11 /
tcp
-971970408 | 2025-04-21T23:38:08.437564
15 /
tcp
-641479109 | 2025-04-12T15:00:22.474716
17 /
tcp
-82008689 | 2025-03-27T19:47:33.815319
"Here's the rule for bargains: "Do other men, for they would do you."
That's the true business precept." Charles Dickens (1812-70)
\x00
19 /
tcp
829384519 | 2025-03-25T12:57:30.306241
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefg
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUV
23 /
tcp
164764193 | 2025-03-26T00:11:40.450361
25 /
tcp
2063598737 | 2025-04-02T06:18:57.359511
43 /
tcp
-1375131644 | 2025-04-17T23:43:15.932033
\x00[v\xc3\xbdC\x7f\x00\x00
49 /
tcp
-801484042 | 2025-04-04T14:51:25.828646
53 /
tcp
-1858876500 | 2025-04-21T23:16:51.388119
9\n\\x81\\x80\\x00\\x01\\x00\\x02\\x00\\x00\\x00\\x00\\x08clients1\\x06google\\x03com\\x00\\x00\\x01\\x00\\x01\\xc0\x0c\\x00\\x05\\x00\\x01\\x00\\x00\\x00\\x02\\x00\x0c\\x07clients\\x01l\\xc0\\x15\\xc01\\x00\\x01\\x00\\x01\\x00\\x00\\x00\\x02\\x00\\x04\\xac\xd9\xa3.\n\\x00\\x06\\x85\\x00\\x00\\x01\\x00\\x00\\x00\\x01\\x00
175081126 | 2025-04-06T14:45:39.019181
HTTP/1.1 400 Bad Request
Server: nginx/1.14.2
Content-Type: text/html
Connection: close
79 /
tcp
627290832 | 2025-04-21T17:28:09.449400
ÿû\x01SOYO_SIP VBNQyQSKc settings
Password:
595531648 | 2025-04-02T00:19:07.094747
HTTP/1.1 403 Forbidden
Server: AliyunOSS
Date: Wed, 02 Apr 2025 00:19:07 GMT
Content-Type: application/xml
Connection: keep-alive
Content-Length: 273
x-oss-request-id: 67EC827BC400DB38390B6D64
94 /
tcp
-1538260461 | 2025-03-27T18:07:48.235573
102 /
tcp
-1399940268 | 2025-04-19T22:53:06.011459
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
104 /
tcp
-1327660293 | 2025-04-20T04:26:39.738161
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
110 /
tcp
580340387 | 2025-04-20T06:17:55.248530
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
-414819019 | 2025-04-21T01:56:36.886305
HTTP/1.1 200 OK
Content-type: text/html
Connection: close
141730637 | 2025-03-26T03:10:15.160164
HTTP/1.0 200 OK
Server: Proxy
143 /
tcp
-100373866 | 2025-04-12T00:18:44.824277
* OK TurboMail IMAP4 Service ready\r\n
175 /
tcp
-1399940268 | 2025-04-15T00:02:52.082600
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
179 /
tcp
-399606100 | 2025-04-06T18:31:18.367172
BGP Message\nType: 3\nMajor error Code: 6\nMinor error Code: 5\n
180 /
tcp
-1399940268 | 2025-04-17T19:22:36.486672
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
195 /
tcp
-971970408 | 2025-04-07T00:23:05.141399
221 /
tcp
-445721795 | 2025-04-20T10:29:43.496036
\x00[\xc3\xaed\x1a\x7f\x00\x00
264 /
tcp
-1707068558 | 2025-04-11T01:42:44.307548
311 /
tcp
1975288991 | 2025-04-20T15:05:00.853533
385 /
tcp
-1611764932 | 2025-04-12T09:33:49.657419
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
389 /
tcp
-1743283776 | 2025-04-05T23:25:11.200297
0\x0c\\x02\\x01\\x01a\\x07\n\\x01\\x04\\x04
670235892 | 2025-04-15T01:39:30.172581
HTTP/1.1 403 Forbidden
Server: AliyunOSS
Date: Tue, 15 Apr 2025 01:39:30 GMT
Content-Type: application/xml
Connection: keep-alive
Content-Length: 273
x-oss-request-id: 67FDB8D2CC3D9D3034E01763
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
61:6b:68:69:54:4a:81:bb:93:b4:d7:d1
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=BE, O=GlobalSign nv-sa, CN=GlobalSign GCC R3 OV TLS CA 2024
Validity
Not Before: Jan 2 06:32:06 2025 GMT
Not After : Sep 4 00:00:00 2025 GMT
Subject: C=CN, ST=ZheJiang, L=HangZhou, O=Alibaba (China) Technology Co., Ltd., CN=cn-beijing.oss.aliyuncs.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:cb:fd:cb:7f:5f:49:ee:e8:d9:d0:d6:53:d0:a5:
88:fd:fc:56:3c:06:76:2d:ad:ee:c9:65:e1:8c:fd:
ee:ef:a1:a2:34:db:d3:65:1e:4a:9c:f7:9d:a6:ad:
fa:a7:b3:1a:8b:45:f7:13:2a:26:24:9c:50:28:92:
25:54:45:fc:d2:2e:17:7d:c1:47:45:a1:39:bf:ce:
7e:f2:8b:d7:69:2c:b6:94:3f:5c:fc:a9:6e:c3:bd:
a5:a9:f3:6e:65:55:50:ba:b2:8a:df:ee:e9:50:a7:
81:b5:5f:3a:96:f9:74:c3:8a:54:51:d7:eb:02:1c:
58:33:e6:a0:ea:12:10:52:63:c9:df:03:84:cf:a3:
15:9c:50:7b:5e:6e:42:0f:3d:bd:33:3c:f6:6a:eb:
be:30:24:30:72:cb:84:a8:e9:17:aa:6a:45:f8:12:
c2:a1:78:0d:31:f0:45:2b:32:2f:ff:98:a3:03:a2:
5a:b0:8d:e2:d5:ce:e1:35:56:0b:0a:f8:11:bf:18:
44:f7:b8:7b:a0:a0:eb:1d:8d:cf:e8:cc:cf:c4:c5:
54:69:59:53:e1:ee:51:79:04:67:86:cf:8b:e5:c6:
88:a8:cc:9e:61:75:91:90:b5:8a:af:4c:a2:8d:57:
14:8a:f6:54:fb:1e:71:e5:09:e3:0a:12:df:34:8d:
d5:47
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature, Key Encipherment
X509v3 Basic Constraints: critical
CA:FALSE
Authority Information Access:
CA Issuers - URI:http://secure.globalsign.com/cacert/gsgccr3ovtlsca2024.crt
OCSP - URI:http://ocsp.globalsign.com/gsgccr3ovtlsca2024
X509v3 Certificate Policies:
Policy: 2.23.140.1.2.2
Policy: 1.3.6.1.4.1.4146.10.1.2
CPS: https://www.globalsign.com/repository/
X509v3 CRL Distribution Points:
Full Name:
URI:http://crl.globalsign.com/gsgccr3ovtlsca2024.crl
X509v3 Subject Alternative Name:
DNS:cn-beijing.oss.aliyuncs.com, DNS:*.cn-beijing.oss-console.aliyuncs.com, DNS:*.s3.oss-cn-beijing.aliyuncs.com, DNS:*.s3.oss-cn-beijing-internal.aliyuncs.com, DNS:*.cn-beijing.mgw.aliyuncs.com, DNS:*.oss.cn-beijing.privatelink.aliyuncs.com, DNS:*.oss-cn-beijing.oss-object-process.aliyuncs.com, DNS:*.oss-cn-beijing-internal.oss-object-process.aliyuncs.com, DNS:*.oss-cn-beijing.oss-accesspoint.aliyuncs.com, DNS:*.oss-cn-beijing-internal.oss-accesspoint.aliyuncs.com, DNS:*.oss-accesspoint.aliyuncs.com, DNS:*.oss-cn-beijing.aliyuncs.com, DNS:*.img-cn-beijing-internal.aliyuncs.com, DNS:*.oss-cn-beijing-internal-cross.aliyuncs.com, DNS:*.oss-cn-beijing-internal.aliyuncs.com, DNS:*.oss-cn-beijing-cross.aliyuncs.com, DNS:*.img-cn-beijing.aliyuncs.com, DNS:*.vpc100-oss-cn-beijing.aliyuncs.com, DNS:*.cn-beijing.oss.aliyuncs.com, DNS:*.oss-cache-cn-beijing-h.aliyuncs.com, DNS:*.oss-cache-cn-beijing-h-cross.aliyuncs.com, DNS:*.oss-cn-beijing-finance-1-pub-internal.aliyuncs.com, DNS:*.oss-cn-beijing-finance-1-pub.aliyuncs.com, DNS:*.cn-beijing-finance.oss.aliyuncs.com, DNS:*.oss-cn-beijing-finance-1-internal.aliyuncs.com, DNS:*.oss-cn-beijing-finance-1.aliyuncs.com, DNS:*.cn-beijing-finance-1.oss.aliyuncs.com, DNS:*.cn-beijing-vpc.oss.aliyuncs.com, DNS:*.oss-enet-cm.aliyuncs.com, DNS:*.oss-enet-cu.aliyuncs.com, DNS:*.oss-enet-ct.aliyuncs.com, DNS:*.oss-enet-cn-north.aliyuncs.com, DNS:*.aliyuncs.com, DNS:*.oss-enet.aliyuncs.com, DNS:*.oss-internal.aliyuncs.com, DNS:*.oss-internal.aliyun-inc.com, DNS:*.oss-accelerate.aliyuncs.com, DNS:*.oss-accelerate-overseas.aliyuncs.com, DNS:*.s3.oss-accelerate.aliyuncs.com, DNS:*.s3.oss-accelerate-overseas.aliyuncs.com, DNS:*.cn-beijing-cross.mgw.aliyuncs.com, DNS:*.oss-vpc.aliyuncs.com, DNS:*.cn-beijing.oss-vpc.aliyuncs.com, DNS:*.oss.aliyuncs.com
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Authority Key Identifier:
DA:D3:A8:08:48:0C:34:37:58:EE:E5:A7:75:2E:59:FC:D6:DC:3C:38
X509v3 Subject Key Identifier:
C1:58:AC:32:69:71:BB:67:42:6C:42:FE:14:E5:57:72:91:C1:82:D6
CT Precertificate SCTs:
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 1A:04:FF:49:D0:54:1D:40:AF:F6:A0:C3:BF:F1:D8:C4:
67:2F:4E:EC:EE:23:40:68:98:6B:17:40:2E:DC:89:7D
Timestamp : Jan 2 06:32:08.952 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:D4:22:D6:BD:85:6A:79:2B:66:0F:1F:
36:9C:87:35:37:A2:DA:91:B3:41:21:70:33:24:48:B8:
AC:01:B2:4F:8A:02:20:78:33:2F:5E:6C:72:6C:BA:8A:
2A:DB:4A:42:99:29:A1:0C:E4:7B:86:88:C2:7F:9F:BE:
CE:93:8F:5D:00:2F:8C
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 12:F1:4E:34:BD:53:72:4C:84:06:19:C3:8F:3F:7A:13:
F8:E7:B5:62:87:88:9C:6D:30:05:84:EB:E5:86:26:3A
Timestamp : Jan 2 06:32:08.990 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:DE:60:8C:72:69:F8:ED:DD:B5:9B:2F:
88:2B:94:8E:C5:EA:A3:29:CF:5E:76:E1:32:5B:33:E9:
09:55:C0:9B:0A:02:20:72:4F:8B:E6:B3:1A:36:F6:61:
91:02:36:00:EA:76:E0:8C:5C:3C:8C:AF:C1:4A:F2:FD:
CA:7D:2B:6A:A6:5A:A7
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 0D:E1:F2:30:2B:D3:0D:C1:40:62:12:09:EA:55:2E:FC:
47:74:7C:B1:D7:E9:30:EF:0E:42:1E:B4:7E:4E:AA:34
Timestamp : Jan 2 06:32:08.695 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:82:E8:40:FB:D2:F4:C7:36:73:02:4A:
CD:8A:B4:A7:3D:E9:DC:7F:23:C7:17:0C:B1:8F:65:59:
3C:89:A5:E4:F0:02:20:2D:57:40:3F:AC:33:84:81:B8:
79:8C:CE:B4:F4:CC:44:29:AE:5A:FA:CD:66:FF:7A:69:
DA:8E:8E:6B:3D:C7:D7
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
4e:88:42:e9:bd:d6:24:7a:b8:0b:08:70:28:8b:e3:90:92:79:
25:1f:f9:ec:83:69:41:21:cb:3f:cc:c6:2c:76:54:44:09:81:
