1077013874 | 2025-03-28T21:45:08.702380
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
19 /
tcp
829384519 | 2025-03-28T17:37:49.190184
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefg
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUV
23 /
tcp
460589547 | 2025-03-18T05:44:48.407137
24 /
tcp
-1399940268 | 2025-03-25T08:52:03.946698
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
25 /
tcp
-784071826 | 2025-03-22T18:58:12.838130
SSH-2.0-OpenSSH_8.0
Vulnerabilities
37 /
tcp
306859053 | 2025-03-15T22:31:58.301408
43 /
tcp
-2033111675 | 2025-03-13T13:12:38.231937
51 /
tcp
819727972 | 2025-03-14T16:39:18.588588
SSH-2.0-OpenSSH_7.4
Vulnerabilities
53 /
tcp
1155744004 | 2025-03-13T22:14:49.957078
9
\x81\x80\x00\x01\x00\x02\x00\x00\x00\x00\x08clients1\x06google\x03com\x00\x00\x01\x00\x01\xc0\x00\x05\x00\x01\x00\x00\x00\x1e\x00\x07clients\x01l\xc0\x15\xc01\x00\x01\x00\x01\x00\x00\x00\x1e\x00\x04\x8e\xfb+\x0e
\x00\x06\x85\x80\x00\x01\x00\x01\x00\x
70 /
tcp
-833941849 | 2025-03-14T22:48:59.837515
\x1e\x06\xc2\x81
\x01\x07version\x04bind\x10\x03
79 /
tcp
1160472910 | 2025-03-07T17:21:25.125941
\xc2\xa5A\\x01,\\x02L\\x08Connectx\\x0857222
89 /
tcp
1996932384 | 2025-03-23T06:28:03.882297
97 /
tcp
819727972 | 2025-03-19T05:50:50.477970
SSH-2.0-OpenSSH_7.4
Vulnerabilities
98 /
tcp
819727972 | 2025-03-06T04:33:27.691855
SSH-2.0-OpenSSH_7.4
Vulnerabilities
636169965 | 2025-03-12T18:29:43.311730
HTTP/1.1 400 Bad Request
Server: Jdcloud-FE
Content-Type: application/octet-stream
Connection: keep-alive
Keep-Alive: timeout=20
104 /
tcp
-2089734047 | 2025-03-27T22:25:29.784017
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
110 /
tcp
1911457608 | 2025-03-28T08:47:09.218973
\x00[\x00\x00\x00\x00\x00\x00
111 /
tcp
-1304843095 | 2025-03-20T06:21:08.097354
113 /
tcp
-1678345660 | 2025-03-26T18:32:15.460625
!\\x07version\\x04bind7 t{RPowerDNS Recursor 410
141730637 | 2025-03-25T20:10:15.481835
HTTP/1.0 200 OK
Server: Proxy
135 /
tcp
-1589645334 | 2025-03-24T23:34:20.647875
\\x05\\x00\r\\x03\\x10\\x00\\x00\\x00\\x18\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x04\\x00\\x01\\x05\\x00\\x00\\x00\\x00\n\nServerAlive2: \n IP1: C56L_POS01\n IP2: 60.251.195.90\n IP3: C56L_POS01\n\nNTLMSSP:\nTarget_Name: C56L_POS01\nProduct_Version: 5.1.2600 Ntlm 15\nOS: Windows XP/Windows XP, Service Pack 3\nNetBIOS_Domain_Name: C56L_POS01\nNetBIOS_Computer_Name: C56L_POS01\nDNS_Domain_Name: C56L_POS01\nDNS_Computer_Name: C56L_POS01\n\nDCERPC Dump:\n1088a980-eae5-11d0-8d9b-00a02453c337 ([MS-MQQP]: Message Queuing (MSMQ):):\n - NCACN: 60.251.195.90:
143 /
tcp
-382990917 | 2025-03-04T02:17:56.508473
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE NAMESPACE LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot ready.\r\n
175 /
tcp
401555314 | 2025-03-20T04:39:48.272336
179 /
tcp
-399606100 | 2025-02-28T01:19:16.225170
BGP Message\nType: 3\nMajor error Code: 6\nMinor error Code: 5\n
189 /
tcp
321971019 | 2025-03-21T15:17:32.286438
-ERR client ip is not in whitelist\r
192 /
tcp
165188539 | 2025-03-04T05:31:16.342756
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
195 /
tcp
1321679546 | 2025-03-25T23:39:27.686335
-1839934832 | 2025-03-23T02:34:26.851325
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
-1932800090 | 2025-03-22T21:35:21.190353
67948279 | 2025-03-28T01:17:27.339957
HTTP/1.1 200 OK
Content-Type: text/html
Accept-Ranges: bytes
Server: Microsoft-IIS/8.5
X-Powered-By: ASP.NET
340 /
tcp
-1678345660 | 2025-03-17T15:14:18.493198
!\\x07version\\x04bind7 t{RPowerDNS Recursor 410
389 /
tcp
-1639129386 | 2025-03-09T12:17:57.513979
0%\\x02\\x01\\x01a \n\\x010\\x04\\x00\\x04\\x19anonymous bind disallowed
427 /
tcp
-349937125 | 2025-03-11T10:45:12.273990
SAAdvert Response:\nVersion: 2\nFunction: SA Advertisement (11)\nURL: service:service-agent://192.168.118.88\nScopeList: default\nAttrributeList: \n\n\nserviceTypes:\nservice:VMwareInfrastructure\nservice:wbem:https\n\nResponse of service:VMwareInfrastructure SrvReq:\nVersion: 2\nFunction: Service Reply (2)\nErrorCode: SUCCESS (0)\nURL Entries:\n Lifetime: 65535\n URL: service:VMwareInfrastructure://192.168.118.88\n\n\nResponse of service:VMwareInfrastructure AttrRqst:\nVersion: 2\nFunction: Attribute Reply (7)\nErrorCode: SUCCE
444 /
tcp
472902042 | 2025-03-25T15:00:53.896803
"Magic:ActiveMQ
Version:12
<ActiveMQ*TcpNoDelayEnabledSizePrefixDisabled CacheSizeProviderName ActiveMQStackTraceEnabledPlatformDetails JavaCacheEnabledTightEncodingEnabledMaxFrameSize@MaxInac
446 /
tcp
-1779118422 | 2025-03-25T23:04:59.535300
\x00[\xc2\xae\xc2\x8d{\x7f\x00\x00
502 /
tcp
-2089734047 | 2025-03-21T20:38:07.111460
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
503 /
tcp
117101543 | 2025-03-27T16:22:21.514367
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
513 /
tcp
-1032713145 | 2025-03-28T04:07:52.636122
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
-1839934832 | 2025-03-16T03:19:49.655696
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
541 /
tcp
268285291 | 2025-03-26T09:18:38.102309
\\x16\\x03\\x01\\x01[\\x01\\x00\\x01W\\x03\\x03\\x86\\x12J\\xac\\xf6e\\xda\\x19A\\xcb\\x18qz\\x90\\xb2\\x89\\xfa\\xa2\\x83\\xf8\\xda\\xfe\xcd\x8d\\x89P\\xe96\\x93@\xcc\xbf E{@\\x8c\\xde\\xbf\\xf84x\x0c\\xb3\x0b\\x91\\x12\\xbc\\xa6\\xe5\\x17\\xe4\\xba\\xe2q\\x92\\xc7\\xdb\\x01\\x129L\\xc6ey\\x002\\x13\\x02\\x13\\x03\\x13\\x01\\x
548 /
tcp
-773160241 | 2025-03-19T16:33:31.674249
Fast Copy: Yes\nExtended Sleep: Yes\nUUIDs: Yes\nUTF8 Server Name: Yes\nDirectory Services: Yes\nReconnect: Yes\nServer Notifications: Yes\nTCP/IP: Yes\nServer Signature: Yes\nServer Message: No\nPassword Saving Prohibited: No\nPassword Changing: Yes\nCopy File: Yes\nServer Name: murphys-airport-time-capsule\nMachine Type: \\x10TimeCapsule8,119\nAFP Versions: AFP3.3, AFP3.2, AFP3.1\nUAMs: DHCAST128\\x04,DHX2\\x03,SRP\\x06,Recon1C\nServer Signature: 4338365332344c58463948350069672d
554 /
tcp
435727587 | 2025-03-10T00:07:41.477880
RTSP/1.0 200 OK\r\nServer: TVT RTSP Server/1.0.0\r\nCSeq: 1\r\nPublic: OPTIONS, DESCRIBE, SETUP, TEARDOWN, PLAY, GET_PARAMETER, SET_PARAMETER\r\n\r\n
-1407711311 | 2025-03-09T08:09:54.641100
HTTP/1.1 302 Found
Cache-Control: private
Content-Type: text/html; charset=utf-8
Location: /login.html?gotourl=default.aspx
X-Powered-By: JunFei
Access-Control-Allow-Credentials: true
X-Content-Type-Options: nosniff
X-XSS-Protection: 1
X-Download-Options: SAMEORIGIN
Access-Control-Allow-Headers: Content-Type
X-Frame-Options: SAMEORIGIN
632 /
tcp
819727972 | 2025-03-10T05:17:51.901794
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1650594030 | 2025-03-17T09:23:22.812979
HTTP/1.1 400 Bad Request
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 4-30654152-0 0NNN RT(1705911965960 176) q(-1 -1 -1 -1) r(0 -1) b1
685 /
tcp
-2089734047 | 2025-03-23T07:28:28.340186
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
771 /
tcp
819727972 | 2025-03-24T05:53:22.835558
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1166978945 | 2025-03-24T04:59:39.824978
HTTP/1.1 407 Proxy Authentication Required
Server: Proxy
Proxy-Authenticate: Basic realm="CCProxy Authorization"
Connection: Close
Proxy-Connection: Close
811 /
tcp
165188539 | 2025-03-24T09:13:50.867486
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
853 /
tcp
307999478 | 2025-03-13T08:00:05.030473
unknown command \r\nunknown command \r\n
873 /
tcp
-1598265216 | 2025-03-23T23:10:27.556845
887 /
tcp
-2089734047 | 2025-03-09T10:07:45.579606
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
-936692830 | 2025-03-04T22:35:42.090744
HTTP/1.1 202 OK
Connection: Keep-Alive
Content-Type: text/html
Keep-Alive: timeout=15; max=19
993 /
tcp
-1888448627 | 2025-03-27T15:57:14.589728
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
995 /
tcp
1685649979 | 2025-03-28T09:28:38.494522
1023 /
tcp
1375509841 | 2025-03-08T21:42:52.252555
ÿû
no data rcvd for version string
recv version id unsuccessful
SSH Session task 0xY: Version Exchange Failed
1025 /
tcp
-2089734047 | 2025-03-11T17:12:41.597834
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1080 /
tcp
1362344524 | 2025-03-27T04:04:57.024737
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.7
1099 /
tcp
493955023 | 2025-03-04T04:41:58.155051
\x00\x00\x0c\x04\x00\x00\x00\x00\x00\x00\x04\x00\x10\x00\x00\x00\n0\x05\x00\x00@\x00
