:39.065563
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3953 /
tcp
1134517380 | 2025-03-14T23:04:36.119918
welcome to Pandora console!\r\n----------------------------\n-------------------------\n| Login Time | 2021-12-08 1...\n
470305186 | 2025-03-22T10:36:35.169410
HTTP/1.1 200 OK
Content-Type: text/html
Accept-Ranges: bytes
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
4001 /
tcp
-1399940268 | 2025-02-27T06:28:19.063081
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2103111368 | 2025-03-04T21:16:36.680805
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
4063 /
tcp
2087396567 | 2025-03-17T17:37:32.074960
kjnkjabhbanc283ubcsbhdc72
4064 /
tcp
1911457608 | 2025-03-19T00:01:21.378128
\x00[\x00\x00\x00\x00\x00\x00
4085 /
tcp
-792826324 | 2025-03-12T11:31:56.758916
220 FTP server ready - login please
4147 /
tcp
321971019 | 2025-03-06T15:32:33.942712
-ERR client ip is not in whitelist\r
4157 /
tcp
2087396567 | 2025-03-16T05:52:07.786384
kjnkjabhbanc283ubcsbhdc72
4159 /
tcp
117101543 | 2025-03-10T12:28:20.034112
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
4321 /
tcp
-1250504565 | 2025-03-12T17:58:27.875550
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x80\x00\x04\x00\x01\x00\x00\x00\x05\x00\xff\xff\xff\x00\x00\x04\x08\x00\x00\x00\x00\x00\x7f\xff\x00\x00\x00\x00\x08\x07\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01
4369 /
tcp
632542934 | 2025-03-13T21:13:30.899992
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
4431 /
tcp
819727972 | 2025-03-14T15:44:40.940570
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4433 /
tcp
-1136600457 | 2025-03-09T08:54:12.005868
HELO:10.3.6.0.false
AS:2048
HL:19
4434 /
tcp
-1999117212 | 2025-03-09T07:32:08.175976
4436 /
tcp
-2089734047 | 2025-03-17T08:24:32.122336
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1089570394 | 2025-02-23T03:58:33.512240
HTTP/1.1 403 Forbidden
Server: openresty
Content-Type: text/html
Connection: keep-alive
Deny-Reason: hotload rechange server uri format error!!
Request-Id: 65ae29d9288d03df989018e5e7290002
4444 /
tcp
2087396567 | 2025-03-22T10:06:40.289073
kjnkjabhbanc283ubcsbhdc72
4459 /
tcp
-1648456501 | 2025-03-04T13:28:06.666038
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
4482 /
tcp
-358801646 | 2025-02-22T23:03:51.138368
4500 /
tcp
677934968 | 2025-03-23T02:13:56.425663
4502 /
tcp
165188539 | 2025-03-07T18:06:51.845215
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
4506 /
tcp
-1399940268 | 2025-03-15T16:05:14.948858
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1830697416 | 2025-03-19T19:09:18.422400
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
4840 /
tcp
-1399940268 | 2025-02-24T16:27:10.016767
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4899 /
tcp
-441419608 | 2025-03-13T18:50:41.109683
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
-1453516345 | 2025-03-18T21:16:05.066795
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
4949 /
tcp
819727972 | 2025-03-13T21:40:51.260988
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5001 /
tcp
2033888749 | 2025-03-08T18:59:47.939073
Content-Type: text/rude-rejection
Content-Length: 24
Access Denied, go away.
Content-Type: text/disconnect-notice
C...
1182822286 | 2025-03-13T20:18:54.575563
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae237b_dianxun172_7460-1469
5010 /
tcp
819727972 | 2025-03-16T06:07:01.697577
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5051 /
tcp
-1810987450 | 2025-03-15T23:32:29.931940
5061 /
tcp
-1399940268 | 2025-03-12T09:47:14.395320
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5123 /
tcp
-1399940268 | 2025-03-23T06:47:17.178838
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5130 /
tcp
1161309183 | 2025-03-05T02:06:47.440511
1396488228 | 2025-03-16T18:17:27.789618
HTTP/1.1 200 OK
Content-Length: 2037
Cache-Control: private, max-age=300
Content-Type: text/html
1282941221 | 2025-03-22T22:10:28.459691
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
5234 /
tcp
1208318993 | 2025-03-13T17:04:56.118233
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
5238 /
tcp
50497985 | 2025-03-13T23:36:44.461135
\x00[\xc3\x88\xc3\x9dS\x7f\x00\x00
5246 /
tcp
-2089734047 | 2025-03-14T20:21:21.452292
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
5250 /
tcp
1519486042 | 2025-03-09T20:26:47.206827
<KU_goodbye>Protocol Error: XML data is not well-formed.</KU_goodbye>
5256 /
tcp
632542934 | 2025-03-17T15:29:16.879372
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
5260 /
tcp
819727972 | 2025-02-24T04:38:11.391772
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1743272246 | 2025-03-11T14:53:12.953020
HTTP/1.1 400 Bad Request
Server: CWAP-waf
Content-Type: text/html
Connection: close
WZWS-RAY: 1249-1705940324.547-w-waf01nbzt
5321 /
tcp
380146262 | 2025-03-13T20:11:56.897169
5432 /
tcp
-2096652808 | 2025-03-19T00:42:03.822467
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
5435 /
tcp
-1399940268 | 2025-03-21T08:05:00.379942
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1547976805 | 2025-02-27T21:35:23.842623
HTTP/1.1 403 Forbidden
Server: nginx
Content-Type: text/html
Connection: close
5494 /
tcp
-1399940268 | 2025-02-25T21:27:46.423727
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5597 /
tcp
819727972 | 2025-03-20T12:41:09.334517
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5598 /
tcp
-1399940268 | 2025-02-22T23:43:41.896527
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5605 /
tcp
-407828767 | 2025-03-11T20:03:51.700817
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
5608 /
tcp
-1399940268 | 2025-03-21T17:43:37.861473
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5672 /
tcp
575925250 | 2025-03-19T09:56:01.542732
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
5701 /
tcp
165188539 | 2025-03-05T08:59:08.864627
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
5858 /
tcp
2087396567 | 2025-03-20T22:38:03.762263
kjnkjabhbanc283ubcsbhdc72
5902 /
tcp
-1730858130 | 2025-02-28T17:25:33.087226
RFB 003.008
VNC:
Protocol Version: 3.8
5916 /
tcp
1911457608 | 2025-02-21T18:30:21.754606
\x00[\x00\x00\x00\x00\x00\x00
5938 /
tcp
-1888448627 | 2025-03-08T19:27:44.173429
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
1999272906 | 2025-03-19T07:03:08.380001
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
5988 /
tcp
632542934 | 2025-03-19T16:31:30.682043
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
6000 /
tcp
-1626979812 | 2025-03-15T20:14:46.808924
220 Service ready for new user.
6007 /
tcp
1991883981 | 2025-02-26T08:28:04.794284
B\x00\x00\x00\xc3\xbfn\x04Too many connections
6010 /
tcp
-303199180 | 2025-03-19T06:23:10.510571
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
6011 /
tcp
-1428621233 | 2025-03-15T23:00:56.365901
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
6050 /
tcp
398077695 | 2025-03-18T07:51:25.994095
6102 /
tcp
-1399940268 | 2025-03-14T21:36:42.932922
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6379 /
tcp
321971019 | 2025-03-16T19:52:29.682817
-ERR client ip is not in whitelist\r
-444830029 | 2025-02-28T07:38:02.426245
HTTP/1.1 401 Unauthorized
Server: xhmmhttpsv130-20200310
Cache-Control: no-cache,no-store
Content-Type: text/html; charset=%s
Connection: close
6511 /
tcp
-1399940268 | 2025-02-26T01:31:27.827184
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6550 /
tcp
819727972 | 2025-03-13T16:39:33.100257
SSH-2.0-OpenSSH_7.4
Vulnerabilities
6581 /
tcp
-1476017887 | 2025-03-06T01:09:38.225215
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
2103111368 | 2025-03-19T13:14:49.344210
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
6605 /
tcp
-1399940268 | 2025-03-22T01:00:50.455452
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6653 /
tcp
165188539 | 2025-03-13T16:09:16.179452
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
-1839934832 | 2025-03-19T12:06:15.532386
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
6666 /
tcp
-365662216 | 2025-02-27T08:53:58.609480
6667 /
tcp
1286504516 | 2025-03-07T18:35:13.214881
CP2E Control Console
Connected to Host: gZI
6668 /
tcp
1665283070 | 2025-03-22T07:38:59.691800
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x01\x00\x00\x10\x00\x00\n0\x03\x00\x00\x00\x01\x00\x05\x00\x00@\x00\x00\x06\x00\x00\x1f@
1603638072 | 2025-03-09T04:28:38.266114
HTTP/1.1 503 Service Unavailable
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 9-34100741-0 0NNN RT(1702355519999 185) q(0 -1 -1 -1) r(0 -1)
6789 /
tcp
1911457608 | 2025-03-15T19:59:28.654770
\x00[\x00\x00\x00\x00\x00\x00
6955 /
tcp
1911457608 | 2025-02-25T14:14:08.504280
\x00[\x00\x00\x00\x00\x00\x00
6998 /
tcp
320677201 | 2025-03-13T10:56:28.599071
H\x00\x00\x00\xc3\xbfj\x04Host \'101.133.140.114\' is not allowed to \nconnect to this MySQL server
1220127183 | 2025-03-20T15:18:20.679946
HTTP/1.1 400 Bad Request
Connection: keep-alive
Connection: close
X-Via-JSL: 6958812,-
X-Cache: error
7003 /
tcp
-2089734047 | 2025-02-23T16:11:23.096700
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
7005 /
tcp
921225407 | 2025-02-28T00:06:03.714127
\x00\x00\x00\x04\x00\x00\x00\x00\x00
7006 /
tcp
-1399940268 | 2025-03-23T04:43:10.187420
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7012 /
tcp
-1737707071 | 2025-03-12T13:05:58.347681
\x00b\x00\x01\x00\x00\x00\x00x\x0b\x00\x00\x00\x00z\x00437
572436013 | 2025-03-09T18:10:41.283335
HTTP/1.1 404 Not Found
Content-Type: text/plain
7071 /
tcp
2087396567 | 2025-03-14T23:02:56.622722
kjnkjabhbanc283ubcsbhdc72
7087 /
tcp
165188539 | 2025-03-21T06:37:55.110204
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
7171 /
tcp
819727972 | 2025-03-19T09:16:13.263069
SSH-2.0-OpenSSH_7.4
Vulnerabilities
7173 /
tcp
-1399940268 | 2025-03-20T19:12:19.961543
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7218 /
tcp
-1681927087 | 2025-03-21T10:58:36.714321
kjnkjabhbanc283ubcsbhdc72
7302 /
tcp
-1795027372 | 2025-03-10T22:02:26.715178
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
7415 /
tcp
103159425 | 2025-03-05T09:08:58.276903
7434 /
tcp
-441419608 | 2025-03-13T02:50:04.681168
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
-1027277763 | 2025-02-26T16:54:42.929998
HTTP/1.1 403 Forbidden
Server: openresty
Content-Type: text/html
Connection: keep-alive
via: CHN-GDdongguan-GLOBAL1-CACHE107[2]
X-CCDN-ERRCODE-SRC: 01
X-CCDN-FORBID-CODE: 040001
7510 /
tcp
921225407 | 2025-02-23T03:23:32.249569
\x00\x00\x00\x04\x00\x00\x00\x00\x00
971933601 | 2025-02-28T21:57:37.058999
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
7548 /
tcp
-1316491703 | 2025-03-20T07:43:17.819928
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready
7634 /
tcp
-784071826 | 2025-03-17T01:52:35.341963
SSH-2.0-OpenSSH_8.0
Vulnerabilities
7771 /
tcp
819727972 | 2025-02-24T19:37:46.255871
SSH-2.0-OpenSSH_7.4
Vulnerabilities
7776 /
tcp
1574088840 | 2025-02-21T18:06:21.474462
">Application and Content Networking Software 3.9</a>)\n</BODY><
7782 /
tcp
669849225 | 2025-03-04T14:31:01.362152
SSH-98.60-SysaxSSH_81885..42\r\n
7900 /
tcp
-1399940268 | 2025-03-15T21:52:52.966637
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-2118655245 | 2025-03-16T06:46:11.059282
HTTP/1.0 500 Internal Server Error
Content-Length: 20
8009 /
tcp
2087396567 | 2025-03-11T22:25:00.407378
kjnkjabhbanc283ubcsbhdc72
8020 /
tcp
-2089734047 | 2025-03-14T16:19:12.165422
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8035 /
tcp
-2096652808 | 2025-03-04T03:25:24.109127
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8036 /
tcp
-358801646 | 2025-03-05T19:54:55.086804
8054 /
tcp
819727972 | 2025-03-10T19:35:13.851620
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8062 /
tcp
-358801646 | 2025-02-22T18:00:27.847210
8073 /
tcp
-1733645023 | 2025-03-05T01:09:08.837870
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
8079 /
tcp
-1399940268 | 2025-03-22T06:14:23.155378
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8081 /
tcp
740837454 | 2025-02-28T17:00:57.665132
SSH-2.0-OpenSSH_5.3
Vulnerabilities
8083 /
tcp
1261582754 | 2025-03-18T10:01:44.390045
unknown command
unknown command
8085 /
tcp
-971970408 | 2025-02-24T23:05:04.165083
8087 /
tcp
740837454 | 2025-03-22T21:29:16.093683
SSH-2.0-OpenSSH_5.3
Vulnerabilities
8089 /
tcp
-971970408 | 2025-03-06T01:48:57.419958
-1839934832 | 2025-03-15T03:11:39.703882
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
8116 /
tcp
-274082663 | 2025-02-25T22:09:59.611134
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
8120 /
tcp
-653033013 | 2025-03-07T09:42:19.793234
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
8124 /
tcp
165188539 | 2025-03-10T19:21:34.485152
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8126 /
tcp
-747911285 | 2025-03-20T12:16:58.750263
-1839934832 | 2025-02-21T17:59:09.726768
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
8139 /
tcp
-1872120160 | 2025-03-09T13:19:10.975733
">Application and Content Networking Software 3.9</a>)
</BODY><
8160 /
tcp
-1538260461 | 2025-03-23T00:50:59.280461
8161 /
tcp
-1730858130 | 2025-03-11T10:36:33.375500
RFB 003.008
VNC:
Protocol Version: 3.8
8166 /
tcp
-1399940268 | 2025-02-28T18:40:27.913167
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8179 /
tcp
921225407 | 2025-03-20T17:13:25.436154
\x00\x00\x00\x04\x00\x00\x00\x00\x00
8181 /
tcp
-653033013 | 2025-03-21T07:47:01.592844
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
8187 /
tcp
-2096652808 | 2025-03-21T05:04:28.276089
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
1317779273 | 2025-03-23T04:30:15.806712
HTTP/1.1 401 Unauthorized
Server: 2001639b-4d38-223a-b87-f9a82c7113c5
Cache-Control: no-cache,no-store
Content-Type: text/html; charset=%s
Connection: close
8193 /
tcp
1492413928 | 2025-03-13T03:36:20.813529
SSH-2.0-OpenSSH_7.5
Vulnerabilities
1320285193 | 2025-03-22T02:30:36.752872
HTTP/1.1 404 Not Found
Server: CloudWAF
Content-Type: text/html
Connection: keep-alive
19227125 | 2025-03-05T22:15:49.094825
HTTP/1.1 200 OK
CONNECTION: close
Etag: "1615985214:91b0"
CONTENT-LENGTH: 37296
CACHE-CONTROL: max-age=0
X-Frame-Options: SAMEORIGIN
Strict-Transport-Security: max-age=604800; includeSubDomains
X-XSS-Protection: 1;mode=block
X-Content-Type-Options: nosniff
CONTENT-TYPE: text/html
8237 /
tcp
722711397 | 2025-03-13T00:01:54.185515
\x00[M\xc3\xba\xc3\x9a\x7f\x00\x00
8250 /
tcp
1761482307 | 2025-02-25T21:06:28.888610
\x00[\xc2\xa5\t\xc2\xbe\x7f\x00\x00
8284 /
tcp
-1261090339 | 2025-03-15T05:05:09.086015
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
1282941221 | 2025-03-17T07:12:51.476930
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
8317 /
tcp
1381121983 | 2025-03-05T23:48:54.392354
8319 /
tcp
921225407 | 2025-02-26T20:02:22.413822
\x00\x00\x00\x04\x00\x00\x00\x00\x00
8350 /
tcp
-1648456501 | 2025-03-10T14:13:00.283558
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
8405 /
tcp
1919228981 | 2025-03-21T06:23:01.714703
\x00\x1e\x00\x06\xc2\x81\xc2\x85\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
8410 /
tcp
165188539 | 2025-03-01T01:46:52.681848
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8451 /
tcp
819727972 | 2025-03-10T19:19:39.363547
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8454 /
tcp
-1888448627 | 2025-03-23T08:44:59.192359
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8456 /
tcp
2063598737 | 2025-03-14T10:20:51.368492
8457 /
tcp
1504401647 | 2025-03-22T00:37:58.429052
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
8462 /
tcp
-1888448627 | 2025-03-13T15:37:42.847465