c9:8b:a9:bc:32:e4:5e:d4:72:17:de:fd:a1:50:2b:58:ed:45:
8e:ba:40:ee:f9:54:31:0e:56:0e:7f:9e:36:2d:98:8b:3a:21:
ac:4c:f7:4b:e5:97:32:cd:c3:b4:9d:b7:99:07:f1:4f:bb:81:
14:60:64:c2:01:bb:85:62:e5:8a:7e:84:86:9f:c9:0b:80:80:
c3:95:a2:77:b8:d9:81:73:28:dc:14:f9:af:1b:22:8b:33:2a:
b5:dd:34:fb:a6:90:3d:a1:37:b1:93:f5:d9:93:d0:3c:86:ac:
28:04:f6:71:24:54:fd:0c:42:2d:48:d4:9c:a6:e5:fa:88:71:
e3:dc:e1:a7:c7:8a:d5:39:43:29:5f:5d:2c:02:1a:72:08:e8:
ce:86:a9:22:b1:ed:4f:4e:7f:e5:7d:ea:01:3b:7f:34:2c:e6:
94:3c:5b:6c:64:09:c3:88:e5:08:64:91:8a:17:63:99:dc:0c:
85:ee:6c:4a:67:f4:66:21:e9:7a:a3:95:8c:ed:6c:6f:af:92:
f8:a3:49:8f:de:3b:85:de:68:56:95:f4:e7:e7:7b:1e:c2:0a:
1f:12:b5:15
452 /
tcp
1911457608 | 2025-04-01T17:51:24.724078
\x00[\x00\x00\x00\x00\x00\x00
465 /
tcp
897328069 | 2025-04-20T05:18:30.148507
220 mail.scott000.com ESMTP
502 /
tcp
819727972 | 2025-04-18T21:12:12.535203
SSH-2.0-OpenSSH_7.4
Vulnerabilities
503 /
tcp
819727972 | 2025-04-20T15:36:29.110301
SSH-2.0-OpenSSH_7.4
Vulnerabilities
515 /
tcp
1948301213 | 2025-04-21T21:09:06.352048
RFB 003.003
VNC:
Protocol Version: 3.3
541 /
tcp
-1299118573 | 2025-03-31T10:30:37.083601
\\x16\\x03\\x01\\x01[\\x01\\x00\\x01W\\x03\\x03\\x89\\xb7a\\xcdh\\xff\\xe7x~\\xc0Z\\x92\\x1f\\xf0\\xd8\xe3\x9f\xb2;\\x92\\x06\\xf9\\xef\\xc7L\\xfa\\x16&#{)` \\xf6k\\x80\\xe6Ylt\\xe8\x0bF\\xa9&?\\xb9!\\xe7\\x93^l\\xb3\\xbe\\x15\\xb1\\xa3n\\x00\\xce\\xde\xcf\x822h\\x002\\x13\\x02\\x13\\x03\\x13\\x01\\x009\\x005\\x00k\\x00=\\xc
548 /
tcp
1801869778 | 2025-04-11T23:19:59.559295
Fast Copy: Yes\nExtended Sleep: Yes\nUUIDs: Yes\nUTF8 Server Name: Yes\nDirectory Services: Yes\nReconnect: No\nServer Notifications: Yes\nTCP/IP: Yes\nServer Signature: Yes\nServer Message: No\nPassword Saving Prohibited: No\nPassword Changing: No\nCopy File: Yes\nServer Name: DS1019Plus\nMachine Type: \rNetatalk3.1.8\nAFP Versions: AFP2.2, AFPX03, AFP3.1, AFP3.2, AFP3.3, AFP3.4\nUAMs: Cleartxt Passwrd\\x04,DHX2\t,DHCAST128\\x00\nServer Signature: 00000000008002000180030002800280
555 /
tcp
819727972 | 2025-03-26T14:57:08.236890
SSH-2.0-OpenSSH_7.4
Vulnerabilities
587 /
tcp
745343730 | 2025-04-02T23:53:15.047326
220 smtp.qq.com Esmtp QQ Mail Server
1402312074 | 2025-04-23T07:52:24.170315
HTTP/1.1 400 Bad Request
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 13-51264013-0 0NNN RT(1705909593861 113) q(-1 -1 -1 -1) r(0 -1) b1
1300162323 | 2025-04-23T00:55:03.416465
HTTP/1.1 404 Not Found
Content-Type: text/plain; charset=utf-8
X-Content-Type-Options: nosniff
685 /
tcp
-146605374 | 2025-04-03T22:23:58.413315
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
-1871658906 | 2025-03-31T12:14:18.822472
HTTP/1.1 302 Moved Temporarily
Content-Type: text/html
Connection: close
Server: Nginx
Expires: 0
Pragma: no-cache
Cache-Control: no-cache
Location: https://portal.ikuai8-wifi.com/templates/default/index.html?timestamp=1705534773&router_ver=3.2.4&firmware=IK-RouterOS&template=default&gwid=a7dea2d1ff2b46d582c814cbae2fb058&user_ip=*.*.*.*
771 /
tcp
-1399940268 | 2025-04-21T10:19:00.860571
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-262532376 | 2025-03-29T21:25:49.921269
HTTP/1.1 403 Forbidden
Server: nginx
Content-Type: text/html
Connection: keep-alive
953 /
tcp
-1399940268 | 2025-03-31T11:31:31.295937
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
993 /
tcp
-303199180 | 2025-03-29T18:39:28.389735
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
1025 /
tcp
-1261090339 | 2025-04-19T21:52:40.563427
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
1080 /
tcp
1362344524 | 2025-04-02T18:10:27.801790
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.7
1099 /
tcp
-1329831334 | 2025-04-08T19:20:08.684025
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
1111 /
tcp
-358801646 | 2025-03-25T06:55:26.207316
-1547976805 | 2025-03-26T08:55:22.150204
HTTP/1.1 403 Forbidden
Server: nginx
Content-Type: text/html
Connection: close
1153 /
tcp
-891714208 | 2025-04-14T21:27:04.096868
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
1177 /
tcp
171352214 | 2025-04-20T15:37:42.922807
-ERR client ip is not in whitelist
1193 /
tcp
-2089734047 | 2025-04-20T20:09:58.788546
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1200 /
tcp
841014058 | 2025-04-07T05:37:03.901967
Hello, this is FRRouting (version 4.0).
Copyright 19
96-2005 Kunihiro Ishiguro, et al.
Use...
1250 /
tcp
-1399940268 | 2025-04-01T15:57:54.231763
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1337 /
tcp
1690634669 | 2025-03-26T22:33:55.938921
1414 /
tcp
819727972 | 2025-04-07T15:50:59.416724
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1433 /
tcp
555056254 | 2025-04-20T23:12:31.976973
MSSQL Server\nVersion: 171050560 (0xa320640)\nSub-Build: 0\nEncryption:Not available\n\nMSSQL NTLM Info:\nTarget_Name: 3NXCU7QCCJGSTII\nProduct_Version: 6.1.7601 Ntlm 15\nOS: Windows 7, Service Pack 1/Windows Server 2008 R2, Service Pack 1\nNetBIOS_Domain_Name: 3NXCU7QCCJGSTII\nNetBIOS_Computer_Name: 3NXCU7QCCJGSTII\nDNS_Domain_Name: 3NXCU7QCCJGSTII\nDNS_Computer_Name: 3NXCU7QCCJGSTII\nMsvAvFlags: 01000000\nSystem_Time: 2024-01-22 01:19:47 +0000 UTC\n\n
1444 /
tcp
1011407350 | 2025-04-07T22:10:25.196823
* OK GroupWise IMAP4rev1 Server Ready\r\n
1515 /
tcp
1975288991 | 2025-04-06T11:49:01.264349
-186520940 | 2025-04-17T23:18:59.702752
1557 /
tcp
-1399940268 | 2025-04-21T02:16:17.134585
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1604 /
tcp
819727972 | 2025-04-12T22:21:46.978503
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1800 /
tcp
-1399940268 | 2025-04-18T12:28:58.132042
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1745717579 | 2025-04-01T05:02:29.272072
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae224e_PS-CSX-01CvJ183_33983-2857
1883 /
tcp
745343730 | 2025-04-23T10:52:06.213467
220 smtp.qq.com Esmtp QQ Mail Server
1911 /
tcp
1308377066 | 2025-03-27T20:43:15.806831
1926 /
tcp
1332894250 | 2025-04-15T01:51:28.384822
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
1332639794 | 2025-04-18T00:22:29.961432
HTTP/1.1 403 Forbidden
Server: HASP LM/16.00
Content-Type: text/html
971933601 | 2025-04-05T17:57:18.146490
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
1966 /
tcp
-832380282 | 2025-04-19T16:14:00.741505
lpd [@Boyk]: Print-services are not available to your host (aF2qXkQ2m).\n
1974 /
tcp
-578719005 | 2025-04-21T10:16:58.887789
\\x06\\xc2\\x81\\xc2\\x81\\x01\\x07version\\x04bind\\x10\\x03
1984 /
tcp
-42767839 | 2025-04-01T18:40:24.377835
RFB 005.000
VNC:
Protocol Version: 5.0
1987 /
tcp
504717326 | 2025-03-31T16:03:21.183896
SSH-2.0-OpenSSH_8.6
Vulnerabilities
2000 /
tcp
-1399940268 | 2025-04-07T12:43:48.799302
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2002 /
tcp
1308377066 | 2025-04-21T16:31:15.254466
2003 /
tcp
-1399940268 | 2025-04-05T18:18:22.665507
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2008 /
tcp
171352214 | 2025-04-18T15:54:35.104935
-ERR client ip is not in whitelist
2021 /
tcp
1726594447 | 2025-04-07T07:09:06.198920
\r\n\nLantronix MSS100 Version V118/523(045538937)\n\r\nType HELP at the \'Local_61349> \' prompt for assistance.\n\r\n\r\n\nUsername>
2053 /
tcp
-358801646 | 2025-04-11T06:28:41.676449
2067 /
tcp
1984588611 | 2025-04-20T16:15:03.513396
2070 /
tcp
-1399940268 | 2025-04-08T10:23:14.861998
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1839934832 | 2025-04-20T19:50:07.695874
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
2083 /
tcp
660175493 | 2025-04-10T07:49:04.071662
2085 /
tcp
-1810987450 | 2025-04-15T02:36:20.850598
2087 /
tcp
-653033013 | 2025-04-21T22:32:56.979589
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
141730637 | 2025-04-14T19:10:28.369262
HTTP/1.0 200 OK
Server: Proxy
2126 /
tcp
989533793 | 2025-03-26T20:50:42.267626
RTSP/1.0 400 Bad Request\r\n\r\n
2130 /
tcp
-1399940268 | 2025-03-31T12:29:23.816372
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2181 /
tcp
546151771 | 2025-03-29T15:00:52.414294
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC
Clients:
/*.*.*.*:11264[0](queued=0,recved=1,sent=0)
Latency min/avg/max: 0/0.0/0
Received: 8557
Sent: 11410
Connections: 1
Outstanding: 0
Zxid: 0x332907ad3391
Mode: follower
Node count: 104618
2222 /
tcp
-358801646 | 2025-04-18T18:27:25.694975
2320 /
tcp
819727972 | 2025-04-02T13:36:47.756486
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2323 /
tcp
-2112953016 | 2025-04-16T16:59:10.824137
There are too many users,please wait a moment to log in!
