220.181.90.240

Regular View Raw Data Timeline
Last Seen: 2025-03-22

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2025(1)
CVE-2025-26465
6.8A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
2024(1)
CVE-2024-6387
8.1A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
2023(4)
CVE-2023-51767
7.0OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
CVE-2023-51385
6.5In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
CVE-2023-48795
5.9The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
CVE-2023-38408
9.8The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
2021(2)
CVE-2021-41617
7.0sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
CVE-2021-36368
3.7An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass, since nothing is being bypassed.
2020(2)
CVE-2020-15778
7.8scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
CVE-2020-14145
5.9The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
2019(4)
CVE-2019-16905
7.8OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
CVE-2019-6111
5.9An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
CVE-2019-6110
6.8In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
CVE-2019-6109
6.8An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
2018(3)
CVE-2018-20685
5.3In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
CVE-2018-15919
5.3Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
CVE-2018-15473
5.3OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
2017(1)
CVE-2017-15906
5.3The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
2016(9)
CVE-2016-20012
5.3OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
CVE-2016-10708
7.5sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
CVE-2016-10012
7.8The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
CVE-2016-10011
5.5authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
CVE-2016-10010
7.0sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
CVE-2016-10009
7.3Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
CVE-2016-3115
6.4Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
CVE-2016-1908
9.8The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
CVE-2016-0777
6.5The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
2015(4)
CVE-2015-6564
6.9Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
CVE-2015-6563
1.9The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
CVE-2015-5600
8.5The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
CVE-2015-5352
4.3The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
2014(3)
CVE-2014-2653
5.8The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
CVE-2014-2532
4.9sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
CVE-2014-1692
7.5The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.
2012(1)
CVE-2012-0814
3.5The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
2011(2)
CVE-2011-5000
3.5The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
CVE-2011-4327
2.1ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.
2010(3)
CVE-2010-5107
5.0The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
CVE-2010-4755
4.0The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
CVE-2010-4478
7.5OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
2008(1)
CVE-2008-3844
9.3Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
2007(1)
CVE-2007-2768
4.3OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.

OpenPorts

21115171921232526374349707910010210411111917517919526428531144344445246550251554855463664668578988588788899299410021023105010991153120013371355136613871414144714501453159918011911192619671981198919902000200220032020205320672080208120872121222223232332237624552556256725682572259826282709276230483084309431163127312931403142315631593164316631723173318631883256326832693306334533883389344335213531354835503572378037923922395141474148443344344438444444514506451047864899500650255061517252015240524552465248525452565269527052725435544655445604560756725721585859055909591259145984598660016002600960366081635265606590663366666667666870017002701370717082708570867349741574437444754876347777799880098028802980398046805480658081808580878104811681178139817881868193823082498280833383438381840684098411841684238425844484588482849385008501853085338553855485608570858485918602864987028728873287668782880188188850886288678874888089129000900290049007901390329044904990519065