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8505 /
tcp
632542934 | 2025-03-14T08:47:58.582951
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
8506 /
tcp
205347087 | 2025-03-19T22:09:36.381804
SSH-25453-Cisco-3524665.35\n
8510 /
tcp
1911457608 | 2025-03-20T13:21:29.535392
\x00[\x00\x00\x00\x00\x00\x00
8520 /
tcp
-2089734047 | 2025-03-10T21:21:43.994290
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8526 /
tcp
1911457608 | 2025-03-17T05:13:12.288565
\x00[\x00\x00\x00\x00\x00\x00
8533 /
tcp
-1648456501 | 2025-03-14T19:55:40.122903
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
8536 /
tcp
-1737707071 | 2025-03-09T05:35:40.118366
\x00b\x00\x01\x00\x00\x00\x00x\x0b\x00\x00\x00\x00z\x00437
8545 /
tcp
707919486 | 2025-03-22T23:20:53.181664
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
8549 /
tcp
-1399940268 | 2025-03-12T13:34:59.057168
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8551 /
tcp
639175818 | 2025-03-17T09:37:30.425285
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
8553 /
tcp
2098371729 | 2025-03-13T04:13:13.230188
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
8569 /
tcp
1830187220 | 2025-02-25T21:53:39.931930
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
8570 /
tcp
819727972 | 2025-02-21T14:40:57.221741
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8571 /
tcp
1948301213 | 2025-02-28T22:48:22.252543
RFB 003.003
VNC:
Protocol Version: 3.3
8575 /
tcp
-2096652808 | 2025-03-10T12:47:18.375961
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8577 /
tcp
-2096652808 | 2025-03-21T01:25:30.040733
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8583 /
tcp
-1611764932 | 2025-03-05T17:15:34.867989
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
8589 /
tcp
1504401647 | 2025-03-10T05:03:51.168457
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
8602 /
tcp
-904840257 | 2025-03-16T21:20:28.725614
572 Relay not authorized\r\n
8606 /
tcp
1665283070 | 2025-03-20T10:30:04.685303
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x01\x00\x00\x10\x00\x00\n0\x03\x00\x00\x00\x01\x00\x05\x00\x00@\x00\x00\x06\x00\x00\x1f@
8640 /
tcp
-1888448627 | 2025-03-12T09:52:10.962313
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
1489954473 | 2025-03-23T03:13:33.215663
HTTP/1.1 410 Gone
Server: openresty
Transfer-Encoding: chunked
Connection: keep-alive
Via: 1.1 google
8688 /
tcp
-1399940268 | 2025-02-23T17:55:09.695628
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8707 /
tcp
1911457608 | 2025-03-23T04:21:52.400798
\x00[\x00\x00\x00\x00\x00\x00
8709 /
tcp
-2096652808 | 2025-03-08T15:52:06.309604
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8728 /
tcp
597764502 | 2025-03-21T09:50:39.053606
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
8731 /
tcp
-375604792 | 2025-03-07T14:38:12.513114
220 Microsoft FTP Service
8801 /
tcp
-1733106930 | 2025-02-27T18:14:04.494216
Mysql Version: 5.6.50-log\nN\n5.6.50-log\x14(\nG5se"tGE\xc3\xbf\xc3\xb7-\x02\x7f\xc2\x80\x15cB^3$Zwh$wM[mysql_native_password
8802 /
tcp
165188539 | 2025-03-06T10:12:33.451027
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8803 /
tcp
-339084706 | 2025-03-12T04:56:33.671153
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
8821 /
tcp
707919486 | 2025-03-19T17:31:51.753003
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
8823 /
tcp
-1888448627 | 2025-03-12T13:48:55.063225
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
8834 /
tcp
-1760806421 | 2025-03-09T05:14:11.503889
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected
8850 /
tcp
1911457608 | 2025-03-11T18:48:37.453826
\x00[\x00\x00\x00\x00\x00\x00
8852 /
tcp
165188539 | 2025-03-15T23:04:55.382234
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8858 /
tcp
165188539 | 2025-02-27T22:04:27.416961
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8865 /
tcp
-1327660293 | 2025-02-27T14:47:08.105249
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
8871 /
tcp
-904840257 | 2025-03-17T01:39:55.064422
572 Relay not authorized\r\n
8879 /
tcp
-1399940268 | 2025-03-08T17:36:47.727420
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8880 /
tcp
117101543 | 2025-02-27T21:40:10.335971
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
8882 /
tcp
-1810987450 | 2025-03-06T07:15:09.867792
8883 /
tcp
-1810987450 | 2025-03-17T06:18:32.531329
1396488228 | 2025-03-10T12:02:22.433007
HTTP/1.1 200 OK
Content-Length: 2037
Cache-Control: private, max-age=300
Content-Type: text/html
8891 /
tcp
-2089734047 | 2025-03-08T19:00:07.873755
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
372433470 | 2025-03-21T04:28:48.497090
HTTP/1.1 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm=""
8912 /
tcp
-1730858130 | 2025-03-17T14:38:10.743709
RFB 003.008
VNC:
Protocol Version: 3.8
8980 /
tcp
-747911285 | 2025-02-22T15:35:59.009412
-2107996212 | 2025-03-06T20:09:41.100942
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
9000 /
tcp
-2067028711 | 2025-03-21T23:37:48.444238
\x15\x03\x01\x00\x02\x02F
9002 /
tcp
-971970408 | 2025-03-14T18:59:02.247192
9004 /
tcp
-1399940268 | 2025-03-19T12:56:42.391506
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9017 /
tcp
-1261090339 | 2025-03-11T05:09:03.433417
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
9020 /
tcp
-2089734047 | 2025-03-21T21:54:39.700558
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9042 /
tcp
165188539 | 2025-03-12T07:47:04.690094
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
9046 /
tcp
632542934 | 2025-03-07T16:39:17.238988
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
9048 /
tcp
1308377066 | 2025-03-12T00:13:50.416104
9051 /
tcp
-971970408 | 2025-03-07T05:27:03.383453
9077 /
tcp
-1279886438 | 2025-03-22T09:16:29.015960
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
9091 /
tcp
-971970408 | 2025-03-20T23:01:46.496721
9094 /
tcp
165188539 | 2025-03-20T02:03:44.062502
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
9095 /
tcp
2087396567 | 2025-03-18T23:38:51.563719
kjnkjabhbanc283ubcsbhdc72
-2091357501 | 2025-03-12T21:19:04.528761
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae24ed_PS-000-01laU45_33498-16549
9100 /
tcp
-375604792 | 2025-03-18T22:11:34.460066
220 Microsoft FTP Service
9104 /
tcp
897328069 | 2025-03-16T06:01:43.393773
220 mail.scott000.com ESMTP
9114 /
tcp
819727972 | 2025-02-28T19:12:28.306410
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9119 /
tcp
-1399940268 | 2025-02-25T09:02:50.402769
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9124 /
tcp
-2089734047 | 2025-03-01T00:14:29.444078
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9137 /
tcp
1991883981 | 2025-03-17T20:44:50.608651
B\x00\x00\x00\xc3\xbfn\x04Too many connections
9151 /
tcp
841014058 | 2025-03-14T10:25:32.071736
Hello, this is FRRouting (version 4.0).
Copyright 19
96-2005 Kunihiro Ishiguro, et al.
Use...
9156 /
tcp
-1399940268 | 2025-03-17T01:11:17.640215
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9158 /
tcp
740837454 | 2025-03-19T13:53:35.063609
SSH-2.0-OpenSSH_5.3
Vulnerabilities
-1839934832 | 2025-03-22T15:12:26.158074
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
9162 /
tcp
1911457608 | 2025-03-19T12:24:06.084294
\x00[\x00\x00\x00\x00\x00\x00
1282941221 | 2025-03-19T23:03:40.427991
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
9188 /
tcp
-1487943323 | 2025-02-27T00:56:02.534908
431 Unable to negotiate secure command connection.\r\n
9194 /
tcp
819727972 | 2025-02-24T11:24:36.366680
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9195 /
tcp
504717326 | 2025-03-14T10:39:39.836343
SSH-2.0-OpenSSH_8.6
Vulnerabilities
9198 /
tcp
1761482307 | 2025-02-25T10:36:48.295309
\x00[\xc2\xa5\t\xc2\xbe\x7f\x00\x00
-1163346640 | 2025-02-22T19:40:57.204302
HTTP/1.1 200 OK
content-type: application/json; charset=UTF-8
content-length: 215
9210 /
tcp
-1487943323 | 2025-03-06T01:49:43.414065
431 Unable to negotiate secure command connection.\r\n
9211 /
tcp
921225407 | 2025-03-17T05:03:54.160031
\x00\x00\x00\x04\x00\x00\x00\x00\x00
9214 /
tcp
-2089734047 | 2025-03-04T08:28:18.204041
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9250 /
tcp
-1538260461 | 2025-02-25T14:32:11.311684
9300 /
tcp
-2089734047 | 2025-03-14T04:59:49.689108
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9333 /
tcp
-1729629024 | 2025-03-15T22:09:05.428332
9398 /
tcp
-2096652808 | 2025-03-05T05:15:33.147149
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
9418 /
tcp
233634112 | 2025-03-12T00:38:20.177055
SSH-98.60-SysaxSSH_81885..42
9513 /
tcp
-904840257 | 2025-03-10T09:05:37.901083
572 Relay not authorized\r\n
9515 /
tcp
1620329124 | 2025-03-09T08:04:28.569718
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\x01\xc3\xbf\xc3\xbb\x03\xc3\xbf\xc3\xbd\x01\xc3\xbf\xc3\xbe\x01Username:
9530 /
tcp
1911457608 | 2025-02-28T10:12:10.837336
\x00[\x00\x00\x00\x00\x00\x00
9600 /
tcp
632542934 | 2025-03-15T23:37:18.049192
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
9606 /
tcp
-1538260461 | 2025-03-18T04:13:08.830125
9611 /
tcp
-1399940268 | 2025-03-14T00:30:07.001485
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9633 /
tcp
2087396567 | 2025-02-22T10:08:01.593898
kjnkjabhbanc283ubcsbhdc72
9658 /
tcp
-1327660293 | 2025-03-09T08:52:12.764647
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
9700 /
tcp
-1399940268 | 2025-03-23T11:45:01.205398
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9711 /
tcp
1767345577 | 2025-02-28T06:01:51.243419
Hello, this is Quagga (version 0T).
