216.92.202.4

Regular View Raw Data Timeline
Last Seen: 2025-03-26

GeneralInformation

Hostnames 48thave.com
pairserver.com
mail.pairserver.com
Domains 48thave.com pairserver.com 
Country United States
City Pittsburgh
Organization pair Networks
ISP pair Networks
ASN AS7859

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2025(2)
CVE-2025-26466
5.9A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
CVE-2025-26465
6.8A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
21 / tcp
760902655 | 2025-03-12T20:49:09.263521
22 / tcp
1526536559 | 2025-03-24T15:24:27.790813
80 / tcp
0 | 2025-03-17T22:48:31.682351
110 / tcp
-481466123 | 2025-03-24T09:32:29.079790
143 / tcp
-1921434939 | 2025-03-13T12:19:24.707963
443 / tcp
0 | 2025-03-26T09:42:58.780310
465 / tcp
1093530833 | 2025-03-21T07:12:33.697300
587 / tcp
-51522903 | 2025-03-22T20:34:02.398279
993 / tcp
1505986360 | 2025-03-23T02:28:32.276373
995 / tcp
-1001764030 | 2025-03-15T14:20:56.721540
3306 / tcp
-938756303 | 2025-03-25T10:37:16.327057



Contact Us

Shodan ® - All rights reserved