907490859091909290959105910891249131913291399148916091639175917791999306930893339393941894419465951595509600980298109811987699439944999099991000010001100111002310035100511005210068100801008710249102541030210554110001106511101111111111211210112111130011688120001201912082121011211112113121161211812120121371214212145121561216312209122291224012242122471225212258122831228812293122951229612309123121232512332123341234412347123491235112352123591237812391123921239912411124181242412435124401244812494125001250112512125141251812519125301253212541125531258713047144431452315006150381504015123154431558815673160101601816022160471605316061160711607816088160891609316099163111640416464169931700117777180081802918030180311804518051180681807918080180821808518090180931810718182182001824519016199992000020001201102015020185202562054720600210252108121082212362124521252212712130921314213212132622000223452255623023241812447225005250062508425565270152701728080284432998430002300033000430011300223008330122303013030330622308223092231322313373202232122324223262233622339223422234422347223500235122352223524135522356223652236622369833702237215374433752237622377773782238122383333852238722388223932239522397224032240522410224202242222424204322244222443014432044345444204500646001475344772248000480014802248122488994950249684500005000650050500705008550100502575050050998534135348253490549845544355475554815552255554557225777857786578225792258122584225852258532587225882259322595226000160021601296161662078632106325663260
2 / tcp
1911457608 | 2025-03-03T19:07:15.986529
11 / tcp
988099889 | 2025-03-04T00:33:44.391650
15 / tcp
-971970408 | 2025-03-14T10:58:58.591684
17 / tcp
-255236012 | 2025-03-21T06:23:16.240672
19 / tcp
1978059005 | 2025-03-05T11:27:21.286767
21 / tcp
179309064 | 2025-03-04T20:30:43.091412
23 / tcp
460589547 | 2025-03-13T19:12:20.466683
25 / tcp
1911457608 | 2025-03-06T12:58:20.146107
26 / tcp
1210754493 | 2025-03-10T07:57:09.804683
37 / tcp
1443000738 | 2025-03-12T07:39:01.957665
43 / tcp
1632932802 | 2025-03-21T20:26:55.675054
49 / tcp
-359657882 | 2025-03-20T17:06:22.406421
70 / tcp
1412519768 | 2025-03-15T16:58:17.848146
79 / tcp
-876294238 | 2025-03-19T12:34:56.757670
100 / tcp
-992671574 | 2025-03-13T18:41:26.786375
102 / tcp
321971019 | 2025-03-10T15:08:10.778591
104 / tcp
671605376 | 2025-03-04T10:51:48.980729
111 / tcp
2087396567 | 2025-03-19T01:42:22.637818
119 / tcp
141730637 | 2025-03-12T21:14:29.714972
175 / tcp
-2096652808 | 2025-03-19T04:35:50.609982
179 / tcp
-399606100 | 2025-03-10T09:07:12.320578
195 / tcp
-68075478 | 2025-02-28T05:45:19.374475
264 / tcp
-1718229072 | 2025-03-14T02:59:31.018931
285 / tcp
-1399940268 | 2025-03-18T08:15:45.078613
311 / tcp
749429829 | 2025-03-13T00:10:38.367375
443 / tcp
-972474105 | 2025-03-07T13:29:39.760173
444 / tcp
-1428621233 | 2025-03-21T09:07:49.779619
452 / tcp
-1399940268 | 2025-03-14T13:59:07.803203
465 / tcp
897328069 | 2025-03-13T17:51:17.474557
502 / tcp
632542934 | 2025-03-04T03:03:15.792912
515 / tcp
2087396567 | 2025-03-22T09:51:21.520654
548 / tcp
-969286897 | 2025-03-07T01:21:31.058673
554 / tcp
1060450357 | 2025-03-22T11:18:41.434461
636 / tcp
1239199743 | 2025-03-19T08:44:30.337205
646 / tcp
1260221665 | 2025-03-05T19:07:19.161235
685 / tcp
165188539 | 2025-03-12T07:55:23.215359
789 / tcp
1996932384 | 2025-02-28T14:12:25.794037
885 / tcp
1911457608 | 2025-03-07T18:41:56.266149
887 / tcp
-1839934832 | 2025-03-18T15:37:30.760818
888 / tcp
-262532376 | 2025-03-05T14:13:16.047545
992 / tcp
-1242315829 | 2025-03-17T08:14:43.754483
994 / tcp
1543809371 | 2025-03-12T15:09:48.473013
1002 / tcp
1767345577 | 2025-03-17T04:01:33.452311
1023 / tcp
1911457608 | 2025-03-16T13:06:28.570018
1050 / tcp
51259122 | 2025-03-12T20:20:54.150566
1099 / tcp
-1032713145 | 2025-03-06T01:53:50.998404
1153 / tcp
1011407350 | 2025-03-15T16:08:58.306091
1200 / tcp
1911457608 | 2025-03-10T09:47:25.060179
1337 / tcp
320677201 | 2025-03-21T12:33:06.332329
1355 / tcp
-1888448627 | 2025-03-17T23:29:53.705197
1366 / tcp
819727972 | 2025-02-28T21:43:16.654852
1387 / tcp
1911457608 | 2025-03-19T22:11:11.603787
1414 / tcp
819727972 | 2025-03-18T12:05:40.954003
1447 / tcp
493955023 | 2025-03-15T23:09:38.740531
1450 / tcp
1504401647 | 2025-03-06T04:09:52.392618
1453 / tcp
-1888448627 | 2025-03-17T14:35:24.701683
1599 / tcp
-2096652808 | 2025-03-13T18:47:43.704986