TELNET Negotiation:
will: Echo, Suppress Go Ahead
do: Echo, Negotiate About Window Size, Remote Flow Control
2376 /
tcp
-1477838366 | 2025-04-23T16:07:40.446286
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
2404 /
tcp
-1399940268 | 2025-04-15T20:58:08.253844
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2423 /
tcp
-2017887953 | 2025-04-02T13:37:24.329840
SSH-2.0-OpenSSH_7.9
Vulnerabilities
2563 /
tcp
819727972 | 2025-04-22T21:09:30.082739
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2568 /
tcp
-1248408558 | 2025-04-21T21:05:17.203212
220 MikroTik FTP server (MikroTik 6.44.3) ready
2761 /
tcp
51259122 | 2025-04-03T23:42:41.482819
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
2985 /
tcp
1642597142 | 2025-03-26T08:25:15.959256
\x00y\xc3\x90\x02\xc3\xbf\xc3\xbf\x00s\x12L\x00\x06\x11I\x00\x08\x00N\x11S\x00\xc3\x93
3004 /
tcp
165188539 | 2025-04-15T17:54:59.512068
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
3015 /
tcp
-2089734047 | 2025-04-20T01:29:05.167636
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3050 /
tcp
408230060 | 2025-04-08T06:06:08.656782
\r\nSorry, that nickname format is invalid.\r\n
3053 /
tcp
455076604 | 2025-03-29T00:20:58.795395
!\x07version\x04bind7 t{RPowerDNS Recursor 410
3066 /
tcp
-339084706 | 2025-04-12T20:33:51.741394
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
3069 /
tcp
366084633 | 2025-04-23T15:51:54.179278
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
3082 /
tcp
1308377066 | 2025-04-10T13:49:07.938892
3094 /
tcp
-2089734047 | 2025-04-23T13:14:26.902098
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3105 /
tcp
-904840257 | 2025-04-22T17:59:53.195379
572 Relay not authorized\r\n
3106 /
tcp
671605376 | 2025-04-18T02:59:14.581593
3107 /
tcp
1911457608 | 2025-04-01T23:57:56.634587
\x00[\x00\x00\x00\x00\x00\x00
3113 /
tcp
1212285915 | 2025-04-21T08:21:31.486781
\x00K\x00\x00\x02\x00\x00\x00%~)J/\\tHjU(IAGENT = (AGENT_VERSION = 2388790170)(RPC_VERSION = 5..722))
3115 /
tcp
1911457608 | 2025-04-20T13:45:18.223540
\x00[\x00\x00\x00\x00\x00\x00
3117 /
tcp
819727972 | 2025-04-12T05:16:46.803495
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3129 /
tcp
1208318993 | 2025-04-15T16:39:37.979034
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
3131 /
tcp
-2017887953 | 2025-04-18T20:55:48.856717
SSH-2.0-OpenSSH_7.9
Vulnerabilities
3135 /
tcp
321971019 | 2025-04-07T22:37:19.680411
-ERR client ip is not in whitelist\r
3142 /
tcp
-2089734047 | 2025-04-15T08:56:01.996552
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3154 /
tcp
-1114821551 | 2025-04-07T22:03:17.881781
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
3167 /
tcp
-1032713145 | 2025-04-07T08:02:58.231094
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
3170 /
tcp
-1476017887 | 2025-04-15T17:22:21.356079
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
3180 /
tcp
45131230 | 2025-04-06T19:54:57.400876
inv2W\x04\x0f\x00\x00\x00\x01\x00\t\x00\x00\x00
3191 /
tcp
669849225 | 2025-03-26T07:08:12.090156
SSH-98.60-SysaxSSH_81885..42\r\n
3193 /
tcp
-441419608 | 2025-04-22T21:02:28.741499
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
3256 /
tcp
-971970408 | 2025-04-06T09:55:33.210864
3260 /
tcp
1135752610 | 2025-04-11T09:48:35.994996
Login Response Success(0x0000)\nKey/Value Pairs\nAuthMethod=None
-2031078612 | 2025-04-19T23:33:52.119480
HTTP/1.1 302 Found
Content-Type: text/html; charset=utf-8
Location: http://proxy.ces.org.tw:3000/login?url=http%3A%2F%2Floginbyurl.wanfangdata.com.cn%2F
3270 /
tcp
1911457608 | 2025-04-19T19:59:27.423994
\x00[\x00\x00\x00\x00\x00\x00
3299 /
tcp
-2096652808 | 2025-04-11T18:45:54.927492
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
3301 /
tcp
1623746877 | 2025-04-12T07:40:32.971611
500 Permission denied - closing connection.\r\n
3310 /
tcp
-1399940268 | 2025-03-27T17:05:16.575036
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3388 /
tcp
1911457608 | 2025-04-10T20:03:32.939188
\x00[\x00\x00\x00\x00\x00\x00
3389 /
tcp
1146750585 | 2025-04-22T14:48:34.127119
Remote Desktop Protocol\n\\x03\\x00\\x00\\x13\\x0e\\xd0\\x00\\x00\\x124\\x00\\x02\\x0f\\x08\\x00\\x08\\x00\\x00\\x00\n\nFlag: PROTOCOL_HYBRID_EX\nTarget_Name: UHYPBIESUENB72Z\nProduct_Version: 6.3.9600 Ntlm 15\nOS: Windows 8.1/Windows Server 2012 R2\nNetBIOS_Domain_Name: UHYPBIESUENB72Z\nNetBIOS_Computer_Name: UHYPBIESUENB72Z\nDNS_Domain_Name: uhypbiesuenb72ze\nDNS_Computer_Name: uhypbiesuenb72ze\nSystem_Time: 2023-02-06 08:40:05 +0000 UTC\n\n
3498 /
tcp
1911457608 | 2025-03-31T23:05:03.479648
\x00[\x00\x00\x00\x00\x00\x00
3530 /
tcp
-1399940268 | 2025-03-27T21:41:22.714814
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
198844676 | 2025-03-26T21:41:49.066152
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3552 /
tcp
-358801646 | 2025-03-25T07:13:39.464747
3559 /
tcp
819727972 | 2025-03-28T05:03:22.640572
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3950 /
tcp
1492413928 | 2025-04-18T22:03:47.035803
SSH-2.0-OpenSSH_7.5
Vulnerabilities
4000 /
tcp
-801484042 | 2025-04-10T09:51:57.040148
4022 /
tcp
-1399940268 | 2025-03-27T20:04:17.750647
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4063 /
tcp
-319440554 | 2025-04-01T01:10:41.472695
4072 /
tcp
1911457608 | 2025-03-28T18:55:02.377447
\x00[\x00\x00\x00\x00\x00\x00
4104 /
tcp
321971019 | 2025-04-02T02:25:32.950217
-ERR client ip is not in whitelist\r
4148 /
tcp
-441419608 | 2025-03-27T17:12:48.453711
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
4150 /
tcp
671605376 | 2025-04-15T19:56:43.830845
4160 /
tcp
632542934 | 2025-04-02T04:49:41.265627
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
-1341662640 | 2025-04-16T00:53:38.142308
HTTP/1.1 301 Moved Permanently
Server: Zope/(2.13.23, python 1.7.18, linux2) ZServer/1.1
Content-Type: text/plain; charset=utf-8
Connection: close
4282 /
tcp
2087396567 | 2025-04-19T23:14:02.229808
kjnkjabhbanc283ubcsbhdc72
4300 /
tcp
-1399940268 | 2025-04-03T05:07:41.066529
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4433 /
tcp
1850902677 | 2025-04-19T23:14:03.074507
4439 /
tcp
-358801646 | 2025-04-17T19:43:36.433091
285437346 | 2025-04-18T13:08:40.229989
HTTP/1.1 200 OK
Content-Type: text/xml
X-Transcend-Version: 1
Strict-Transport-Security: max-age=31536000 ; includeSubDomains
X-Frame-Options: deny
X-Content-Type-Options: nosniff
X-Permitted-Cross-Domain-Policies: none
Referrer-Policy: no-referrer
Clear-Site-Data: "cache","cookies","storage"
Cross-Origin-Embedder-Policy: require-corp
Cross-Origin-Opener-Policy: same-origin
Cross-Origin-Resource-Policy: same-origin
X-XSS-Protection: 0
4451 /
tcp
-1733106930 | 2025-04-14T17:36:43.576068
Mysql Version: 5.6.50-log\nN\n5.6.50-log\x14(\nG5se"tGE\xc3\xbf\xc3\xb7-\x02\x7f\xc2\x80\x15cB^3$Zwh$wM[mysql_native_password
4455 /
tcp
-1795027372 | 2025-04-11T09:11:39.713566
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
4524 /
tcp
-1996280214 | 2025-04-21T20:47:54.905350
4545 /
tcp
-1428621233 | 2025-03-26T16:24:28.121195
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
4643 /
tcp
1975288991 | 2025-03-29T02:20:32.281102
4734 /
tcp
165188539 | 2025-04-18T21:02:34.347381
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
4786 /
tcp
-1329831334 | 2025-04-21T05:02:14.630590
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
4808 /
tcp
-904840257 | 2025-04-05T22:40:27.312422
572 Relay not authorized\r\n
4840 /
tcp
-358801646 | 2025-04-04T01:28:00.546123
4899 /
tcp
233634112 | 2025-04-18T03:01:53.330750
SSH-98.60-SysaxSSH_81885..42
4911 /
tcp
165188539 | 2025-04-05T19:37:40.036213
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
5001 /
tcp
-971970408 | 2025-04-16T11:49:18.637155
5007 /
tcp
-1099385124 | 2025-04-20T20:42:45.775269
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
5009 /
tcp
1472866667 | 2025-04-10T11:48:07.425719
5010 /
tcp
1911457608 | 2025-03-26T06:17:39.369487
\x00[\x00\x00\x00\x00\x00\x00
5025 /
tcp
957278843 | 2025-04-19T19:57:00.307333
5070 /
tcp
165188539 | 2025-04-17T01:57:41.399812
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
5130 /
tcp
740837454 | 2025-04-20T01:50:47.536490
SSH-2.0-OpenSSH_5.3
Vulnerabilities
5201 /
tcp
1948301213 | 2025-04-15T22:51:04.738156
RFB 003.003
VNC:
Protocol Version: 3.3
-1839934832 | 2025-04-18T12:04:24.100834
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
5222 /
tcp
-971970408 | 2025-03-31T21:59:26.841410
5246 /
tcp
-1996280214 | 2025-04-23T00:06:11.783821
5247 /
tcp
1911457608 | 2025-04-03T04:03:28.777839
\x00[\x00\x00\x00\x00\x00\x00
5262 /
tcp
-1399940268 | 2025-03-28T06:51:52.869657
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5321 /
tcp
-1835475271 | 2025-03-24T19:18:17.593382
200 NOD32SS 99 (3318497116)\r\n
5432 /
tcp
-1032713145 | 2025-04-01T15:38:37.231007
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
5435 /
tcp
-2089734047 | 2025-04-22T21:15:19.326903