Copyright 1996-200
9779 /
tcp
937756010 | 2025-02-23T09:26:45.306008
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x01\x00\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
0 | 2025-03-10T05:02:11.775798
HTTP/1.1 408 Request Timeout
content-length: 0
1320285193 | 2025-03-06T01:48:38.374268
HTTP/1.1 404 Not Found
Server: CloudWAF
Content-Type: text/html
Connection: keep-alive
9901 /
tcp
-832380282 | 2025-03-18T19:13:24.194493
lpd [@Boyk]: Print-services are not available to your host (aF2qXkQ2m).\n
-1839934832 | 2025-03-05T13:45:50.156214
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
9918 /
tcp
745343730 | 2025-03-08T18:31:03.806356
220 smtp.qq.com Esmtp QQ Mail Server
9922 /
tcp
819727972 | 2025-03-14T21:40:17.565691
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9944 /
tcp
2087396567 | 2025-03-18T05:47:30.995035
kjnkjabhbanc283ubcsbhdc72
9991 /
tcp
1948301213 | 2025-03-13T03:23:30.409461
RFB 003.003
VNC:
Protocol Version: 3.3
9994 /
tcp
-1399940268 | 2025-03-19T15:36:30.367918
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1917695220 | 2025-03-11T12:54:29.460165
HTTP/1.1 200 OK
Server: Jetty(9.4.8.v20171121)
9999 /
tcp
1161309183 | 2025-03-22T18:23:30.703015
10000 /
tcp
-971970408 | 2025-03-06T14:23:39.942884
10001 /
tcp
1492413928 | 2025-02-23T10:59:20.597442
SSH-2.0-OpenSSH_7.5
Vulnerabilities
10010 /
tcp
366084633 | 2025-02-22T23:05:24.155862
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
10015 /
tcp
-2089734047 | 2025-03-04T04:02:59.729234
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
10018 /
tcp
819727972 | 2025-03-05T20:17:04.535577
SSH-2.0-OpenSSH_7.4
Vulnerabilities
10032 /
tcp
-1399940268 | 2025-03-22T05:42:17.326006
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10038 /
tcp
-1399940268 | 2025-02-24T04:37:36.743397
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10049 /
tcp
1623746877 | 2025-03-20T10:09:45.056166
500 Permission denied - closing connection.\r\n
10065 /
tcp
-1099385124 | 2025-03-03T20:05:50.858906
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
10083 /
tcp
2098371729 | 2025-03-01T01:29:07.307702
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
10089 /
tcp
639175818 | 2025-03-17T16:49:55.502101
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
1282941221 | 2025-03-21T04:47:04.346882
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
10205 /
tcp
-1399940268 | 2025-02-23T05:02:08.258236
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-2107996212 | 2025-03-13T08:01:17.764132
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
10225 /
tcp
-2089734047 | 2025-03-09T09:29:29.424146
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
-1839934832 | 2025-03-16T06:19:01.869500
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
10250 /
tcp
957278843 | 2025-03-17T17:52:29.975275
10251 /
tcp
-2089734047 | 2025-03-14T18:51:24.180282
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
10533 /
tcp
321971019 | 2025-03-07T14:29:02.898080
-ERR client ip is not in whitelist\r
10554 /
tcp
-68075478 | 2025-03-06T06:07:31.226532
10911 /
tcp
1911457608 | 2025-03-15T02:34:21.803621
\x00[\x00\x00\x00\x00\x00\x00
11000 /
tcp
-1399940268 | 2025-03-19T14:24:58.096612
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
11027 /
tcp
1541211644 | 2025-03-15T05:31:42.094726
11065 /
tcp
165188539 | 2025-03-11T01:27:17.358136
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
11082 /
tcp
632542934 | 2025-03-19T18:41:55.969944
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
114471724 | 2025-03-12T22:01:19.782363
HTTP/1.1 302
X-Frame-Options: SAMEORIGIN
Server: NSX
11210 /
tcp
599074451 | 2025-03-18T11:45:08.130392
11211 /
tcp
-136006866 | 2025-03-20T08:05:59.541602
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
11288 /
tcp
819727972 | 2025-03-17T23:27:06.921048
SSH-2.0-OpenSSH_7.4
Vulnerabilities
11300 /
tcp
1911457608 | 2025-03-22T16:56:07.160953
\x00[\x00\x00\x00\x00\x00\x00
11601 /
tcp
165188539 | 2025-03-10T08:18:34.391988
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
227700176 | 2025-03-23T00:15:03.071886
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding
Cache-Control: no-store, no-transform
Set-Cookie: _csrf=kW6lEf7WlBTiDChV5oht1zfpUBE6MTcwNTkxMjc1NjU1NzkzNjYwNQ; Path=/; Expires=Tue, 23 Jan 2024 08:39:16 GMT; HttpOnly; SameSite=Lax
Set-Cookie: macaron_flash=; Path=/; Max-Age=0; HttpOnly; SameSite=Lax
X-Frame-Options: SAMEORIGIN
Cache-Control: no-cache
12112 /
tcp
1911457608 | 2025-03-21T09:21:41.501730
\x00[\x00\x00\x00\x00\x00\x00
12115 /
tcp
-891714208 | 2025-03-17T21:03:35.268241
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
12120 /
tcp
-1888448627 | 2025-03-05T00:20:38.760792
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12136 /
tcp
-1399940268 | 2025-02-26T16:06:23.767463
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12140 /
tcp
1911457608 | 2025-02-23T23:19:12.638849
\x00[\x00\x00\x00\x00\x00\x00
12146 /
tcp
1948301213 | 2025-03-21T01:10:58.297214
RFB 003.003
VNC:
Protocol Version: 3.3
12149 /
tcp
-1399940268 | 2025-02-24T09:13:48.207838
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12161 /
tcp
-1399940268 | 2025-03-11T23:37:27.341615
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12168 /
tcp
921225407 | 2025-03-16T15:33:52.142986
\x00\x00\x00\x04\x00\x00\x00\x00\x00
12173 /
tcp
819727972 | 2025-03-18T03:41:43.664212
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12193 /
tcp
-445721795 | 2025-02-25T14:20:36.799283
\x00[\xc3\xaed\x1a\x7f\x00\x00
12194 /
tcp
-2096652808 | 2025-03-06T17:33:35.357499
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12202 /
tcp
819727972 | 2025-03-21T16:10:33.798550
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12210 /
tcp
-1327660293 | 2025-02-27T01:19:24.986153
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
12214 /
tcp
-747911285 | 2025-03-11T09:40:32.817138
12220 /
tcp
632542934 | 2025-02-27T15:10:23.468353
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
12224 /
tcp
-1279886438 | 2025-02-22T21:28:32.328407
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
12227 /
tcp
1723769361 | 2025-03-22T20:04:43.581531
ELM Enterprise Manager _l\r\nCopyright \xc2\xa9 18668511-928641920 TNT Software, Inc.\r\n
2103111368 | 2025-03-05T20:39:15.373168
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
12236 /
tcp
-1399940268 | 2025-03-13T08:32:43.193903
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12239 /
tcp
-2140303521 | 2025-03-05T13:57:13.171437
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected\n
12240 /
tcp
-1888448627 | 2025-02-25T20:55:35.816799