1801 / tcp
-1299899661 | 2025-03-11T19:15:57.365044
1911 / tcp
599074451 | 2025-03-21T18:24:13.095202
1926 / tcp
2143387245 | 2025-03-21T21:33:20.968721
1967 / tcp
-1099385124 | 2025-03-14T16:53:32.719762
1981 / tcp
-1114821551 | 2025-03-09T22:40:34.109641
1989 / tcp
-1059554316 | 2025-03-13T16:47:32.216591
1990 / tcp
-2089734047 | 2025-03-22T03:52:19.613980
2000 / tcp
632542934 | 2025-03-15T18:13:44.172220
2002 / tcp
-1681927087 | 2025-03-11T21:26:00.985746
2003 / tcp
740837454 | 2025-03-08T20:21:45.476370
2020 / tcp
-1967861764 | 2025-03-04T10:33:55.182094
2053 / tcp
-1888448627 | 2025-03-20T10:02:15.103443
2067 / tcp
-792826324 | 2025-03-21T12:10:50.277025
2080 / tcp
-1399940268 | 2025-03-18T03:24:44.839302
2081 / tcp
321971019 | 2025-03-18T04:03:45.594713
2087 / tcp
2087396567 | 2025-03-04T21:30:28.184723
2121 / tcp
141730637 | 2025-03-17T21:59:11.923550
2222 / tcp
372433470 | 2025-03-09T20:35:21.923681
2323 / tcp
1662205251 | 2025-03-18T06:30:04.720688
2332 / tcp
-1385917587 | 2025-03-09T21:09:51.527560
2376 / tcp
1282941221 | 2025-03-11T21:55:23.409027
2455 / tcp
1778988322 | 2025-03-15T01:34:07.170937
2556 / tcp
677934968 | 2025-03-17T17:32:16.869037
2567 / tcp
493955023 | 2025-03-14T16:24:11.244803
2568 / tcp
1504401647 | 2025-03-19T15:46:39.793558
2572 / tcp
493955023 | 2025-03-20T13:25:07.926582
2598 / tcp
165188539 | 2025-03-22T05:57:00.772393
2628 / tcp
819727972 | 2025-03-11T11:10:14.828408
2709 / tcp
820958131 | 2025-03-16T23:29:55.075909
2762 / tcp
1210754493 | 2025-03-16T00:04:03.969899
3048 / tcp
2063598737 | 2025-03-06T12:14:13.851188
3084 / tcp
-445721795 | 2025-03-05T16:41:18.770283
3094 / tcp
921225407 | 2025-03-06T16:48:57.735664
3116 / tcp
321971019 | 2025-03-19T20:26:11.775627
3127 / tcp
740837454 | 2025-03-06T18:15:36.608502
3129 / tcp
165188539 | 2025-03-21T10:05:35.641988
3140 / tcp
1624217396 | 2025-03-18T16:47:09.567213
3142 / tcp
-2089734047 | 2025-03-21T05:57:51.596559
3156 / tcp
580340387 | 2025-03-05T04:04:22.324478
3159 / tcp
-441419608 | 2025-03-21T07:52:36.709055
3164 / tcp
-1839934832 | 2025-03-16T05:30:08.636401
3166 / tcp
-653033013 | 2025-03-18T06:47:58.833298
3172 / tcp
15018106 | 2025-03-16T03:43:40.667005
3173 / tcp
1077013874 | 2025-03-10T19:34:05.743543
3186 / tcp
-1399940268 | 2025-03-05T00:04:53.084572
3188 / tcp
1919228981 | 2025-03-05T11:22:10.578424
3256 / tcp
-971970408 | 2025-03-14T16:29:44.127813
3268 / tcp
-2031078612 | 2025-03-20T23:14:29.667086
3269 / tcp
1911457608 | 2025-03-17T18:07:19.615696
3306 / tcp
1801207137 | 2025-03-15T17:03:37.446341
3345 / tcp
1911457608 | 2025-03-08T14:22:29.391404
3388 / tcp
-1032713145 | 2025-03-08T14:59:33.802342
3389 / tcp
-6645672 | 2025-03-15T19:32:30.573262
3443 / tcp
-1399940268 | 2025-03-12T08:19:26.897907
3521 / tcp
-1399940268 | 2025-03-05T18:56:58.207583
3531 / tcp
-1947777893 | 2025-03-06T21:55:46.970023
3548 / tcp
-1399940268 | 2025-03-21T07:58:47.965168
3550 / tcp
-1399940268 | 2025-03-05T11:18:19.445783
3572 / tcp
-1399940268 | 2025-03-07T07:02:26.166480
3780 / tcp
660175493 | 2025-03-04T06:09:20.591097
3792 / tcp
632542934 | 2025-03-20T23:54:07.610317
3922 / tcp
-653033013 | 2025-03-06T13:07:01.379286
3951 / tcp
1975288991 | 2025-03-18T01:05:06.953891
4147 / tcp
819727972 | 2025-03-10T08:11:41.106237
4148 / tcp
-1399940268 | 2025-03-21T01:42:32.683662
4433 / tcp
401555314 | 2025-03-21T02:00:26.824991
4434 / tcp
-1026951088 | 2025-03-21T20:11:34.895401
4438 / tcp
-1476017887 | 2025-03-05T03:00:34.365485
4444 / tcp
2033888749 | 2025-03-16T19:10:30.462420
4451 / tcp
-1399940268 | 2025-03-13T04:03:27.926461
4506 / tcp
-971970408 | 2025-03-09T12:15:41.076282
4510 / tcp
-1730858130 | 2025-03-22T08:18:44.535714
4786 / tcp
504717326 | 2025-03-12T08:20:01.498281
4899 / tcp
-319440554 | 2025-03-16T15:19:48.336220
5006 / tcp
-2096652808 | 2025-03-06T01:05:48.845417
5025 / tcp
-971970408 | 2025-03-19T13:09:57.655501
5061 / tcp
-1399940268 | 2025-03-19T04:23:34.941969
5172 / tcp
-441419608 | 2025-03-05T10:38:27.500651
5201 / tcp
410249975 | 2025-02-28T01:51:33.505247
5240 / tcp
-1598265216 | 2025-03-15T06:07:33.365010
5245 / tcp
1210754493 | 2025-03-21T05:20:19.988108
5246 / tcp
897328069 | 2025-03-13T05:28:55.485948
5248 / tcp
819727972 | 2025-03-17T10:25:39.988309
5254 / tcp
1492413928 | 2025-03-21T06:24:31.096006
5256 / tcp
-1399940268 | 2025-03-11T05:40:52.834802