1177 /
tcp
104385780 | 2025-03-28T21:07:46.062371
-2107996212 | 2025-03-04T05:16:43.231027
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
1234 /
tcp
1655023012 | 2025-03-16T23:29:17.463524
athinfod: invalid query.\n
1283 /
tcp
1011407350 | 2025-03-05T08:18:59.082786
* OK GroupWise IMAP4rev1 Server Ready\r\n
1293 /
tcp
1308377066 | 2025-03-27T08:23:58.839932
1337 /
tcp
-1559123399 | 2025-03-23T08:48:35.334629
500 Permission denied - closing connection.
1343 /
tcp
-358801646 | 2025-03-24T10:08:07.107240
1388 /
tcp
-1375131644 | 2025-03-05T10:15:53.743678
\x00[v\xc3\xbdC\x7f\x00\x00
-2118655245 | 2025-02-28T18:43:51.435752
HTTP/1.0 500 Internal Server Error
Content-Length: 20
1414 /
tcp
-1626979812 | 2025-03-04T16:59:29.373149
220 Service ready for new user.
1433 /
tcp
-325802316 | 2025-03-20T11:55:35.710976
MSSQL Server\nVersion: 134219767 (0x80007f7)\nSub-Build: 0\nEncryption:Not available\n\nMSSQL NTLM Info:\nTarget_Name: PC-20150816MQOM\nProduct_Version: 6.1.7601 Ntlm 15\nOS: Windows 7, Service Pack 1/Windows Server 2008 R2, Service Pack 1\nNetBIOS_Domain_Name: PC-20150816MQOM\nNetBIOS_Computer_Name: PC-20150816MQOM\nDNS_Domain_Name: PC-20150816MQOM\nDNS_Computer_Name: PC-20150816MQOM\nMsvAvFlags: 01000000\nSystem_Time: 2024-01-22 04:03:26 +0000 UTC\n\n
1450 /
tcp
819727972 | 2025-03-09T12:47:39.261299
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1452 /
tcp
-1399940268 | 2025-03-24T15:57:45.790111
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1453 /
tcp
-1598265216 | 2025-03-06T12:57:23.113061
1515 /
tcp
-971970408 | 2025-03-17T21:29:58.966276
1599 /
tcp
-1375131644 | 2025-03-04T12:54:47.504751
\x00[v\xc3\xbdC\x7f\x00\x00
1604 /
tcp
-971970408 | 2025-03-10T13:41:01.260587
1800 /
tcp
-1105333987 | 2025-03-12T17:16:13.484843
1801 /
tcp
-833635452 | 2025-03-21T02:20:50.125128
\\x10Z\x0b\\x00LIOR<\\x02\\x00\\x00\\xff\\xff\\xff\\xff\\x00\\x00\\x12\\x00a36a0e421af47074\\x05\xe8\x9b\xb5\\x95E\\x1eJ\\x85\xd5\xb1\\xe4\\xf9\\xba\\xf6+92d3\\x10\\x03\\x00\\x00ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ
1830 /
tcp
-2031152423 | 2025-03-26T06:52:35.213467
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
1833 /
tcp
-1428621233 | 2025-03-26T02:27:27.350651
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
1883 /
tcp
2087396567 | 2025-03-06T04:57:01.090667
kjnkjabhbanc283ubcsbhdc72
1911 /
tcp
1492413928 | 2025-03-28T13:54:15.325597
SSH-2.0-OpenSSH_7.5
Vulnerabilities
1926 /
tcp
-786044033 | 2025-03-24T03:01:19.987913
OK Welcome <299685> on DirectUpdate server 7286
1951 /
tcp
1363464823 | 2025-02-27T09:49:03.569754
1962 /
tcp
-1888448627 | 2025-03-24T03:49:51.164920
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
1964 /
tcp
819727972 | 2025-03-06T01:34:22.929155
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1966 /
tcp
165188539 | 2025-03-14T05:39:04.345068
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
1967 /
tcp
819727972 | 2025-03-19T09:09:26.437558
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1981 /
tcp
632542934 | 2025-03-15T13:31:30.309988
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
2000 /
tcp
707919486 | 2025-03-27T10:56:55.441130
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
2002 /
tcp
128380719 | 2025-03-24T15:31:06.265652
2003 /
tcp
-1399940268 | 2025-03-29T00:14:04.430399
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2008 /
tcp
1545917845 | 2025-03-22T10:41:53.838120
2018 /
tcp
-1487943323 | 2025-03-26T04:56:39.802357
431 Unable to negotiate secure command connection.\r\n
2022 /
tcp
819727972 | 2025-03-22T05:47:59.698715
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2031 /
tcp
-1375131644 | 2025-03-27T07:46:49.123077
\x00[v\xc3\xbdC\x7f\x00\x00
2048 /
tcp
1210754493 | 2025-03-25T15:53:40.733177
0\x0c\x02\x01\x01a\x07\n\x01\x00\x04\x00\x04\x00
2064 /
tcp
1911457608 | 2025-03-24T15:34:53.632211
\x00[\x00\x00\x00\x00\x00\x00
2067 /
tcp
-1461540015 | 2025-02-28T09:16:14.767429
audio 0 RTP/AVP 18 4 3 8 0 101
a
2081 /
tcp
-1888448627 | 2025-03-04T05:01:25.634748
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
2083 /
tcp
677934968 | 2025-03-18T22:42:43.258484
2087 /
tcp
-146605374 | 2025-03-18T02:04:59.748151
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
2090 /
tcp
-1399940268 | 2025-03-23T19:06:24.758692
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2121 /
tcp
-459998123 | 2025-03-08T23:01:21.972001
220-FileZilla Server version 0.9.46 beta\r\n
-2042671887 | 2025-03-22T14:51:04.271769
HTTP/1.1 503 Service Unavailable
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 9-111938-0 0NNN RT(1701369144594 8) q(0 -1 -1 -1) r(0 -1)
2154 /
tcp
-358801646 | 2025-03-23T22:02:09.527136
2181 /
tcp
546151771 | 2025-03-21T10:52:50.919070
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC
Clients:
/*.*.*.*:11264[0](queued=0,recved=1,sent=0)
Latency min/avg/max: 0/0.0/0
Received: 8557
Sent: 11410
Connections: 1
Outstanding: 0
Zxid: 0x332907ad3391
Mode: follower
Node count: 104618
2225 /
tcp
-1399940268 | 2025-03-16T06:48:04.331943
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1045760528 | 2025-03-13T11:16:36.641752
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
2250 /
tcp
1911457608 | 2025-03-13T17:39:59.329997
\x00[\x00\x00\x00\x00\x00\x00
1662205251 | 2025-03-22T23:37:24.432117
HTTP/1.0 404 FAIL
Content-length:5
Connection:Close
2332 /
tcp
921225407 | 2025-03-22T08:05:04.718062
\x00\x00\x00\x04\x00\x00\x00\x00\x00
2345 /
tcp
-1279886438 | 2025-03-12T13:53:50.660405
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
2352 /
tcp
401555314 | 2025-03-26T09:33:23.203086
2404 /
tcp
408230060 | 2025-03-26T07:41:57.852917
\r\nSorry, that nickname format is invalid.\r\n
2433 /
tcp
1911457608 | 2025-03-05T12:04:37.394018
\x00[\x00\x00\x00\x00\x00\x00
2455 /
tcp
339872247 | 2025-03-22T07:19:37.591100
2506 /
tcp
-1730858130 | 2025-03-05T03:46:47.193934
RFB 003.008
VNC:
Protocol Version: 3.8
1617540835 | 2025-03-12T02:01:14.991756
HTTP/1.1 404 Not Found
Connection: close
2549 /
tcp
-303199180 | 2025-03-04T22:57:54.092168
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
2559 /
tcp
1911457608 | 2025-03-09T11:10:10.863820
\x00[\x00\x00\x00\x00\x00\x00
2568 /
tcp
-1399940268 | 2025-03-28T07:20:11.939028
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2628 /
tcp
-345718689 | 2025-03-05T16:12:16.135025
2761 /
tcp
-249504111 | 2025-03-17T15:40:17.968441
2762 /
tcp
-457235091 | 2025-03-23T14:33:38.513357
audio 0 RTP/AVP 18 4 3 8 0 101\r\na
2806 /
tcp
165188539 | 2025-03-27T20:45:28.932280
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
2995 /
tcp
1911457608 | 2025-03-12T11:48:42.288989
\x00[\x00\x00\x00\x00\x00\x00
3001 /
tcp
-2089734047 | 2025-03-15T05:10:07.254389
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3002 /
tcp
1911457608 | 2025-03-07T17:18:52.562168
\x00[\x00\x00\x00\x00\x00\x00
3008 /
tcp
1911457608 | 2025-03-26T20:28:40.371349
\x00[\x00\x00\x00\x00\x00\x00
-1013082686 | 2025-03-17T07:29:47.301744
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
809283431 | 2025-03-14T17:06:05.635950
HTTP/1.1 405 Method Not Allowed
Server: nginx/1.18.0 (Ubuntu)
Connection: keep-alive
access-control-allow-credentials: true
access-control-expose-headers: host, accept, connection
vary: Origin, Access-Control-Request-Method, Access-Control-Request-Headers
3048 /
tcp
-2089734047 | 2025-03-23T12:46:58.757395
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3050 /
tcp
819727972 | 2025-03-28T09:24:11.587119
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3057 /
tcp
-1329831334 | 2025-03-15T03:41:04.544378
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
3089 /
tcp
-1399940268 | 2025-03-26T22:09:38.500380
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3105 /
tcp
-1099385124 | 2025-03-16T11:01:49.128900
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
3107 /
tcp
-1297953727 | 2025-03-09T05:38:07.584296
\x02\x00\x00\x00\x00\x00\x06\x04\x00\x00\x00\x00\x00\x0c\x00\x00\n0\x00\x1c
3116 /
tcp
-1399940268 | 2025-03-23T17:12:42.923336
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3118 /
tcp
-249504111 | 2025-03-27T21:11:07.094042
3121 /
tcp
1381121983 | 2025-03-26T16:13:08.170904
3122 /
tcp
-1888448627 | 2025-03-05T19:11:40.713052
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
3130 /
tcp
1911457608 | 2025-03-20T23:25:36.166135
\x00[\x00\x00\x00\x00\x00\x00
-1013082686 | 2025-03-19T22:18:34.198919
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
3163 /
tcp
-904840257 | 2025-03-03T22:28:50.775664
572 Relay not authorized\r\n
3165 /
tcp
819727972 | 2025-03-28T17:40:20.924555
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3166 /
tcp
-1730858130 | 2025-03-14T19:52:21.732449
RFB 003.008
VNC:
Protocol Version: 3.8
3176 /
tcp
103159425 | 2025-03-28T08:26:06.046289
3186 /
tcp
921225407 | 2025-03-15T09:43:53.610341
\x00\x00\x00\x04\x00\x00\x00\x00\x00
3193 /
tcp
-1105333987 | 2025-03-15T06:55:52.013303
-1695841648 | 2025-03-23T02:20:12.862016
HTTP/1.1 404 Not Found
Server: nginx/1.18.11011 (Ubuntu)
Content-Type: text/plain; charset=utf-8
Connection: close
3260 /
tcp
-862070606 | 2025-03-14T18:07:46.059205
Login Response Success(0x0000)\nKey/Value Pairs\nAuthMethod=None\nTargetAlias=LIO Target\nTargetPortalGroupTag=1\n\n
-1688921933 | 2025-03-05T02:11:04.890027
HTTP/1.1 503 Service Unavailable
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 12-14878276-0 0NNN RT(1705363841143 0) q(0 -1 -1 -1) r(0 -1)
-2118655245 | 2025-03-21T05:05:53.741946
HTTP/1.0 500 Internal Server Error
Content-Length: 20
3299 /
tcp
819727972 | 2025-03-22T00:49:50.965246
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3306 /
tcp
849822411 | 2025-03-28T16:06:57.641118
Mysql Version: 5.7.44-log \r\nN\\x00\\x00\\x00\n5.7.44-log\\x00s/\\x06\\x00(o>\\x1c`\\x18*a\\x00\\xff\\xff-\\x02\\x00\\xff\\xc1\\x15\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00fFU\\x07_\\x1ay\\x14i}\\x02E\\x00mysql_native_password\\x00
3310 /
tcp
1911457608 | 2025-03-28T08:56:29.554668
\x00[\x00\x00\x00\x00\x00\x00
3388 /
tcp
1911457608 | 2025-03-07T18:38:48.071528
\x00[\x00\x00\x00\x00\x00\x00
3401 /
tcp
-1329831334 | 2025-03-17T17:31:44.555088
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
3403 /
tcp
-339084706 | 2025-03-29T05:59:59.093167
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
3412 /
tcp
-339084706 | 2025-03-11T18:15:23.428290
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
-1839934832 | 2025-03-26T09:01:39.740291
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
3524 /
tcp
-2096652808 | 2025-03-06T20:17:59.790683
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
3557 /
tcp
-1248408558 | 2025-03-04T01:06:29.944892
220 MikroTik FTP server (MikroTik 6.44.3) ready
1077013874 | 2025-03-09T19:55:22.336103
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
3780 /
tcp
-952165951 | 2025-03-23T20:40:50.517899
3790 /
tcp
1690634669 | 2025-03-12T01:52:01.501068
3794 /
tcp
819727972 | 2025-03-23T15:52:25.717061
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3952 /
tcp
-2096652808 | 2025-03-18T02:27:05.244207
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
1170207731 | 2025-03-11T18:10:36.431261
HTTP/1.1 200 OK
cache-control: max-age=0, private, must-revalidate
content-length: 9446
content-type: text/html; charset=utf-8
cross-origin-window-policy: deny
date: Mon, 22 Jan 2024 08:34:42 GMT
server: Cowboy
x-content-type-options: nosniff
x-download-options: noopen
x-frame-options: SAMEORIGIN
x-permitted-cross-domain-policies: none
x-request-id: F6yeXaHCjyC4elgAAoAh
x-xss-protection: 1; mode=block
set-cookie: _teslamate_key=SFMyNTY.g3QAAAAEbQAAAAtfY3NyZl90b2tlbm0AAAAYaUxzWXpoMm5SdWh1V2piMFd
4042 /
tcp
819727972 | 2025-03-12T17:25:27.645274
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4063 /
tcp
-1730858130 | 2025-03-16T01:23:14.183964
RFB 003.008
VNC:
Protocol Version: 3.8
4064 /
tcp
-2089734047 | 2025-03-26T20:10:18.179509
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
4072 /
tcp
45131230 | 2025-03-28T20:16:19.356076
inv2W\x04\x0f\x00\x00\x00\x01\x00\t\x00\x00\x00
4150 /
tcp
-358801646 | 2025-03-25T13:27:35.133657
4157 /
tcp
539065883 | 2025-03-26T22:15:25.691749
4244 /
tcp
-445721795 | 2025-03-26T14:19:24.301157
\x00[\xc3\xaed\x1a\x7f\x00\x00
4282 /
tcp
-1032713145 | 2025-03-25T09:50:15.475320
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
4321 /
tcp
-1250504565 | 2025-03-22T16:27:43.762336
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x80\x00\x04\x00\x01\x00\x00\x00\x05\x00\xff\xff\xff\x00\x00\x04\x08\x00\x00\x00\x00\x00\x7f\xff\x00\x00\x00\x00\x08\x07\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01
4369 /
tcp
819727972 | 2025-03-23T18:52:32.472682
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4431 /
tcp
-1399940268 | 2025-03-04T00:48:35.889036
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4433 /
tcp
-971970408 | 2025-03-07T09:19:48.819990
1140068775 | 2025-03-18T10:14:41.808171
HTTP/1.1 200 OK
Connection: Keep-Alive
Content-Type: text/html
X-Frame-Options: DENY
Name: VMware ESXi
FullName: VMware ESXi 6.7.0 build-8169922
Vendor: VMware, Inc.