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12263 /
tcp
401555314 | 2025-03-13T05:26:05.395717
12265 /
tcp
1869192275 | 2025-03-14T08:31:46.927297
12267 /
tcp
-1399940268 | 2025-03-05T18:05:15.816203
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12269 /
tcp
321971019 | 2025-02-24T20:42:28.177950
-ERR client ip is not in whitelist\r
12278 /
tcp
-1399940268 | 2025-03-22T07:52:15.693549
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12280 /
tcp
-1375131644 | 2025-03-10T04:48:33.656183
\x00[v\xc3\xbdC\x7f\x00\x00
12284 /
tcp
1911457608 | 2025-03-18T11:20:39.139869
\x00[\x00\x00\x00\x00\x00\x00
-2107996212 | 2025-03-11T20:34:19.955019
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
12301 /
tcp
1991883981 | 2025-03-11T14:44:17.487810
B\x00\x00\x00\xc3\xbfn\x04Too many connections
12316 /
tcp
165188539 | 2025-03-14T19:52:10.389772
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12327 /
tcp
401555314 | 2025-03-14T19:28:05.629472
12340 /
tcp
-1476017887 | 2025-03-12T02:22:48.799838
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
142594048 | 2025-03-18T09:49:05.132551
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae29bb_CS-000-01pYi173_32176-13938
12353 /
tcp
117101543 | 2025-02-22T11:01:47.027718
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
12354 /
tcp
-1114821551 | 2025-03-12T19:17:33.964544
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
12356 /
tcp
1911457608 | 2025-03-18T10:38:52.688722
\x00[\x00\x00\x00\x00\x00\x00
12357 /
tcp
1911457608 | 2025-03-18T06:00:36.801033
\x00[\x00\x00\x00\x00\x00\x00
12381 /
tcp
921225407 | 2025-03-17T01:20:00.671445
\x00\x00\x00\x04\x00\x00\x00\x00\x00
-1453516345 | 2025-03-18T04:35:34.186967
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
12394 /
tcp
819727972 | 2025-03-14T20:56:02.277865
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2103111368 | 2025-03-22T18:23:02.661422
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
12412 /
tcp
401555314 | 2025-03-13T18:44:50.972500
12421 /
tcp
1996932384 | 2025-03-18T12:52:50.380907
12426 /
tcp
-375604792 | 2025-03-04T17:47:59.926493
220 Microsoft FTP Service
12431 /
tcp
819727972 | 2025-03-18T23:06:31.646219
SSH-2.0-OpenSSH_7.4
Vulnerabilities
971933601 | 2025-03-09T05:57:27.601392
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
12454 /
tcp
-1248408558 | 2025-03-16T20:32:37.361681
220 MikroTik FTP server (MikroTik 6.44.3) ready
12479 /
tcp
921225407 | 2025-03-09T05:52:32.579538
\x00\x00\x00\x04\x00\x00\x00\x00\x00
12482 /
tcp
-1399940268 | 2025-02-26T23:37:58.453382
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1077013874 | 2025-03-06T20:30:43.727417
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
12494 /
tcp
819727972 | 2025-03-18T11:40:56.878200
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12503 /
tcp
819727972 | 2025-03-19T05:01:16.550255
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12514 /
tcp
-2089734047 | 2025-03-10T16:46:37.328166
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12523 /
tcp
-1626979812 | 2025-03-20T10:56:30.120475
220 Service ready for new user.
12524 /
tcp
-1399940268 | 2025-02-25T00:44:21.334944
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12525 /
tcp
819727972 | 2025-03-22T16:52:18.537391
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12533 /
tcp
-358801646 | 2025-03-11T09:31:39.192257
12537 /
tcp
-2096652808 | 2025-03-05T22:22:57.552826
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12543 /
tcp
-180163620 | 2025-02-28T16:46:32.390191
NPC Telnet permit one connection.\r\n But One connection() already keep alive.\r\nGood Bye !! \r\n
12553 /
tcp
-2089734047 | 2025-03-04T18:10:51.404372
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12554 /
tcp
1278527606 | 2025-03-13T06:41:25.716264
12560 /
tcp
493955023 | 2025-03-18T09:43:25.333926
\x00\x00\x0c\x04\x00\x00\x00\x00\x00\x00\x04\x00\x10\x00\x00\x00\n0\x05\x00\x00@\x00
12571 /
tcp
1996932384 | 2025-03-11T10:45:15.378548
12578 /
tcp
819727972 | 2025-02-24T03:24:51.046152
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12980 /
tcp
1975288991 | 2025-03-09T07:51:30.161469
13000 /
tcp
671605376 | 2025-02-26T18:36:54.075908
13047 /
tcp
660175493 | 2025-03-12T00:11:06.152780
13228 /
tcp
321971019 | 2025-02-22T02:40:33.561973
-ERR client ip is not in whitelist\r
14147 /
tcp
1332894250 | 2025-03-19T21:06:11.817831
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
14184 /
tcp
-1327660293 | 2025-03-19T10:43:14.045429
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
14265 /
tcp
-2031152423 | 2025-03-16T00:17:40.559509
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
14880 /
tcp
1911457608 | 2025-03-17T12:16:15.975598
\x00[\x00\x00\x00\x00\x00\x00
15018 /
tcp
-1888448627 | 2025-03-16T11:24:41.676552
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
15040 /
tcp
639175818 | 2025-02-27T18:42:50.359182
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
15443 /
tcp
1690634669 | 2025-03-14T04:41:55.948942
15588 /
tcp
669849225 | 2025-03-17T23:55:34.631224
SSH-98.60-SysaxSSH_81885..42\r\n
16010 /
tcp
-358801646 | 2025-03-21T01:36:45.821256
16021 /
tcp
1911457608 | 2025-03-12T23:33:02.624040
\x00[\x00\x00\x00\x00\x00\x00
16022 /
tcp
-1399940268 | 2025-03-17T16:35:40.456257
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16027 /
tcp
-2033111675 | 2025-03-18T08:11:43.277970
16031 /
tcp
740837454 | 2025-03-22T09:54:34.731314
SSH-2.0-OpenSSH_5.3
Vulnerabilities
16033 /
tcp
-1947777893 | 2025-03-14T09:02:45.688269
"Broadband Router"\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
16051 /
tcp
-1399940268 | 2025-02-23T06:16:36.517544
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16068 /
tcp
-146605374 | 2025-03-18T05:23:22.672255
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
16070 /
tcp
-339084706 | 2025-03-15T07:32:15.810472
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
16074 /
tcp
819727972 | 2025-02-24T18:18:51.386355
SSH-2.0-OpenSSH_7.4
Vulnerabilities
16085 /
tcp
819727972 | 2025-02-21T18:55:19.441428
SSH-2.0-OpenSSH_7.4
Vulnerabilities
16089 /
tcp
-1888448627 | 2025-02-22T02:36:16.011918
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
16090 /
tcp
-1261090339 | 2025-03-19T01:52:24.024506
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
16092 /
tcp
-1399940268 | 2025-02-26T16:37:12.579432
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16101 /
tcp
-1399940268 | 2025-02-26T08:32:24.357793
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16464 /
tcp
841014058 | 2025-03-21T00:17:09.032392
Hello, this is FRRouting (version 4.0).
Copyright 19
96-2005 Kunihiro Ishiguro, et al.
Use...