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
5440 /
tcp
-1641514916 | 2025-04-10T20:26:56.581560
* OK Merak 1dFUa2 IMAP4rev1
5443 /
tcp
-274082663 | 2025-04-08T12:55:59.439476
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
-1839934832 | 2025-04-17T09:23:52.763339
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
5552 /
tcp
-2089734047 | 2025-04-11T18:13:07.766251
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
5556 /
tcp
-1399940268 | 2025-04-06T20:33:54.721785
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5557 /
tcp
1911457608 | 2025-04-20T21:01:22.480450
\x00[\x00\x00\x00\x00\x00\x00
5592 /
tcp
1011407350 | 2025-04-11T08:11:38.811144
* OK GroupWise IMAP4rev1 Server Ready\r\n
5596 /
tcp
165188539 | 2025-04-21T02:47:04.120349
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
5605 /
tcp
-1399940268 | 2025-04-17T16:55:11.197032
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5640 /
tcp
921225407 | 2025-04-08T21:17:41.462496
\x00\x00\x00\x04\x00\x00\x00\x00\x00
5721 /
tcp
709622286 | 2025-04-09T01:03:08.930666
OK Welcome <299685> on DirectUpdate server 7286\r\n
5853 /
tcp
321971019 | 2025-04-19T21:45:59.821551
-ERR client ip is not in whitelist\r
5908 /
tcp
1574088840 | 2025-04-12T18:12:32.709904
">Application and Content Networking Software 3.9</a>)\n</BODY><
5909 /
tcp
1623746877 | 2025-04-05T18:02:38.715967
500 Permission denied - closing connection.\r\n
5938 /
tcp
1426971893 | 2025-04-21T23:26:27.719636
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
5986 /
tcp
-2096652808 | 2025-04-18T15:08:20.650211
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
5992 /
tcp
819727972 | 2025-04-15T18:26:50.024310
SSH-2.0-OpenSSH_7.4
Vulnerabilities
6000 /
tcp
120534451 | 2025-04-08T06:59:01.451034
6001 /
tcp
-1399940268 | 2025-04-22T18:28:24.885277
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6005 /
tcp
-122096153 | 2025-04-10T02:17:57.491531
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
-1045760528 | 2025-04-22T17:49:05.068203
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
6036 /
tcp
-2089734047 | 2025-04-18T07:28:26.057561
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
6161 /
tcp
-585940771 | 2025-04-14T15:58:50.360685
6264 /
tcp
677934968 | 2025-04-12T12:37:34.925892
6379 /
tcp
321971019 | 2025-04-23T00:18:05.455317
-ERR client ip is not in whitelist\r
6433 /
tcp
921225407 | 2025-04-19T07:28:17.458118
\x00\x00\x00\x04\x00\x00\x00\x00\x00
-1021929371 | 2025-04-15T17:10:10.743727
HTTP/1.1 302 Moved Temporarily
Server: nginx/1.22.1
Date: Tue, 15 Apr 2025 17:10:10 GMT
Content-Type: text/html
Content-Length: 145
Connection: close
Location: https://39.103.1.2:443/
<html>
<head><title>302 Found</title></head>
<body>
<center><h1>302 Found</h1></center>
<hr><center>nginx/1.22.1</center>
</body>
</html>
6482 /
tcp
-832380282 | 2025-04-10T12:55:31.869901
lpd [@Boyk]: Print-services are not available to your host (aF2qXkQ2m).\n
6513 /
tcp
1212285915 | 2025-04-04T16:42:20.209808
\x00K\x00\x00\x02\x00\x00\x00%~)J/\\tHjU(IAGENT = (AGENT_VERSION = 2388790170)(RPC_VERSION = 5..722))
6601 /
tcp
819727972 | 2025-03-29T14:24:39.504288
SSH-2.0-OpenSSH_7.4
Vulnerabilities
6602 /
tcp
-1399940268 | 2025-04-03T23:09:22.860620
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6622 /
tcp
-1399940268 | 2025-04-21T03:14:03.191404
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4935895 | 2025-04-16T12:45:24.095038
HTTP/1.1 400 Bad Request
Server: CloudWAF
6668 /
tcp
-1399940268 | 2025-04-17T13:11:59.608251
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6697 /
tcp
-1428621233 | 2025-04-21T19:23:40.732831
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
1265582946 | 2025-04-14T20:53:11.487205
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae2838_PS-JJN-01GM465_27752-26327
7006 /
tcp
-1399940268 | 2025-04-06T17:08:27.464715
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
7021 /
tcp
-2089734047 | 2025-04-23T08:05:53.019542
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
7022 /
tcp
632542934 | 2025-04-11T19:36:16.844322
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
7057 /
tcp
-1399940268 | 2025-04-12T17:17:10.060985
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
941003269 | 2025-04-20T07:32:45.327868
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae245d_PS-WNZ-01DGy105_39693-41227
1077013874 | 2025-04-06T17:11:45.558475
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
7171 /
tcp
707919486 | 2025-04-21T01:55:08.164048
\x00\x06\xc2\x81\xc2\x81\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
7218 /
tcp
1887224352 | 2025-04-03T19:43:36.942098
7349 /
tcp
1911457608 | 2025-04-11T21:52:02.276362
\x00[\x00\x00\x00\x00\x00\x00
1342763855 | 2025-04-22T21:33:08.239913
HTTP/1.1 302 Moved Temporarily
Content-Type: text/html
Connection: close
Server: Nginx
Expires: 0
Pragma: no-cache
Cache-Control: no-cache
X-LANG: 1
X-Timezone: 0800
X-Timestamp: 1705912071
X-Arch: x86
X-Sysbit: x64
X-Enterprise: 0
X-Support-i18n: 0
X-Support-wifi: 0
Location: /login
7548 /
tcp
2087396567 | 2025-04-16T17:32:46.016919
kjnkjabhbanc283ubcsbhdc72
7773 /
tcp
-1476017887 | 2025-03-31T11:21:04.567280
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
7774 /
tcp
1308377066 | 2025-04-17T21:41:56.758934
8000 /
tcp
-1036370807 | 2025-04-09T03:59:44.232487
8005 /
tcp
-2089734047 | 2025-04-10T03:17:12.554715
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8006 /
tcp
597764502 | 2025-04-19T20:18:59.833379
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
8009 /
tcp
671605376 | 2025-04-23T10:37:26.621123
8012 /
tcp
504717326 | 2025-04-09T22:24:15.702600
SSH-2.0-OpenSSH_8.6
Vulnerabilities
8015 /
tcp
-1899074860 | 2025-03-25T19:33:30.273626
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00\x00\x00\n03\x00\x00\x00d\x00\x04\x00\x01\x00\x00\x00\x00\x04\x08\x00\x00\x00\n
-80596172 | 2025-04-06T18:40:30.202829
HTTP/1.1 200 OK
Cache-Control: no-cache
Connection: keep-alive
Content-Type: text/html; charset=UTF-8
Pramga: no-cache
Server: E2EE Server 2.0
X-Powered-By: E2EE
8036 /
tcp
-1399940268 | 2025-04-18T18:42:10.501011
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1352007528 | 2025-04-08T16:57:47.601962
HTTP/1.1 503 Service Unavailable
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 14-14834758-0 0NNN RT(1705363874694 121) q(0 -1 -1 -1) r(0 -1)
8053 /
tcp
819727972 | 2025-03-28T22:35:59.240687
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1839934832 | 2025-04-22T13:57:55.024972
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
-1013082686 | 2025-04-18T21:37:05.687420
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
8072 /
tcp
-1399940268 | 2025-04-14T22:24:31.056060
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1013082686 | 2025-04-15T05:41:00.768640
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
8081 /
tcp
-971970408 | 2025-04-19T20:31:16.151811
8083 /
tcp
1842524259 | 2025-04-21T12:32:28.742302
8084 /
tcp
-1399940268 | 2025-03-29T07:04:16.915069
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8087 /
tcp
1504401647 | 2025-04-04T18:27:02.036637
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
623236583 | 2025-04-03T03:46:31.789134
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae293a_dedxin34_19677-349
8124 /
tcp
-1399940268 | 2025-04-03T03:59:05.909588
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8138 /
tcp
819727972 | 2025-03-24T19:37:36.175818
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8146 /
tcp
-1399940268 | 2025-03-27T06:39:14.162491
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8162 /
tcp
819727972 | 2025-04-02T03:32:21.566337
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8168 /
tcp
-2089734047 | 2025-04-03T11:46:02.983130
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8169 /
tcp
-1019343788 | 2025-04-20T21:41:14.577602
8174 /
tcp
-1399940268 | 2025-04-14T19:54:12.808301
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8178 /
tcp
820958131 | 2025-04-11T20:53:23.952740
kjnkjabhbanc283ubcsbhdc72\x02
8181 /
tcp
-1026951088 | 2025-04-11T04:47:08.519007
8200 /
tcp
-877598700 | 2025-04-22T07:07:09.048603
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\\x01\xc3\xbf\xc3\xbb\\x03\xc3\xbf\xc3\xbd\\x01\xc3\xbf\xc3\xbe\\x01Username:
8251 /
tcp
1911457608 | 2025-04-15T23:23:07.558607
\x00[\x00\x00\x00\x00\x00\x00
8291 /
tcp
1308377066 | 2025-04-21T12:48:27.673939
-1713467553 | 2025-04-09T11:59:08.954715
HTTP/1.1 400 Bad Request
Content-Type: text/html; charset=us-ascii
Server: Microsoft-HTTPAPI/2.0
Connection: close
8384 /
tcp
-454087041 | 2025-03-28T00:03:32.590070
\x1e\xc3\x80\x010\x02\x00\xc2\xa8\xc3\xa3\x00\x00\x00\x00
1077013874 | 2025-04-20T03:11:52.102614
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
8430 /
tcp
1574088840 | 2025-04-08T05:33:31.178522
">Application and Content Networking Software 3.9</a>)\n</BODY><
