Last Seen: 2025-04-23

GeneralInformation

cn-beijing.oss.aliyuncs.com

OpenPorts

111517192325434953707980941021041101131191431751791801952212643113853894434524655025035155415485555876366666857007718889539931025108010991111111911531177119312001250133714141433144415151521155716041800180118831911192619471962196619741984198720002002200320082021205320672070208120832085208721212126213021812222232023232376240424232563256827612985300430153050305330663069308230943105310631073113311531173129313131353142315431673170318031913193325632603268327032993301331033883389349835303551355235593950400040224063407241044148415041604242428243004433443944434451445545244545464347344786480848404899491150015007500950105025507051305201520952225246524752625321543254355440544354955552555655575592559656055640572158535908590959385986599260006001600560106036616162646379643364436482651366016602662266666668669770017006702170227057707070717171721873497443754877737774800080058006800980128015802180368042805380598071807280798081808380848087809981248138814681628168816981748178818182008251829183338384841484308435844984548493850085108524852685458548854985508551855885758583858685908594862186498686870987288779878288128815882188338834884788748875889188998901891289359000900390049028903690429052906490769088908990919092909591009103910891189122913191489151915791589160916191889195919691999204921292239243924792489251925792929299930093069333935093539398940094189455953296909704974397549761980098119861987698859908990999169943994499929998999910011100501005110134102501038010393103971039810477105541093311000110271111211210112881130012000120191210612132121361214612183121841218812190122021220412208122101222012227122431227212286122941229512297123141231612318123221234512354123891240112409124111243112434124351243612437124421244612449124531247112476124911250012513125141252112530125581257112574125801258613084140241408214130141821434414873148961490314909154431550216008160101601716020160231602416042160441606416066160911609316094164641699217000177741777618005180081801018019180221803018031180331803618051180521805318060180751808118099181011810218104181091811218182182451844318553190711920019443200012005320087201072020220547208802100221025210272124221249212602126221271212722128021283213162132121379215002200022069225562302323084231282408224808250022500525082251052556526656266572701527016270172710528015280172979930006300223012230123302223030130452305223062230722308223092231022312223142231443319223212232202323033262232764333383524035522355243553136984377773833338880418004219444021441584452044818450004500345444464434708047808479844799048001491524915349210496885000050003500085002250070501005010550106510015110651235529515348253483541385444455000550805520055443555535555457778577876000160129616136207863210632566325763260
11 / tcp
-971970408 | 2025-04-21T23:38:08.437564
15 / tcp
-641479109 | 2025-04-12T15:00:22.474716
17 / tcp
-82008689 | 2025-03-27T19:47:33.815319
19 / tcp
829384519 | 2025-03-25T12:57:30.306241
23 / tcp
164764193 | 2025-03-26T00:11:40.450361
25 / tcp
2063598737 | 2025-04-02T06:18:57.359511
43 / tcp
-1375131644 | 2025-04-17T23:43:15.932033
49 / tcp
-801484042 | 2025-04-04T14:51:25.828646
53 / tcp
-1858876500 | 2025-04-21T23:16:51.388119
70 / tcp
175081126 | 2025-04-06T14:45:39.019181
79 / tcp
627290832 | 2025-04-21T17:28:09.449400
80 / tcp
595531648 | 2025-04-02T00:19:07.094747
94 / tcp
-1538260461 | 2025-03-27T18:07:48.235573
102 / tcp
-1399940268 | 2025-04-19T22:53:06.011459
104 / tcp
-1327660293 | 2025-04-20T04:26:39.738161
110 / tcp
580340387 | 2025-04-20T06:17:55.248530
113 / tcp
-414819019 | 2025-04-21T01:56:36.886305
119 / tcp
141730637 | 2025-03-26T03:10:15.160164
143 / tcp
-100373866 | 2025-04-12T00:18:44.824277
175 / tcp
-1399940268 | 2025-04-15T00:02:52.082600
179 / tcp
-399606100 | 2025-04-06T18:31:18.367172
180 / tcp
-1399940268 | 2025-04-17T19:22:36.486672
195 / tcp
-971970408 | 2025-04-07T00:23:05.141399
221 / tcp
-445721795 | 2025-04-20T10:29:43.496036
264 / tcp
-1707068558 | 2025-04-11T01:42:44.307548
311 / tcp
1975288991 | 2025-04-20T15:05:00.853533
385 / tcp
-1611764932 | 2025-04-12T09:33:49.657419
389 / tcp
-1743283776 | 2025-04-05T23:25:11.200297
443 / tcp
670235892 | 2025-04-15T01:39:30.172581
452 / tcp
1911457608 | 2025-04-01T17:51:24.724078
465 / tcp
897328069 | 2025-04-20T05:18:30.148507
502 / tcp
819727972 | 2025-04-18T21:12:12.535203
503 / tcp
819727972 | 2025-04-20T15:36:29.110301
515 / tcp
1948301213 | 2025-04-21T21:09:06.352048
541 / tcp
-1299118573 | 2025-03-31T10:30:37.083601
548 / tcp
1801869778 | 2025-04-11T23:19:59.559295
555 / tcp
819727972 | 2025-03-26T14:57:08.236890
587 / tcp
745343730 | 2025-04-02T23:53:15.047326
636 / tcp
1402312074 | 2025-04-23T07:52:24.170315
666 / tcp
1300162323 | 2025-04-23T00:55:03.416465
685 / tcp
