39.103.20.114

Regular View Raw Data Timeline
Last Seen: 2025-04-04

GeneralInformation

Country China
City Beijing
Organization Aliyun Computing Co., LTD
ISP Hangzhou Alibaba Advertising Co.,Ltd.
ASN AS37963

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2025(1)
CVE-2025-26465
6.8A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
2023(4)
CVE-2023-51767
7.0OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
CVE-2023-51385
6.5In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
CVE-2023-48795
5.9The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
CVE-2023-38408
9.8The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
2021(2)
CVE-2021-41617
7.0sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
CVE-2021-36368
3.7An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass, since nothing is being bypassed.
2020(2)
CVE-2020-15778
7.8scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
CVE-2020-14145
5.9The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
2019(4)
CVE-2019-16905
7.8OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
CVE-2019-6111
5.9An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
CVE-2019-6110
6.8In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
CVE-2019-6109
6.8An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
2018(4)
CVE-2018-20685
5.3In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
CVE-2018-15919
5.3Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
CVE-2018-15473
5.3OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
CVE-2018-10088
9.8Buffer overflow in XiongMai uc-httpd 1.0.0 has unspecified impact and attack vectors, a different vulnerability than CVE-2017-16725.
2017(1)
CVE-2017-15906
5.3The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
2016(9)
CVE-2016-20012
5.3OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
CVE-2016-10708
7.5sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
CVE-2016-10012
7.8The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
CVE-2016-10011
5.5authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
CVE-2016-10010
7.0sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
CVE-2016-10009
7.3Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
CVE-2016-3115
6.4Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
CVE-2016-1908
9.8The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
CVE-2016-0777
6.5The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
2015(4)
CVE-2015-6564
6.9Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
CVE-2015-6563
1.9The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
CVE-2015-5600
8.5The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
CVE-2015-5352
4.3The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
2014(3)
CVE-2014-2653
5.8The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
CVE-2014-2532
4.9sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
CVE-2014-1692
7.5The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.
2012(1)
CVE-2012-0814
3.5The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
2011(2)
CVE-2011-5000
3.5The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
CVE-2011-4327
2.1ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.
2010(3)
CVE-2010-5107
5.0The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
CVE-2010-4755
4.0The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
CVE-2010-4478
7.5OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
2008(1)
CVE-2008-3844
9.3Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
2007(1)
CVE-2007-2768
4.3OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.