8435 /
tcp
1911457608 | 2025-04-06T06:57:46.913969
\x00[\x00\x00\x00\x00\x00\x00
8449 /
tcp
819727972 | 2025-04-14T19:58:17.686140
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8454 /
tcp
-2089734047 | 2025-04-19T20:32:41.038180
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
8493 /
tcp
-146605374 | 2025-04-22T17:40:11.536136
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
1652191202 | 2025-04-20T18:10:31.899500
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae296b_PS-NTG-014eQ157_14943-13699
8510 /
tcp
1911457608 | 2025-04-10T17:59:43.188550
\x00[\x00\x00\x00\x00\x00\x00
8524 /
tcp
1543809371 | 2025-04-15T14:14:24.944784
220 corpease.net Anti-spam GT for Coremail System (icmhosting[2\n0181212])
8526 /
tcp
-358801646 | 2025-04-10T08:36:40.727552
8545 /
tcp
321971019 | 2025-04-19T11:03:51.727196
-ERR client ip is not in whitelist\r
8548 /
tcp
-1140468363 | 2025-04-07T19:24:57.844904
8549 /
tcp
-146605374 | 2025-04-20T19:36:10.927435
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
8550 /
tcp
-1140468363 | 2025-04-05T20:01:40.687818
8551 /
tcp
-1140468363 | 2025-04-03T23:51:59.989882
8558 /
tcp
-1399940268 | 2025-03-28T03:48:37.879463
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8575 /
tcp
408230060 | 2025-04-15T18:52:47.080740
\r\nSorry, that nickname format is invalid.\r\n
8583 /
tcp
1911457608 | 2025-04-20T17:23:40.336942
\x00[\x00\x00\x00\x00\x00\x00
8586 /
tcp
-805362002 | 2025-04-17T14:16:37.831570
ICAP/1.0 501 Other
Server: Traffic Spicer 7788179225
8590 /
tcp
165188539 | 2025-04-09T21:46:13.050078
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8594 /
tcp
632542934 | 2025-03-28T11:14:59.649716
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
8621 /
tcp
-1611764932 | 2025-03-26T17:29:34.217113
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
8649 /
tcp
842535728 | 2025-04-10T00:36:47.418604
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>
A<!DOCTYPE GANGLIA_XML [
<!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...
8686 /
tcp
-1399940268 | 2025-03-24T22:45:17.176437
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8709 /
tcp
-1538260461 | 2025-04-08T17:29:05.921698
8728 /
tcp
165188539 | 2025-04-01T19:54:36.405423
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
8779 /
tcp
-375604792 | 2025-03-31T21:07:25.148528
220 Microsoft FTP Service
8782 /
tcp
-891714208 | 2025-04-19T18:56:50.698575
( success ( 2 2 ( ) ( edit-pipeline svndiff1 absent-entries com\nmit-revprops depth log-revprops partial-replay ) ) )
8812 /
tcp
1948301213 | 2025-03-31T22:24:18.015270
RFB 003.003
VNC:
Protocol Version: 3.3
8815 /
tcp
1948301213 | 2025-04-15T03:24:06.574794
RFB 003.003
VNC:
Protocol Version: 3.3
8821 /
tcp
504717326 | 2025-04-07T18:45:40.225323
SSH-2.0-OpenSSH_8.6
Vulnerabilities
8833 /
tcp
-1399940268 | 2025-04-11T10:55:47.277594
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8834 /
tcp
472902042 | 2025-04-01T11:33:37.911808
"Magic:ActiveMQ
Version:12
<ActiveMQ*TcpNoDelayEnabledSizePrefixDisabled CacheSizeProviderName ActiveMQStackTraceEnabledPlatformDetails JavaCacheEnabledTightEncodingEnabledMaxFrameSize@MaxInac
8847 /
tcp
-2033111675 | 2025-03-25T00:48:52.718950
8874 /
tcp
-1399940268 | 2025-04-19T16:52:09.819358
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8875 /
tcp
1620329124 | 2025-03-28T20:03:24.856072
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\x01\xc3\xbf\xc3\xbb\x03\xc3\xbf\xc3\xbd\x01\xc3\xbf\xc3\xbe\x01Username:
8891 /
tcp
-1598265216 | 2025-04-02T14:47:31.032708
372433470 | 2025-04-08T10:08:24.546232
HTTP/1.1 407 Proxy Authentication Required
Proxy-Authenticate: Basic realm=""
8901 /
tcp
-1261090339 | 2025-04-07T06:25:32.099179
\x00[l\xc2\xb6\xc3\x90\x7f\x00\x00
8912 /
tcp
677934968 | 2025-03-26T10:00:19.930153
8935 /
tcp
-358801646 | 2025-04-06T12:13:09.722368
9000 /
tcp
-2067028711 | 2025-03-31T19:09:36.218128
\x15\x03\x01\x00\x02\x02F
9003 /
tcp
-2089734047 | 2025-03-27T18:48:52.357421
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9004 /
tcp
-1730858130 | 2025-04-18T01:05:01.238274
RFB 003.008
VNC:
Protocol Version: 3.8
9028 /
tcp
1911457608 | 2025-04-17T21:00:56.581426
\x00[\x00\x00\x00\x00\x00\x00
9036 /
tcp
921225407 | 2025-04-21T07:06:52.714189
\x00\x00\x00\x04\x00\x00\x00\x00\x00
9042 /
tcp
819727972 | 2025-04-04T19:42:08.999226
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9052 /
tcp
921225407 | 2025-04-05T02:11:23.237624
\x00\x00\x00\x04\x00\x00\x00\x00\x00
9064 /
tcp
-441419608 | 2025-04-08T05:46:10.062315
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
9076 /
tcp
-653033013 | 2025-04-19T16:21:50.424554
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
9088 /
tcp
-441419608 | 2025-04-15T11:03:16.627364
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
9089 /
tcp
632542934 | 2025-04-22T02:57:45.610500
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
9091 /
tcp
2087396567 | 2025-04-20T12:57:47.030769
kjnkjabhbanc283ubcsbhdc72
9092 /
tcp
1911457608 | 2025-04-22T01:13:15.678673
\x00[\x00\x00\x00\x00\x00\x00
9095 /
tcp
1842524259 | 2025-04-09T11:42:24.424062
-1045760528 | 2025-04-20T14:58:41.714064
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
9103 /
tcp
-1399940268 | 2025-04-15T16:13:52.618514
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9108 /
tcp
921225407 | 2025-03-28T21:54:30.894655
\x00\x00\x00\x04\x00\x00\x00\x00\x00
9118 /
tcp
1615193817 | 2025-03-28T19:48:06.145220
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
9122 /
tcp
-457235091 | 2025-04-10T03:50:58.611825
audio 0 RTP/AVP 18 4 3 8 0 101\r\na
9131 /
tcp
-1399940268 | 2025-04-08T10:04:55.051473
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9148 /
tcp
-1399940268 | 2025-03-29T08:33:50.596328
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9151 /
tcp
660175493 | 2025-04-21T17:47:25.105260
9157 /
tcp
-1888448627 | 2025-04-19T17:05:13.324978
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9158 /
tcp
-274082663 | 2025-04-04T08:28:30.149056
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
9160 /
tcp
-1399940268 | 2025-03-29T02:12:20.156295
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9161 /
tcp
-1399940268 | 2025-04-22T20:03:32.958977
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9188 /
tcp
745343730 | 2025-04-23T13:29:40.442509
220 smtp.qq.com Esmtp QQ Mail Server
9195 /
tcp
-1399940268 | 2025-04-21T21:28:14.166517
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9196 /
tcp
1189133115 | 2025-04-20T12:41:48.368286
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
9199 /
tcp
-1059554316 | 2025-04-16T22:41:27.859699
\xc2\xa5A\x00\x01\x00\x00\x00,\x00\x00\x00\x02\x00\x00\x00L\x00\x00\x00\x08Connect\x00\x00\x00\x00x\x00\x00\x00\x0857222\x00\x00\x00
9204 /
tcp
1911457608 | 2025-04-23T14:28:43.784596
\x00[\x00\x00\x00\x00\x00\x00
9212 /
tcp
1911457608 | 2025-04-22T17:30:18.187664
\x00[\x00\x00\x00\x00\x00\x00
9223 /
tcp
1762042191 | 2025-04-15T18:22:49.943432
9243 /
tcp
1189133115 | 2025-03-28T19:46:51.037879
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
9247 /
tcp
-1399940268 | 2025-04-15T22:43:02.475103
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9248 /
tcp
1210754493 | 2025-04-20T20:36:40.117679
0\x0c\x02\x01\x01a\x07\n\x01\x00\x04\x00\x04\x00
9251 /
tcp
819727972 | 2025-03-29T19:53:29.457284
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9257 /
tcp
-358801646 | 2025-04-05T06:57:29.551926
9292 /
tcp
-1996280214 | 2025-04-22T02:14:29.617237
9299 /
tcp
580340387 | 2025-04-08T08:43:32.056706
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
9300 /
tcp
-1036370807 | 2025-04-11T10:38:55.022163
9306 /
tcp
1615193817 | 2025-04-05T11:34:53.435419
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
1830697416 | 2025-04-22T00:53:59.565650
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
9350 /
tcp
1911457608 | 2025-04-12T01:57:51.603154
\x00[\x00\x00\x00\x00\x00\x00
9353 /
tcp
819727972 | 2025-04-15T09:44:42.063971
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9398 /
tcp
1082732927 | 2025-04-17T12:45:54.629224
STAT pid 1660
STAT uptime 28884
STAT time 1641290377
STAT version 1.2.1
STAT pointer_size 32
STAT curr_items 14
STAT total_items 3533
STAT bytes 30524
STAT curr_connections 1
STAT total_connections 3542
STAT connection_structures 3
STAT cmd_get 3533
STAT cmd_set 3533
STAT get_hits 3519
STAT get_misses 14
STAT bytes_read 7927780
STAT bytes_written 7848552
STAT limit_maxbytes 67108864
END
9400 /
tcp
-1399940268 | 2025-04-05T18:19:57.840127
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-833168972 | 2025-04-17T10:17:42.570849
HTTP/1.1 200
Content-Type: text/html;charset=UTF-8
Transfer-Encoding: chunked
9455 /
tcp
819727972 | 2025-04-07T21:54:05.999121
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9532 /
tcp
2063598737 | 2025-04-19T07:34:48.793701
9690 /
tcp