-146605374 | 2025-04-03T22:23:58.413315
700 / tcp
-1871658906 | 2025-03-31T12:14:18.822472
771 / tcp
-1399940268 | 2025-04-21T10:19:00.860571
888 / tcp
-262532376 | 2025-03-29T21:25:49.921269
953 / tcp
-1399940268 | 2025-03-31T11:31:31.295937
993 / tcp
-303199180 | 2025-03-29T18:39:28.389735
1025 / tcp
-1261090339 | 2025-04-19T21:52:40.563427
1080 / tcp
1362344524 | 2025-04-02T18:10:27.801790
1099 / tcp
-1329831334 | 2025-04-08T19:20:08.684025
1111 / tcp
-358801646 | 2025-03-25T06:55:26.207316
1119 / tcp
-1547976805 | 2025-03-26T08:55:22.150204
1153 / tcp
-891714208 | 2025-04-14T21:27:04.096868
1177 / tcp
171352214 | 2025-04-20T15:37:42.922807
1193 / tcp
-2089734047 | 2025-04-20T20:09:58.788546
1200 / tcp
841014058 | 2025-04-07T05:37:03.901967
1250 / tcp
-1399940268 | 2025-04-01T15:57:54.231763
1337 / tcp
1690634669 | 2025-03-26T22:33:55.938921
1414 / tcp
819727972 | 2025-04-07T15:50:59.416724
1433 / tcp
555056254 | 2025-04-20T23:12:31.976973
1444 / tcp
1011407350 | 2025-04-07T22:10:25.196823
1515 / tcp
1975288991 | 2025-04-06T11:49:01.264349
1521 / tcp
-186520940 | 2025-04-17T23:18:59.702752
1557 / tcp
-1399940268 | 2025-04-21T02:16:17.134585
1604 / tcp
819727972 | 2025-04-12T22:21:46.978503
1800 / tcp
-1399940268 | 2025-04-18T12:28:58.132042
1801 / tcp
1745717579 | 2025-04-01T05:02:29.272072
1883 / tcp
745343730 | 2025-04-23T10:52:06.213467
1911 / tcp
1308377066 | 2025-03-27T20:43:15.806831
1926 / tcp
1332894250 | 2025-04-15T01:51:28.384822
1947 / tcp
1332639794 | 2025-04-18T00:22:29.961432
1962 / tcp
971933601 | 2025-04-05T17:57:18.146490
1966 / tcp
-832380282 | 2025-04-19T16:14:00.741505
1974 / tcp
-578719005 | 2025-04-21T10:16:58.887789
1984 / tcp
-42767839 | 2025-04-01T18:40:24.377835
1987 / tcp
504717326 | 2025-03-31T16:03:21.183896
2000 / tcp
-1399940268 | 2025-04-07T12:43:48.799302
2002 / tcp
1308377066 | 2025-04-21T16:31:15.254466
2003 / tcp
-1399940268 | 2025-04-05T18:18:22.665507
2008 / tcp
171352214 | 2025-04-18T15:54:35.104935
2021 / tcp
1726594447 | 2025-04-07T07:09:06.198920
2053 / tcp
-358801646 | 2025-04-11T06:28:41.676449
2067 / tcp
1984588611 | 2025-04-20T16:15:03.513396
2070 / tcp
-1399940268 | 2025-04-08T10:23:14.861998
2081 / tcp
-1839934832 | 2025-04-20T19:50:07.695874
2083 / tcp
660175493 | 2025-04-10T07:49:04.071662
2085 / tcp
-1810987450 | 2025-04-15T02:36:20.850598
2087 / tcp
-653033013 | 2025-04-21T22:32:56.979589
2121 / tcp
141730637 | 2025-04-14T19:10:28.369262
2126 / tcp
989533793 | 2025-03-26T20:50:42.267626
2130 / tcp
-1399940268 | 2025-03-31T12:29:23.816372
2181 / tcp
546151771 | 2025-03-29T15:00:52.414294
2222 / tcp
-358801646 | 2025-04-18T18:27:25.694975
2320 / tcp
819727972 | 2025-04-02T13:36:47.756486
2323 / tcp
-2112953016 | 2025-04-16T16:59:10.824137
2376 / tcp
-1477838366 | 2025-04-23T16:07:40.446286
2404 / tcp
-1399940268 | 2025-04-15T20:58:08.253844
2423 / tcp
-2017887953 | 2025-04-02T13:37:24.329840
2563 / tcp
819727972 | 2025-04-22T21:09:30.082739
2568 / tcp
-1248408558 | 2025-04-21T21:05:17.203212
2761 / tcp
51259122 | 2025-04-03T23:42:41.482819
2985 / tcp
1642597142 | 2025-03-26T08:25:15.959256
3004 / tcp
165188539 | 2025-04-15T17:54:59.512068
3015 / tcp
-2089734047 | 2025-04-20T01:29:05.167636
3050 / tcp
408230060 | 2025-04-08T06:06:08.656782
3053 / tcp
455076604 | 2025-03-29T00:20:58.795395
3066 / tcp
-339084706 | 2025-04-12T20:33:51.741394
3069 / tcp
366084633 | 2025-04-23T15:51:54.179278
3082 / tcp
1308377066 | 2025-04-10T13:49:07.938892
3094 / tcp
-2089734047 | 2025-04-23T13:14:26.902098
3105 / tcp
-904840257 | 2025-04-22T17:59:53.195379
3106 / tcp
671605376 | 2025-04-18T02:59:14.581593
3107 / tcp
1911457608 | 2025-04-01T23:57:56.634587
3113 / tcp
1212285915 | 2025-04-21T08:21:31.486781
3115 / tcp
1911457608 | 2025-04-20T13:45:18.223540
3117 / tcp
819727972 | 2025-04-12T05:16:46.803495
3129 / tcp
1208318993 | 2025-04-15T16:39:37.979034
3131 / tcp
-2017887953 | 2025-04-18T20:55:48.856717
3135 / tcp
321971019 | 2025-04-07T22:37:19.680411
3142 / tcp
-2089734047 | 2025-04-15T08:56:01.996552
3154 / tcp
-1114821551 | 2025-04-07T22:03:17.881781
3167 / tcp
-1032713145 | 2025-04-07T08:02:58.231094
3170 / tcp
-1476017887 | 2025-04-15T17:22:21.356079
3180 / tcp
45131230 | 2025-04-06T19:54:57.400876
3191 / tcp
669849225 | 2025-03-26T07:08:12.090156
3193 / tcp
-441419608 | 2025-04-22T21:02:28.741499
3256 / tcp
-971970408 | 2025-04-06T09:55:33.210864
3260 / tcp
1135752610 | 2025-04-11T09:48:35.994996
3268 / tcp
-2031078612 | 2025-04-19T23:33:52.119480
3270 / tcp
1911457608 | 2025-04-19T19:59:27.423994
3299 / tcp
-2096652808 | 2025-04-11T18:45:54.927492
3301 / tcp
1623746877 | 2025-04-12T07:40:32.971611
3310 / tcp
-1399940268 | 2025-03-27T17:05:16.575036
3388 / tcp
1911457608 | 2025-04-10T20:03:32.939188
3389 / tcp
1146750585 | 2025-04-22T14:48:34.127119
3498 / tcp
1911457608 | 2025-03-31T23:05:03.479648