16831 /
tcp
1911457608 | 2025-03-19T21:31:07.610445
\x00[\x00\x00\x00\x00\x00\x00
16992 /
tcp
-1840324437 | 2025-03-22T16:30:00.995728
16993 /
tcp
2087396567 | 2025-03-09T09:33:19.605250
kjnkjabhbanc283ubcsbhdc72
17000 /
tcp
-1810987450 | 2025-03-13T07:53:02.679425
17184 /
tcp
1911457608 | 2025-03-06T02:38:02.433607
\x00[\x00\x00\x00\x00\x00\x00
17770 /
tcp
1620329124 | 2025-02-28T21:33:25.050405
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\x01\xc3\xbf\xc3\xbb\x03\xc3\xbf\xc3\xbd\x01\xc3\xbf\xc3\xbe\x01Username:
17772 /
tcp
-1888448627 | 2025-02-26T04:58:37.882773
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
17773 /
tcp
-1097188123 | 2025-02-25T16:17:31.588054
18021 /
tcp
1911457608 | 2025-02-22T14:22:16.609232
\x00[\x00\x00\x00\x00\x00\x00
18025 /
tcp
-1327660293 | 2025-02-23T17:59:36.411963
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
18044 /
tcp
-1327660293 | 2025-02-25T12:31:55.357916
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
18055 /
tcp
-1399940268 | 2025-03-23T08:21:32.104160
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18058 /
tcp
-2046514463 | 2025-03-16T01:50:31.277525
18068 /
tcp
-1399940268 | 2025-03-13T14:27:58.085685
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18074 /
tcp
597764502 | 2025-03-09T04:21:12.258355
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
18081 /
tcp
-407828767 | 2025-03-20T13:28:23.657579
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
18105 /
tcp
-122096153 | 2025-03-13T18:26:30.474157
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
18107 /
tcp
-2089734047 | 2025-03-12T14:48:00.753898
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
18225 /
tcp
-1399940268 | 2025-03-14T00:12:25.912769
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18245 /
tcp
2087396567 | 2025-03-21T21:44:39.039098
kjnkjabhbanc283ubcsbhdc72
18443 /
tcp
1544300041 | 2025-03-15T10:33:16.437408
SSH-25453-Cisco-3524665.35
-2107996212 | 2025-03-14T11:42:47.779106
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
19000 /
tcp
1911457608 | 2025-03-19T22:49:04.395890
\x00[\x00\x00\x00\x00\x00\x00
1282941221 | 2025-02-22T10:30:00.760506
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
19776 /
tcp
-1477838366 | 2025-03-21T13:56:30.971061
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
1900503736 | 2025-03-14T20:11:33.822624
HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-HTTPAPI/2.0
20020 /
tcp
819727972 | 2025-03-11T17:27:29.461351
SSH-2.0-OpenSSH_7.4
Vulnerabilities
20053 /
tcp
1426971893 | 2025-03-03T20:03:11.003894
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
-1839934832 | 2025-02-22T06:10:03.068263
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
20208 /
tcp
-1399940268 | 2025-03-23T01:11:22.342598
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
20440 /
tcp
-303199180 | 2025-03-23T12:08:21.939410
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
20547 /
tcp
597764502 | 2025-03-22T06:17:11.980135
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
20880 /
tcp
1370263973 | 2025-03-11T14:41:44.396918
20892 /
tcp
1134517380 | 2025-03-19T06:16:59.693675
welcome to Pandora console!\r\n----------------------------\n-------------------------\n| Login Time | 2021-12-08 1...\n
21233 /
tcp
819727972 | 2025-03-06T01:27:24.813542
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21244 /
tcp
671605376 | 2025-03-05T00:35:09.297913
21247 /
tcp
819727972 | 2025-02-28T04:24:51.871491
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21248 /
tcp
1911457608 | 2025-03-22T14:02:54.341270
\x00[\x00\x00\x00\x00\x00\x00
21257 /
tcp
-1399940268 | 2025-03-12T01:12:28.429712
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21258 /
tcp
-616720387 | 2025-02-22T06:50:38.019111
21260 /
tcp
819727972 | 2025-02-24T02:53:47.112213
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21268 /
tcp
-1730858130 | 2025-03-14T10:58:07.611119
RFB 003.008
VNC:
Protocol Version: 3.8
21292 /
tcp
321971019 | 2025-03-20T11:17:54.213490
-ERR client ip is not in whitelist\r
21295 /
tcp
-2089734047 | 2025-03-17T20:49:27.266945
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
21301 /
tcp
1911457608 | 2025-03-14T02:15:12.401394
\x00[\x00\x00\x00\x00\x00\x00
21314 /
tcp
-1114821551 | 2025-03-12T21:11:34.425349
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
21315 /
tcp
-784071826 | 2025-03-18T19:32:50.725575
SSH-2.0-OpenSSH_8.0
Vulnerabilities
21327 /
tcp
-1399940268 | 2025-03-12T13:27:57.503458
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21379 /
tcp
-1487943323 | 2025-03-18T19:28:10.914158
431 Unable to negotiate secure command connection.\r\n
21935 /
tcp
-274082663 | 2025-03-12T05:55:22.013282
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
22000 /
tcp
-1399940268 | 2025-03-22T22:22:47.473755
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
22084 /
tcp
599074451 | 2025-03-17T19:41:57.371768
22107 /
tcp
677934968 | 2025-03-09T04:26:44.034440
22206 /
tcp
-1189269828 | 2025-02-25T01:20:59.749317
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
22222 /
tcp
-358801646 | 2025-03-08T19:01:56.610659
23023 /
tcp
945910976 | 2025-03-13T01:22:18.655266
* OK TeamXchange IMAP4rev1 server (otyUg) ready.\r\n
24181 /
tcp
2098371729 | 2025-03-08T19:29:25.762572
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
24245 /
tcp
660175493 | 2025-03-14T13:25:19.454793
25001 /
tcp
-1140468363 | 2025-03-13T00:16:31.932131
25003 /
tcp
-2089734047 | 2025-03-18T06:46:11.669991
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
25782 /
tcp
-616720387 | 2025-03-16T01:35:44.890940
26657 /
tcp
2087396567 | 2025-03-12T02:40:32.908832
kjnkjabhbanc283ubcsbhdc72
27015 /
tcp
-345718689 | 2025-03-23T01:06:09.170634
27017 /
tcp
1763259671 | 2025-03-21T20:15:02.356415
{\n"Version": "3.4.18",\n"VersionArray": [\n3,\n4,\n18,\n0\n],\n"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",\n"OpenSSLVersion": "",\n"SysInfo": "",\n"Bits": 64,\n"Debug": false,\n"MaxObjectSize": 16777216\n}\n\n
28015 /
tcp
-801484042 | 2025-03-21T13:03:21.394257
28080 /
tcp
1911457608 | 2025-03-13T21:39:38.225734
\x00[\x00\x00\x00\x00\x00\x00
29798 /
tcp
-1399940268 | 2025-03-08T13:42:51.654921
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
30002 /
tcp
819727972 | 2025-03-12T23:05:48.984455
SSH-2.0-OpenSSH_7.4
Vulnerabilities
30003 /
tcp
1375509841 | 2025-03-14T11:06:39.773799
ÿû
no data rcvd for version string
recv version id unsuccessful
SSH Session task 0xY: Version Exchange Failed
30006 /
tcp
-375604792 | 2025-03-14T12:37:11.337423
220 Microsoft FTP Service
30017 /
tcp
-1327660293 | 2025-02-24T06:22:39.574418
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
30022 /
tcp
-1810987450 | 2025-03-18T21:13:28.079510
30029 /
tcp
1911457608 | 2025-03-08T15:31:35.881028
\x00[\x00\x00\x00\x00\x00\x00
30120 /
tcp
-1327660293 | 2025-02-23T13:29:33.173073
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
30122 /
tcp
1741579575 | 2025-03-19T21:10:29.015313
30303 /
tcp
-1529979118 | 2025-03-19T22:05:28.938685
30522 /
tcp
366084633 | 2025-03-12T14:01:02.814585
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
30622 /
tcp
819727972 | 2025-03-12T10:28:17.511139
SSH-2.0-OpenSSH_7.4
Vulnerabilities
30700 /
tcp
921225407 | 2025-03-12T22:10:22.830615
\x00\x00\x00\x04\x00\x00\x00\x00\x00
30718 /
tcp
428036883 | 2025-03-22T10:59:33.928911
LH\xdb\xc6\xdd\xf6g\x10\x19\x00\x00\x00\x18\x00\x01\x02\x00\x10\x00\x04\x00\x00\x00\x01b\xa8\xacO\xd0\x10D!\xce\x19Aa\xaf\x04\x8c\xfe
-1013082686 | 2025-03-12T19:12:04.629223
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
30922 /
tcp
-971970408 | 2025-03-20T22:12:19.986500
31017 /
tcp
-1399940268 | 2025-03-18T03:17:40.897940
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
31022 /
tcp
1620329124 | 2025-03-13T07:38:38.146764
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\x01\xc3\xbf\xc3\xbb\x03\xc3\xbf\xc3\xbd\x01\xc3\xbf\xc3\xbe\x01Username:
31322 /
tcp
660175493 | 2025-03-09T15:30:43.827410
31337 /
tcp
-786044033 | 2025-02-24T19:36:31.870461
OK Welcome <299685> on DirectUpdate server 7286
31622 /
tcp
1690634669 | 2025-03-23T09:28:59.673286
32122 /
tcp
2087396567 | 2025-03-09T20:34:42.497940
kjnkjabhbanc283ubcsbhdc72
32422 /
tcp
2087396567 | 2025-03-23T13:17:30.408274
kjnkjabhbanc283ubcsbhdc72
32522 /
tcp
-746114901 | 2025-03-22T03:23:46.088529
32622 /
tcp
-527005584 | 2025-03-21T03:18:53.533709
32722 /
tcp
597764502 | 2025-03-23T05:17:45.499063
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
32764 /
tcp
1632932802 | 2025-03-19T03:08:05.967011
32822 /
tcp
-2031152423 | 2025-03-23T03:07:47.978246
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
33022 /
tcp
1189133115 | 2025-02-27T16:06:40.825487
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
33060 /
tcp
2087396567 | 2025-03-22T18:16:00.567595
kjnkjabhbanc283ubcsbhdc72
33122 /
tcp
819727972 | 2025-03-22T21:49:05.826940
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1230049476 | 2025-03-19T23:18:45.255782
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
33322 /
tcp
-1477838366 | 2025-03-22T07:16:12.373858
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
33422 /
tcp
-2096652808 | 2025-03-19T17:08:04.121071
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
33522 /
tcp
1741579575 | 2025-03-20T14:11:11.850244
33622 /
tcp
-438503381 | 2025-03-21T05:00:17.946835
WORLD OF WARCRAFT CONNECTION - SERVER TO CLIENT - V2
33722 /
tcp
-68075478 | 2025-03-18T03:46:16.435247
33922 /
tcp
60948681 | 2025-03-18T01:57:14.737784
lpd [@Boyk]: Print-services are not available to your host (aF2qXkQ2m).