5269 / tcp
-898901461 | 2025-03-17T21:56:06.400229
5270 / tcp
-1888448627 | 2025-03-08T21:53:33.486759
5272 / tcp
165188539 | 2025-03-06T13:57:57.577371
5435 / tcp
-1045760528 | 2025-03-13T15:19:17.334908
5446 / tcp
-136006866 | 2025-03-04T23:51:10.008575
5544 / tcp
408230060 | 2025-02-28T03:08:56.727151
5604 / tcp
1911457608 | 2025-03-06T09:40:05.114813
5607 / tcp
-1730858130 | 2025-03-03T18:18:33.469981
5672 / tcp
575925250 | 2025-03-18T04:28:44.460294
5721 / tcp
-1019343788 | 2025-03-14T16:46:19.995613
5858 / tcp
2098371729 | 2025-03-16T18:07:26.499459
5905 / tcp
671605376 | 2025-03-15T07:46:23.552266
5909 / tcp
-1327660293 | 2025-03-09T23:46:35.134027
5912 / tcp
-303199180 | 2025-03-09T13:26:12.958096
5914 / tcp
2143387245 | 2025-03-14T20:33:46.040370
5984 / tcp
1999272906 | 2025-03-15T16:43:12.904398
5986 / tcp
819727972 | 2025-03-12T10:32:43.306709
6001 / tcp
1308377066 | 2025-03-05T02:15:58.667059
6002 / tcp
671605376 | 2025-03-06T05:00:40.020219
6009 / tcp
1351148360 | 2025-03-10T06:45:17.814401
6036 / tcp
-1399940268 | 2025-03-11T02:19:30.946588
6081 / tcp
-345718689 | 2025-03-10T03:27:00.775804
6352 / tcp
401555314 | 2025-03-12T05:54:21.538781
6560 / tcp
-1399940268 | 2025-03-18T23:38:35.688197
6590 / tcp
-1399940268 | 2025-03-07T08:41:18.040683
6633 / tcp
1726594447 | 2025-03-14T23:37:32.042765
6666 / tcp
4935895 | 2025-03-07T17:05:33.220920
6667 / tcp
819727972 | 2025-03-18T15:41:13.592018
6668 / tcp
1189133115 | 2025-03-05T11:30:40.321714
7001 / tcp
-274925451 | 2025-03-18T15:46:08.963838
7002 / tcp
740837454 | 2025-03-08T15:27:29.976816
7013 / tcp
51259122 | 2025-03-08T19:55:14.353336
7071 / tcp
-1392039491 | 2025-03-11T11:01:09.109131
7082 / tcp
597764502 | 2025-03-03T19:44:17.276514
7085 / tcp
819727972 | 2025-03-18T20:52:01.315185
7086 / tcp
-1230049476 | 2025-03-06T22:10:57.946999
7349 / tcp
1911457608 | 2025-03-06T14:05:26.196887
7415 / tcp
819727972 | 2025-03-17T09:15:08.029859
7443 / tcp
-512831750 | 2025-03-13T03:24:21.672973
7444 / tcp
-136006866 | 2025-03-15T01:44:28.198081
7548 / tcp
1741579575 | 2025-03-22T08:41:20.550064
7634 / tcp
-1760806421 | 2025-03-14T12:47:52.239917
7777 / tcp
1391945995 | 2025-03-15T05:17:21.386761
7998 / tcp
321971019 | 2025-03-14T18:49:42.281192
8009 / tcp
632542934 | 2025-03-16T14:17:16.127453
8028 / tcp
1308377066 | 2025-02-28T05:46:26.394490
8029 / tcp
-1327660293 | 2025-03-20T14:16:20.789274
8039 / tcp
-2089734047 | 2025-03-11T05:12:27.686570
8046 / tcp
165188539 | 2025-02-28T03:09:52.718669
8054 / tcp
-1399940268 | 2025-03-10T09:21:11.104441
8065 / tcp
165188539 | 2025-03-04T00:24:26.303510
8081 / tcp
-971970408 | 2025-03-19T13:28:53.111844
8085 / tcp
320677201 | 2025-03-18T18:30:10.983506
8087 / tcp
-1699556818 | 2025-03-04T15:12:52.900678
8104 / tcp
671605376 | 2025-03-14T01:48:47.703362
8116 / tcp
51259122 | 2025-03-09T04:39:13.191464
8117 / tcp
-585940771 | 2025-02-28T09:16:28.723375
8139 / tcp
841014058 | 2025-03-18T08:35:44.478097
8178 / tcp
1620329124 | 2025-03-04T04:44:25.839465
8186 / tcp
-345718689 | 2025-03-14T22:05:47.659446
8193 / tcp
-1839934832 | 2025-03-20T14:38:32.768229
8230 / tcp
819727972 | 2025-02-28T09:05:56.645080
8249 / tcp
-1399940268 | 2025-03-06T05:11:03.685090
8280 / tcp
819727972 | 2025-03-21T14:23:23.561739
8333 / tcp
-1300025046 | 2025-03-11T17:08:27.035947
8343 / tcp
-1399940268 | 2025-03-06T09:36:41.804393
8381 / tcp
1615193817 | 2025-03-06T02:43:02.309837
8406 / tcp
-1019343788 | 2025-03-06T22:00:02.996378
8409 / tcp
1541211644 | 2025-03-15T22:18:56.429543
8411 / tcp
-616720387 | 2025-03-04T22:42:02.118216
8416 / tcp
-1036370807 | 2025-03-14T11:26:04.202337
8423 / tcp
1134517380 | 2025-03-12T16:53:54.245621
8425 / tcp
-1810987450 | 2025-02-28T06:53:24.299773
8444 / tcp
-1888448627 | 2025-03-17T03:32:44.303041
8458 / tcp
-2017887953 | 2025-03-09T17:22:50.761311
8482 / tcp
1212285915 | 2025-03-06T15:55:13.989113
8493 / tcp
-345718689 | 2025-03-15T00:19:44.903960
8500 / tcp
1529351907 | 2025-03-13T05:40:45.892870
8501 / tcp
971933601 | 2025-03-20T17:48:42.383856
8530 / tcp
1208318993 | 2025-03-19T01:05:58.936436
8533 / tcp
-1265999252 | 2025-03-14T08:18:52.342239
8553 / tcp
-2107996212 | 2025-03-13T01:11:34.580964
8554 / tcp
1842524259 | 2025-03-20T04:37:39.411689
8560 / tcp
-407828767 | 2025-03-07T04:56:37.287950
8570 / tcp
740837454 | 2025-03-07T11:23:00.190675
8584 / tcp