Version: 6.7.0
Build: 8169922
LocaleVersion: INTL
LocaleBuild: 000
OsType: vmnix-x86
ProductLineId: embeddedEsx
ApiType: HostAgent
ApiVersion: 6.7
4444 /
tcp
-1399940268 | 2025-03-21T18:23:58.007239
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4461 /
tcp
1208318993 | 2025-02-28T06:53:45.907156
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
4477 /
tcp
632542934 | 2025-02-28T05:44:11.025340
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
4500 /
tcp
819727972 | 2025-03-26T18:30:35.939793
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4506 /
tcp
2033888749 | 2025-03-27T23:51:45.566168
Content-Type: text/rude-rejection
Content-Length: 24
Access Denied, go away.
Content-Type: text/disconnect-notice
C...
4531 /
tcp
-1888448627 | 2025-02-28T08:33:05.559509
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
4646 /
tcp
-1097188123 | 2025-03-07T15:57:40.502645
4700 /
tcp
-1399940268 | 2025-03-09T18:37:46.845040
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4821 /
tcp
1911457608 | 2025-03-27T06:26:50.143983
\x00[\x00\x00\x00\x00\x00\x00
4840 /
tcp
-2089734047 | 2025-03-12T22:01:39.138065
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
4911 /
tcp
-454087041 | 2025-03-26T03:41:30.989212
\x1e\xc3\x80\x010\x02\x00\xc2\xa8\xc3\xa3\x00\x00\x00\x00
4949 /
tcp
-616720387 | 2025-03-29T05:54:12.189349
4993 /
tcp
-1399940268 | 2025-03-04T14:49:45.212046
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5001 /
tcp
2087396567 | 2025-03-04T05:20:44.554116
kjnkjabhbanc283ubcsbhdc72
5003 /
tcp
820958131 | 2025-03-22T13:00:56.869688
kjnkjabhbanc283ubcsbhdc72\x02
5004 /
tcp
-2089734047 | 2025-03-14T02:33:23.167117
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
-2107996212 | 2025-03-20T19:25:11.478031
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
-1338936697 | 2025-03-20T06:39:56.156357
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae2109_PStjdxtk16_38957-48596
5010 /
tcp
1208318993 | 2025-03-14T10:55:48.197018
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
5025 /
tcp
1741579575 | 2025-03-21T10:53:10.405006
2136170042 | 2025-03-04T23:42:07.528268
HTTP/1.1 200
Accept-Ranges: bytes
Content-Type: text/html
5180 /
tcp
921225407 | 2025-03-23T05:17:58.552033
\x00\x00\x00\x04\x00\x00\x00\x00\x00
5201 /
tcp
-1327660293 | 2025-03-06T22:04:59.163787
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
5222 /
tcp
585675468 | 2025-03-23T10:37:08.747817
5231 /
tcp
-1626979812 | 2025-03-22T01:47:33.060235
220 Service ready for new user.
-1045760528 | 2025-02-27T16:49:37.505630
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
-1045760528 | 2025-03-23T09:59:31.794535
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
5268 /
tcp
819727972 | 2025-02-28T02:59:40.753123
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-898901461 | 2025-03-21T23:51:23.824625
HTTP/1.1 400 Bad Request
Server: CWAP-waf
Content-Type: text/html
Connection: close
WZWS-RAY: 1249-1705941047.522-w-waf01tjgt
5272 /
tcp
1911457608 | 2025-03-25T20:54:36.612812
\x00[\x00\x00\x00\x00\x00\x00
5351 /
tcp
-1888448627 | 2025-03-28T12:11:18.015142
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
5432 /
tcp
165188539 | 2025-03-23T17:38:02.607455
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
5433 /
tcp
1308377066 | 2025-03-12T20:41:09.139787
5435 /
tcp
-1888448627 | 2025-03-26T03:30:07.785312
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
5495 /
tcp
1911457608 | 2025-03-18T13:26:28.392853
\x00[\x00\x00\x00\x00\x00\x00
1023953321 | 2025-03-06T21:07:32.270508
HTTP/1.0 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm="proxy"
Connection: close
Content-type: text/html; charset=utf-8
5569 /
tcp
1189133115 | 2025-03-22T21:40:52.353049
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
5590 /
tcp
-2089734047 | 2025-03-12T13:41:25.377339
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
5593 /
tcp
-1399940268 | 2025-02-27T20:21:50.916815
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5594 /
tcp
-1105333987 | 2025-03-22T07:02:30.619159
5672 /
tcp
575925250 | 2025-03-28T22:12:07.055090
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
5680 /
tcp
-457235091 | 2025-03-23T07:03:45.060917
audio 0 RTP/AVP 18 4 3 8 0 101\r\na
5858 /
tcp
-358801646 | 2025-03-12T13:46:50.581764
5907 /
tcp
1911457608 | 2025-03-27T11:26:17.354854
\x00[\x00\x00\x00\x00\x00\x00
-1249500036 | 2025-03-10T00:06:52.954396
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html
Connection: keep-alive
Accept-Ranges: bytes
5938 /
tcp
1911457608 | 2025-03-24T01:02:00.117014
\x00[\x00\x00\x00\x00\x00\x00
1999272906 | 2025-03-09T11:41:07.674146
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
-2107996212 | 2025-03-26T16:53:14.328051
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
-912876292 | 2025-03-19T06:24:36.025975
HTTP/1.1 503 Service Unavailable
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 13-298599-0 0NNN RT(1699908785717 9) q(0 -1 -1 -1) r(0 -1)
6000 /
tcp
120534451 | 2025-03-13T04:29:06.265729
6001 /
tcp
120534451 | 2025-03-20T16:36:09.027517
1830697416 | 2025-03-22T10:23:10.979067
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
6006 /
tcp
-1399940268 | 2025-03-26T17:14:25.991769
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6050 /
tcp
1332894250 | 2025-03-25T06:58:59.122389
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
6379 /
tcp
321971019 | 2025-03-04T04:06:25.006582
-ERR client ip is not in whitelist\r
6443 /
tcp
1690634669 | 2025-03-18T07:40:43.613805
6512 /
tcp
-2089734047 | 2025-03-03T18:26:58.089989
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
6601 /
tcp
-1399940268 | 2025-03-22T17:47:37.993563
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6602 /
tcp
1363464823 | 2025-03-26T15:23:54.963638
6653 /
tcp
165188539 | 2025-03-27T13:48:40.260643
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
4935895 | 2025-03-08T22:29:00.742304
HTTP/1.1 400 Bad Request
Server: CloudWAF
6667 /
tcp
819727972 | 2025-03-25T12:54:08.114504
SSH-2.0-OpenSSH_7.4
Vulnerabilities
6668 /
tcp
819727972 | 2025-03-26T10:02:25.790614
SSH-2.0-OpenSSH_7.4
Vulnerabilities
6697 /
tcp
-2017887953 | 2025-03-20T20:49:10.472796
SSH-2.0-OpenSSH_7.9
Vulnerabilities
2022011474 | 2025-03-04T16:06:13.578823
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
WZWS-RAY: 1249-1705941985.55-w-waf06yzm
1827807483 | 2025-03-24T09:02:47.087199
HTTP/1.1 401 Unauthorized
Server:
Cache-Control: no-cache,no-store
Content-Type: text/html; charset=%s
Connection: close
7087 /
tcp
575925250 | 2025-03-08T16:30:49.274656
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
7171 /
tcp
819727972 | 2025-03-26T23:30:35.319204
SSH-2.0-OpenSSH_7.4
Vulnerabilities
7172 /
tcp
-2096652808 | 2025-03-19T01:10:00.740961
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
7218 /
tcp
819727972 | 2025-03-08T22:25:27.315487
SSH-2.0-OpenSSH_7.4
Vulnerabilities
7401 /
tcp
-1279886438 | 2025-02-28T20:31:57.031569
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
7415 /
tcp
165188539 | 2025-03-27T11:44:06.251967
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
7434 /
tcp
1741579575 | 2025-03-13T03:14:05.524265
7441 /
tcp
-1399940268 | 2025-03-15T09:15:15.757700
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1612309769 | 2025-03-12T08:25:08.990289
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae28e1_CS-000-01SZh112_7344-42222
7548 /
tcp
546151771 | 2025-02-28T11:07:44.894173
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC
Clients:
/*.*.*.*:11264[0](queued=0,recved=1,sent=0)
Latency min/avg/max: 0/0.0/0
Received: 8557
Sent: 11410
Connections: 1
Outstanding: 0
Zxid: 0x332907ad3391
Mode: follower
Node count: 104618
7634 /
tcp
-1461540015 | 2025-03-15T00:27:11.472416
audio 0 RTP/AVP 18 4 3 8 0 101
a
7774 /
tcp
-2089734047 | 2025-03-28T09:53:39.225453
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
7775 /
tcp
-1428621233 | 2025-03-17T23:07:25.460177
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
1391945995 | 2025-03-27T13:51:11.861719
HTTP/1.1 403 Forbidden
Content-Type: text/plain; charset=utf-8
Proxy-Authenticate: Basic realm=""
7788 /
tcp
-441419608 | 2025-03-15T13:25:25.812994
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
7946 /
tcp
1632932802 | 2025-03-13T08:55:01.638233
7979 /
tcp
-2033111675 | 2025-03-05T23:25:44.299794
2103111368 | 2025-03-16T16:54:36.537287
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
8009 /
tcp
2087396567 | 2025-03-24T23:12:56.458683
kjnkjabhbanc283ubcsbhdc72
8015 /
tcp
820958131 | 2025-03-07T14:20:15.171231
kjnkjabhbanc283ubcsbhdc72\x02
8029 /
tcp
-2089734047 | 2025-03-11T20:39:10.365113
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
-1839934832 | 2025-03-22T08:15:38.047530
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
8044 /
tcp
-1032713145 | 2025-03-04T09:42:20.677196
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
932130308 | 2025-03-25T11:00:04.779427
HTTP/1.1 404 Not Found
content-type: text/plain;charset=utf-8
content-length: 10
8053 /
tcp
-375604792 | 2025-03-06T10:50:55.504193
220 Microsoft FTP Service
8068 /
tcp
-1428621233 | 2025-03-08T15:55:55.439276
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
-1453516345 | 2025-03-23T15:28:06.355892
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
8085 /
tcp
-952165951 | 2025-03-12T11:19:40.198974
8089 /
tcp
819727972 | 2025-03-16T01:51:09.137828
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1839934832 | 2025-03-12T18:47:36.393417
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
-1311886953 | 2025-03-09T18:03:07.143262
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae2207_hlj44_14026-32895
-749939074 | 2025-03-22T07:20:00.463925
HTTP/1.1 200