3530 / tcp
-1399940268 | 2025-03-27T21:41:22.714814
3551 / tcp
198844676 | 2025-03-26T21:41:49.066152
3552 / tcp
-358801646 | 2025-03-25T07:13:39.464747
3559 / tcp
819727972 | 2025-03-28T05:03:22.640572
3950 / tcp
1492413928 | 2025-04-18T22:03:47.035803
4000 / tcp
-801484042 | 2025-04-10T09:51:57.040148
4022 / tcp
-1399940268 | 2025-03-27T20:04:17.750647
4063 / tcp
-319440554 | 2025-04-01T01:10:41.472695
4072 / tcp
1911457608 | 2025-03-28T18:55:02.377447
4104 / tcp
321971019 | 2025-04-02T02:25:32.950217
4148 / tcp
-441419608 | 2025-03-27T17:12:48.453711
4150 / tcp
671605376 | 2025-04-15T19:56:43.830845
4160 / tcp
632542934 | 2025-04-02T04:49:41.265627
4242 / tcp
-1341662640 | 2025-04-16T00:53:38.142308
4282 / tcp
2087396567 | 2025-04-19T23:14:02.229808
4300 / tcp
-1399940268 | 2025-04-03T05:07:41.066529
4433 / tcp
1850902677 | 2025-04-19T23:14:03.074507
4439 / tcp
-358801646 | 2025-04-17T19:43:36.433091
4443 / tcp
285437346 | 2025-04-18T13:08:40.229989
4451 / tcp
-1733106930 | 2025-04-14T17:36:43.576068
4455 / tcp
-1795027372 | 2025-04-11T09:11:39.713566
4524 / tcp
-1996280214 | 2025-04-21T20:47:54.905350
4545 / tcp
-1428621233 | 2025-03-26T16:24:28.121195
4643 / tcp
1975288991 | 2025-03-29T02:20:32.281102
4734 / tcp
165188539 | 2025-04-18T21:02:34.347381
4786 / tcp
-1329831334 | 2025-04-21T05:02:14.630590
4808 / tcp
-904840257 | 2025-04-05T22:40:27.312422
4840 / tcp
-358801646 | 2025-04-04T01:28:00.546123
4899 / tcp
233634112 | 2025-04-18T03:01:53.330750
4911 / tcp
165188539 | 2025-04-05T19:37:40.036213
5001 / tcp
-971970408 | 2025-04-16T11:49:18.637155
5007 / tcp
-1099385124 | 2025-04-20T20:42:45.775269
5009 / tcp
1472866667 | 2025-04-10T11:48:07.425719
5010 / tcp
1911457608 | 2025-03-26T06:17:39.369487
5025 / tcp
957278843 | 2025-04-19T19:57:00.307333
5070 / tcp
165188539 | 2025-04-17T01:57:41.399812
5130 / tcp
740837454 | 2025-04-20T01:50:47.536490
5201 / tcp
1948301213 | 2025-04-15T22:51:04.738156
5209 / tcp
-1839934832 | 2025-04-18T12:04:24.100834
5222 / tcp
-971970408 | 2025-03-31T21:59:26.841410
5246 / tcp
-1996280214 | 2025-04-23T00:06:11.783821
5247 / tcp
1911457608 | 2025-04-03T04:03:28.777839
5262 / tcp
-1399940268 | 2025-03-28T06:51:52.869657
5321 / tcp
-1835475271 | 2025-03-24T19:18:17.593382
5432 / tcp
-1032713145 | 2025-04-01T15:38:37.231007
5435 / tcp
-2089734047 | 2025-04-22T21:15:19.326903
5440 / tcp
-1641514916 | 2025-04-10T20:26:56.581560
5443 / tcp
-274082663 | 2025-04-08T12:55:59.439476
5495 / tcp
-1839934832 | 2025-04-17T09:23:52.763339
5552 / tcp
-2089734047 | 2025-04-11T18:13:07.766251
5556 / tcp
-1399940268 | 2025-04-06T20:33:54.721785
5557 / tcp
1911457608 | 2025-04-20T21:01:22.480450
5592 / tcp
1011407350 | 2025-04-11T08:11:38.811144
5596 / tcp
165188539 | 2025-04-21T02:47:04.120349
5605 / tcp
-1399940268 | 2025-04-17T16:55:11.197032
5640 / tcp
921225407 | 2025-04-08T21:17:41.462496
5721 / tcp
709622286 | 2025-04-09T01:03:08.930666
5853 / tcp
321971019 | 2025-04-19T21:45:59.821551
5908 / tcp
1574088840 | 2025-04-12T18:12:32.709904
5909 / tcp
1623746877 | 2025-04-05T18:02:38.715967
5938 / tcp
1426971893 | 2025-04-21T23:26:27.719636
5986 / tcp
-2096652808 | 2025-04-18T15:08:20.650211
5992 / tcp
819727972 | 2025-04-15T18:26:50.024310
6000 / tcp
120534451 | 2025-04-08T06:59:01.451034
6001 / tcp
-1399940268 | 2025-04-22T18:28:24.885277
6005 / tcp
-122096153 | 2025-04-10T02:17:57.491531
6010 / tcp
-1045760528 | 2025-04-22T17:49:05.068203
6036 / tcp
-2089734047 | 2025-04-18T07:28:26.057561
6161 / tcp
-585940771 | 2025-04-14T15:58:50.360685
6264 / tcp
677934968 | 2025-04-12T12:37:34.925892
6379 / tcp
321971019 | 2025-04-23T00:18:05.455317
6433 / tcp
921225407 | 2025-04-19T07:28:17.458118
6443 / tcp
-1021929371 | 2025-04-15T17:10:10.743727
6482 / tcp
-832380282 | 2025-04-10T12:55:31.869901
6513 / tcp
1212285915 | 2025-04-04T16:42:20.209808
6601 / tcp
819727972 | 2025-03-29T14:24:39.504288
6602 / tcp
-1399940268 | 2025-04-03T23:09:22.860620
6622 / tcp
-1399940268 | 2025-04-21T03:14:03.191404
6666 / tcp
4935895 | 2025-04-16T12:45:24.095038
6668 / tcp
-1399940268 | 2025-04-17T13:11:59.608251
6697 / tcp
-1428621233 | 2025-04-21T19:23:40.732831
7001 / tcp
1265582946 | 2025-04-14T20:53:11.487205
7006 / tcp
-1399940268 | 2025-04-06T17:08:27.464715
7021 / tcp
-2089734047 | 2025-04-23T08:05:53.019542
7022 / tcp
632542934 | 2025-04-11T19:36:16.844322
7057 / tcp
-1399940268 | 2025-04-12T17:17:10.060985
7070 / tcp
941003269 | 2025-04-20T07:32:45.327868
7071 / tcp
1077013874 | 2025-04-06T17:11:45.558475
7171 / tcp
707919486 | 2025-04-21T01:55:08.164048
7218 / tcp
1887224352 | 2025-04-03T19:43:36.942098
7349 / tcp
1911457608 | 2025-04-11T21:52:02.276362
7443 / tcp
1342763855 | 2025-04-22T21:33:08.239913
7548 / tcp
2087396567 | 2025-04-16T17:32:46.016919
7773 / tcp
-1476017887 | 2025-03-31T11:21:04.567280