OpenPorts

111315172125374349537079808692104111113135175177179195221264400427440465503513515548554636666789811830995102310251080117711901200123412501337136413701414145615151521159917231800180119261955195819621974197920002008205720582078208020832091209521302154220922102220222222232226232323322344234523532404248025502561257226012626262827623001300830103050305630643080309630993103310631193124313831433144314731523167319231983221325632693299331033453388338935103551378037903954400040224063409541034150415742824321443244334435443744384439444344444477450045064523478648214840489949114949500150075009501151725180519052225226523552385251526352645269527254325435544354465503554455565557559155955602560456205672569857215858591059385984599060006001600260066011603660616161626263796380650065616565663366666667669766997001700670107013701670817171721874037415743474807548763477737775777777907946798079987999800180028009801780278052805880688081808380858087808980948099810581068139814081438150816481808183818581928196823082368251825282918384842684608481850285288545854885498554857085738574857585958649870087028731876787918804881288428847885988668872888088878889889088998906900090019002900490199020904290519052905890619065906790759077909591009102912891349151915591589160916291819185921292269236924592489256925793059306930893339398941894439445948895539658974397619802989899199944999199989999100001000110010100141002410027100341004610050100511007110086101341024010256103241039910443109111100011002111121128811300117011208212109121131214312144121471215512171121781221012219122211223412258122771230512310123241234512347123501235812361123621237712378123881239412395123971239812424124321243312454124601246212470124731247412478124871250012510125111251512518125431256812574125811261513001131281333314265143441440014407145231452414873148941490115000150181544315672160021600416006160291603516038160401604116047160581607116077160791609316104164021646417000170011708417770177741800218009180121801618029180331803918043180521806318065180721808018096181001824519017190801990219930200002008020087201512020220208205002054720880210252123621238212502126221264212702127721296212992130921330213792193522000220012206722107230232308423182231842342425001250062556525782266562665727015270162701727036280012801528080300023000330004300093002230122302223030130443307183072231122314223144431522316223172231822319223202232222324223252232622327223276432822330603333833389336223442234922350003532235422355223552435531358223592236022361223622237122372153732237622377223777737922380223833338522388803912239522396224002241022414434300944158442224430344307443504440044818450064502245777457864582245922478084782248019482224852248889488994915249153495014968450000500225004250070500735008050100501135100251235520225341353481534845413854984552225542255443555535582257522577785778157787584225852258532588225901260001600996012960443616136161662016620786321063256632606344364738
11 / tcp
165188539 | 2025-03-07T10:08:20.318765
13 / tcp
291723434 | 2025-03-17T05:38:48.461138
15 / tcp
-2017887953 | 2025-04-03T05:56:58.371005
17 / tcp
-1907909544 | 2025-04-02T18:54:42.529902
21 / tcp
-1248408558 | 2025-04-03T09:36:14.027351
25 / tcp
-1626979812 | 2025-04-02T22:36:00.220530
37 / tcp
1443000738 | 2025-03-20T20:33:57.134677
43 / tcp
-358801646 | 2025-03-27T22:33:55.502878
49 / tcp
1160472910 | 2025-04-03T18:17:29.411527
53 / tcp
-682282491 | 2025-03-16T14:27:54.345351
70 / tcp
-972699072 | 2025-03-17T11:26:34.647319
79 / tcp
-2029556872 | 2025-03-15T21:40:46.462306
80 / tcp
445417871 | 2025-03-18T11:13:46.412410
86 / tcp
-1888448627 | 2025-03-17T02:56:00.087049
92 / tcp
-1399940268 | 2025-03-15T06:46:21.260243
104 / tcp
-1399940268 | 2025-03-20T04:24:28.400879
111 / tcp
-122096153 | 2025-03-26T00:03:48.981646
113 / tcp
455076604 | 2025-03-20T03:56:40.158986
135 / tcp
1483120365 | 2025-03-28T21:23:15.604469
175 / tcp
-2096652808 | 2025-03-16T12:29:54.600789
177 / tcp
165188539 | 2025-03-06T10:45:17.175968
179 / tcp
-399606100 | 2025-03-22T18:09:25.982350
195 / tcp
897328069 | 2025-03-15T16:40:09.923767
221 / tcp
366084633 | 2025-03-09T21:27:29.445530
264 / tcp
-654288545 | 2025-03-27T08:37:14.610573
400 / tcp
819727972 | 2025-03-23T20:46:48.604420
427 / tcp
1801635450 | 2025-03-20T03:49:13.747138
440 / tcp
1911457608 | 2025-03-07T09:07:20.795180
465 / tcp
897328069 | 2025-03-23T21:25:28.118987
503 / tcp
-2096652808 | 2025-03-18T12:00:36.669655
513 / tcp
1623746877 | 2025-03-21T18:29:28.484607
515 / tcp
1282941221 | 2025-03-17T10:53:59.201116
548 / tcp
-773160241 | 2025-04-03T02:51:08.195424
554 / tcp
902688621 | 2025-04-04T06:07:19.430336
636 / tcp
1255568492 | 2025-03-23T02:38:06.932655
666 / tcp
-1960639992 | 2025-03-22T23:45:45.122870
789 / tcp
897328069 | 2025-03-11T15:26:48.047212
811 / tcp
-1399940268 | 2025-03-24T09:18:51.446923