Cache-Control: private
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Access-Control-Allow-Origin: http://localhost:8009
Access-Control-Allow-Methods: *
Access-Control-Max-Age: 0
Access-Control-Allow-Credentials: true
XDomainRequestAllowed: 1
Access-Control-Allow-Headers: Authorization,Origin, X-Requested-With, Content-Type, Accept,Access-Token
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Transfer-Encoding: chunked
8101 /
tcp
1911457608 | 2025-03-23T20:39:56.561265
\x00[\x00\x00\x00\x00\x00\x00
1282941221 | 2025-03-05T05:45:04.243959
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
8109 /
tcp
921225407 | 2025-03-12T00:47:31.837618
\x00\x00\x00\x04\x00\x00\x00\x00\x00
8126 /
tcp
1778988322 | 2025-03-23T17:53:40.724028
* OK GroupWise IMAP4rev1 Server Ready
8134 /
tcp
1665283070 | 2025-03-12T05:50:25.550974
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x01\x00\x00\x10\x00\x00\n0\x03\x00\x00\x00\x01\x00\x05\x00\x00@\x00\x00\x06\x00\x00\x1f@
8136 /
tcp
-1399940268 | 2025-03-16T04:03:11.817487
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8139 /
tcp
1308377066 | 2025-03-11T10:25:19.898779
8147 /
tcp
-2089734047 | 2025-03-15T20:49:00.303137
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8148 /
tcp
1911457608 | 2025-03-06T18:10:31.395974
\x00[\x00\x00\x00\x00\x00\x00
8150 /
tcp
671605376 | 2025-03-28T06:40:07.834436
8156 /
tcp
-1399940268 | 2025-03-08T21:25:23.554323
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8161 /
tcp
-1019343788 | 2025-03-21T19:44:35.013378
8181 /
tcp
707919486 | 2025-03-17T14:22:45.059517
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
8183 /
tcp
820958131 | 2025-03-27T19:15:29.026921
kjnkjabhbanc283ubcsbhdc72\x02
8191 /
tcp
-1019343788 | 2025-03-17T13:03:30.247745
81614701 | 2025-02-27T14:10:42.176413
HTTP/1.1 200 OK
Content-Type: text/html
Accept-Ranges: bytes
Server: Microsoft-IIS/10.0
X-Powered-By: ASP.NET
8239 /
tcp
-345718689 | 2025-03-25T16:03:23.284849
8248 /
tcp
-1399940268 | 2025-03-19T20:26:15.514251
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8280 /
tcp
15018106 | 2025-03-17T21:37:05.511787
\x00\x19\x02\x00\x02\x00\x07\x00Protocol version mismatch\x00
8285 /
tcp
-1327660293 | 2025-03-29T06:11:56.870037
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
8291 /
tcp
1911457608 | 2025-03-13T15:30:14.974891
\x00[\x00\x00\x00\x00\x00\x00
8317 /
tcp
1911457608 | 2025-03-09T05:47:05.259606
\x00[\x00\x00\x00\x00\x00\x00
8350 /
tcp
-1399940268 | 2025-02-28T17:55:15.203897
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8384 /
tcp
1911457608 | 2025-03-27T23:12:30.613660
\x00[\x00\x00\x00\x00\x00\x00
8419 /
tcp
1911457608 | 2025-03-11T04:26:36.679136
\x00[\x00\x00\x00\x00\x00\x00
8428 /
tcp
819727972 | 2025-03-16T20:00:03.967913
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8433 /
tcp
722711397 | 2025-03-23T10:20:01.228166
\x00[M\xc3\xba\xc3\x9a\x7f\x00\x00
8435 /
tcp
-1810987450 | 2025-02-28T14:59:28.980249
8440 /
tcp
1911457608 | 2025-03-16T22:11:32.734543
\x00[\x00\x00\x00\x00\x00\x00
8442 /
tcp
504717326 | 2025-03-05T13:46:25.483921
SSH-2.0-OpenSSH_8.6
Vulnerabilities
-1638750096 | 2025-02-28T08:39:03.260342
HTTP/1.1 302 Moved Temporarily
Server: nginx/1.22.1
Date: Fri, 28 Feb 2025 08:39:03 GMT
Content-Type: text/html
Content-Length: 145
Connection: close
Location: https://139.196.97.119:443/
<html>
<head><title>302 Found</title></head>
<body>
<center><h1>302 Found</h1></center>
<hr><center>nginx/1.22.1</center>
</body>
</html>
8449 /
tcp
-2089734047 | 2025-03-22T21:31:56.300010
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8461 /
tcp
1911457608 | 2025-03-24T17:13:27.905924
\x00[\x00\x00\x00\x00\x00\x00
8465 /
tcp
-1399940268 | 2025-03-28T19:20:06.860178
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8466 /
tcp
1911457608 | 2025-03-24T16:42:16.932043
\x00[\x00\x00\x00\x00\x00\x00
8485 /
tcp
819727972 | 2025-03-18T05:57:49.788233
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8500 /
tcp
-684625978 | 2025-03-20T14:36:04.726983
{Datacenter:dc1 NodeName:consul-dev NodeID:e61aec6b-e338-67fa-3b08-f8185bd5b528 Revision:db839f18b Server:true Version:1.10.1}
8504 /
tcp
632542934 | 2025-03-05T02:56:47.818479
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
8530 /
tcp
819727972 | 2025-03-19T07:31:16.750347
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8545 /
tcp
165188539 | 2025-03-10T00:16:47.499244
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8553 /
tcp
1541211644 | 2025-03-17T20:53:35.479763
8554 /
tcp
290819026 | 2025-03-25T10:57:28.447583
welcome to Pandora console!
----------------------------
-------------------------
| Login Time | 2021-12-08 1...
8565 /
tcp
1492413928 | 2025-03-23T22:36:23.219399
SSH-2.0-OpenSSH_7.5
Vulnerabilities
8575 /
tcp
-1399940268 | 2025-03-21T00:54:56.585115
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8577 /
tcp
-136006866 | 2025-03-15T01:22:02.630536
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
8594 /
tcp
366084633 | 2025-03-19T23:28:04.877477
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
8601 /
tcp
-2089734047 | 2025-03-08T18:16:28.703809
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8649 /
tcp
842535728 | 2025-03-25T17:50:22.993745
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>
A<!DOCTYPE GANGLIA_XML [
<!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...
8702 /
tcp
1911457608 | 2025-03-19T08:40:07.829127
\x00[\x00\x00\x00\x00\x00\x00
8703 /
tcp
165188539 | 2025-03-05T20:53:57.650582
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8708 /
tcp
1308377066 | 2025-03-24T18:29:46.308559
8733 /
tcp
1426971893 | 2025-03-06T01:20:26.669569
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
8743 /
tcp
671605376 | 2025-03-24T15:27:04.709764
8764 /
tcp
-1779118422 | 2025-03-12T10:27:42.820357
\x00[\xc2\xae\xc2\x8d{\x7f\x00\x00
8791 /
tcp
819727972 | 2025-03-17T07:00:59.596475
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8809 /
tcp
1620329124 | 2025-03-23T18:27:30.509685
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\x01\xc3\xbf\xc3\xbb\x03\xc3\xbf\xc3\xbd\x01\xc3\xbf\xc3\xbe\x01Username:
8817 /
tcp
921225407 | 2025-03-05T08:54:31.524283
\x00\x00\x00\x04\x00\x00\x00\x00\x00
8831 /
tcp
-1399940268 | 2025-03-20T01:09:16.093764
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8837 /
tcp
1911457608 | 2025-03-16T15:08:53.595925
\x00[\x00\x00\x00\x00\x00\x00
8873 /
tcp
-1153858743 | 2025-03-08T13:18:05.719826
8875 /
tcp
-1189269828 | 2025-03-19T15:44:11.781844
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8879 /
tcp
-1399940268 | 2025-03-13T08:55:17.163609
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8880 /
tcp
-1611764932 | 2025-03-17T08:05:36.845041
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
372433470 | 2025-03-10T12:50:00.659399
HTTP/1.1 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm=""
8943 /
tcp
-1399940268 | 2025-03-12T12:28:16.514297
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9000 /
tcp
-2067028711 | 2025-03-27T15:38:31.007720
\x15\x03\x01\x00\x02\x02F
9001 /
tcp
-1026951088 | 2025-03-19T11:06:45.253168
9002 /
tcp
-971970408 | 2025-03-20T07:25:31.367821
9016 /
tcp
321971019 | 2025-03-24T17:51:50.942663
-ERR client ip is not in whitelist\r
9017 /
tcp
205347087 | 2025-03-13T11:56:09.374281
SSH-25453-Cisco-3524665.35\n
9020 /
tcp
-904840257 | 2025-03-11T00:12:30.323400
572 Relay not authorized\r\n
9028 /
tcp
-358801646 | 2025-03-27T22:53:22.749442
9029 /
tcp
-1399940268 | 2025-03-28T21:34:16.039993
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9030 /
tcp
-1428621233 | 2025-03-25T18:56:42.053593
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
9033 /
tcp
-457235091 | 2025-03-13T07:01:02.991484
audio 0 RTP/AVP 18 4 3 8 0 101\r\na
9034 /
tcp
-1888448627 | 2025-03-19T11:47:16.016704
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
1130179067 | 2025-03-20T00:06:08.992120
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65aa15a9_PS-000-01k7g70_22621-61633
9042 /
tcp
2087396567 | 2025-03-19T07:21:23.393294
kjnkjabhbanc283ubcsbhdc72
9051 /
tcp
-1399940268 | 2025-03-20T08:37:24.839800
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9055 /
tcp
1975288991 | 2025-03-10T23:02:15.537758
9061 /
tcp
-1327660293 | 2025-03-07T18:39:02.512199
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
9070 /
tcp
-303199180 | 2025-03-08T12:14:45.190634
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
9073 /
tcp
1363464823 | 2025-03-19T01:39:41.203853
9089 /
tcp
-1399940268 | 2025-03-24T12:00:35.925906
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9091 /
tcp
-319440554 | 2025-03-11T07:20:05.545160
9095 /
tcp
2087396567 | 2025-03-22T22:47:15.472984
kjnkjabhbanc283ubcsbhdc72
9100 /
tcp
-1779118422 | 2025-03-20T21:55:57.745403
\x00[\xc2\xae\xc2\x8d{\x7f\x00\x00
9102 /
tcp
165188539 | 2025-03-12T12:22:02.370420
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
9105 /
tcp
-1399940268 | 2025-03-19T07:38:32.506620
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9109 /
tcp
1210754493 | 2025-03-22T08:54:18.142613
0\x0c\x02\x01\x01a\x07\n\x01\x00\x04\x00\x04\x00
-1839934832 | 2025-03-28T18:23:49.377355
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
9133 /
tcp
-146605374 | 2025-03-06T01:49:52.712551
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
9136 /
tcp
1492413928 | 2025-03-06T13:32:21.202869
SSH-2.0-OpenSSH_7.5
Vulnerabilities
9147 /
tcp
1948301213 | 2025-03-15T12:12:00.759614
RFB 003.003
VNC:
Protocol Version: 3.3
9149 /
tcp
740837454 | 2025-03-25T20:45:53.326119
SSH-2.0-OpenSSH_5.3
Vulnerabilities
9151 /
tcp
1453929220 | 2025-03-14T19:03:55.653785
9162 /
tcp
1767345577 | 2025-03-06T22:55:25.483897
Hello, this is Quagga (version 0T).