-1899074860 | 2025-04-11T05:14:00.880469
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00\x00\x00\n03\x00\x00\x00d\x00\x04\x00\x01\x00\x00\x00\x00\x04\x08\x00\x00\x00\n
9704 /
tcp
165188539 | 2025-03-25T21:01:07.174302
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
9743 /
tcp
321971019 | 2025-04-07T14:28:01.766691
-ERR client ip is not in whitelist\r
9754 /
tcp
321971019 | 2025-04-03T06:57:04.952493
-ERR client ip is not in whitelist\r
9761 /
tcp
-1888448627 | 2025-04-04T11:06:11.758957
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
-2118655245 | 2025-04-11T19:55:34.954559
HTTP/1.0 500 Internal Server Error
Content-Length: 20
-1013082686 | 2025-04-17T01:25:12.683286
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
9861 /
tcp
-1888448627 | 2025-04-04T21:58:01.789609
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9876 /
tcp
2070013657 | 2025-04-21T21:37:40.138758
\\x00\\x00\\x01+\\x00\\x00\\x00_{"code":0,"flag":1,"language":"JAVA","opaque":0,"serializeTypeCurrentRPC":"JSON","version":433}{"brokerAddrTable":{"broker-a":{"brokerAddrs":{0:"127.63.135.245:10911"},"brokerName":"broker-a","cluster":"DefaultCluster","enableActingMaster":false}},"clusterAddrTable":{"DefaultCluster":["broker-a"]}}
9885 /
tcp
-122096153 | 2025-03-26T22:28:04.452487
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
9908 /
tcp
819727972 | 2025-04-15T22:51:38.028089
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9909 /
tcp
-1399940268 | 2025-04-07T13:31:08.459332
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9916 /
tcp
-1399940268 | 2025-04-20T01:15:04.823198
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
491999737 | 2025-04-12T02:37:07.947526
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
WZWS-RAY: 1249-1705935095.837-s5jhg
9944 /
tcp
819727972 | 2025-03-28T01:37:30.332263
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9992 /
tcp
-2089734047 | 2025-04-19T21:37:53.398162
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1969772007 | 2025-03-25T19:09:51.442527
HTTP/1.1 400 Bad Request
Connection: keep-alive
Connection: close
X-Via-JSL: c973153,-
X-Cache: error
9999 /
tcp
1161309183 | 2025-04-06T11:20:07.472597
10011 /
tcp
307999478 | 2025-04-11T20:55:34.502613
unknown command \r\nunknown command \r\n
10050 /
tcp
-2096652808 | 2025-04-12T00:11:29.774105
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
10051 /
tcp
-2081419599 | 2025-03-25T20:03:14.111931
10134 /
tcp
632542934 | 2025-04-21T03:58:21.694022
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
10250 /
tcp
-1392039491 | 2025-04-17T22:36:50.528564
"Broadband Router"
<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD><BODY onLoad
10380 /
tcp
-1139539254 | 2025-03-29T02:34:11.522916
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
10393 /
tcp
-1399940268 | 2025-04-22T13:13:47.094664
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10397 /
tcp
-1795027372 | 2025-04-17T21:47:03.944414
\xc3\xbf\xc3\xbd"\r\nLinuxNode v06953 (ggfks)\r\n\r\nlogin:
-1045760528 | 2025-04-03T05:17:24.156837
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
10477 /
tcp
-1746074029 | 2025-04-03T18:27:17.178825
10554 /
tcp
-952165951 | 2025-04-15T22:30:40.910423
10933 /
tcp
1911457608 | 2025-04-14T18:24:22.365083
\x00[\x00\x00\x00\x00\x00\x00
11000 /
tcp
1574088840 | 2025-04-10T18:08:35.520003
">Application and Content Networking Software 3.9</a>)\n</BODY><
11027 /
tcp
165188539 | 2025-04-03T04:54:19.758353
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
11112 /
tcp
-1713437100 | 2025-03-26T20:44:24.315008
\xc3\xbf\xc3\xbb\x01\r\nWelcome to NetLinx v94 Copyright AMX Corp. 34395-49007\r\n>
11210 /
tcp
1911457608 | 2025-04-12T02:49:59.061936
\x00[\x00\x00\x00\x00\x00\x00
-1045760528 | 2025-04-09T04:02:42.665551
HTTP/1.1 302 Found
Connection: close
Location: http://*.*.*.*/solr/
11300 /
tcp
1911457608 | 2025-04-15T20:16:48.898483
\x00[\x00\x00\x00\x00\x00\x00
227700176 | 2025-04-16T05:40:27.326614
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding
Cache-Control: no-store, no-transform
Set-Cookie: _csrf=kW6lEf7WlBTiDChV5oht1zfpUBE6MTcwNTkxMjc1NjU1NzkzNjYwNQ; Path=/; Expires=Tue, 23 Jan 2024 08:39:16 GMT; HttpOnly; SameSite=Lax
Set-Cookie: macaron_flash=; Path=/; Max-Age=0; HttpOnly; SameSite=Lax
X-Frame-Options: SAMEORIGIN
Cache-Control: no-cache
12019 /
tcp
-1888448627 | 2025-04-15T18:08:30.956831
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12106 /
tcp
580340387 | 2025-04-10T01:29:08.301598
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
12132 /
tcp
119860953 | 2025-04-20T19:24:12.245689
* OK ArGoSoft Mail Server IMAP Module v.YW at
12136 /
tcp
-1399940268 | 2025-04-20T07:40:21.663297
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12146 /
tcp
-2031152423 | 2025-04-03T06:55:20.531356
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
12183 /
tcp
-1399940268 | 2025-04-19T17:05:31.291554
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12184 /
tcp
819727972 | 2025-03-27T13:24:20.691114
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12188 /
tcp
-2096652808 | 2025-04-02T02:53:25.020813
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12190 /
tcp
-2096652808 | 2025-04-12T12:07:12.763219
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12202 /
tcp
1492413928 | 2025-04-11T22:23:33.767136
SSH-2.0-OpenSSH_7.5
Vulnerabilities
12204 /
tcp
-1399940268 | 2025-04-12T22:10:14.787427
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12208 /
tcp
819727972 | 2025-03-29T05:38:55.275804
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12210 /
tcp
921225407 | 2025-04-05T20:15:59.666063
\x00\x00\x00\x04\x00\x00\x00\x00\x00
12220 /
tcp
-2033111675 | 2025-03-25T08:46:22.394387
12227 /
tcp
-1399940268 | 2025-03-26T19:14:50.189938
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12243 /
tcp
819727972 | 2025-04-03T23:46:41.443185
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12272 /
tcp
632542934 | 2025-03-28T19:32:47.186842
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
12286 /
tcp
-1888448627 | 2025-04-03T04:47:31.885463
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
1282941221 | 2025-04-08T13:15:34.815134
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
12295 /
tcp
1911457608 | 2025-04-04T09:58:18.722611
\x00[\x00\x00\x00\x00\x00\x00
12297 /
tcp
-653033013 | 2025-03-29T12:41:40.916441
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
1282941221 | 2025-04-22T10:04:56.368468
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
12316 /
tcp
321971019 | 2025-03-25T11:59:24.326058
-ERR client ip is not in whitelist\r
12318 /
tcp
-1399940268 | 2025-03-28T00:02:19.340451
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12322 /
tcp
1726594447 | 2025-04-18T06:10:41.143462
\r\n\nLantronix MSS100 Version V118/523(045538937)\n\r\nType HELP at the \'Local_61349> \' prompt for assistance.\n\r\n\r\n\nUsername>
142594048 | 2025-04-16T12:04:52.471211
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae29bb_CS-000-01pYi173_32176-13938
12354 /
tcp
398077695 | 2025-04-01T12:47:10.622179
12389 /
tcp
-1746074029 | 2025-04-16T06:16:20.364777
-2107996212 | 2025-04-17T19:05:17.398045
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
12409 /
tcp
921225407 | 2025-04-11T04:51:54.295245
\x00\x00\x00\x04\x00\x00\x00\x00\x00
12411 /
tcp
-1399940268 | 2025-04-22T14:19:34.133322
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12431 /
tcp
-1399940268 | 2025-03-27T12:54:24.542231
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12434 /
tcp
639175818 | 2025-04-20T16:13:44.518331
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
12435 /
tcp
1911457608 | 2025-04-20T06:33:40.103224
\x00[\x00\x00\x00\x00\x00\x00
12436 /
tcp
-1399940268 | 2025-04-16T22:13:29.736180
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12437 /
tcp
-1399940268 | 2025-04-19T16:14:23.011019
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12442 /
tcp
-136006866 | 2025-04-22T01:44:26.781524
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
12446 /
tcp
-1888448627 | 2025-03-28T11:55:30.040593
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12449 /
tcp
-142686627 | 2025-04-02T21:10:49.795540
\x00[\xc2\xba\x7fs\x7f\x00\x00
12453 /
tcp
1308377066 | 2025-04-18T04:13:38.952147
12471 /
tcp
-1648456501 | 2025-04-04T22:29:53.946944
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
12476 /
tcp
-142686627 | 2025-03-25T16:02:00.634767
\x00[\xc2\xba\x7fs\x7f\x00\x00
12491 /
tcp
1911457608 | 2025-04-07T14:38:08.030519
\x00[\x00\x00\x00\x00\x00\x00
12500 /
tcp
-358801646 | 2025-04-04T12:51:31.148350
1077013874 | 2025-04-21T19:17:39.605922
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
12514 /
tcp
671605376 | 2025-03-25T00:49:05.726850
12521 /
tcp
51259122 | 2025-04-12T00:09:29.264935
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
12530 /
tcp