7774 / tcp
1308377066 | 2025-04-17T21:41:56.758934
8000 / tcp
-1036370807 | 2025-04-09T03:59:44.232487
8005 / tcp
-2089734047 | 2025-04-10T03:17:12.554715
8006 / tcp
597764502 | 2025-04-19T20:18:59.833379
8009 / tcp
671605376 | 2025-04-23T10:37:26.621123
8012 / tcp
504717326 | 2025-04-09T22:24:15.702600
8015 / tcp
-1899074860 | 2025-03-25T19:33:30.273626
8021 / tcp
-80596172 | 2025-04-06T18:40:30.202829
8036 / tcp
-1399940268 | 2025-04-18T18:42:10.501011
8042 / tcp
1352007528 | 2025-04-08T16:57:47.601962
8053 / tcp
819727972 | 2025-03-28T22:35:59.240687
8059 / tcp
-1839934832 | 2025-04-22T13:57:55.024972
8071 / tcp
-1013082686 | 2025-04-18T21:37:05.687420
8072 / tcp
-1399940268 | 2025-04-14T22:24:31.056060
8079 / tcp
-1013082686 | 2025-04-15T05:41:00.768640
8081 / tcp
-971970408 | 2025-04-19T20:31:16.151811
8083 / tcp
1842524259 | 2025-04-21T12:32:28.742302
8084 / tcp
-1399940268 | 2025-03-29T07:04:16.915069
8087 / tcp
1504401647 | 2025-04-04T18:27:02.036637
8099 / tcp
623236583 | 2025-04-03T03:46:31.789134
8124 / tcp
-1399940268 | 2025-04-03T03:59:05.909588
8138 / tcp
819727972 | 2025-03-24T19:37:36.175818
8146 / tcp
-1399940268 | 2025-03-27T06:39:14.162491
8162 / tcp
819727972 | 2025-04-02T03:32:21.566337
8168 / tcp
-2089734047 | 2025-04-03T11:46:02.983130
8169 / tcp
-1019343788 | 2025-04-20T21:41:14.577602
8174 / tcp
-1399940268 | 2025-04-14T19:54:12.808301
8178 / tcp
820958131 | 2025-04-11T20:53:23.952740
8181 / tcp
-1026951088 | 2025-04-11T04:47:08.519007
8200 / tcp
-877598700 | 2025-04-22T07:07:09.048603
8251 / tcp
1911457608 | 2025-04-15T23:23:07.558607
8291 / tcp
1308377066 | 2025-04-21T12:48:27.673939
8333 / tcp
-1713467553 | 2025-04-09T11:59:08.954715
8384 / tcp
-454087041 | 2025-03-28T00:03:32.590070
8414 / tcp
1077013874 | 2025-04-20T03:11:52.102614
8430 / tcp
1574088840 | 2025-04-08T05:33:31.178522
8435 / tcp
1911457608 | 2025-04-06T06:57:46.913969
8449 / tcp
819727972 | 2025-04-14T19:58:17.686140
8454 / tcp
-2089734047 | 2025-04-19T20:32:41.038180
8493 / tcp
-146605374 | 2025-04-22T17:40:11.536136
8500 / tcp
1652191202 | 2025-04-20T18:10:31.899500
8510 / tcp
1911457608 | 2025-04-10T17:59:43.188550
8524 / tcp
1543809371 | 2025-04-15T14:14:24.944784
8526 / tcp
-358801646 | 2025-04-10T08:36:40.727552
8545 / tcp
321971019 | 2025-04-19T11:03:51.727196
8548 / tcp
-1140468363 | 2025-04-07T19:24:57.844904
8549 / tcp
-146605374 | 2025-04-20T19:36:10.927435
8550 / tcp
-1140468363 | 2025-04-05T20:01:40.687818
8551 / tcp
-1140468363 | 2025-04-03T23:51:59.989882
8558 / tcp
-1399940268 | 2025-03-28T03:48:37.879463
8575 / tcp
408230060 | 2025-04-15T18:52:47.080740
8583 / tcp
1911457608 | 2025-04-20T17:23:40.336942
8586 / tcp
-805362002 | 2025-04-17T14:16:37.831570
8590 / tcp
165188539 | 2025-04-09T21:46:13.050078
8594 / tcp
632542934 | 2025-03-28T11:14:59.649716
8621 / tcp
-1611764932 | 2025-03-26T17:29:34.217113
8649 / tcp
842535728 | 2025-04-10T00:36:47.418604
8686 / tcp
-1399940268 | 2025-03-24T22:45:17.176437
8709 / tcp
-1538260461 | 2025-04-08T17:29:05.921698
8728 / tcp
165188539 | 2025-04-01T19:54:36.405423
8779 / tcp
-375604792 | 2025-03-31T21:07:25.148528
8782 / tcp
-891714208 | 2025-04-19T18:56:50.698575
8812 / tcp
1948301213 | 2025-03-31T22:24:18.015270
8815 / tcp
1948301213 | 2025-04-15T03:24:06.574794
8821 / tcp
504717326 | 2025-04-07T18:45:40.225323
8833 / tcp
-1399940268 | 2025-04-11T10:55:47.277594
8834 / tcp
472902042 | 2025-04-01T11:33:37.911808
8847 / tcp
-2033111675 | 2025-03-25T00:48:52.718950
8874 / tcp
-1399940268 | 2025-04-19T16:52:09.819358
8875 / tcp
1620329124 | 2025-03-28T20:03:24.856072
8891 / tcp
-1598265216 | 2025-04-02T14:47:31.032708
8899 / tcp
372433470 | 2025-04-08T10:08:24.546232
8901 / tcp
-1261090339 | 2025-04-07T06:25:32.099179
8912 / tcp
677934968 | 2025-03-26T10:00:19.930153
8935 / tcp
-358801646 | 2025-04-06T12:13:09.722368
9000 / tcp
-2067028711 | 2025-03-31T19:09:36.218128
9003 / tcp
-2089734047 | 2025-03-27T18:48:52.357421
9004 / tcp
-1730858130 | 2025-04-18T01:05:01.238274
9028 / tcp
1911457608 | 2025-04-17T21:00:56.581426
9036 / tcp
921225407 | 2025-04-21T07:06:52.714189
9042 / tcp
819727972 | 2025-04-04T19:42:08.999226
9052 / tcp
921225407 | 2025-04-05T02:11:23.237624
9064 / tcp
-441419608 | 2025-04-08T05:46:10.062315
9076 / tcp
-653033013 | 2025-04-19T16:21:50.424554
9088 / tcp
-441419608 | 2025-04-15T11:03:16.627364
9089 / tcp
632542934 | 2025-04-22T02:57:45.610500
9091 / tcp
2087396567 | 2025-04-20T12:57:47.030769
9092 / tcp
1911457608 | 2025-04-22T01:13:15.678673
9095 / tcp
1842524259 | 2025-04-09T11:42:24.424062
9100 / tcp
-1045760528 | 2025-04-20T14:58:41.714064
9103 / tcp
-1399940268 | 2025-04-15T16:13:52.618514
9108 / tcp
921225407 | 2025-03-28T21:54:30.894655
9118 / tcp
1615193817 | 2025-03-28T19:48:06.145220
9122 / tcp