Copyright 1996-200
9163 /
tcp
1308377066 | 2025-03-26T19:42:14.614791
9174 /
tcp
2121220663 | 2025-03-10T18:48:00.922810
9181 /
tcp
1726594447 | 2025-03-26T15:06:13.195048
\r\n\nLantronix MSS100 Version V118/523(045538937)\n\r\nType HELP at the \'Local_61349> \' prompt for assistance.\n\r\n\r\n\nUsername>
9182 /
tcp
-375604792 | 2025-03-08T22:37:08.460735
220 Microsoft FTP Service
9189 /
tcp
1492413928 | 2025-03-24T09:24:33.658529
SSH-2.0-OpenSSH_7.5
Vulnerabilities
9192 /
tcp
-358801646 | 2025-03-14T16:45:43.662701
9194 /
tcp
-1399940268 | 2025-03-19T00:18:29.662704
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9198 /
tcp
165188539 | 2025-03-10T12:51:39.363576
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
9199 /
tcp
1492413928 | 2025-02-27T08:32:14.619136
SSH-2.0-OpenSSH_7.5
Vulnerabilities
-1045760528 | 2025-03-20T16:31:22.452875
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
9208 /
tcp
1492413928 | 2025-03-14T02:20:02.425310
SSH-2.0-OpenSSH_7.5
Vulnerabilities
9236 /
tcp
819727972 | 2025-03-19T02:54:55.404705
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9245 /
tcp
-1399940268 | 2025-03-27T21:35:01.160594
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9304 /
tcp
1911457608 | 2025-03-28T16:36:28.908123
\x00[\x00\x00\x00\x00\x00\x00
9306 /
tcp
-585940771 | 2025-03-24T21:24:18.729993
9333 /
tcp
165188539 | 2025-03-21T15:50:32.162957
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
9376 /
tcp
-1399940268 | 2025-03-08T22:38:03.942282
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9398 /
tcp
-2096652808 | 2025-03-11T23:13:06.374096
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
1529351907 | 2025-03-12T12:01:52.033173
HTTP/1.1 407 OK
Content-Type: text/plain; charset=utf-8
Connection: keep-alive
please add white ip *.*.*.*
-1045760528 | 2025-03-04T20:43:55.532545
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
9553 /
tcp
-2089734047 | 2025-03-21T21:48:28.540616
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9600 /
tcp
51259122 | 2025-03-24T07:03:17.771358
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
9633 /
tcp
2087396567 | 2025-03-22T16:42:47.866013
kjnkjabhbanc283ubcsbhdc72
9734 /
tcp
1911457608 | 2025-03-10T00:58:23.958095
\x00[\x00\x00\x00\x00\x00\x00
9765 /
tcp
1363464823 | 2025-03-13T07:04:07.089238
9810 /
tcp
-445721795 | 2025-03-10T01:46:47.343909
\x00[\xc3\xaed\x1a\x7f\x00\x00
9943 /
tcp
-726580714 | 2025-03-28T03:10:58.037683
\\x03\\x10\\x08\\x02\\xc2\\x80}\\x08\\x02\\xc2\\x80\xc3\xa2\\x14\\x01
9944 /
tcp
2087396567 | 2025-03-28T01:05:15.195155
kjnkjabhbanc283ubcsbhdc72
9992 /
tcp
1126993057 | 2025-03-13T11:34:57.898656
* OK [CAPABILITY a2,M\\] nBwXk2pPP IMAP4rev1 20qx at
-1901729922 | 2025-03-19T16:42:07.409471
HTTP/1.1 404
Vary: Origin
Vary: Access-Control-Request-Method
Vary: Access-Control-Request-Headers
Content-Type: application/json
Transfer-Encoding: chunked
9999 /
tcp
1161309183 | 2025-03-26T14:59:49.452948
10000 /
tcp
-1598265216 | 2025-03-09T14:13:05.529655
10001 /
tcp
1492413928 | 2025-03-15T22:16:33.654597
SSH-2.0-OpenSSH_7.5
Vulnerabilities
10010 /
tcp
-2096652808 | 2025-03-10T02:14:09.001770
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
10011 /
tcp
1911457608 | 2025-03-24T19:50:50.299330
\x00[\x00\x00\x00\x00\x00\x00
10012 /
tcp
-1380608668 | 2025-03-17T09:46:42.575439
\\x00[\'\\x1c\\xc0\\xa8X\\xfd
10029 /
tcp
-1399940268 | 2025-03-12T17:30:58.847852
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10030 /
tcp
-1428621233 | 2025-03-18T02:36:23.685906
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
10042 /
tcp
1615193817 | 2025-03-10T20:41:55.284297
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
10044 /
tcp
937756010 | 2025-03-12T20:28:11.956249
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x01\x00\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
10050 /
tcp
-971970408 | 2025-03-27T03:51:23.625840
10089 /
tcp
-2096652808 | 2025-03-22T12:00:36.615564
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
10134 /
tcp
-1099385124 | 2025-03-22T13:43:22.854237
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
10209 /
tcp
-1399940268 | 2025-03-22T16:37:20.051097
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10225 /
tcp
945910976 | 2025-03-16T03:54:52.274353
* OK TeamXchange IMAP4rev1 server (otyUg) ready.\r\n
10250 /
tcp
539065883 | 2025-03-27T00:55:52.646357
10251 /
tcp
410249975 | 2025-03-04T07:49:09.664972
10254 /
tcp
1830187220 | 2025-03-07T01:14:21.026940
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
10283 /
tcp
819727972 | 2025-03-11T20:29:02.127428
SSH-2.0-OpenSSH_7.4
Vulnerabilities
10894 /
tcp
1911457608 | 2025-03-14T11:52:05.625582
\x00[\x00\x00\x00\x00\x00\x00
10909 /
tcp
-2089734047 | 2025-03-28T02:35:12.343085
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
10911 /
tcp
-1399940268 | 2025-03-27T20:13:13.356767
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10933 /
tcp
819727972 | 2025-03-05T12:20:40.221140
SSH-2.0-OpenSSH_7.4
Vulnerabilities
10934 /
tcp
-1399940268 | 2025-03-04T09:06:30.488504
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1830697416 | 2025-03-29T06:09:35.558766
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
11288 /
tcp
165188539 | 2025-03-28T23:40:10.991935
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
11481 /
tcp
-358801646 | 2025-03-20T03:48:21.997683
11596 /
tcp
-358801646 | 2025-03-17T07:27:18.095537
11701 /
tcp
1126993057 | 2025-03-19T03:37:08.053461
* OK [CAPABILITY a2,M\\] nBwXk2pPP IMAP4rev1 20qx at
12082 /
tcp
-2096652808 | 2025-03-17T20:21:03.825138
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12084 /
tcp
1189133115 | 2025-02-27T23:24:25.070076
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
-1453516345 | 2025-03-20T02:44:18.764740
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
12112 /
tcp
-903067560 | 2025-03-07T17:58:29.875097
\x00[\x13)\xc2\x81\x7f\x00\x00
12120 /
tcp
819727972 | 2025-03-04T22:22:45.541766
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12129 /
tcp
-1399940268 | 2025-03-10T01:39:35.103948
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12139 /
tcp
1911457608 | 2025-03-24T14:30:03.934959
\x00[\x00\x00\x00\x00\x00\x00
1282941221 | 2025-03-21T03:45:45.351814
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
12144 /
tcp
-1399940268 | 2025-02-27T15:46:42.354312
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12150 /
tcp
740837454 | 2025-03-04T11:10:14.900138
SSH-2.0-OpenSSH_5.3
Vulnerabilities
12153 /
tcp
632542934 | 2025-03-16T11:30:38.315013
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
12155 /
tcp
819727972 | 2025-03-08T19:34:52.545822
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12156 /
tcp
819727972 | 2025-03-19T03:37:58.898341
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12176 /
tcp
380146262 | 2025-03-06T15:56:47.163542
12177 /
tcp
819727972 | 2025-03-26T22:04:01.133568
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12189 /
tcp
709622286 | 2025-03-19T08:43:33.748952
OK Welcome <299685> on DirectUpdate server 7286\r\n
12194 /
tcp
1011407350 | 2025-03-05T06:53:04.948405
* OK GroupWise IMAP4rev1 Server Ready\r\n
12196 /
tcp
-2089734047 | 2025-03-23T15:18:09.343243
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12211 /
tcp
921225407 | 2025-03-06T14:50:17.614870
\x00\x00\x00\x04\x00\x00\x00\x00\x00
12214 /
tcp
-358801646 | 2025-03-17T22:15:01.985498
12217 /
tcp
-653033013 | 2025-03-28T09:44:29.053630
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
12220 /
tcp
493955023 | 2025-02-27T20:53:13.532148
\x00\x00\x0c\x04\x00\x00\x00\x00\x00\x00\x04\x00\x10\x00\x00\x00\n0\x05\x00\x00@\x00
12234 /
tcp
-1399940268 | 2025-03-24T02:07:07.261685
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12255 /
tcp
320677201 | 2025-03-04T23:42:32.509939
H\x00\x00\x00\xc3\xbfj\x04Host \'101.133.140.114\' is not allowed to \nconnect to this MySQL server
12266 /
tcp
1991883981 | 2025-03-24T08:15:47.886961
B\x00\x00\x00\xc3\xbfn\x04Too many connections
12272 /
tcp
819727972 | 2025-03-23T10:54:50.643738
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12277 /
tcp
819727972 | 2025-03-26T20:19:14.396972
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12286 /
tcp
-1399940268 | 2025-03-05T10:12:06.359347
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12287 /
tcp
-2080784861 | 2025-03-18T23:48:41.526251
GBPK\xc3\xbb\xc3\xb7n\xc2\x93W\xc2\xaf\xc2\x86\xc2\x93x@\xc2\xa9\x0e\xc3\x8a*\xc2\x9bS\x00
12288 /
tcp
580340387 | 2025-03-28T13:53:11.345506
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
12293 /
tcp
-1476017887 | 2025-03-01T00:14:21.939091
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
12294 /
tcp
-122096153 | 2025-03-16T14:18:58.557757
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
12312 /
tcp
-784071826 | 2025-03-07T17:41:27.149069
SSH-2.0-OpenSSH_8.0
Vulnerabilities
12316 /
tcp
-1399940268 | 2025-03-17T15:50:59.218063
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12323 /
tcp
-1399940268 | 2025-03-05T07:15:12.786329
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12327 /
tcp
51259122 | 2025-03-26T05:11:16.287123
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
1077013874 | 2025-03-19T05:32:33.964132
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
12332 /
tcp
165188539 | 2025-03-13T17:31:38.617175
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12338 /
tcp
51259122 | 2025-03-07T07:31:31.114103
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
296364507 | 2025-03-12T18:59:52.211549
HTTP/1.1 500 Internal Server Error
SERVER: Trend Chip UPnP/1.0 DMS
CONNECTION: close
CONTENT-LENGTH: 60
CONTENT-TYPE: text/html
12348 /
tcp
-1399940268 | 2025-03-01T01:10:20.094795
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12351 /
tcp
-1399940268 | 2025-03-22T00:00:49.728532
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12361 /
tcp
1911457608 | 2025-03-28T00:19:14.795483
\x00[\x00\x00\x00\x00\x00\x00
12365 /
tcp
-1399940268 | 2025-03-21T00:21:14.385852
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
971933601 | 2025-03-13T16:11:46.432555
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
12372 /
tcp
1911457608 | 2025-03-14T05:58:38.261617
\x00[\x00\x00\x00\x00\x00\x00
12383 /
tcp
1911457608 | 2025-03-19T20:54:44.544844
\x00[\x00\x00\x00\x00\x00\x00
12394 /
tcp
-1487943323 | 2025-03-23T10:36:20.240265
431 Unable to negotiate secure command connection.\r\n
12399 /
tcp
597764502 | 2025-03-23T21:53:53.537098
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
12403 /
tcp
1911457608 | 2025-03-22T13:21:40.960460
\x00[\x00\x00\x00\x00\x00\x00
12426 /
tcp
-1399940268 | 2025-03-14T20:10:47.376877
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12436 /
tcp
-2017887953 | 2025-03-06T09:34:37.671850
SSH-2.0-OpenSSH_7.9
Vulnerabilities
12440 /
tcp
677934968 | 2025-03-04T12:00:01.140111
12451 /
tcp
165188539 | 2025-03-20T18:31:10.990277
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12458 /
tcp
117101543 | 2025-03-23T09:56:30.093917
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
12474 /
tcp
-2089734047 | 2025-03-27T18:14:48.501407
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12476 /
tcp
-1105333987 | 2025-03-28T14:56:55.930153
12483 /
tcp
-445721795 | 2025-03-18T09:10:14.905872
\x00[\xc3\xaed\x1a\x7f\x00\x00
12491 /
tcp
-1487943323 | 2025-03-21T14:28:14.485201
431 Unable to negotiate secure command connection.\r\n
12498 /
tcp
597764502 | 2025-03-05T23:19:42.988409
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
12500 /
tcp
1126993057 | 2025-03-27T03:53:11.824240
* OK [CAPABILITY a2,M\\] nBwXk2pPP IMAP4rev1 20qx at
971933601 | 2025-03-15T19:03:33.822542
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
12507 /
tcp
1911457608 | 2025-03-25T11:10:23.006022
\x00[\x00\x00\x00\x00\x00\x00
12528 /
tcp
632542934 | 2025-03-06T09:37:37.844334
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
12533 /
tcp
-1097188123 | 2025-03-19T04:39:14.106051
12536 /
tcp
819727972 | 2025-03-13T04:20:36.470290
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12538 /
tcp
-441419608 | 2025-03-12T12:34:49.857717
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
12541 /
tcp
-1399940268 | 2025-03-25T08:30:54.620000
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12547 /
tcp
-653033013 | 2025-03-26T21:41:25.892037
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
12550 /
tcp
1426971893 | 2025-03-25T15:59:25.558145
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
12557 /
tcp
-1399940268 | 2025-03-28T11:44:39.426162
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12563 /
tcp
1911457608 | 2025-02-28T22:36:27.692392
\x00[\x00\x00\x00\x00\x00\x00
12583 /
tcp
165188539 | 2025-03-06T14:30:45.872086
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
-1839934832 | 2025-03-21T18:37:33.332484
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
12615 /
tcp
45131230 | 2025-03-04T20:23:26.701899
inv2W\x04\x0f\x00\x00\x00\x01\x00\t\x00\x00\x00
12980 /
tcp
819727972 | 2025-03-16T22:24:59.469558
SSH-2.0-OpenSSH_7.4
Vulnerabilities
13001 /
tcp
-1399940268 | 2025-03-26T12:15:36.555215
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
13228 /
tcp
-1907909544 | 2025-02-28T11:36:56.966231
\r\nHello, this is Quagga (version 0T).\r\nCopyright 1996-200
14082 /
tcp
1911457608 | 2025-03-19T03:04:34.100597
\x00[\x00\x00\x00\x00\x00\x00
14147 /
tcp
-1795027372 | 2025-03-28T01:05:54.617813
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
14265 /
tcp
1767345577 | 2025-03-06T07:27:45.300594
Hello, this is Quagga (version 0T).