34022 /
tcp
-2017887953 | 2025-03-20T16:47:07.270901
SSH-2.0-OpenSSH_7.9
Vulnerabilities
34222 /
tcp
171352214 | 2025-03-20T01:03:05.079889
-ERR client ip is not in whitelist
34322 /
tcp
1761482307 | 2025-03-19T18:02:51.624603
\x00[\xc2\xa5\t\xc2\xbe\x7f\x00\x00
34422 /
tcp
1842524259 | 2025-03-15T00:22:38.024770
34500 /
tcp
-375604792 | 2025-03-19T13:47:57.703559
220 Microsoft FTP Service
34522 /
tcp
-971970408 | 2025-03-05T05:47:26.294712
34822 /
tcp
398077695 | 2025-03-03T22:56:21.752953
34922 /
tcp
1991883981 | 2025-03-18T19:22:27.324410
B\x00\x00\x00\xc3\xbfn\x04Too many connections
35000 /
tcp
-1476017887 | 2025-03-07T11:50:24.750492
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
35004 /
tcp
-2096652808 | 2025-02-23T15:36:51.911885
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
35022 /
tcp
1308377066 | 2025-03-19T03:20:46.761024
35100 /
tcp
-2089734047 | 2025-03-13T10:15:56.396231
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
35122 /
tcp
819727972 | 2025-03-04T08:29:47.543543
SSH-2.0-OpenSSH_7.4
Vulnerabilities
35222 /
tcp
1690634669 | 2025-03-18T09:50:20.900790
35240 /
tcp
1623746877 | 2025-03-16T03:52:00.504913
500 Permission denied - closing connection.\r\n
35250 /
tcp
-1399940268 | 2025-02-21T18:43:25.510198
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
35322 /
tcp
1690634669 | 2025-03-17T08:19:57.553893
35422 /
tcp
-971970408 | 2025-03-18T23:15:28.573620
35522 /
tcp
-971970408 | 2025-03-17T00:30:21.724811
35622 /
tcp
1842524259 | 2025-03-18T07:17:54.381583
35722 /
tcp
-527005584 | 2025-03-17T09:54:02.794354
35822 /
tcp
996960436 | 2025-03-17T17:43:40.718920
35922 /
tcp
-784071826 | 2025-03-16T20:56:38.509937
SSH-2.0-OpenSSH_8.0
Vulnerabilities
36022 /
tcp
-1032713145 | 2025-03-17T20:43:43.521527
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
36222 /
tcp
-1428621233 | 2025-03-17T20:45:33.209307
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
36422 /
tcp
380146262 | 2025-03-15T08:04:55.056967
36522 /
tcp
-441419608 | 2025-03-18T15:56:04.252654
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
36722 /
tcp
-1611764932 | 2025-03-17T04:53:25.959064
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
36822 /
tcp
-786044033 | 2025-03-18T14:20:24.578971
OK Welcome <299685> on DirectUpdate server 7286
-1839934832 | 2025-03-16T22:50:10.428481
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
37215 /
tcp
2087396567 | 2025-03-21T10:06:11.214351
kjnkjabhbanc283ubcsbhdc72
37222 /
tcp
2087396567 | 2025-03-14T19:06:14.130105
kjnkjabhbanc283ubcsbhdc72
37322 /
tcp
171352214 | 2025-03-16T10:44:51.821490
-ERR client ip is not in whitelist
37422 /
tcp
1741579575 | 2025-02-28T18:34:21.144440
37622 /
tcp
1278527606 | 2025-03-16T01:33:53.960646
1282941221 | 2025-03-15T23:52:16.403575
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
37777 /
tcp
1690634669 | 2025-03-23T07:04:38.633929
37922 /
tcp
-375604792 | 2025-03-18T00:11:36.370339
220 Microsoft FTP Service
38022 /
tcp
1741579575 | 2025-03-17T22:24:45.187265
38122 /
tcp
1842524259 | 2025-03-15T16:59:24.736719
38322 /
tcp
-1733645023 | 2025-03-15T13:16:12.729824
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
38922 /
tcp
2087396567 | 2025-03-13T14:42:58.150467
kjnkjabhbanc283ubcsbhdc72
39001 /
tcp
-339084706 | 2025-03-13T01:57:13.098962
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
39022 /
tcp
1741579575 | 2025-03-13T19:56:08.382734
39122 /
tcp
-1477838366 | 2025-03-13T18:11:21.385885
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
39222 /
tcp
-358801646 | 2025-03-13T16:27:10.685314
39622 /
tcp
-653033013 | 2025-03-11T07:55:18.241867
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
39922 /
tcp
-358801646 | 2025-02-26T17:28:18.021726
40022 /
tcp
-1248408558 | 2025-03-09T10:22:25.509442
220 MikroTik FTP server (MikroTik 6.44.3) ready
40070 /
tcp
-1139539254 | 2025-03-19T14:22:42.958472
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
40099 /
tcp
410249975 | 2025-03-16T01:29:38.085233
40222 /
tcp
104385780 | 2025-03-04T10:13:53.375499
40522 /
tcp
-1999117212 | 2025-03-04T07:17:56.955343
40622 /
tcp
819727972 | 2025-02-26T11:39:56.176078
SSH-2.0-OpenSSH_7.4
Vulnerabilities
41122 /
tcp
819727972 | 2025-02-27T14:24:34.573783
SSH-2.0-OpenSSH_7.4
Vulnerabilities
41443 /
tcp
-441419608 | 2025-03-14T03:13:37.559499
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
41522 /
tcp
1426971893 | 2025-03-04T20:51:21.256366
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
41800 /
tcp
-1810987450 | 2025-03-12T08:52:55.147391
41922 /
tcp
-971970408 | 2025-03-07T15:37:57.745550
42122 /
tcp
2087396567 | 2025-03-05T02:08:15.616226
kjnkjabhbanc283ubcsbhdc72
42208 /
tcp
-2096652808 | 2025-03-18T20:15:43.805694
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
42222 /
tcp
2087396567 | 2025-03-04T22:35:20.235872
kjnkjabhbanc283ubcsbhdc72
42422 /
tcp
1690634669 | 2025-03-04T19:09:02.926603
42443 /
tcp
1763259671 | 2025-03-22T03:57:01.226960
{\n"Version": "3.4.18",\n"VersionArray": [\n3,\n4,\n18,\n0\n],\n"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",\n"OpenSSLVersion": "",\n"SysInfo": "",\n"Bits": 64,\n"Debug": false,\n"MaxObjectSize": 16777216\n}\n\n
42922 /
tcp
539065883 | 2025-02-28T14:52:56.145330
43422 /
tcp
-2031152423 | 2025-02-27T19:36:46.935657
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
43622 /
tcp
-1428621233 | 2025-02-27T00:10:41.003190
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
44022 /
tcp
-971970408 | 2025-02-27T06:34:19.565645
44122 /
tcp
-358801646 | 2025-02-26T22:00:23.721796
44222 /
tcp
-1032713145 | 2025-03-10T22:10:52.741411
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
44309 /
tcp
1126993057 | 2025-02-23T14:05:34.880717
* OK [CAPABILITY a2,M\\] nBwXk2pPP IMAP4rev1 20qx at
44310 /
tcp
1492413928 | 2025-02-21T22:09:43.838202
SSH-2.0-OpenSSH_7.5
Vulnerabilities
44322 /
tcp
1231376952 | 2025-02-26T09:57:12.153292
-1230049476 | 2025-03-19T22:18:15.362951
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
44399 /
tcp
-1279886438 | 2025-03-12T21:35:26.602655
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
44422 /
tcp
677934968 | 2025-02-26T08:16:20.617423
-2107996212 | 2025-03-06T08:54:12.311973
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
44520 /
tcp
89142341 | 2025-02-22T09:11:51.175525
\x05\x00\x00\x00\x0b\x08\x05\x1a\x00
44522 /
tcp
2087396567 | 2025-02-26T06:36:11.878556
kjnkjabhbanc283ubcsbhdc72
44818 /
tcp
1278527606 | 2025-03-22T00:53:24.437444
44922 /
tcp
1544300041 | 2025-02-26T03:10:08.684457
SSH-25453-Cisco-3524665.35
45039 /
tcp
-358801646 | 2025-03-07T09:08:36.961791
45122 /
tcp
117101543 | 2025-02-25T12:43:11.230984
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
45222 /
tcp
233634112 | 2025-02-25T19:03:38.051055
SSH-98.60-SysaxSSH_81885..42
45322 /
tcp
171352214 | 2025-02-25T17:31:07.205118
-ERR client ip is not in whitelist
45667 /
tcp
-358801646 | 2025-03-12T21:50:53.298864
45788 /
tcp
1208318993 | 2025-02-25T19:13:37.493326
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
45922 /
tcp
1741579575 | 2025-03-10T14:06:22.251549
46000 /
tcp
408230060 | 2025-03-14T06:59:45.766622
\r\nSorry, that nickname format is invalid.\r\n
46001 /
tcp
408230060 | 2025-02-27T16:34:03.046091
\r\nSorry, that nickname format is invalid.\r\n
46022 /
tcp
-2031152423 | 2025-02-21T21:04:50.628839
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
46122 /
tcp
660175493 | 2025-02-25T05:26:40.736629
46222 /
tcp
-154107716 | 2025-02-24T22:29:48.805698
220 Microsoft FTP Service
530 User cannot log in.
214-The following commands are recognized (* ==>'s unimplemented).