-457235091 | 2025-04-10T03:50:58.611825
9131 / tcp
-1399940268 | 2025-04-08T10:04:55.051473
9148 / tcp
-1399940268 | 2025-03-29T08:33:50.596328
9151 / tcp
660175493 | 2025-04-21T17:47:25.105260
9157 / tcp
-1888448627 | 2025-04-19T17:05:13.324978
9158 / tcp
-274082663 | 2025-04-04T08:28:30.149056
9160 / tcp
-1399940268 | 2025-03-29T02:12:20.156295
9161 / tcp
-1399940268 | 2025-04-22T20:03:32.958977
9188 / tcp
745343730 | 2025-04-23T13:29:40.442509
9195 / tcp
-1399940268 | 2025-04-21T21:28:14.166517
9196 / tcp
1189133115 | 2025-04-20T12:41:48.368286
9199 / tcp
-1059554316 | 2025-04-16T22:41:27.859699
9204 / tcp
1911457608 | 2025-04-23T14:28:43.784596
9212 / tcp
1911457608 | 2025-04-22T17:30:18.187664
9223 / tcp
1762042191 | 2025-04-15T18:22:49.943432
9243 / tcp
1189133115 | 2025-03-28T19:46:51.037879
9247 / tcp
-1399940268 | 2025-04-15T22:43:02.475103
9248 / tcp
1210754493 | 2025-04-20T20:36:40.117679
9251 / tcp
819727972 | 2025-03-29T19:53:29.457284
9257 / tcp
-358801646 | 2025-04-05T06:57:29.551926
9292 / tcp
-1996280214 | 2025-04-22T02:14:29.617237
9299 / tcp
580340387 | 2025-04-08T08:43:32.056706
9300 / tcp
-1036370807 | 2025-04-11T10:38:55.022163
9306 / tcp
1615193817 | 2025-04-05T11:34:53.435419
9333 / tcp
1830697416 | 2025-04-22T00:53:59.565650
9350 / tcp
1911457608 | 2025-04-12T01:57:51.603154
9353 / tcp
819727972 | 2025-04-15T09:44:42.063971
9398 / tcp
1082732927 | 2025-04-17T12:45:54.629224
9400 / tcp
-1399940268 | 2025-04-05T18:19:57.840127
9418 / tcp
-833168972 | 2025-04-17T10:17:42.570849
9455 / tcp
819727972 | 2025-04-07T21:54:05.999121
9532 / tcp
2063598737 | 2025-04-19T07:34:48.793701
9690 / tcp
-1899074860 | 2025-04-11T05:14:00.880469
9704 / tcp
165188539 | 2025-03-25T21:01:07.174302
9743 / tcp
321971019 | 2025-04-07T14:28:01.766691
9754 / tcp
321971019 | 2025-04-03T06:57:04.952493
9761 / tcp
-1888448627 | 2025-04-04T11:06:11.758957
9800 / tcp
-2118655245 | 2025-04-11T19:55:34.954559
9811 / tcp
-1013082686 | 2025-04-17T01:25:12.683286
9861 / tcp
-1888448627 | 2025-04-04T21:58:01.789609
9876 / tcp
2070013657 | 2025-04-21T21:37:40.138758
9885 / tcp
-122096153 | 2025-03-26T22:28:04.452487
9908 / tcp
819727972 | 2025-04-15T22:51:38.028089
9909 / tcp
-1399940268 | 2025-04-07T13:31:08.459332
9916 / tcp
-1399940268 | 2025-04-20T01:15:04.823198
9943 / tcp
491999737 | 2025-04-12T02:37:07.947526
9944 / tcp
819727972 | 2025-03-28T01:37:30.332263
9992 / tcp
-2089734047 | 2025-04-19T21:37:53.398162
9998 / tcp
1969772007 | 2025-03-25T19:09:51.442527
9999 / tcp
1161309183 | 2025-04-06T11:20:07.472597
10011 / tcp
307999478 | 2025-04-11T20:55:34.502613
10050 / tcp
-2096652808 | 2025-04-12T00:11:29.774105
10051 / tcp
-2081419599 | 2025-03-25T20:03:14.111931
10134 / tcp
632542934 | 2025-04-21T03:58:21.694022
10250 / tcp
-1392039491 | 2025-04-17T22:36:50.528564
10380 / tcp
-1139539254 | 2025-03-29T02:34:11.522916
10393 / tcp
-1399940268 | 2025-04-22T13:13:47.094664
10397 / tcp
-1795027372 | 2025-04-17T21:47:03.944414
10398 / tcp
-1045760528 | 2025-04-03T05:17:24.156837
10477 / tcp
-1746074029 | 2025-04-03T18:27:17.178825
10554 / tcp
-952165951 | 2025-04-15T22:30:40.910423
10933 / tcp
1911457608 | 2025-04-14T18:24:22.365083
11000 / tcp
1574088840 | 2025-04-10T18:08:35.520003
11027 / tcp
165188539 | 2025-04-03T04:54:19.758353
11112 / tcp
-1713437100 | 2025-03-26T20:44:24.315008
11210 / tcp
1911457608 | 2025-04-12T02:49:59.061936
11288 / tcp
-1045760528 | 2025-04-09T04:02:42.665551
11300 / tcp
1911457608 | 2025-04-15T20:16:48.898483
12000 / tcp
227700176 | 2025-04-16T05:40:27.326614
12019 / tcp
-1888448627 | 2025-04-15T18:08:30.956831
12106 / tcp
580340387 | 2025-04-10T01:29:08.301598
12132 / tcp
119860953 | 2025-04-20T19:24:12.245689
12136 / tcp
-1399940268 | 2025-04-20T07:40:21.663297
12146 / tcp
-2031152423 | 2025-04-03T06:55:20.531356
12183 / tcp
-1399940268 | 2025-04-19T17:05:31.291554
12184 / tcp
819727972 | 2025-03-27T13:24:20.691114
12188 / tcp
-2096652808 | 2025-04-02T02:53:25.020813
12190 / tcp
-2096652808 | 2025-04-12T12:07:12.763219
12202 / tcp
1492413928 | 2025-04-11T22:23:33.767136
12204 / tcp
-1399940268 | 2025-04-12T22:10:14.787427
12208 / tcp
819727972 | 2025-03-29T05:38:55.275804
12210 / tcp
921225407 | 2025-04-05T20:15:59.666063
12220 / tcp
-2033111675 | 2025-03-25T08:46:22.394387
12227 / tcp
-1399940268 | 2025-03-26T19:14:50.189938
12243 / tcp
819727972 | 2025-04-03T23:46:41.443185
12272 / tcp
632542934 | 2025-03-28T19:32:47.186842
12286 / tcp
-1888448627 | 2025-04-03T04:47:31.885463
12294 / tcp
1282941221 | 2025-04-08T13:15:34.815134
12295 / tcp
1911457608 | 2025-04-04T09:58:18.722611
12297 / tcp
-653033013 | 2025-03-29T12:41:40.916441
12314 / tcp
1282941221 | 2025-04-22T10:04:56.368468
12316 / tcp
321971019 | 2025-03-25T11:59:24.326058
12318 / tcp
-1399940268 | 2025-03-28T00:02:19.340451
12322 / tcp