Copyright 1996-200
14344 /
tcp
-1399940268 | 2025-03-18T03:40:10.638003
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
14402 /
tcp
632542934 | 2025-03-11T19:27:07.801545
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
14909 /
tcp
-345718689 | 2025-03-12T08:00:28.325893
15001 /
tcp
-2089734047 | 2025-03-15T07:34:36.035460
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
15038 /
tcp
-1399940268 | 2025-03-15T22:59:10.214941
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
15044 /
tcp
-1099385124 | 2025-02-28T21:38:53.052937
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
15672 /
tcp
921225407 | 2025-03-26T14:08:17.133285
\x00\x00\x00\x04\x00\x00\x00\x00\x00
16002 /
tcp
321971019 | 2025-03-29T03:58:06.721311
-ERR client ip is not in whitelist\r
-1013082686 | 2025-03-21T01:38:39.179989
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
16011 /
tcp
740837454 | 2025-03-28T03:00:07.462038
SSH-2.0-OpenSSH_5.3
Vulnerabilities
16013 /
tcp
745343730 | 2025-03-21T21:35:45.849113
220 smtp.qq.com Esmtp QQ Mail Server
16021 /
tcp
937756010 | 2025-03-16T09:29:34.967579
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x01\x00\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
16025 /
tcp
-2089734047 | 2025-03-28T14:54:44.226890
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
-2107996212 | 2025-03-25T13:20:30.596533
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
16028 /
tcp
-1730858130 | 2025-03-19T00:27:48.191074
RFB 003.008
VNC:
Protocol Version: 3.8
16033 /
tcp
-2089734047 | 2025-03-25T18:53:20.896290
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
16048 /
tcp
-180163620 | 2025-03-24T07:57:58.805747
NPC Telnet permit one connection.\r\n But One connection() already keep alive.\r\nGood Bye !! \r\n
16056 /
tcp
-616720387 | 2025-02-28T23:26:03.530796
16062 /
tcp
-1626979812 | 2025-03-03T22:57:08.691548
220 Service ready for new user.
16063 /
tcp
-407828767 | 2025-03-13T17:53:27.879932
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
16065 /
tcp
-2031152423 | 2025-03-14T23:29:20.432997
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
16071 /
tcp
-2046514463 | 2025-03-19T16:00:14.256270
16081 /
tcp
-1399940268 | 2025-03-20T17:54:30.686585
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16093 /
tcp
-358801646 | 2025-03-28T02:29:37.650942
16095 /
tcp
50497985 | 2025-03-16T11:51:25.207755
\x00[\xc3\x88\xc3\x9dS\x7f\x00\x00
16097 /
tcp
-358801646 | 2025-03-27T20:27:29.888280
16098 /
tcp
-1399940268 | 2025-03-16T15:29:42.525769
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16404 /
tcp
1911457608 | 2025-03-24T12:24:23.700496
\x00[\x00\x00\x00\x00\x00\x00
16464 /
tcp
-454087041 | 2025-03-21T00:03:54.315617
\x1e\xc3\x80\x010\x02\x00\xc2\xa8\xc3\xa3\x00\x00\x00\x00
-147424911 | 2025-03-22T18:01:06.541606
HTTP/1.1 404 Not Found
Content Length: 0
16993 /
tcp
-1733645023 | 2025-03-22T15:02:52.463787
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.10
17001 /
tcp
-1810987450 | 2025-03-13T15:15:23.220130
17010 /
tcp
165188539 | 2025-03-25T21:44:37.573978
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
17084 /
tcp
-1648456501 | 2025-03-04T22:18:25.759371
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
17443 /
tcp
-1428621233 | 2025-03-20T10:32:57.137030
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
17774 /
tcp
1989907056 | 2025-03-06T20:20:07.210501
RTSP/1.0 453 Not Enough Bandwidth\r\nServer: AirTunes/7l_wZ\r\n\r\n
18002 /
tcp
-1399940268 | 2025-03-13T06:44:18.413723
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18004 /
tcp
-1399940268 | 2025-03-25T16:20:03.430787
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18005 /
tcp
-1399940268 | 2025-03-12T07:25:48.488006
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2143387245 | 2025-03-22T01:46:22.699509
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
18020 /
tcp
1911457608 | 2025-03-25T13:10:16.942383
\x00[\x00\x00\x00\x00\x00\x00
18023 /
tcp
-375604792 | 2025-03-15T05:33:45.186001
220 Microsoft FTP Service
1282941221 | 2025-03-24T11:54:34.658169
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
18043 /
tcp
-1399940268 | 2025-03-06T23:42:13.546559
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18046 /
tcp
580340387 | 2025-03-17T19:30:00.860090
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
18056 /
tcp
-358801646 | 2025-03-26T20:57:27.156070
18065 /
tcp
320677201 | 2025-03-28T16:48:57.769761
H\x00\x00\x00\xc3\xbfj\x04Host \'101.133.140.114\' is not allowed to \nconnect to this MySQL server
18071 /
tcp
-585940771 | 2025-03-22T18:18:55.014282
18080 /
tcp
-375604792 | 2025-03-29T02:53:26.490359
220 Microsoft FTP Service
18081 /
tcp
1542849631 | 2025-03-26T19:17:53.754194
* OK [CAPABILITY a2,M\] nBwXk2pPP IMAP4rev1 20qx at
-1045760528 | 2025-03-20T11:01:44.724853
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
18099 /
tcp
-2089734047 | 2025-03-17T13:28:35.257266
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
18239 /
tcp
-1248408558 | 2025-03-17T23:57:31.418707
220 MikroTik FTP server (MikroTik 6.44.3) ready
18245 /
tcp
632542934 | 2025-03-27T18:35:44.438035
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
18443 /
tcp
-1032713145 | 2025-03-28T20:13:51.688844
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
18553 /
tcp
1541211644 | 2025-03-14T11:58:08.269463
18556 /
tcp
-1888448627 | 2025-03-21T05:46:38.501574
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
18765 /
tcp
1363464823 | 2025-03-25T00:08:24.740313
19091 /
tcp
-2031152423 | 2025-03-22T04:14:26.484131
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
19200 /
tcp
751496153 | 2025-03-27T19:43:10.615503
* OK TeamXchange IMAP4rev1 server (otyUg) ready.