ABOR
ACCT
ADAT *
ALLO
APPE
AUTH
CCC
CDUP
CWD
DELE
ENC *
EPRT
EPSV
FEAT
HELP
HOST
LANG
LIST ...
47122 /
tcp
2087396567 | 2025-02-23T22:14:53.830737
kjnkjabhbanc283ubcsbhdc72
47222 /
tcp
2087396567 | 2025-02-23T20:29:28.434076
kjnkjabhbanc283ubcsbhdc72
-2107996212 | 2025-02-25T00:15:25.759982
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
47522 /
tcp
1492413928 | 2025-02-25T08:55:08.609285
SSH-2.0-OpenSSH_7.5
Vulnerabilities
47622 /
tcp
2087396567 | 2025-02-25T01:59:33.192735
kjnkjabhbanc283ubcsbhdc72
47722 /
tcp
1690634669 | 2025-03-10T10:31:01.416187
47922 /
tcp
819727972 | 2025-03-10T06:53:46.548270
SSH-2.0-OpenSSH_7.4
Vulnerabilities
47990 /
tcp
1984588611 | 2025-03-21T04:49:14.209692
48012 /
tcp
-146605374 | 2025-03-10T18:29:18.826470
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
48020 /
tcp
1615193817 | 2025-03-22T05:56:16.731209
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
48122 /
tcp
-1428621233 | 2025-03-10T05:10:58.330966
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
48422 /
tcp
1189133115 | 2025-03-09T23:59:08.972113
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
48622 /
tcp
-1730858130 | 2025-02-24T19:00:37.341250
RFB 003.008
VNC:
Protocol Version: 3.8
48899 /
tcp
1842524259 | 2025-03-22T05:12:39.995445
-726970723 | 2025-03-20T07:19:08.099838
HTTP/1.1 500 Internal Server Error
CONTENT-LENGTH: 411
CONTENT-TYPE: text/xml; charset="utf-8"
DATE: Mon, 22 Jan 2024 16:46:55 GMT
EXT:
SERVER: Linux/3.18.20, UPnP/1.0, Portable SDK for UPnP devices/1.6.18
X-User-Agent: redsonic
<s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">
<s:Body>
<s:Fault>
<faultcode>s:Client</faultcode>
<faultstring>UPnPError</faultstring>
<detail>
<UPnPError xmlns="urn:schemas-upnp-org:control-1-0">
49501 /
tcp
321971019 | 2025-03-20T18:19:58.257177
-ERR client ip is not in whitelist\r
-1045760528 | 2025-03-09T20:01:52.795843
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
49722 /
tcp
873425297 | 2025-02-22T22:22:15.324404
200 NOD32SS 99 (3318497116)
49922 /
tcp
-1730858130 | 2025-02-22T18:21:00.422968
RFB 003.008
VNC:
Protocol Version: 3.8
50000 /
tcp
2087396567 | 2025-03-22T10:06:17.583105
kjnkjabhbanc283ubcsbhdc72
50013 /
tcp
632542934 | 2025-03-18T09:59:48.949025
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
50100 /
tcp
-1730858130 | 2025-03-20T10:01:23.190300
RFB 003.008
VNC:
Protocol Version: 3.8
50101 /
tcp
165188539 | 2025-03-13T22:51:04.699033
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
50106 /
tcp
-2096652808 | 2025-03-22T08:18:27.838354
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
50122 /
tcp
2087396567 | 2025-02-22T08:44:01.277721
kjnkjabhbanc283ubcsbhdc72
50222 /
tcp
2087396567 | 2025-02-22T06:56:26.900596
kjnkjabhbanc283ubcsbhdc72
50922 /
tcp
2087396567 | 2025-02-21T15:59:38.922652
kjnkjabhbanc283ubcsbhdc72
51106 /
tcp
1208318993 | 2025-03-20T10:04:28.606296
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
51235 /
tcp
1426971893 | 2025-03-21T16:59:27.043372
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
51443 /
tcp
-1476017887 | 2025-03-12T02:41:14.339818
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
52340 /
tcp
1911457608 | 2025-03-06T09:55:36.662266
\x00[\x00\x00\x00\x00\x00\x00
52869 /
tcp
-1101712668 | 2025-03-21T13:31:24.268918
\\x1e\xc3\x80\\x010\\x02\xc2\xa8\xc3\xa3
-1013082686 | 2025-02-28T09:08:51.615447
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
54327 /
tcp
-1399940268 | 2025-03-14T10:52:04.436389
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
54922 /
tcp
1741579575 | 2025-03-07T08:54:57.197385
55000 /
tcp
-1399940268 | 2025-03-18T23:13:30.349010
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
55222 /
tcp
-952165951 | 2025-03-07T01:57:15.419165
55442 /
tcp
1984588611 | 2025-03-20T20:11:33.181538
55443 /
tcp
660175493 | 2025-03-19T14:35:22.730486
55475 /
tcp
-980525298 | 2025-03-15T11:58:22.830213
\x01\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
55553 /
tcp
-358801646 | 2025-03-17T17:07:15.090997
55554 /
tcp
1690634669 | 2025-03-20T08:15:21.798074
55622 /
tcp
597764502 | 2025-03-06T16:22:00.740093
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
55722 /
tcp
1741579575 | 2025-03-06T19:06:24.855576
55822 /
tcp
-1026951088 | 2025-03-06T22:12:37.308881
57722 /
tcp
660175493 | 2025-03-06T07:37:38.296481
57780 /
tcp
-1888448627 | 2025-03-19T09:10:21.641109
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
57781 /
tcp
-2089734047 | 2025-03-07T11:18:40.088252
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
57783 /
tcp
-1327660293 | 2025-03-10T00:41:58.280200
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
57785 /
tcp
819727972 | 2025-03-19T00:24:11.658427
SSH-2.0-OpenSSH_7.4
Vulnerabilities
57788 /
tcp
-1327660293 | 2025-03-21T00:03:07.669374
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
58322 /
tcp
-1059554316 | 2025-03-05T22:52:57.074828
\xc2\xa5A\x00\x01\x00\x00\x00,\x00\x00\x00\x02\x00\x00\x00L\x00\x00\x00\x08Connect\x00\x00\x00\x00x\x00\x00\x00\x0857222\x00\x00\x00
58422 /
tcp
-441419608 | 2025-03-05T21:14:31.108251
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
58822 /
tcp
819727972 | 2025-03-05T15:59:17.549315
SSH-2.0-OpenSSH_7.4
Vulnerabilities
59122 /
tcp
539065883 | 2025-03-05T10:48:55.423689
59222 /
tcp
-971970408 | 2025-03-05T09:38:08.707590
59322 /
tcp
819727972 | 2025-03-05T07:20:18.307468
SSH-2.0-OpenSSH_7.4
Vulnerabilities
59522 /
tcp
599074451 | 2025-03-03T18:12:30.455546
60001 /
tcp
-784071826 | 2025-03-15T02:20:33.244570
SSH-2.0-OpenSSH_8.0
Vulnerabilities
-1013082686 | 2025-02-24T05:59:36.259223
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
61234 /
tcp
51259122 | 2025-03-14T17:57:04.970370
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
61613 /
tcp
366084633 | 2025-03-11T04:49:37.019035
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
61616 /
tcp
660175493 | 2025-03-13T01:02:29.818902
61619 /
tcp
-1730858130 | 2025-03-20T13:12:36.349951
RFB 003.008
VNC:
Protocol Version: 3.8
-583302436 | 2025-03-20T11:39:43.939269
HTTP/1.1 400 Bad Request
Server: nginx/1.13.0
Content-Type: text/html
Connection: close
62443 /
tcp
-1261090339 | 2025-03-23T11:16:14.514257
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
63210 /
tcp
671605376 | 2025-03-11T21:32:55.183818
63256 /
tcp
-2081419599 | 2025-03-21T22:39:02.472739
63260 /
tcp
1911457608 | 2025-02-28T06:17:05.567653
\x00[\x00\x00\x00\x00\x00\x00
64738 /
tcp
-971970408 | 2025-03-15T04:05:35.954214
-297057753 | 2025-03-15T23:42:48.010352
HTTP/1.1 401 Unauthorized
X-Plex-Protocol: 1.0
Content-Type: text/html
Connection: close
Cache-Control: no-cache