1726594447 | 2025-04-18T06:10:41.143462
12345 / tcp
142594048 | 2025-04-16T12:04:52.471211
12354 / tcp
398077695 | 2025-04-01T12:47:10.622179
12389 / tcp
-1746074029 | 2025-04-16T06:16:20.364777
12401 / tcp
-2107996212 | 2025-04-17T19:05:17.398045
12409 / tcp
921225407 | 2025-04-11T04:51:54.295245
12411 / tcp
-1399940268 | 2025-04-22T14:19:34.133322
12431 / tcp
-1399940268 | 2025-03-27T12:54:24.542231
12434 / tcp
639175818 | 2025-04-20T16:13:44.518331
12435 / tcp
1911457608 | 2025-04-20T06:33:40.103224
12436 / tcp
-1399940268 | 2025-04-16T22:13:29.736180
12437 / tcp
-1399940268 | 2025-04-19T16:14:23.011019
12442 / tcp
-136006866 | 2025-04-22T01:44:26.781524
12446 / tcp
-1888448627 | 2025-03-28T11:55:30.040593
12449 / tcp
-142686627 | 2025-04-02T21:10:49.795540
12453 / tcp
1308377066 | 2025-04-18T04:13:38.952147
12471 / tcp
-1648456501 | 2025-04-04T22:29:53.946944
12476 / tcp
-142686627 | 2025-03-25T16:02:00.634767
12491 / tcp
1911457608 | 2025-04-07T14:38:08.030519
12500 / tcp
-358801646 | 2025-04-04T12:51:31.148350
12513 / tcp
1077013874 | 2025-04-21T19:17:39.605922
12514 / tcp
671605376 | 2025-03-25T00:49:05.726850
12521 / tcp
51259122 | 2025-04-12T00:09:29.264935
12530 / tcp
-1329831334 | 2025-04-03T00:41:02.364711
12558 / tcp
669849225 | 2025-04-12T17:50:16.850393
12571 / tcp
1911457608 | 2025-04-20T19:43:53.997449
12574 / tcp
-2031152423 | 2025-04-17T21:29:47.875789
12580 / tcp
819727972 | 2025-03-27T17:56:38.471655
12586 / tcp
307999478 | 2025-03-25T21:29:57.840022
13084 / tcp
-653033013 | 2025-04-23T12:00:24.572686
14024 / tcp
1911457608 | 2025-03-26T17:57:55.233546
14082 / tcp
-2089734047 | 2025-04-08T10:57:38.450476
14130 / tcp
709622286 | 2025-04-05T20:21:17.602530
14182 / tcp
-1230049476 | 2025-04-04T20:58:29.254368
14344 / tcp
-1399940268 | 2025-04-15T06:45:12.078014
14873 / tcp
1161309183 | 2025-03-27T18:08:05.546872
14896 / tcp
639175818 | 2025-04-21T18:18:21.225286
14903 / tcp
-2096652808 | 2025-04-18T03:59:25.430754
14909 / tcp
366084633 | 2025-03-26T19:24:54.770265
15443 / tcp
380146262 | 2025-04-07T01:24:01.142185
15502 / tcp
-2089734047 | 2025-04-01T03:05:41.821293
16008 / tcp
1504401647 | 2025-04-22T16:40:36.595067
16010 / tcp
1690634669 | 2025-04-01T02:43:49.717213
16017 / tcp
1278527606 | 2025-04-21T10:18:57.083281
16020 / tcp
1308377066 | 2025-04-16T11:22:40.258123
16023 / tcp
1911457608 | 2025-04-10T02:24:16.442479
16024 / tcp
-288825733 | 2025-04-15T09:27:19.234784
16042 / tcp
-441419608 | 2025-04-20T07:27:08.680195
16044 / tcp
1911457608 | 2025-04-07T18:05:57.828221
16064 / tcp
-2089734047 | 2025-04-14T23:49:29.538637
16066 / tcp
-2089734047 | 2025-04-09T08:36:46.494053
16091 / tcp
1911457608 | 2025-04-01T09:19:22.961754
16093 / tcp
709622286 | 2025-03-27T02:56:45.341500
16094 / tcp
1911457608 | 2025-04-01T10:23:48.607228
16464 / tcp
171352214 | 2025-04-02T10:02:35.010124
16992 / tcp
-1118605404 | 2025-03-31T09:47:29.269162
17000 / tcp
-1810987450 | 2025-04-03T19:36:08.879778
17774 / tcp
-1399940268 | 2025-03-25T12:02:33.460628
17776 / tcp
-1538260461 | 2025-04-15T06:46:26.771936
18005 / tcp
117101543 | 2025-04-01T17:09:07.157215
18008 / tcp
-1327660293 | 2025-04-21T23:39:28.232648
18010 / tcp
632542934 | 2025-04-18T21:10:13.474921
18019 / tcp
-2089734047 | 2025-04-05T19:56:25.570082
18022 / tcp
1911457608 | 2025-04-02T02:36:36.724387
18030 / tcp
-441419608 | 2025-03-24T22:38:58.715086
18031 / tcp
-1399940268 | 2025-04-17T17:56:37.727706
18033 / tcp
1011407350 | 2025-04-05T02:27:32.133877
18036 / tcp
-1476017887 | 2025-04-11T13:28:52.147078
18051 / tcp
-1399940268 | 2025-03-26T20:27:13.039122
18052 / tcp
-2140303521 | 2025-04-16T03:57:09.683969
18053 / tcp
-1399940268 | 2025-03-31T22:16:52.683447
18060 / tcp
-1399940268 | 2025-04-11T17:12:33.601719
18075 / tcp
-1297953727 | 2025-04-14T17:08:37.670215
18081 / tcp
459162008 | 2025-04-09T09:01:27.807212
18099 / tcp
-1148066627 | 2025-04-03T14:32:18.411648
18101 / tcp
156877613 | 2025-04-12T00:31:27.873499
18102 / tcp
-303199180 | 2025-04-23T16:33:16.036095
18104 / tcp
632542934 | 2025-03-31T20:10:44.898602
18109 / tcp
1911457608 | 2025-04-01T19:56:42.978310
18112 / tcp
1911457608 | 2025-04-10T21:39:56.807930
18182 / tcp
-2096652808 | 2025-04-07T02:01:03.370732
18245 / tcp
1690634669 | 2025-04-04T00:01:50.544144
18443 / tcp
472902042 | 2025-04-08T01:06:04.182155
18553 / tcp
1690634669 | 2025-04-06T21:32:39.732697
19071 / tcp
0 | 2025-04-21T17:38:24.820164
19200 / tcp
366084633 | 2025-03-27T20:00:02.616090
19443 / tcp
2103111368 | 2025-04-03T19:05:16.940922
20001 / tcp
1911457608 | 2025-04-23T03:39:21.805213
20053 / tcp
119860953 | 2025-04-01T09:36:08.536899
20087 / tcp
-641479109 | 2025-04-03T01:15:12.555443
20107 / tcp
-653033013 | 2025-04-12T22:07:51.973246
20202 / tcp
-1399940268 | 2025-03-29T06:26:52.654207
20547 / tcp
-1032713145 | 2025-04-12T22:16:35.061889