19222 /
tcp
1911457608 | 2025-03-13T23:12:18.744393
\x00[\x00\x00\x00\x00\x00\x00
19233 /
tcp
819727972 | 2025-03-08T13:38:43.300112
SSH-2.0-OpenSSH_7.4
Vulnerabilities
19930 /
tcp
-1032713145 | 2025-03-26T17:20:26.393132
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
1900503736 | 2025-03-27T02:26:34.638642
HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-HTTPAPI/2.0
20018 /
tcp
819727972 | 2025-03-04T07:52:44.537452
SSH-2.0-OpenSSH_7.4
Vulnerabilities
20030 /
tcp
-1327660293 | 2025-03-17T23:26:22.910191
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
20087 /
tcp
1741579575 | 2025-03-26T11:29:00.950191
20106 /
tcp
401555314 | 2025-03-03T23:51:43.977856
20107 /
tcp
669849225 | 2025-03-15T01:08:18.129844
SSH-98.60-SysaxSSH_81885..42\r\n
20185 /
tcp
-832380282 | 2025-03-04T16:46:59.132367
lpd [@Boyk]: Print-services are not available to your host (aF2qXkQ2m).\n
20200 /
tcp
-1399940268 | 2025-03-27T10:56:03.495803
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
20256 /
tcp
-1392039491 | 2025-03-04T00:44:55.354781
"Broadband Router"
<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
20547 /
tcp
819727972 | 2025-03-24T01:01:26.250179
SSH-2.0-OpenSSH_7.4
Vulnerabilities
20880 /
tcp
1370263973 | 2025-03-27T11:41:46.169967
-1013082686 | 2025-03-27T13:38:29.945651
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
21027 /
tcp
819727972 | 2025-03-26T23:01:01.223684
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21234 /
tcp
1504401647 | 2025-03-23T09:45:39.539959
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
21241 /
tcp
1278527606 | 2025-03-26T15:01:22.366657
21245 /
tcp
819727972 | 2025-03-16T17:56:04.273068
SSH-2.0-OpenSSH_7.4
Vulnerabilities
21254 /
tcp
1911457608 | 2025-03-11T07:34:05.838511
\x00[\x00\x00\x00\x00\x00\x00
21256 /
tcp
-2089734047 | 2025-03-13T11:19:11.136582
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
21258 /
tcp
-904840257 | 2025-03-10T08:32:51.146933
572 Relay not authorized\r\n
21259 /
tcp
1911457608 | 2025-03-09T19:56:21.840726
\x00[\x00\x00\x00\x00\x00\x00
21264 /
tcp
1911457608 | 2025-03-10T15:31:48.149213
\x00[\x00\x00\x00\x00\x00\x00
21266 /
tcp
1911457608 | 2025-03-11T05:42:21.879571
\x00[\x00\x00\x00\x00\x00\x00
21274 /
tcp
-1399940268 | 2025-03-25T06:51:36.045814
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21280 /
tcp
-1888448627 | 2025-03-04T05:04:48.668816
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
21284 /
tcp
401555314 | 2025-03-13T02:41:19.468288
21312 /
tcp
-1059554316 | 2025-02-28T20:58:58.613194
\xc2\xa5A\x00\x01\x00\x00\x00,\x00\x00\x00\x02\x00\x00\x00L\x00\x00\x00\x08Connect\x00\x00\x00\x00x\x00\x00\x00\x0857222\x00\x00\x00
21320 /
tcp
-1399940268 | 2025-03-25T12:11:38.428073
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21322 /
tcp
-1399940268 | 2025-03-23T16:25:47.991790
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21379 /
tcp
-1733106930 | 2025-03-22T04:45:52.819872
Mysql Version: 5.6.50-log\nN\n5.6.50-log\x14(\nG5se"tGE\xc3\xbf\xc3\xb7-\x02\x7f\xc2\x80\x15cB^3$Zwh$wM[mysql_native_password
22000 /
tcp
1212921144 | 2025-03-27T11:31:54.876435
22001 /
tcp
2087396567 | 2025-03-27T20:58:46.299666
kjnkjabhbanc283ubcsbhdc72
22070 /
tcp
1542849631 | 2025-03-27T15:35:43.073642
* OK [CAPABILITY a2,M\] nBwXk2pPP IMAP4rev1 20qx at
22082 /
tcp
-1986594217 | 2025-02-28T00:07:27.550027
"AP0F1D85"\r\nConnection: close\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD>\n<BODY BGCOLOR
22222 /
tcp
-358801646 | 2025-03-26T09:20:05.521408
22556 /
tcp
-1097188123 | 2025-03-21T01:18:07.583705
25000 /
tcp
819727972 | 2025-03-20T01:08:37.597817
SSH-2.0-OpenSSH_7.4
Vulnerabilities
25006 /
tcp
51259122 | 2025-03-09T04:35:37.081121
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
25082 /
tcp
-2089734047 | 2025-03-21T00:52:12.880662
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
25565 /
tcp
1842524259 | 2025-03-25T23:10:04.392375
25952 /
tcp
1726594447 | 2025-03-12T01:38:38.536449
\r\n\nLantronix MSS100 Version V118/523(045538937)\n\r\nType HELP at the \'Local_61349> \' prompt for assistance.\n\r\n\r\n\nUsername>
27015 /
tcp
117101543 | 2025-03-25T12:14:48.281202
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
27017 /
tcp
422524323 | 2025-03-25T10:25:06.694607
{
"Version": "3.4.18",
"VersionArray": [
3,
4,
18,
0
],
"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",
"OpenSSLVersion": "",
"SysInfo": "",
"Bits": 64,
"Debug": false,
"MaxObjectSize": 16777216
}
27036 /
tcp
-1032713145 | 2025-03-25T08:36:03.374983
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
28017 /
tcp
-971970408 | 2025-03-24T15:30:25.913445
28443 /
tcp
380146262 | 2025-03-22T03:05:30.510539
29840 /
tcp
-653033013 | 2025-03-23T19:26:59.451368
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
29984 /
tcp
-441419608 | 2025-03-13T22:54:32.903507
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
30003 /
tcp
474736340 | 2025-03-16T07:08:38.053081
431 Unable to negotiate secure command connection.
30008 /
tcp
-1399940268 | 2025-02-28T20:30:25.125240
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
30022 /
tcp
1690634669 | 2025-03-18T21:21:45.962494
30222 /
tcp
2087396567 | 2025-03-09T05:36:55.274943
kjnkjabhbanc283ubcsbhdc72
30303 /
tcp
-653033013 | 2025-03-19T22:14:54.661062
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
30322 /
tcp
-1681927087 | 2025-03-24T13:31:06.413591
kjnkjabhbanc283ubcsbhdc72
30422 /
tcp
-375604792 | 2025-03-26T07:57:16.030668
220 Microsoft FTP Service
30443 /
tcp
165188539 | 2025-03-10T01:12:24.251169
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
30444 /
tcp
-1399940268 | 2025-03-18T08:40:57.937635
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
30452 /
tcp
-1399940268 | 2025-03-21T19:37:57.984189
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
30468 /
tcp
-891714208 | 2025-03-15T21:54:09.865177
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
30479 /
tcp
-1297953727 | 2025-02-28T23:24:50.569970
\x02\x00\x00\x00\x00\x00\x06\x04\x00\x00\x00\x00\x00\x0c\x00\x00\n0\x00\x1c
30701 /
tcp
1615193817 | 2025-03-06T08:35:43.107465
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
30718 /
tcp
-512818614 | 2025-03-22T11:16:15.110530
LH\\xdb\\xc6\\xdd\\xf6g\x0c\\x10\\x19\\x00\\x00\\x00\\x18\\x00\\x01\\x02\\x00\\x10\\x00\\x04\\x00\\x00\\x00\\x01\\xce\xdd\xb7\\x9d\\x86F\\xc7t\\x01\\xc1\\xcbU\xc8\x9c\\xe0_
30722 /
tcp
819727972 | 2025-03-24T23:47:11.621345
SSH-2.0-OpenSSH_7.4
Vulnerabilities
30822 /
tcp
-1514525820 | 2025-03-25T20:57:28.322539
Protocol version mismatch
31001 /
tcp
321971019 | 2025-03-23T16:54:24.310220
-ERR client ip is not in whitelist\r
31122 /
tcp
2087396567 | 2025-03-25T17:23:12.956121
kjnkjabhbanc283ubcsbhdc72
1282941221 | 2025-03-11T03:57:58.199597
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
31222 /
tcp
-297128567 | 2025-03-24T02:06:38.002176
\x04\x01\xc3\xb4\x00\x15Internal Server Error\x00\x00\x00AB\x00\x02\x05\x00
31322 /
tcp
-2096652808 | 2025-03-25T05:08:33.451943
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
1024374118 | 2025-03-18T07:22:17.922550
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
31422 /
tcp
677934968 | 2025-03-13T02:28:56.972669
31443 /
tcp
2087396567 | 2025-03-28T16:49:40.179912
kjnkjabhbanc283ubcsbhdc72
31522 /
tcp
1741579575 | 2025-03-23T11:29:21.192225
31622 /
tcp
-1428621233 | 2025-03-23T10:38:14.016160
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
31722 /
tcp
1741579575 | 2025-03-21T15:44:07.170068
31822 /
tcp
660175493 | 2025-03-20T18:52:49.864770
31922 /
tcp
1426971893 | 2025-03-11T07:27:33.645140
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
32122 /
tcp
2087396567 | 2025-03-09T22:02:20.666560
kjnkjabhbanc283ubcsbhdc72
32222 /
tcp
-1713437100 | 2025-03-23T17:14:20.826661
\xc3\xbf\xc3\xbb\x01\r\nWelcome to NetLinx v94 Copyright AMX Corp. 34395-49007\r\n>
32322 /
tcp
472902042 | 2025-03-09T19:30:16.802454
"Magic:ActiveMQ
Version:12
<ActiveMQ*TcpNoDelayEnabledSizePrefixDisabled CacheSizeProviderName ActiveMQStackTraceEnabledPlatformDetails JavaCacheEnabledTightEncodingEnabledMaxFrameSize@MaxInac
-1453516345 | 2025-03-22T03:41:18.506263
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
32622 /
tcp
1690634669 | 2025-03-21T03:24:50.574898
32722 /
tcp
539065883 | 2025-03-11T16:08:42.416885
32746 /
tcp
1504401647 | 2025-03-22T21:57:23.258679
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
32764 /
tcp
-1111515360 | 2025-03-15T08:49:15.474159
remshd: Kerberos Authentication not enabled.
33022 /
tcp
897328069 | 2025-03-22T23:54:36.338860
220 mail.scott000.com ESMTP
33060 /
tcp
-786044033 | 2025-03-29T00:22:28.132752
OK Welcome <299685> on DirectUpdate server 7286
33122 /
tcp
996960436 | 2025-03-22T22:06:50.548211
33222 /
tcp
2087396567 | 2025-03-19T23:59:50.592281
kjnkjabhbanc283ubcsbhdc72
33322 /
tcp
-1477838366 | 2025-03-22T08:09:15.409095
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
33389 /
tcp
-1059554316 | 2025-03-19T15:36:42.360892
\xc2\xa5A\x00\x01\x00\x00\x00,\x00\x00\x00\x02\x00\x00\x00L\x00\x00\x00\x08Connect\x00\x00\x00\x00x\x00\x00\x00\x0857222\x00\x00\x00
33422 /
tcp
-527005584 | 2025-03-19T16:37:29.870468
33522 /
tcp
-1529979118 | 2025-03-20T13:37:38.984378
33622 /
tcp
-653033013 | 2025-03-08T19:22:38.740078
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
33822 /
tcp
1741579575 | 2025-03-08T12:35:22.276692
33922 /
tcp
-893477759 | 2025-03-18T02:15:00.414026
!versionbind7 t{RPowerDNS Recursor 410
34022 /
tcp
-358801646 | 2025-03-20T17:03:48.524196
34122 /
tcp
-2096652808 | 2025-03-20T15:53:37.061784
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
34322 /
tcp
740837454 | 2025-03-19T18:25:22.606488
SSH-2.0-OpenSSH_5.3
Vulnerabilities
34622 /
tcp
-893477759 | 2025-03-19T09:32:06.503042
!versionbind7 t{RPowerDNS Recursor 410
34722 /
tcp
2087396567 | 2025-03-19T07:49:38.957859
kjnkjabhbanc283ubcsbhdc72
34822 /
tcp
-358801646 | 2025-03-03T23:45:29.835271
35000 /
tcp
-1399940268 | 2025-03-27T04:53:24.372731
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1230049476 | 2025-03-17T08:34:27.749981
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
35422 /
tcp
-801484042 | 2025-03-18T23:15:29.353703
35622 /
tcp
2087396567 | 2025-03-04T12:15:18.738451
kjnkjabhbanc283ubcsbhdc72
35922 /
tcp
2087396567 | 2025-03-16T21:48:55.955609
kjnkjabhbanc283ubcsbhdc72
36122 /
tcp
819727972 | 2025-03-13T09:46:32.481877
SSH-2.0-OpenSSH_7.4
Vulnerabilities
36222 /
tcp
-438503381 | 2025-03-17T19:18:45.217306
WORLD OF WARCRAFT CONNECTION - SERVER TO CLIENT - V2
36522 /
tcp
2087396567 | 2025-03-18T16:13:08.878103
kjnkjabhbanc283ubcsbhdc72
36722 /
tcp
2087396567 | 2025-03-17T04:45:48.832287
kjnkjabhbanc283ubcsbhdc72
36922 /
tcp
2087396567 | 2025-03-01T01:45:06.970609
kjnkjabhbanc283ubcsbhdc72
37122 /
tcp
-1428621233 | 2025-03-16T23:00:01.440801
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
37222 /
tcp
-441419608 | 2025-03-14T19:23:33.635943
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
37322 /
tcp
1208318993 | 2025-03-16T11:36:40.276903
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
37422 /
tcp
707919486 | 2025-03-15T11:50:12.707836
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
37522 /
tcp
1332894250 | 2025-02-28T16:57:16.721142
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
37622 /
tcp
1830187220 | 2025-03-16T01:50:53.116696
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
37722 /
tcp
-1681927087 | 2025-03-16T01:17:58.265024
kjnkjabhbanc283ubcsbhdc72
37822 /
tcp
-1598265216 | 2025-02-28T03:01:16.775766
37922 /
tcp
-2017887953 | 2025-03-18T00:25:18.174433
SSH-2.0-OpenSSH_7.9
Vulnerabilities
38022 /
tcp
1842524259 | 2025-02-27T13:22:25.388304
38122 /
tcp
1278527606 | 2025-03-15T17:55:57.426157
38333 /
tcp
597764502 | 2025-03-28T19:39:51.169370
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
38522 /
tcp
2087396567 | 2025-03-13T23:41:59.362617
kjnkjabhbanc283ubcsbhdc72
38722 /
tcp
2087396567 | 2025-03-07T05:34:37.786262
kjnkjabhbanc283ubcsbhdc72
38822 /
tcp
1850902677 | 2025-03-12T16:06:23.927332
39001 /
tcp
-1947777893 | 2025-03-19T20:30:49.975721
"Broadband Router"\r\n\r\n<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
39022 /
tcp
-1810987450 | 2025-03-13T20:12:00.798330
39222 /
tcp
2087396567 | 2025-03-13T17:51:10.567720
kjnkjabhbanc283ubcsbhdc72
39322 /
tcp
2087396567 | 2025-03-11T10:52:40.817351
kjnkjabhbanc283ubcsbhdc72
39422 /
tcp
-2081419599 | 2025-03-11T12:39:17.575074
39622 /
tcp
819727972 | 2025-03-11T07:23:04.447490
SSH-2.0-OpenSSH_7.4
Vulnerabilities
39722 /
tcp
-358801646 | 2025-03-05T04:07:54.305671
40722 /
tcp
-1887823886 | 2025-03-08T15:20:32.735323
K%~)J/\tHjU(IAGENT = (AGENT_VERSION = 2388790170)(RPC_VERSION = 5..722))
41022 /
tcp
-1428621233 | 2025-03-08T23:04:59.657769
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
41222 /
tcp
-1311598826 | 2025-03-05T00:38:09.495085
AMQP:
cluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local
copyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.
