192.187.123.147

Regular View Raw Data Timeline
Last Seen: 2025-03-27

GeneralInformation

Country United States
City Kansas City
Organization Nocix, LLC
ISP Nocix, LLC
ASN AS33387
Operating System Ubuntu

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2023(1)
CVE-2023-44487
7.5The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
2021(2)
CVE-2021-23017
7.7A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
CVE-2021-3618
7.4ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
1080 / tcp
1325601258 | 2025-03-18T19:29:46.895693
3127 / tcp
802509640 | 2025-03-18T01:25:33.982474
3128 / tcp
802509640 | 2025-03-26T20:29:19.259541
5000 / tcp
780672404 | 2025-03-16T08:40:50.741295
5001 / tcp
1068438272 | 2025-03-25T00:35:49.449812
5005 / tcp
780672404 | 2025-03-23T08:23:01.112940
5007 / tcp
-1864352528 | 2025-03-15T04:25:42.717258
5009 / tcp
1607160079 | 2025-03-26T14:51:43.141128
5010 / tcp
51539995 | 2025-03-24T06:31:19.236006
5011 / tcp
780672404 | 2025-03-22T22:03:25.702953
5022 / tcp
780672404 | 2025-03-05T03:02:39.142351
5025 / tcp
-1401313 | 2025-03-05T05:46:40.861787
5061 / tcp
780672404 | 2025-03-18T13:26:22.128496
5090 / tcp
780672404 | 2025-03-14T04:40:09.619551
5093 / tcp
780672404 | 2025-03-22T11:52:51.785818
9000 / tcp
-943897568 | 2025-03-24T01:10:32.126579
9001 / tcp
-1428735745 | 2025-03-25T06:47:20.793660
9002 / tcp
-1820345936 | 2025-03-25T14:06:42.930690
9007 / tcp
335330650 | 2025-03-06T13:43:16.308783
9009 / tcp
335330650 | 2025-03-20T14:08:12.338837
9010 / tcp
335330650 | 2025-03-19T07:59:16.779698
9017 / tcp
335330650 | 2025-03-20T20:29:00.555406
9024 / tcp
335330650 | 2025-03-08T18:34:12.606285
9028 / tcp
335330650 | 2025-03-13T23:05:06.401566
9032 / tcp
335330650 | 2025-03-16T18:56:43.388142
9034 / tcp
335330650 | 2025-03-26T18:41:41.376436
9042 / tcp
335330650 | 2025-03-26T00:30:07.821931
9048 / tcp
335330650 | 2025-03-22T22:15:48.445733
9049 / tcp
335330650 | 2025-03-18T20:51:48.427641
9052 / tcp
335330650 | 2025-03-06T21:19:43.800070
9059 / tcp
335330650 | 2025-03-19T08:21:50.192617
9062 / tcp
335330650 | 2025-03-24T15:33:23.860780
9064 / tcp
335330650 | 2025-03-27T06:57:06.369069
9066 / tcp
335330650 | 2025-03-09T05:09:58.662284
9068 / tcp
335330650 | 2025-03-18T21:29:31.875004
9079 / tcp
335330650 | 2025-03-14T02:52:17.580719
9080 / tcp
335330650 | 2025-03-04T03:05:25.219835
9085 / tcp
335330650 | 2025-03-13T01:24:39.228272
9089 / tcp
335330650 | 2025-03-16T09:31:45.463582
9090 / tcp
335330650 | 2025-03-09T11:06:11.077330
9091 / tcp
2075566592 | 2025-03-11T14:34:09.092446
9092 / tcp
335330650 | 2025-03-23T18:07:48.093391
9095 / tcp
1406257163 | 2025-03-24T11:22:58.306991
10000 / tcp
1114093323 | 2025-03-21T20:40:01.095165
10001 / tcp
335330650 | 2025-03-11T12:38:45.329766
10003 / tcp
335330650 | 2025-03-15T20:08:33.668426
10009 / tcp
335330650 | 2025-03-20T00:32:23.364080



Contact Us

Shodan ® - All rights reserved