209.68.14.152

Regular View Raw Data Timeline
Last Seen: 2025-03-22
Tags:
starttls

GeneralInformation

Hostnames 606club.co.uk
www.606club.co.uk
pair.com
Domains 606club.co.uk pair.com 
Country United States
City Pittsburgh
Organization pair Networks
ISP pair Networks
ASN AS7859

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2025(2)
CVE-2025-26466
5.9A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
CVE-2025-26465
6.8A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
21 / tcp
-1656279441 | 2025-03-19T23:25:01.761823
22 / tcp
1526536559 | 2025-03-17T10:51:07.100856
26 / tcp
142137648 | 2025-03-22T08:20:46.645404
80 / tcp
-942635167 | 2025-03-16T17:31:20.611899
110 / tcp
-481466123 | 2025-03-17T05:19:57.253641
143 / tcp
-1921434939 | 2025-03-19T18:17:24.917419
443 / tcp
1458692976 | 2025-03-14T09:26:46.156568
465 / tcp
-5390719 | 2025-03-14T00:07:20.558983
587 / tcp
125878646 | 2025-03-21T08:31:14.544769
993 / tcp
1505986360 | 2025-03-22T08:38:10.025945
995 / tcp
-1001764030 | 2025-03-13T18:01:51.176911



Contact Us

Shodan ® - All rights reserved