216.92.250.10

Regular View Raw Data Timeline
Last Seen: 2025-03-21
Tags:
starttls

GeneralInformation

Hostnames pair.com
phauthority.com
Domains pair.com phauthority.com 
Country United States
City Pittsburgh
Organization pair Networks
ISP pair Networks
ASN AS7859

WebTechnologies

CMS
Ecommerce
JavaScript libraries
Programming languages
UI frameworks

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2025(2)
CVE-2025-26466
5.9A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.
CVE-2025-26465
6.8A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
21 / tcp
569238827 | 2025-03-20T19:24:09.662472
22 / tcp
2093005913 | 2025-03-16T03:21:05.560586
25 / tcp
-1000578778 | 2025-03-20T22:25:57.578458
80 / tcp
-1184664841 | 2025-03-21T13:19:08.213941
110 / tcp
-481466123 | 2025-02-22T05:14:52.204335
143 / tcp
-1921434939 | 2025-02-28T02:19:48.809026
465 / tcp
1584038693 | 2025-03-21T14:05:29.039894
587 / tcp
-1440157360 | 2025-03-17T23:51:32.954231
993 / tcp
1505986360 | 2025-03-20T13:30:19.146533
995 / tcp
-1001764030 | 2025-03-21T18:30:19.590975
3306 / tcp
-1876000753 | 2025-03-21T04:41:01.889097



Contact Us

Shodan ® - All rights reserved