1911457608 | 2025-03-03T20:38:33.084059
8591 / tcp
-2089734047 | 2025-03-09T11:16:52.499292
8602 / tcp
-1399940268 | 2025-03-14T21:35:16.850104
8649 / tcp
842535728 | 2025-03-21T17:35:47.297203
8702 / tcp
-1013082686 | 2025-03-19T20:10:00.242881
8728 / tcp
-1648456501 | 2025-03-20T03:01:37.731567
8732 / tcp
1363464823 | 2025-03-20T05:45:34.354651
8766 / tcp
-1105333987 | 2025-03-06T20:16:50.126826
8782 / tcp
-2031152423 | 2025-03-13T18:53:11.512997
8801 / tcp
1911457608 | 2025-03-11T10:28:40.024300
8818 / tcp
-1810987450 | 2025-03-19T12:34:22.651499
8850 / tcp
-832380282 | 2025-03-18T01:00:27.479059
8862 / tcp
1911457608 | 2025-03-05T07:48:49.222275
8867 / tcp
-1399940268 | 2025-02-28T20:07:47.901679
8874 / tcp
-2096652808 | 2025-03-22T10:42:23.666721
8880 / tcp
1842524259 | 2025-03-15T04:10:49.563474
8912 / tcp
-2031152423 | 2025-03-12T21:10:57.243622
9000 / tcp
-2067028711 | 2025-03-21T15:38:36.552472
9002 / tcp
-441419608 | 2025-03-21T21:25:07.890877
9004 / tcp
1543809371 | 2025-03-14T22:59:51.235546
9007 / tcp
165188539 | 2025-03-12T01:55:21.612294
9013 / tcp
-146605374 | 2025-03-09T21:24:45.559849
9032 / tcp
819727972 | 2025-03-10T05:17:55.296479
9044 / tcp
1911457608 | 2025-03-16T13:53:45.843604
9049 / tcp
-980525298 | 2025-03-07T17:19:24.276306
9051 / tcp
2087396567 | 2025-03-07T10:13:10.465614
9065 / tcp
1911457608 | 2025-03-16T03:48:15.953065
9074 / tcp
-1045760528 | 2025-03-15T01:30:54.906779
9085 / tcp
1911457608 | 2025-03-16T00:06:54.390738
9091 / tcp
-905685638 | 2025-03-05T17:52:20.608766
9092 / tcp
-1399940268 | 2025-03-10T10:48:01.126699
9095 / tcp
171352214 | 2025-03-21T04:11:25.059143
9105 / tcp
-1399940268 | 2025-03-13T13:12:04.797360
9108 / tcp
-2089734047 | 2025-03-20T11:03:17.884891
9124 / tcp
-1399940268 | 2025-03-04T09:49:20.622678
9131 / tcp
-1375131644 | 2025-03-05T04:08:59.076252
9132 / tcp
-904840257 | 2025-03-15T05:31:33.271176
9139 / tcp
165188539 | 2025-03-18T03:21:17.247891
9148 / tcp
1189133115 | 2025-03-12T00:40:06.149262
9160 / tcp
-1779118422 | 2025-03-18T00:15:50.315293
9163 / tcp
205347087 | 2025-03-03T18:50:49.884175
9175 / tcp
1134517380 | 2025-03-13T04:58:03.719610
9177 / tcp
1911457608 | 2025-03-09T21:00:40.606525
9199 / tcp
-2096652808 | 2025-03-14T16:21:24.316984
9306 / tcp
165188539 | 2025-03-12T01:55:56.976158
9308 / tcp
-1746074029 | 2025-03-15T21:15:10.521280
9333 / tcp
-1839934832 | 2025-03-15T21:35:54.110772
9393 / tcp
-1399940268 | 2025-03-19T20:51:11.325327
9418 / tcp
694512854 | 2025-03-08T18:04:42.175892
9441 / tcp
1911457608 | 2025-03-10T08:02:46.325636
9465 / tcp
-1399940268 | 2025-03-06T02:59:09.143412
9515 / tcp
820958131 | 2025-03-21T23:16:02.577014
9550 / tcp
-1399940268 | 2025-03-16T14:23:57.472002
9600 / tcp
1308377066 | 2025-03-15T07:04:48.807348
9802 / tcp
-1730858130 | 2025-03-06T14:52:40.429969
9810 / tcp
504717326 | 2025-03-12T05:38:32.450348
9811 / tcp
-1399940268 | 2025-03-18T15:57:30.363474
9876 / tcp
1977569953 | 2025-03-14T00:52:53.032555
9943 / tcp
56005235 | 2025-03-16T04:39:59.732629
9944 / tcp
1975288991 | 2025-03-18T05:19:25.032675
9990 / tcp
1996932384 | 2025-03-05T16:56:57.369271
9999 / tcp
1161309183 | 2025-03-06T23:27:08.872613
10000 / tcp
-971970408 | 2025-03-21T08:24:21.610605
10001 / tcp
1492413928 | 2025-03-19T22:17:35.780135
10011 / tcp
1308377066 | 2025-03-11T04:50:26.771384
10023 / tcp
89142341 | 2025-03-20T15:43:20.546659
10035 / tcp
307999478 | 2025-03-16T21:05:52.137362
10051 / tcp
1761482307 | 2025-03-14T14:34:59.137996
10052 / tcp
51259122 | 2025-03-08T14:01:37.975096
10068 / tcp
1381121983 | 2025-03-14T03:22:18.257497
10080 / tcp
-1013082686 | 2025-03-17T13:49:29.401353
10087 / tcp
945910976 | 2025-03-05T07:55:54.984766
10249 / tcp
-345718689 | 2025-03-21T07:05:15.327474
10254 / tcp
-1399940268 | 2025-03-01T00:17:03.504611
10302 / tcp
1134517380 | 2025-03-21T14:20:10.016394
10554 / tcp
-1471513798 | 2025-03-21T05:27:47.753918
11000 / tcp
1011407350 | 2025-03-20T07:32:14.242997
11065 / tcp
897328069 | 2025-03-20T03:29:07.810567
11101 / tcp
1911457608 | 2025-03-13T19:47:42.304584
11111 / tcp
1830187220 | 2025-03-03T18:41:38.563346
11112 / tcp
-454087041 | 2025-03-14T18:43:04.857992
11210 / tcp
921225407 | 2025-03-15T23:34:28.932960
11211 / tcp
-136006866 | 2025-03-13T22:17:41.319096
11300 / tcp
-2089734047 | 2025-03-18T12:08:05.199088
11688 / tcp
1011407350 | 2025-03-17T22:04:47.822079