20880 / tcp
1370263973 | 2025-04-01T11:42:16.370183
21002 / tcp
165188539 | 2025-04-15T16:42:57.618466
21025 / tcp
-1729629024 | 2025-04-22T15:58:17.606077
21027 / tcp
-1428621233 | 2025-03-26T23:50:51.339209
21242 / tcp
-1189269828 | 2025-04-23T05:46:49.567670
21249 / tcp
921225407 | 2025-04-12T19:23:43.596529
21260 / tcp
2098371729 | 2025-04-12T22:25:03.645413
21262 / tcp
-1019343788 | 2025-04-12T02:34:06.103044
21271 / tcp
-1399940268 | 2025-03-28T03:58:27.706528
21272 / tcp
-1019343788 | 2025-03-27T16:25:44.291269
21280 / tcp
-180163620 | 2025-03-27T03:47:29.977053
21283 / tcp
-1428621233 | 2025-04-18T18:14:14.789042
21316 / tcp
-1399940268 | 2025-04-23T08:32:24.594428
21321 / tcp
-2107996212 | 2025-04-14T15:24:14.444384
21379 / tcp
639175818 | 2025-04-23T05:33:25.545748
21500 / tcp
-1888448627 | 2025-04-06T01:29:32.854100
22000 / tcp
-358801646 | 2025-04-01T18:14:43.553747
22069 / tcp
-905685638 | 2025-04-01T06:10:35.911285
22556 / tcp
398077695 | 2025-04-08T04:41:28.883606
23023 / tcp
-1839934832 | 2025-04-19T02:47:34.134224
23084 / tcp
-1114821551 | 2025-04-11T20:40:51.223294
23128 / tcp
1948301213 | 2025-04-11T19:33:49.315247
24082 / tcp
-2089734047 | 2025-04-16T20:46:12.374828
24808 / tcp
819727972 | 2025-03-28T12:23:53.223426
25002 / tcp
-2089734047 | 2025-04-12T21:42:08.402315
25005 / tcp
504717326 | 2025-04-20T07:26:53.563711
25082 / tcp
-1399940268 | 2025-03-28T08:39:06.726157
25105 / tcp
2087396567 | 2025-04-12T11:10:23.816199
25565 / tcp
2087396567 | 2025-03-25T23:33:03.457442
26656 / tcp
819727972 | 2025-04-07T19:04:09.341669
26657 / tcp
-971970408 | 2025-04-07T15:28:23.482286
27015 / tcp
-1588385920 | 2025-04-23T09:30:56.688185
27016 / tcp
-1839934832 | 2025-03-29T09:58:20.268152
27017 / tcp
422524323 | 2025-03-31T17:23:29.784619
27105 / tcp
1911457608 | 2025-04-11T22:15:37.440168
28015 / tcp
-1626979812 | 2025-04-02T21:13:00.530314
28017 / tcp
2087396567 | 2025-04-02T13:46:42.124607
29799 / tcp
-146605374 | 2025-04-15T19:04:01.702280
30006 / tcp
-1399940268 | 2025-03-27T22:27:53.702211
30022 / tcp
819727972 | 2025-04-06T00:52:27.211667
30122 / tcp
-1097188123 | 2025-04-06T04:26:52.253090
30123 / tcp
-2096652808 | 2025-04-17T18:54:34.387300
30222 / tcp
-1990350878 | 2025-03-25T16:29:46.250850
30301 / tcp
819727972 | 2025-03-31T19:50:50.352896
30452 / tcp
-1888448627 | 2025-04-05T07:52:16.739113
30522 / tcp
-1032713145 | 2025-03-26T06:50:11.618506
30622 / tcp
819727972 | 2025-04-05T13:47:59.254264
30722 / tcp
2087396567 | 2025-04-05T05:53:22.360604
30822 / tcp
1741579575 | 2025-04-05T16:09:32.143341
30922 / tcp
1690634669 | 2025-04-06T00:20:36.784523
31022 / tcp
-641479109 | 2025-04-05T17:53:55.235748
31222 / tcp
-971970408 | 2025-04-05T09:19:02.808581
31422 / tcp
2103111368 | 2025-03-25T04:11:28.626632
31443 / tcp
1741579575 | 2025-04-07T17:21:15.074411
31922 / tcp
89282912 | 2025-04-05T03:14:02.078524
32122 / tcp
-616720387 | 2025-04-04T17:41:31.726860
32202 / tcp
1642597142 | 2025-04-03T07:43:35.464663
32303 / tcp
-903067560 | 2025-03-28T15:23:53.169059
32622 / tcp
1690634669 | 2025-04-04T12:17:24.413702
32764 / tcp
-375604792 | 2025-04-11T16:55:11.537240
33338 / tcp
-1428621233 | 2025-04-11T15:13:36.088517
35240 / tcp
15018106 | 2025-04-08T07:52:49.631654
35522 / tcp
-358801646 | 2025-04-23T02:38:37.376769
35524 / tcp
-375604792 | 2025-04-17T08:29:14.495110
35531 / tcp
1911457608 | 2025-04-21T15:15:39.073515
36984 / tcp
165188539 | 2025-04-10T18:45:48.220965
37777 / tcp
1741579575 | 2025-04-11T10:13:20.800979
38333 / tcp
2087396567 | 2025-04-07T14:20:35.273249
38880 / tcp
819727972 | 2025-04-08T12:15:46.623896
41800 / tcp
819727972 | 2025-04-16T04:35:25.361988
42194 / tcp
2143387245 | 2025-04-08T18:51:59.387012
44021 / tcp
-2089734047 | 2025-04-18T20:47:44.223739
44158 / tcp
-433302150 | 2025-04-03T13:47:31.874800
44520 / tcp
117101543 | 2025-04-20T06:21:33.839086
44818 / tcp
1353260875 | 2025-03-24T21:02:25.285282
45000 / tcp
-1399940268 | 2025-03-28T20:27:58.339813
45003 / tcp
-1399940268 | 2025-04-17T21:16:54.473022
45444 / tcp
-2089734047 | 2025-04-04T00:31:18.656892
46443 / tcp
366084633 | 2025-04-17T17:20:23.401118
47080 / tcp
1623746877 | 2025-04-08T20:02:54.562917
47808 / tcp
873425297 | 2025-04-10T18:26:34.689391
47984 / tcp
819727972 | 2025-04-21T20:53:59.406057
47990 / tcp
89282912 | 2025-04-23T04:15:02.558452
48001 / tcp
-1399940268 | 2025-04-07T15:57:18.862813
49152 / tcp
1449779382 | 2025-04-11T03:54:15.115663
49153 / tcp
171352214 | 2025-04-02T08:54:09.791835
49210 / tcp
1282941221 | 2025-04-06T19:27:01.653372
49688 / tcp
597764502 | 2025-04-16T15:48:23.555522
50000 / tcp
-1399940268 | 2025-04-18T06:00:49.188152
50003 / tcp
-1399940268 | 2025-04-20T17:57:29.953654
50008 / tcp
1830187220 | 2025-04-17T21:16:49.693545
50022 / tcp
819727972 | 2025-04-11T16:17:35.820991