-1329831334 | 2025-04-03T00:41:02.364711
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
12558 /
tcp
669849225 | 2025-04-12T17:50:16.850393
SSH-98.60-SysaxSSH_81885..42\r\n
12571 /
tcp
1911457608 | 2025-04-20T19:43:53.997449
\x00[\x00\x00\x00\x00\x00\x00
12574 /
tcp
-2031152423 | 2025-04-17T21:29:47.875789
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
12580 /
tcp
819727972 | 2025-03-27T17:56:38.471655
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12586 /
tcp
307999478 | 2025-03-25T21:29:57.840022
unknown command \r\nunknown command \r\n
13084 /
tcp
-653033013 | 2025-04-23T12:00:24.572686
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
14024 /
tcp
1911457608 | 2025-03-26T17:57:55.233546
\x00[\x00\x00\x00\x00\x00\x00
14082 /
tcp
-2089734047 | 2025-04-08T10:57:38.450476
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
14130 /
tcp
709622286 | 2025-04-05T20:21:17.602530
OK Welcome <299685> on DirectUpdate server 7286\r\n
-1230049476 | 2025-04-04T20:58:29.254368
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
14344 /
tcp
-1399940268 | 2025-04-15T06:45:12.078014
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
14873 /
tcp
1161309183 | 2025-03-27T18:08:05.546872
14896 /
tcp
639175818 | 2025-04-21T18:18:21.225286
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
14903 /
tcp
-2096652808 | 2025-04-18T03:59:25.430754
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
14909 /
tcp
366084633 | 2025-03-26T19:24:54.770265
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
15443 /
tcp
380146262 | 2025-04-07T01:24:01.142185
15502 /
tcp
-2089734047 | 2025-04-01T03:05:41.821293
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
16008 /
tcp
1504401647 | 2025-04-22T16:40:36.595067
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
16010 /
tcp
1690634669 | 2025-04-01T02:43:49.717213
16017 /
tcp
1278527606 | 2025-04-21T10:18:57.083281
16020 /
tcp
1308377066 | 2025-04-16T11:22:40.258123
16023 /
tcp
1911457608 | 2025-04-10T02:24:16.442479
\x00[\x00\x00\x00\x00\x00\x00
-288825733 | 2025-04-15T09:27:19.234784
HTTP/1.1 200 OK
Connection: close
Content-Length: 2619
Accept-Ranges: bytes
Access-Control-Allow-Credentials: true
Access-Control-Allow-Headers: authorization,Content-Type
Access-Control-Allow-Methods: POST, GET, OPTIONS, PUT, HEAD, DELETE
Content-Type: text/html
Server: Jetty(9.4.14.v20181114)
X-Frame-Options: SAMEORIGIN
X-Xss-Protection: 1
16042 /
tcp
-441419608 | 2025-04-20T07:27:08.680195
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
16044 /
tcp
1911457608 | 2025-04-07T18:05:57.828221
\x00[\x00\x00\x00\x00\x00\x00
16064 /
tcp
-2089734047 | 2025-04-14T23:49:29.538637
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
16066 /
tcp
-2089734047 | 2025-04-09T08:36:46.494053
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
16091 /
tcp
1911457608 | 2025-04-01T09:19:22.961754
\x00[\x00\x00\x00\x00\x00\x00
16093 /
tcp
709622286 | 2025-03-27T02:56:45.341500
OK Welcome <299685> on DirectUpdate server 7286\r\n
16094 /
tcp
1911457608 | 2025-04-01T10:23:48.607228
\x00[\x00\x00\x00\x00\x00\x00
16464 /
tcp
171352214 | 2025-04-02T10:02:35.010124
-ERR client ip is not in whitelist
16992 /
tcp
-1118605404 | 2025-03-31T09:47:29.269162
220 barracuda.dhc.com.cn ESMTP (0985ecb3f26d489aa5d50a88583d05e6)
17000 /
tcp
-1810987450 | 2025-04-03T19:36:08.879778
17774 /
tcp
-1399940268 | 2025-03-25T12:02:33.460628
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
17776 /
tcp
-1538260461 | 2025-04-15T06:46:26.771936
18005 /
tcp
117101543 | 2025-04-01T17:09:07.157215
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
18008 /
tcp
-1327660293 | 2025-04-21T23:39:28.232648
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
18010 /
tcp
632542934 | 2025-04-18T21:10:13.474921
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
18019 /
tcp
-2089734047 | 2025-04-05T19:56:25.570082
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
18022 /
tcp
1911457608 | 2025-04-02T02:36:36.724387
\x00[\x00\x00\x00\x00\x00\x00
18030 /
tcp
-441419608 | 2025-03-24T22:38:58.715086
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
18031 /
tcp
-1399940268 | 2025-04-17T17:56:37.727706
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18033 /
tcp
1011407350 | 2025-04-05T02:27:32.133877
* OK GroupWise IMAP4rev1 Server Ready\r\n
18036 /
tcp
-1476017887 | 2025-04-11T13:28:52.147078
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
18051 /
tcp
-1399940268 | 2025-03-26T20:27:13.039122
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18052 /
tcp
-2140303521 | 2025-04-16T03:57:09.683969
protocolErrorInf error=Missing hw string from : null. Check hardware state=disconnected\n
18053 /
tcp
-1399940268 | 2025-03-31T22:16:52.683447
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18060 /
tcp
-1399940268 | 2025-04-11T17:12:33.601719
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18075 /
tcp
-1297953727 | 2025-04-14T17:08:37.670215
\x02\x00\x00\x00\x00\x00\x06\x04\x00\x00\x00\x00\x00\x0c\x00\x00\n0\x00\x1c
18081 /
tcp
459162008 | 2025-04-09T09:01:27.807212
18099 /
tcp
-1148066627 | 2025-04-03T14:32:18.411648
\x00[\xc2\x84\xc2\x86\xc3\xb2\x7f\x00\x00
156877613 | 2025-04-12T00:31:27.873499
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65a1140e_PSfjfzdx2zb89_9370-53200
18102 /
tcp
-303199180 | 2025-04-23T16:33:16.036095
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
18104 /
tcp
632542934 | 2025-03-31T20:10:44.898602
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
18109 /
tcp
1911457608 | 2025-04-01T19:56:42.978310
\x00[\x00\x00\x00\x00\x00\x00
18112 /
tcp
1911457608 | 2025-04-10T21:39:56.807930
\x00[\x00\x00\x00\x00\x00\x00
18182 /
tcp
-2096652808 | 2025-04-07T02:01:03.370732
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
18245 /
tcp
1690634669 | 2025-04-04T00:01:50.544144
18443 /
tcp
472902042 | 2025-04-08T01:06:04.182155
"Magic:ActiveMQ
Version:12
<ActiveMQ*TcpNoDelayEnabledSizePrefixDisabled CacheSizeProviderName ActiveMQStackTraceEnabledPlatformDetails JavaCacheEnabledTightEncodingEnabledMaxFrameSize@MaxInac
18553 /
tcp
1690634669 | 2025-04-06T21:32:39.732697
0 | 2025-04-21T17:38:24.820164
HTTP/1.1 408 Request Timeout
Content-Length: 0
19200 /
tcp
366084633 | 2025-03-27T20:00:02.616090
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
2103111368 | 2025-04-03T19:05:16.940922
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
20001 /
tcp
1911457608 | 2025-04-23T03:39:21.805213
\x00[\x00\x00\x00\x00\x00\x00
20053 /
tcp
119860953 | 2025-04-01T09:36:08.536899
* OK ArGoSoft Mail Server IMAP Module v.YW at
20087 /
tcp
-641479109 | 2025-04-03T01:15:12.555443
20107 /
tcp
-653033013 | 2025-04-12T22:07:51.973246
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
20202 /
tcp
-1399940268 | 2025-03-29T06:26:52.654207
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
20547 /
tcp
-1032713145 | 2025-04-12T22:16:35.061889
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
20880 /
tcp
1370263973 | 2025-04-01T11:42:16.370183
21002 /
tcp
165188539 | 2025-04-15T16:42:57.618466
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
21025 /
tcp
-1729629024 | 2025-04-22T15:58:17.606077
21027 /
tcp
-1428621233 | 2025-03-26T23:50:51.339209
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
21242 /
tcp
-1189269828 | 2025-04-23T05:46:49.567670
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
21249 /
tcp
921225407 | 2025-04-12T19:23:43.596529
\x00\x00\x00\x04\x00\x00\x00\x00\x00
21260 /
tcp
2098371729 | 2025-04-12T22:25:03.645413
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
21262 /
tcp
-1019343788 | 2025-04-12T02:34:06.103044
21271 /
tcp
-1399940268 | 2025-03-28T03:58:27.706528
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21272 /
tcp
-1019343788 | 2025-03-27T16:25:44.291269
21280 /
tcp
-180163620 | 2025-03-27T03:47:29.977053
NPC Telnet permit one connection.\r\n But One connection() already keep alive.\r\nGood Bye !! \r\n
21283 /
tcp
-1428621233 | 2025-04-18T18:14:14.789042
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
21316 /
tcp
-1399940268 | 2025-04-23T08:32:24.594428
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-2107996212 | 2025-04-14T15:24:14.444384
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
21379 /
tcp
639175818 | 2025-04-23T05:33:25.545748
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
21500 /
tcp
-1888448627 | 2025-04-06T01:29:32.854100
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
22000 /
tcp
-358801646 | 2025-04-01T18:14:43.553747
22069 /
tcp
-905685638 | 2025-04-01T06:10:35.911285
22556 /
tcp
398077695 | 2025-04-08T04:41:28.883606
-1839934832 | 2025-04-19T02:47:34.134224
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
23084 /
tcp
-1114821551 | 2025-04-11T20:40:51.223294
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
23128 /
tcp
1948301213 | 2025-04-11T19:33:49.315247
RFB 003.003
VNC:
Protocol Version: 3.3
24082 /
tcp
-2089734047 | 2025-04-16T20:46:12.374828
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
24808 /
tcp
819727972 | 2025-03-28T12:23:53.223426
SSH-2.0-OpenSSH_7.4
Vulnerabilities
25002 /
tcp
-2089734047 | 2025-04-12T21:42:08.402315
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
25005 /
tcp
504717326 | 2025-04-20T07:26:53.563711
SSH-2.0-OpenSSH_8.6
Vulnerabilities
25082 /
tcp
-1399940268 | 2025-03-28T08:39:06.726157
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
25105 /
tcp
2087396567 | 2025-04-12T11:10:23.816199
kjnkjabhbanc283ubcsbhdc72
25565 /
tcp
2087396567 | 2025-03-25T23:33:03.457442
kjnkjabhbanc283ubcsbhdc72
26656 /
tcp
819727972 | 2025-04-07T19:04:09.341669
SSH-2.0-OpenSSH_7.4
Vulnerabilities
26657 /
tcp
-971970408 | 2025-04-07T15:28:23.482286
27015 /
tcp
-1588385920 | 2025-04-23T09:30:56.688185
Command: None
Size: 540029490
ID: 1987208531
Type: 543515497
-1839934832 | 2025-03-29T09:58:20.268152
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
27017 /
tcp
422524323 | 2025-03-31T17:23:29.784619
{
"Version": "3.4.18",
"VersionArray": [
3,
4,
18,
0
],
"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",
"OpenSSLVersion": "",
"SysInfo": "",
"Bits": 64,
"Debug": false,
"MaxObjectSize": 16777216
}
27105 /
tcp
1911457608 | 2025-04-11T22:15:37.440168
\x00[\x00\x00\x00\x00\x00\x00
28015 /
tcp
-1626979812 | 2025-04-02T21:13:00.530314
220 Service ready for new user.
28017 /
tcp
2087396567 | 2025-04-02T13:46:42.124607
kjnkjabhbanc283ubcsbhdc72
29799 /
tcp
-146605374 | 2025-04-15T19:04:01.702280
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
30006 /
tcp
-1399940268 | 2025-03-27T22:27:53.702211
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
30022 /
tcp
819727972 | 2025-04-06T00:52:27.211667
SSH-2.0-OpenSSH_7.4
Vulnerabilities
30122 /
tcp
-1097188123 | 2025-04-06T04:26:52.253090
30123 /
tcp
-2096652808 | 2025-04-17T18:54:34.387300
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
30222 /
tcp
-1990350878 | 2025-03-25T16:29:46.250850
30301 /
tcp
819727972 | 2025-03-31T19:50:50.352896
SSH-2.0-OpenSSH_7.4
Vulnerabilities
30452 /
tcp
-1888448627 | 2025-04-05T07:52:16.739113
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
30522 /
tcp
-1032713145 | 2025-03-26T06:50:11.618506
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
30622 /
tcp
819727972 | 2025-04-05T13:47:59.254264
SSH-2.0-OpenSSH_7.4
Vulnerabilities
30722 /
tcp
2087396567 | 2025-04-05T05:53:22.360604
kjnkjabhbanc283ubcsbhdc72
30822 /
tcp
1741579575 | 2025-04-05T16:09:32.143341
30922 /
tcp
1690634669 | 2025-04-06T00:20:36.784523
31022 /
tcp
-641479109 | 2025-04-05T17:53:55.235748
31222 /
tcp
-971970408 | 2025-04-05T09:19:02.808581
2103111368 | 2025-03-25T04:11:28.626632
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
31443 /
tcp
1741579575 | 2025-04-07T17:21:15.074411
31922 /
tcp
89282912 | 2025-04-05T03:14:02.078524
220 VMware Authentication Daemon Version 1.0, ServerDaemonProto
col:SOAP, MKSDisplayProtocol:VNC , ,
32122 /
tcp
-616720387 | 2025-04-04T17:41:31.726860
32202 /
tcp
1642597142 | 2025-04-03T07:43:35.464663
\x00y\xc3\x90\x02\xc3\xbf\xc3\xbf\x00s\x12L\x00\x06\x11I\x00\x08\x00N\x11S\x00\xc3\x93
32303 /
tcp
-903067560 | 2025-03-28T15:23:53.169059
\x00[\x13)\xc2\x81\x7f\x00\x00
32622 /
tcp
1690634669 | 2025-04-04T12:17:24.413702
32764 /
tcp
-375604792 | 2025-04-11T16:55:11.537240
220 Microsoft FTP Service
33338 /
tcp
-1428621233 | 2025-04-11T15:13:36.088517
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
35240 /
tcp
15018106 | 2025-04-08T07:52:49.631654
\x00\x19\x02\x00\x02\x00\x07\x00Protocol version mismatch\x00
35522 /
tcp
-358801646 | 2025-04-23T02:38:37.376769
35524 /
tcp
-375604792 | 2025-04-17T08:29:14.495110
220 Microsoft FTP Service
35531 /
tcp
1911457608 | 2025-04-21T15:15:39.073515
\x00[\x00\x00\x00\x00\x00\x00
36984 /
tcp
165188539 | 2025-04-10T18:45:48.220965
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
37777 /
tcp
1741579575 | 2025-04-11T10:13:20.800979
38333 /
tcp
2087396567 | 2025-04-07T14:20:35.273249
kjnkjabhbanc283ubcsbhdc72
38880 /
tcp
819727972 | 2025-04-08T12:15:46.623896
SSH-2.0-OpenSSH_7.4
Vulnerabilities
41800 /
tcp
819727972 | 2025-04-16T04:35:25.361988
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2143387245 | 2025-04-08T18:51:59.387012
HTTP/1.1 408 Request Timeout
content-length: 0
co
nnection: close
date: Fri, 26 Nov 2021 07:46:40 GMT
44021 /
tcp
-2089734047 | 2025-04-18T20:47:44.223739
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
44158 /
tcp
-433302150 | 2025-04-03T13:47:31.874800
44520 /
tcp
117101543 | 2025-04-20T06:21:33.839086
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
44818 /
tcp
1353260875 | 2025-03-24T21:02:25.285282
\x00[g\xc2\x95N\x7f\x00\x00
45000 /
tcp
-1399940268 | 2025-03-28T20:27:58.339813
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
45003 /
tcp
-1399940268 | 2025-04-17T21:16:54.473022
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
45444 /
tcp
-2089734047 | 2025-04-04T00:31:18.656892
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
46443 /
tcp
366084633 | 2025-04-17T17:20:23.401118
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
47080 /
tcp
1623746877 | 2025-04-08T20:02:54.562917
500 Permission denied - closing connection.\r\n
47808 /
tcp
873425297 | 2025-04-10T18:26:34.689391
200 NOD32SS 99 (3318497116)
47984 /
tcp
819727972 | 2025-04-21T20:53:59.406057
SSH-2.0-OpenSSH_7.4
Vulnerabilities
47990 /
tcp
89282912 | 2025-04-23T04:15:02.558452
220 VMware Authentication Daemon Version 1.0, ServerDaemonProto
col:SOAP, MKSDisplayProtocol:VNC , ,
48001 /
tcp
-1399940268 | 2025-04-07T15:57:18.862813
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1449779382 | 2025-04-11T03:54:15.115663
HTTP/1.1 500 Internal Server Error
CONTENT-LENGTH: 411
CONTENT-TYPE: text/xml; charset="utf-8"
DATE: Mon, 22 Jan 2024 08:04:18 GMT
EXT:
SERVER: Linux/3.3.0, UPnP/1.0, Portable SDK for UPnP devices/1.6.18
X-User-Agent: redsonic
<s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">
<s:Body>
<s:Fault>
<faultcode>s:Client</faultcode>
<faultstring>UPnPError</faultstring>
<detail>
<UPnPError xmlns="urn:schemas-upnp-org:control-1-0">
<
49153 /
tcp
171352214 | 2025-04-02T08:54:09.791835
-ERR client ip is not in whitelist
1282941221 | 2025-04-06T19:27:01.653372
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
49688 /
tcp
597764502 | 2025-04-16T15:48:23.555522
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
50000 /
tcp
-1399940268 | 2025-04-18T06:00:49.188152
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
50003 /
tcp
-1399940268 | 2025-04-20T17:57:29.953654
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
50008 /
tcp
1830187220 | 2025-04-17T21:16:49.693545
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
50022 /
tcp
819727972 | 2025-04-11T16:17:35.820991
SSH-2.0-OpenSSH_7.4
Vulnerabilities
50070 /
tcp
178736976 | 2025-04-10T16:25:38.236075
50100 /
tcp
1632932802 | 2025-04-14T16:57:24.575637
50105 /
tcp
493955023 | 2025-03-28T00:44:20.941882
\x00\x00\x0c\x04\x00\x00\x00\x00\x00\x00\x04\x00\x10\x00\x00\x00\n0\x05\x00\x00@\x00
50106 /
tcp
-122096153 | 2025-04-22T04:09:39.752836
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
51001 /
tcp
-1097188123 | 2025-04-16T11:20:00.051494
51106 /
tcp
320677201 | 2025-04-11T02:42:00.003945
H\x00\x00\x00\xc3\xbfj\x04Host \'101.133.140.114\' is not allowed to \nconnect to this MySQL server
51235 /
tcp
1911457608 | 2025-04-09T08:59:24.035890
\x00[\x00\x00\x00\x00\x00\x00
52951 /
tcp
1911457608 | 2025-04-10T23:01:56.452518
\x00[\x00\x00\x00\x00\x00\x00
53482 /
tcp
1911457608 | 2025-03-24T21:58:19.129418
\x00[\x00\x00\x00\x00\x00\x00
53483 /
tcp
1911457608 | 2025-04-16T07:58:39.606821
\x00[\x00\x00\x00\x00\x00\x00
54138 /
tcp
632542934 | 2025-04-17T06:57:16.322355
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
54444 /
tcp
-358801646 | 2025-04-07T22:45:35.100230
-1013082686 | 2025-04-21T16:40:57.836687
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
55080 /
tcp
165188539 | 2025-04-14T20:46:41.433631
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
55200 /
tcp
165188539 | 2025-04-02T10:32:20.588217
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
55443 /
tcp
-1189269828 | 2025-04-15T11:04:05.120939
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
55553 /
tcp
1308377066 | 2025-04-17T22:28:32.682909
55554 /
tcp
1741579575 | 2025-04-16T12:12:27.463476
57778 /
tcp
1911457608 | 2025-04-06T03:34:56.499671
\x00[\x00\x00\x00\x00\x00\x00
57787 /
tcp
-1375131644 | 2025-04-15T16:10:16.989662
\x00[v\xc3\xbdC\x7f\x00\x00
60001 /
tcp
-1136600457 | 2025-04-09T19:42:42.163844
HELO:10.3.6.0.false
AS:2048
HL:19
60129 /
tcp
1984588611 | 2025-04-22T09:10:00.838872
61613 /
tcp
820958131 | 2025-04-17T19:50:14.154035
kjnkjabhbanc283ubcsbhdc72\x02
62078 /
tcp
980478633 | 2025-04-23T13:18:49.094060
rry, that nickname format is invalid.
63210 /
tcp
819727972 | 2025-04-14T22:46:22.237150
SSH-2.0-OpenSSH_7.4
Vulnerabilities
63256 /
tcp
-358801646 | 2025-04-09T11:02:43.720995
63257 /
tcp
2087396567 | 2025-04-06T23:13:41.554755
kjnkjabhbanc283ubcsbhdc72
63260 /
tcp
-1399940268 | 2025-03-29T11:16:15.453688
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02