information:Licensed under the MPL 2.0. Website: https://rabbitmq.com
platform:Erlang/OTP 24.1
product:RabbitMQ
version:3.9.7
Capabilities:
publisher_confirms:true
exchange_exchange_bindings:true
basic.nack:true
consumer_cancel_notify:true
connection.blocked:true
consumer_priorities:true
authentication_failure_close:true
per_consumer_qos:true
direct_reply_to:tru
41522 /
tcp
-1810987450 | 2025-03-04T21:07:35.451720
41822 /
tcp
-1114821551 | 2025-03-07T17:37:13.668184
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
2143387245 | 2025-03-04T17:07:56.148231
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
42422 /
tcp
2087396567 | 2025-03-04T19:56:08.376259
kjnkjabhbanc283ubcsbhdc72
42901 /
tcp
-832380282 | 2025-02-27T13:56:56.032196
lpd [@Boyk]: Print-services are not available to your host (aF2qXkQ2m).\n
42922 /
tcp
398077695 | 2025-02-28T15:10:24.982552
43080 /
tcp
-274082663 | 2025-03-07T02:18:24.822741
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
43222 /
tcp
599074451 | 2025-02-28T23:58:01.849457
43322 /
tcp
472902042 | 2025-02-27T21:36:05.063641
"Magic:ActiveMQ
Version:12
<ActiveMQ*TcpNoDelayEnabledSizePrefixDisabled CacheSizeProviderName ActiveMQStackTraceEnabledPlatformDetails JavaCacheEnabledTightEncodingEnabledMaxFrameSize@MaxInac
43522 /
tcp
-1887823886 | 2025-02-27T18:41:12.924736
K%~)J/\tHjU(IAGENT = (AGENT_VERSION = 2388790170)(RPC_VERSION = 5..722))
44100 /
tcp
-345718689 | 2025-03-23T11:35:29.913152
44158 /
tcp
-433302150 | 2025-03-17T04:49:42.503829
44222 /
tcp
2087396567 | 2025-03-10T22:27:35.970089
kjnkjabhbanc283ubcsbhdc72
44333 /
tcp
1011407350 | 2025-03-03T17:27:10.774763
* OK GroupWise IMAP4rev1 Server Ready\r\n
44334 /
tcp
-1737707071 | 2025-03-14T09:09:27.265712
\x00b\x00\x01\x00\x00\x00\x00x\x0b\x00\x00\x00\x00z\x00437
44340 /
tcp
-358801646 | 2025-03-16T12:46:16.962500
44365 /
tcp
-653033013 | 2025-03-05T12:26:09.037562
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
44520 /
tcp
709622286 | 2025-03-15T15:20:43.378422
OK Welcome <299685> on DirectUpdate server 7286\r\n
44818 /
tcp
-2089734047 | 2025-03-13T06:16:39.148247
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
45003 /
tcp
1492413928 | 2025-03-04T23:00:02.995010
SSH-2.0-OpenSSH_7.5
Vulnerabilities
45022 /
tcp
1741579575 | 2025-03-10T15:49:31.307190
45822 /
tcp
-79865617 | 2025-03-10T12:34:59.280099
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com
mit-revprops depth log-revprops partial-replay ) ) )
45922 /
tcp
2087396567 | 2025-03-10T15:21:03.305647
kjnkjabhbanc283ubcsbhdc72
47808 /
tcp
2087396567 | 2025-03-24T03:50:07.404728
kjnkjabhbanc283ubcsbhdc72
47822 /
tcp
1741579575 | 2025-03-10T08:53:26.226713
47922 /
tcp
-641479109 | 2025-03-10T07:55:06.820760
47990 /
tcp
1426971893 | 2025-03-22T06:09:12.964494
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
48002 /
tcp
398077695 | 2025-03-24T16:17:29.782338
48122 /
tcp
1492413928 | 2025-03-10T05:26:47.932276
SSH-2.0-OpenSSH_7.5
Vulnerabilities
48322 /
tcp
-319440554 | 2025-03-10T01:58:20.338421
48422 /
tcp
-1611764932 | 2025-03-10T00:25:29.847718
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
48522 /
tcp
2033888749 | 2025-03-09T22:32:31.635911
Content-Type: text/rude-rejection
Content-Length: 24
Access Denied, go away.
Content-Type: text/disconnect-notice
C...
49080 /
tcp
897328069 | 2025-03-27T21:33:48.770494
220 mail.scott000.com ESMTP
49153 /
tcp
2087396567 | 2025-03-22T14:00:28.679714
kjnkjabhbanc283ubcsbhdc72
49443 /
tcp
-1399940268 | 2025-03-19T18:32:08.490671
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
49692 /
tcp
165188539 | 2025-03-04T20:57:36.542702
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
50000 /
tcp
2087396567 | 2025-03-24T15:10:12.335078
kjnkjabhbanc283ubcsbhdc72
50007 /
tcp
117101543 | 2025-03-28T05:44:56.185422
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
50105 /
tcp
-1327660293 | 2025-03-05T18:57:11.370227
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
50805 /
tcp
117101543 | 2025-03-12T17:29:23.979399
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
50996 /
tcp
-1487943323 | 2025-03-17T20:11:46.174782
431 Unable to negotiate secure command connection.\r\n
51007 /
tcp
-1399940268 | 2025-03-19T05:27:40.326909
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
51235 /
tcp
1911457608 | 2025-03-09T12:19:37.479879
\x00[\x00\x00\x00\x00\x00\x00
52536 /
tcp
819727972 | 2025-03-21T10:41:29.766500
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1072158793 | 2025-03-21T16:25:37.950736
HTTP/1.1 500 Internal Server Error
SERVER: Linux/2.6.21.5, UPnP/1.0, Portable SDK for UPnP devices/1.6.6
CONNECTION: close
CONTENT-LENGTH: 60
CONTENT-TYPE: text/html
52881 /
tcp
707919486 | 2025-03-13T08:08:05.332177
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
52931 /
tcp
-1737707071 | 2025-03-22T23:57:21.481049
\x00b\x00\x01\x00\x00\x00\x00x\x0b\x00\x00\x00\x00z\x00437
53022 /
tcp
1948301213 | 2025-03-07T07:13:59.116236
RFB 003.003
VNC:
Protocol Version: 3.3
53480 /
tcp
-1399940268 | 2025-03-13T19:30:12.626878
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
53484 /
tcp
-1648456501 | 2025-03-28T01:11:16.126849
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
54022 /
tcp
819727972 | 2025-03-13T02:45:49.260290
SSH-2.0-OpenSSH_7.4
Vulnerabilities
54138 /
tcp
-1888448627 | 2025-03-15T17:26:46.929067
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
54327 /
tcp
-2096652808 | 2025-03-18T16:19:19.670730
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
55000 /
tcp
-1399940268 | 2025-03-14T23:36:44.282648
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
55022 /
tcp
660175493 | 2025-03-07T05:37:49.805557
55442 /
tcp
1189133115 | 2025-03-20T21:25:39.828263
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
55443 /
tcp
957278843 | 2025-03-20T11:54:55.346830
55470 /
tcp
-2096652808 | 2025-03-22T07:29:46.064234
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
55490 /
tcp
-1327660293 | 2025-03-14T08:09:58.158644
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
55522 /
tcp
1632932802 | 2025-03-06T22:49:18.669806
55554 /
tcp
-2089734047 | 2025-03-24T11:42:48.868161
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
55822 /
tcp
-321444299 | 2025-03-06T21:03:39.967826
:dircproxy NOTICE AUTH :Looking up your hostname...
:dircproxy NOTICE AUTH :Got your hostname.
57522 /
tcp
2087396567 | 2025-03-06T12:35:22.080457
kjnkjabhbanc283ubcsbhdc72
57722 /
tcp
2087396567 | 2025-03-06T07:46:24.841302
kjnkjabhbanc283ubcsbhdc72
57784 /
tcp
-1399940268 | 2025-03-10T19:23:54.675857
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
57788 /
tcp
1911457608 | 2025-03-14T20:17:45.946637
\x00[\x00\x00\x00\x00\x00\x00
57822 /
tcp
-992671574 | 2025-03-06T06:04:54.503307
1830697416 | 2025-03-06T00:52:51.526906
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
58392 /
tcp
165188539 | 2025-03-10T09:00:29.101640
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
58422 /
tcp
320677201 | 2025-03-05T21:52:45.226861
H\x00\x00\x00\xc3\xbfj\x04Host \'101.133.140.114\' is not allowed to \nconnect to this MySQL server
58522 /
tcp
-1373613804 | 2025-03-05T19:41:04.722132
00970795:d7:smethod,6:shello,8:soptions,80:d10:shttp_port,368696:i1082,5:sname,5:sL_x,10:ssync_port,5:i00469,10:stimestamp,3190459:f920.7251553166,8:sversion,6262522:sl4X,
58822 /
tcp
-1036370807 | 2025-03-05T16:14:58.045853
59222 /
tcp
897328069 | 2025-03-05T09:54:08.436738
220 mail.scott000.com ESMTP
60000 /
tcp
-1399940268 | 2025-03-17T23:09:23.499035
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
60001 /
tcp
2087396567 | 2025-03-29T05:54:05.535162
kjnkjabhbanc283ubcsbhdc72
60129 /
tcp
-784071826 | 2025-03-20T04:45:39.271050
SSH-2.0-OpenSSH_8.0
Vulnerabilities
61613 /
tcp
165188539 | 2025-03-23T02:52:06.279150
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
61616 /
tcp
-971970408 | 2025-03-24T19:27:51.438796
62016 /
tcp
-1399940268 | 2025-02-27T18:39:57.764313
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-147424911 | 2025-03-20T12:25:24.712855
HTTP/1.1 404 Not Found
Content Length: 0
63210 /
tcp
-1399940268 | 2025-03-24T19:03:10.673340
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
63256 /
tcp
921225407 | 2025-03-22T07:54:25.281903
\x00\x00\x00\x04\x00\x00\x00\x00\x00
63260 /
tcp
2087396567 | 2025-03-28T07:55:13.997235
kjnkjabhbanc283ubcsbhdc72
-2107996212 | 2025-03-19T20:34:06.126946
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
64683 /
tcp
1911457608 | 2025-03-24T00:30:28.072116
\x00[\x00\x00\x00\x00\x00\x00
65432 /
tcp
-1626979812 | 2025-03-23T10:32:29.665436
220 Service ready for new user.