12000 / tcp
-2046909074 | 2025-03-21T23:24:13.055664
12019 / tcp
401555314 | 2025-03-18T22:34:56.185236
12082 / tcp
320677201 | 2025-03-15T06:12:06.350100
12101 / tcp
-805362002 | 2025-03-14T18:48:11.730250
12111 / tcp
1911457608 | 2025-03-11T11:34:53.206871
12113 / tcp
-2046514463 | 2025-03-20T02:56:04.298803
12116 / tcp
-1888448627 | 2025-03-05T04:14:57.653650
12118 / tcp
-1888448627 | 2025-03-15T11:14:10.007493
12120 / tcp
1213931722 | 2025-03-05T12:35:37.274319
12137 / tcp
51259122 | 2025-03-04T15:27:57.842061
12142 / tcp
-1105333987 | 2025-03-10T16:51:24.111663
12145 / tcp
119860953 | 2025-03-10T09:19:42.666757
12156 / tcp
-585940771 | 2025-03-21T12:18:52.676843
12163 / tcp
-1888448627 | 2025-03-12T22:02:40.068717
12209 / tcp
819727972 | 2025-03-16T11:42:04.161521
12229 / tcp
-2089734047 | 2025-03-21T02:57:13.718657
12240 / tcp
-1746074029 | 2025-03-09T10:13:42.898102
12242 / tcp
-358801646 | 2025-03-05T17:58:47.730932
12247 / tcp
-358801646 | 2025-03-13T05:21:00.244003
12252 / tcp
-1399940268 | 2025-03-10T19:30:01.845797
12258 / tcp
1989907056 | 2025-03-06T09:52:23.312230
12283 / tcp
1492413928 | 2025-03-20T20:09:13.111610
12288 / tcp
-339084706 | 2025-03-22T03:21:08.259120
12293 / tcp
-1399940268 | 2025-03-16T07:54:04.567032
12295 / tcp
-1399940268 | 2025-03-04T23:00:12.102726
12296 / tcp
-1399940268 | 2025-02-28T17:41:21.107548
12309 / tcp
-1399940268 | 2025-03-04T06:36:09.225214
12312 / tcp
2121220663 | 2025-03-21T01:56:14.741538
12325 / tcp
-1648456501 | 2025-03-22T04:08:11.066872
12332 / tcp
1623746877 | 2025-03-16T02:12:42.720648
12334 / tcp
455076604 | 2025-03-16T07:32:52.048979
12344 / tcp
-1399940268 | 2025-03-19T04:28:40.665968
12347 / tcp
-1399940268 | 2025-03-22T03:08:41.257212
12349 / tcp
1282941221 | 2025-03-06T04:32:30.129151
12351 / tcp
1426971893 | 2025-03-05T16:58:47.426833
12352 / tcp
-1888448627 | 2025-03-21T18:34:39.852484
12359 / tcp
819727972 | 2025-03-18T20:43:16.783719
12378 / tcp
819727972 | 2025-03-10T07:06:38.005955
12391 / tcp
-1399940268 | 2025-03-17T00:55:51.623948
12392 / tcp
1911457608 | 2025-03-12T20:55:27.449828
12399 / tcp
1911457608 | 2025-03-14T11:51:08.124122
12411 / tcp
1504401647 | 2025-03-17T01:29:24.168620
12418 / tcp
320677201 | 2025-03-03T23:32:36.429426
12424 / tcp
-1730858130 | 2025-02-28T18:52:30.553294
12435 / tcp
632542934 | 2025-03-08T16:51:25.795856
12440 / tcp
921225407 | 2025-03-13T10:46:42.131059
12448 / tcp
-1399940268 | 2025-03-16T15:58:55.937553
12494 / tcp
671605376 | 2025-03-20T08:50:17.634051
12500 / tcp
-1699556818 | 2025-03-06T23:29:11.026176
12501 / tcp
819727972 | 2025-02-28T11:01:13.368286
12512 / tcp
-980525298 | 2025-03-21T04:29:18.132392
12514 / tcp
1665283070 | 2025-03-17T03:56:53.569250
12518 / tcp
-1996280214 | 2025-03-08T15:17:59.613653
12519 / tcp
-1839934832 | 2025-03-17T17:12:24.531183
12530 / tcp
-1839934832 | 2025-03-06T01:36:53.343557
12532 / tcp
632542934 | 2025-03-17T18:47:40.925721
12541 / tcp
-1399940268 | 2025-03-17T21:42:14.743479
12553 / tcp
-2017887953 | 2025-03-10T01:46:38.092612
12587 / tcp
1726594447 | 2025-03-12T02:57:13.404010
13047 / tcp
-321444299 | 2025-03-11T21:53:05.863268
14443 / tcp
89142341 | 2025-03-11T19:37:09.544821
14523 / tcp
-2033111675 | 2025-03-16T02:02:45.736733
15006 / tcp
1911457608 | 2025-03-22T10:46:22.426146
15038 / tcp
921225407 | 2025-03-07T10:37:40.108231
15040 / tcp
-407828767 | 2025-03-09T20:37:11.784480
15123 / tcp
580340387 | 2025-03-22T04:46:29.166214
15443 / tcp
-142686627 | 2025-03-14T04:06:47.527684
15588 / tcp
2103111368 | 2025-03-17T10:32:18.338257
15673 / tcp
819727972 | 2025-03-12T19:19:40.176113
16010 / tcp
-1139539254 | 2025-03-21T00:47:54.668259
16018 / tcp
-147424911 | 2025-03-17T18:47:40.993331
16022 / tcp
-1375131644 | 2025-02-28T19:02:02.366926
16047 / tcp
-1399940268 | 2025-03-15T03:22:28.373956
16053 / tcp
165188539 | 2025-03-15T01:39:19.458753
16061 / tcp
-457235091 | 2025-03-12T14:25:09.789064
16071 / tcp
-1399940268 | 2025-03-14T01:55:44.853920
16078 / tcp
307999478 | 2025-03-19T05:40:39.055714
16088 / tcp
632542934 | 2025-03-05T11:03:16.288615
16089 / tcp
1615193817 | 2025-03-20T17:42:27.100717
16093 / tcp
408230060 | 2025-03-08T19:13:58.255636
16099 / tcp
819727972 | 2025-03-12T18:52:31.964193
16311 / tcp
-339084706 | 2025-03-11T23:25:07.665237
16404 / tcp
819727972 | 2025-03-16T08:07:00.773626
16464 / tcp