50070 / tcp
178736976 | 2025-04-10T16:25:38.236075
50100 / tcp
1632932802 | 2025-04-14T16:57:24.575637
50105 / tcp
493955023 | 2025-03-28T00:44:20.941882
50106 / tcp
-122096153 | 2025-04-22T04:09:39.752836
51001 / tcp
-1097188123 | 2025-04-16T11:20:00.051494
51106 / tcp
320677201 | 2025-04-11T02:42:00.003945
51235 / tcp
1911457608 | 2025-04-09T08:59:24.035890
52951 / tcp
1911457608 | 2025-04-10T23:01:56.452518
53482 / tcp
1911457608 | 2025-03-24T21:58:19.129418
53483 / tcp
1911457608 | 2025-04-16T07:58:39.606821
54138 / tcp
632542934 | 2025-04-17T06:57:16.322355
54444 / tcp
-358801646 | 2025-04-07T22:45:35.100230
55000 / tcp
-1013082686 | 2025-04-21T16:40:57.836687
55080 / tcp
165188539 | 2025-04-14T20:46:41.433631
55200 / tcp
165188539 | 2025-04-02T10:32:20.588217
55443 / tcp
-1189269828 | 2025-04-15T11:04:05.120939
55553 / tcp
1308377066 | 2025-04-17T22:28:32.682909
55554 / tcp
1741579575 | 2025-04-16T12:12:27.463476
57778 / tcp
1911457608 | 2025-04-06T03:34:56.499671
57787 / tcp
-1375131644 | 2025-04-15T16:10:16.989662
60001 / tcp
-1136600457 | 2025-04-09T19:42:42.163844
60129 / tcp
1984588611 | 2025-04-22T09:10:00.838872
61613 / tcp
820958131 | 2025-04-17T19:50:14.154035
62078 / tcp
980478633 | 2025-04-23T13:18:49.094060
63210 / tcp
819727972 | 2025-04-14T22:46:22.237150
63256 / tcp
-358801646 | 2025-04-09T11:02:43.720995
63257 / tcp
2087396567 | 2025-04-06T23:13:41.554755
63260 / tcp
-1399940268 | 2025-03-29T11:16:15.453688

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2025(1)
CVE-2025-26465
6.8A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
2024(1)
CVE-2024-6387
8.1A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
2023(4)
CVE-2023-51767
7.0OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
CVE-2023-51385
6.5In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
CVE-2023-48795
5.9The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
CVE-2023-38408
9.8The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
2021(2)
CVE-2021-41617
7.0sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
CVE-2021-36368
3.7An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass, since nothing is being bypassed.
2020(2)
CVE-2020-15778
7.8scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
CVE-2020-14145
5.9The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
2019(4)
CVE-2019-16905
7.8OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
CVE-2019-6111
5.9An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
CVE-2019-6110
6.8In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
CVE-2019-6109
6.8An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
2018(3)
CVE-2018-20685
5.3In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
CVE-2018-15919
5.3Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
CVE-2018-15473
5.3OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
2017(1)
CVE-2017-15906
5.3The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
2016(9)
CVE-2016-20012
5.3OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
CVE-2016-10708
7.5sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
CVE-2016-10012
7.8The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
CVE-2016-10011
5.5authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
CVE-2016-10010
7.0sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
CVE-2016-10009
7.3Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
CVE-2016-3115
6.4Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
CVE-2016-1908
9.8The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
CVE-2016-0777
6.5The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
2015(4)
CVE-2015-6564
6.9Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
CVE-2015-6563
1.9The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
CVE-2015-5600
8.5The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
CVE-2015-5352
4.3The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
2014(3)
CVE-2014-2653
5.8The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
CVE-2014-2532
4.9sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
CVE-2014-1692
7.5The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.
2012(1)
CVE-2012-0814
3.5The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
2011(2)
CVE-2011-5000
3.5The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
CVE-2011-4327
2.1ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.
2010(3)
CVE-2010-5107
5.0The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
CVE-2010-4755
4.0The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
CVE-2010-4478
7.5OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
2008(1)
CVE-2008-3844
9.3Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
2007(1)
CVE-2007-2768
4.3OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.



Contact Us

Shodan ® - All rights reserved