-1730858130 | 2025-03-20T23:04:26.447104
16993 / tcp
-1990350878 | 2025-03-07T10:05:54.815036
17001 / tcp
-1810987450 | 2025-03-13T21:44:10.689981
17777 / tcp
-1399940268 | 2025-03-17T17:17:42.131586
18008 / tcp
632542934 | 2025-03-19T00:13:11.496394
18029 / tcp
819727972 | 2025-03-18T19:34:14.778752
18030 / tcp
819727972 | 2025-03-17T05:31:57.403568
18031 / tcp
-2096652808 | 2025-03-19T14:26:30.572053
18045 / tcp
-2046514463 | 2025-03-14T03:21:28.193960
18051 / tcp
1911457608 | 2025-03-16T09:58:29.967353
18068 / tcp
-980525298 | 2025-03-06T02:11:43.806529
18079 / tcp
-1019343788 | 2025-03-18T08:52:39.206790
18080 / tcp
-992671574 | 2025-03-17T14:49:14.351639
18082 / tcp
-1648456501 | 2025-03-12T05:29:48.808726
18085 / tcp
-1373613804 | 2025-03-14T19:03:48.083846
18090 / tcp
1504401647 | 2025-03-19T11:20:36.201138
18093 / tcp
-1373613804 | 2025-03-04T15:44:12.372646
18107 / tcp
1504401647 | 2025-03-14T22:59:22.757597
18182 / tcp
119860953 | 2025-03-22T09:21:17.064084
18200 / tcp
-1032713145 | 2025-03-09T13:48:12.954818
18245 / tcp
-971970408 | 2025-03-21T18:08:35.270026
19016 / tcp
-1888448627 | 2025-03-19T11:43:25.595937
19999 / tcp
-1888448627 | 2025-03-15T17:58:32.150261
20000 / tcp
1900503736 | 2025-03-12T17:05:09.108589
20001 / tcp
-1730858130 | 2025-03-16T13:31:02.405493
20110 / tcp
-616720387 | 2025-03-14T09:16:50.771009
20150 / tcp
-2031152423 | 2025-03-15T09:58:52.833812
20185 / tcp
1282941221 | 2025-03-15T13:35:31.762408
20256 / tcp
-1399940268 | 2025-03-12T14:48:55.523845
20547 / tcp
89142341 | 2025-03-10T13:10:21.726488
20600 / tcp
1543809371 | 2025-02-28T06:31:17.757472
21025 / tcp
1741579575 | 2025-03-04T07:29:00.164332
21081 / tcp
321971019 | 2025-03-18T21:43:39.474324
21082 / tcp
-1399940268 | 2025-03-04T17:34:36.014340
21236 / tcp
-2089734047 | 2025-03-10T22:53:57.605459
21245 / tcp
819727972 | 2025-03-10T03:35:18.695752
21252 / tcp
632542934 | 2025-03-15T03:26:28.507115
21271 / tcp
320677201 | 2025-03-17T22:38:25.334689
21309 / tcp
-1399940268 | 2025-03-06T11:40:51.505840
21314 / tcp
-1699556818 | 2025-03-14T18:36:33.335179
21321 / tcp
119860953 | 2025-03-21T09:01:17.240890
21326 / tcp
671605376 | 2025-03-13T07:04:59.373003
22000 / tcp
-1888448627 | 2025-03-10T23:09:07.841673
22345 / tcp
-1888448627 | 2025-03-09T18:37:56.372801
22556 / tcp
-1399940268 | 2025-03-06T23:35:12.507619
23023 / tcp
119860953 | 2025-03-15T16:01:21.880241
24181 / tcp
1282941221 | 2025-03-06T22:48:19.784062
24472 / tcp
921225407 | 2025-03-17T10:49:00.672505
25005 / tcp
-1059554316 | 2025-03-08T21:08:20.007590
25006 / tcp
1911457608 | 2025-03-14T17:25:57.656168
25084 / tcp
-1888448627 | 2025-03-15T08:02:33.678310
25565 / tcp
671605376 | 2025-03-06T22:36:02.223330
27015 / tcp
-80321085 | 2025-03-20T19:05:38.112533
27017 / tcp
1763259671 | 2025-03-20T20:42:17.691760
28080 / tcp
-407828767 | 2025-03-10T23:22:04.050657
28443 / tcp
455076604 | 2025-03-16T08:09:02.654085
29984 / tcp
1911457608 | 2025-03-18T06:56:10.527212
30002 / tcp
-1399940268 | 2025-03-08T21:20:40.744247
30003 / tcp
-2031152423 | 2025-03-11T00:35:18.528826
30004 / tcp
1208318993 | 2025-03-20T20:08:15.883135
30011 / tcp
1911457608 | 2025-03-12T13:55:48.800199
30022 / tcp
2033888749 | 2025-03-18T20:31:36.253820
30083 / tcp
1911457608 | 2025-03-16T11:42:04.292752
30122 / tcp
-2107996212 | 2025-03-18T10:50:50.715501
30301 / tcp
-1839934832 | 2025-03-15T18:10:00.006750
30303 / tcp
1887224352 | 2025-03-19T21:02:30.214395
30622 / tcp
-971970408 | 2025-03-12T09:57:23.858637
30822 / tcp
996960436 | 2025-03-12T18:40:28.176164
30922 / tcp
2087396567 | 2025-03-20T21:22:28.689150
31322 / tcp
971933601 | 2025-03-09T14:58:43.082346
31337 / tcp
756886313 | 2025-03-10T13:18:22.350580
32022 / tcp
1212921144 | 2025-03-12T04:00:39.930747
32122 / tcp
-2096652808 | 2025-03-20T02:12:24.216431
32422 / tcp
1492413928 | 2025-03-09T13:15:56.890057
32622 / tcp
-2096652808 | 2025-03-11T18:40:44.540794
33622 / tcp
2087396567 | 2025-03-21T04:17:17.126038
33922 / tcp
-1476017887 | 2025-03-18T04:03:04.965626
34222 / tcp
1690634669 | 2025-03-20T00:29:17.152466
34422 / tcp
-1990350878 | 2025-03-14T23:48:27.916278
34722 / tcp
380146262 | 2025-03-19T07:02:01.588922
35002 / tcp
-2089734047 | 2025-03-14T12:35:26.775152
35122 / tcp
104385780 | 2025-03-19T00:00:29.942469
35222 / tcp
2087396567 | 2025-03-18T08:54:51.315725
35241 / tcp
-1810987450 | 2025-03-16T20:13:39.917135
35522 / tcp
819727972 | 2025-03-16T23:54:55.968909
35622 / tcp
-905685638 | 2025-03-18T06:46:44.182951
36522 / tcp
-1626979812 | 2025-03-18T16:11:58.347119
36622 / tcp
-801484042 | 2025-03-16T06:41:53.577358
36983 / tcp
-1611764932 | 2025-03-18T13:38:37.748192
37022 / tcp
-971970408 | 2025-03-16T18:25:56.567525
37215 / tcp
-1729629024 | 2025-03-21T09:33:08.037911
37443 / tcp
493955023 | 2025-03-20T19:56:18.165204
37522 / tcp
1948301213 | 2025-02-28T16:06:59.257171
37622 / tcp
-1839934832 | 2025-03-16T01:01:52.108877
37777 / tcp
1282941221 | 2025-03-18T16:03:45.429412
37822 / tcp
996960436 | 2025-03-14T00:38:15.834607
38122 / tcp
-786044033 | 2025-03-15T16:28:32.890781
38333 / tcp
1308377066 | 2025-03-15T19:53:35.571556
38522 / tcp
-971970408 | 2025-03-13T22:59:11.380835
38722 / tcp
1282941221 | 2025-03-07T04:49:54.670281
38822 / tcp
-321444299 | 2025-03-12T15:07:48.493834
39322 / tcp
707919486 | 2025-03-11T10:02:37.742428
39522 / tcp
1332894250 | 2025-03-11T08:16:51.536914
39722 / tcp
996960436 | 2025-03-05T03:19:39.292212
40322 / tcp
1948301213 | 2025-03-08T20:18:06.190733
40522 / tcp
-1733106930 | 2025-03-04T06:09:06.599364
41022 / tcp
2033888749 | 2025-03-08T21:59:21.822124
42022 / tcp
1690634669 | 2025-03-04T15:03:05.386138
42222 / tcp
114471724 | 2025-03-04T22:01:46.545993
42420 / tcp
1911457608 | 2025-03-18T03:43:06.974420
43222 / tcp
1632932802 | 2025-02-28T23:08:05.206619
44222 / tcp
2087396567 | 2025-03-10T21:35:53.304686
44301 / tcp
-2089734047 | 2025-03-14T05:59:44.935895
44320 / tcp
-445721795 | 2025-03-05T18:48:24.487958
44345 / tcp
-1598265216 | 2025-03-06T15:43:19.455021
44420 / tcp
-2031152423 | 2025-03-04T13:37:55.439737
45006 / tcp
-1839934832 | 2025-03-06T15:45:42.475015
46001 / tcp
401555314 | 2025-03-06T04:50:49.298823
47534 / tcp
-747911285 | 2025-03-19T16:34:48.414088
47722 / tcp
-1839934832 | 2025-03-10T10:01:21.684585
48000 / tcp
1615193817 | 2025-03-17T16:54:07.417546
48001 / tcp
819727972 | 2025-03-18T11:12:10.132084
48022 / tcp
539065883 | 2025-03-07T10:00:04.449589
48122 / tcp
-616720387 | 2025-03-10T04:38:05.838183
48899 / tcp
1842524259 | 2025-03-22T04:37:23.563848
49502 / tcp
-2031152423 | 2025-03-19T20:02:39.324660
49684 / tcp
2143387245 | 2025-03-03T21:14:18.654355
50000 / tcp
-971970408 | 2025-03-05T23:10:34.723258
50006 / tcp
-147424911 | 2025-03-17T23:09:03.498259
50050 / tcp
660175493 | 2025-03-16T11:59:20.049451
50070 / tcp
-971970408 | 2025-03-21T23:29:35.237890
50085 / tcp
-457235091 | 2025-03-04T14:56:51.861120
50100 / tcp
819727972 | 2025-03-21T21:36:16.908268
50257 / tcp
1911457608 | 2025-03-15T18:29:29.143466
50500 / tcp
-1261314728 | 2025-03-09T17:19:22.119887
50998 / tcp
819727972 | 2025-03-20T09:31:15.031318
53413 / tcp
1308377066 | 2025-03-22T01:10:24.514595
53482 / tcp
408230060 | 2025-02-28T12:28:41.553400
53490 / tcp
-1730858130 | 2025-03-17T01:44:33.138176
54984 / tcp
-971970408 | 2025-03-21T06:02:44.680474
55443 / tcp
-971970408 | 2025-03-19T13:59:46.657842
55475 / tcp
-2089734047 | 2025-03-03T21:02:23.967228
55481 / tcp
819727972 | 2025-03-06T00:56:16.451644
55522 / tcp
2033888749 | 2025-03-06T21:59:16.488233
55554 / tcp
2087396567 | 2025-03-14T04:00:05.140433
55722 / tcp
1542849631 | 2025-03-06T18:32:56.813215
57778 / tcp
-1737707071 | 2025-03-16T02:29:43.095486
57786 / tcp
-2089734047 | 2025-03-13T21:14:24.263947
57822 / tcp
2087396567 | 2025-03-06T05:15:23.049154
57922 / tcp
-971970408 | 2025-03-06T03:33:14.535594
58122 / tcp
539065883 | 2025-03-06T01:48:49.184973
58422 / tcp
1332894250 | 2025-03-05T20:35:04.107713
58522 / tcp
-1681927087 | 2025-03-05T18:52:32.448920
58532 / tcp
-1327660293 | 2025-03-06T08:19:16.883328
58722 / tcp
-2033111675 | 2025-03-05T17:10:23.823784
58822 / tcp
-441419608 | 2025-03-05T15:26:38.639400
59322 / tcp
-805362002 | 2025-03-05T06:48:08.805354
59522 / tcp
2087396567 | 2025-03-03T17:38:41.311376
60001 / tcp
472902042 | 2025-03-15T01:35:38.264020
60021 / tcp
-792826324 | 2025-03-15T09:52:51.790011
60129 / tcp
-1148066627 | 2025-03-20T03:56:39.743556
61616 / tcp
1267517148 | 2025-03-12T17:52:15.561600
62078 / tcp
980478633 | 2025-03-05T10:56:54.688248
63210 / tcp
962700458 | 2025-03-10T02:53:23.912080
63256 / tcp
873425297 | 2025-03-21T19:52:15.886292
63260 / tcp
-297128567 | 2025-03-13T13:52:10.374345



Contact Us

Shodan ® - All rights reserved