830 / tcp
103159425 | 2025-03-31T23:23:33.360239
995 / tcp
-740312032 | 2025-03-07T18:13:32.976339
1023 / tcp
819727972 | 2025-03-15T15:17:04.159534
1025 / tcp
921225407 | 2025-03-23T05:52:32.646352
1080 / tcp
1362344524 | 2025-04-03T18:28:19.874620
1177 / tcp
-2017887953 | 2025-03-21T04:43:03.504460
1190 / tcp
819727972 | 2025-03-20T16:00:04.898714
1200 / tcp
171352214 | 2025-03-23T21:10:39.429591
1234 / tcp
-1947777893 | 2025-03-13T01:58:16.652127
1250 / tcp
1189133115 | 2025-03-17T23:14:52.047514
1337 / tcp
1842524259 | 2025-03-10T18:27:21.504257
1364 / tcp
-1189269828 | 2025-03-14T17:14:31.234181
1370 / tcp
1642597142 | 2025-03-21T03:38:42.451499
1414 / tcp
-903067560 | 2025-03-22T06:06:20.846195
1456 / tcp
740837454 | 2025-03-17T22:03:33.267383
1515 / tcp
-375604792 | 2025-03-16T22:16:32.268840
1521 / tcp
-186520940 | 2025-03-29T08:44:23.345434
1599 / tcp
-746114901 | 2025-03-20T00:07:05.773576
1723 / tcp
1103582599 | 2025-04-01T20:27:06.264296
1800 / tcp
1911457608 | 2025-04-01T18:56:08.302489
1801 / tcp
-833635452 | 2025-03-25T08:11:05.586613
1926 / tcp
819727972 | 2025-03-10T04:38:48.211618
1955 / tcp
1911457608 | 2025-03-12T18:56:43.746107
1958 / tcp
-358801646 | 2025-03-22T04:16:29.185368
1962 / tcp
819727972 | 2025-03-21T03:18:54.250135
1974 / tcp
-1835475271 | 2025-03-24T15:28:17.041673
1979 / tcp
-1105333987 | 2025-03-29T16:56:06.634815
2000 / tcp
1624217396 | 2025-03-25T03:09:30.566288
2008 / tcp
971933601 | 2025-03-22T10:30:05.140023
2057 / tcp
1282941221 | 2025-03-22T21:18:49.009082
2058 / tcp
-1746074029 | 2025-03-21T20:07:59.537384
2078 / tcp
-1746074029 | 2025-03-22T04:50:52.820055
2080 / tcp
307999478 | 2025-03-29T03:02:21.721274
2083 / tcp
1842524259 | 2025-03-28T12:48:03.442527
2091 / tcp
819727972 | 2025-03-21T06:46:48.861858
2095 / tcp
2063598737 | 2025-04-03T00:30:08.133347
2130 / tcp
745343730 | 2025-04-02T03:51:54.862414
2154 / tcp
539065883 | 2025-03-27T05:13:03.691946
2209 / tcp
-358801646 | 2025-03-08T22:44:14.432394
2210 / tcp
-1888448627 | 2025-03-24T08:06:07.843210
2220 / tcp
-1810987450 | 2025-03-11T07:12:40.719978
2222 / tcp
372433470 | 2025-04-03T16:16:37.232926
2223 / tcp
1911457608 | 2025-03-07T09:39:56.750074
2226 / tcp
-303199180 | 2025-03-26T20:32:46.472398
2323 / tcp
1662205251 | 2025-03-11T19:48:56.374796
2332 / tcp
-1448296133 | 2025-03-17T14:22:21.969141
2344 / tcp
-2017887953 | 2025-03-18T19:29:54.065830
2345 / tcp
707919486 | 2025-04-04T03:59:16.560409
2353 / tcp
597764502 | 2025-03-17T17:49:56.065379
2404 / tcp
-407828767 | 2025-04-01T23:06:59.102491
2480 / tcp
-2118655245 | 2025-03-11T14:08:41.704405
2550 / tcp
-2017887953 | 2025-03-18T09:55:42.202591
2561 / tcp
-1399940268 | 2025-03-12T21:15:27.265491
2572 / tcp
632542934 | 2025-03-26T21:39:34.757840
2601 / tcp
-1804005872 | 2025-03-17T20:56:42.381105
2626 / tcp
1623746877 | 2025-03-18T00:15:51.308860
2628 / tcp
-122096153 | 2025-03-23T14:04:47.391513
2762 / tcp
-1399940268 | 2025-04-04T04:09:15.239066
3001 / tcp
1778988322 | 2025-04-01T09:43:20.364765
3008 / tcp
-1399940268 | 2025-04-03T14:18:09.022651
3010 / tcp
455076604 | 2025-03-20T21:15:06.829658
3050 / tcp
669849225 | 2025-04-03T10:11:27.654043
3056 / tcp
819727972 | 2025-04-02T01:42:06.310437
3064 / tcp
1911457608 | 2025-03-19T08:40:27.802238
3080 / tcp
-1810987450 | 2025-03-17T18:07:50.774514
3096 / tcp
-2017887953 | 2025-03-20T15:38:41.531040
3099 / tcp
165188539 | 2025-03-17T15:55:27.479741
3103 / tcp
-1059554316 | 2025-03-24T04:41:12.220904
3106 / tcp
-1265999252 | 2025-03-08T15:46:19.820737
3119 / tcp
-784071826 | 2025-03-20T23:53:07.427270
3124 / tcp
-1399940268 | 2025-03-10T08:50:07.377323
3138 / tcp
493955023 | 2025-03-14T18:57:30.241880
3143 / tcp
819727972 | 2025-03-22T21:11:26.916859
3144 / tcp
2098371729 | 2025-03-14T19:25:17.017846
3147 / tcp
-1399940268 | 2025-03-14T06:15:47.503530
3152 / tcp
-358801646 | 2025-03-21T04:02:15.625287
3167 / tcp
-1399940268 | 2025-03-17T15:42:17.302585
3192 / tcp
-1399940268 | 2025-03-31T19:35:41.455228
3198 / tcp
50497985 | 2025-04-01T12:48:16.473148
3221 / tcp
-2019309480 | 2025-03-27T05:03:22.978069
3256 / tcp
398077695 | 2025-03-27T05:57:36.246014
3269 / tcp
-1839934832 | 2025-04-02T01:57:05.626359
3299 / tcp
2033888749 | 2025-03-31T12:55:21.046291
3310 / tcp
819727972 | 2025-04-03T16:06:23.749441
3345 / tcp
819727972 | 2025-04-02T19:02:59.037457
3388 / tcp
1911457608 | 2025-04-01T01:49:24.535314
3389 / tcp
-989469824 | 2025-03-24T11:43:53.820242
3510 / tcp
819727972 | 2025-03-24T19:03:40.175940
3551 / tcp
198844676 | 2025-03-21T23:51:17.411957
3780 / tcp
398077695 | 2025-03-11T18:53:25.091054
3790 / tcp
1975288991 | 2025-03-05T22:18:24.830189
3954 / tcp
-1399940268 | 2025-03-20T15:40:18.612742
4000 / tcp
-1101712668 | 2025-03-22T07:05:23.359976
4022 / tcp
-1399940268 | 2025-03-26T08:20:27.826882
4063 / tcp
-616720387 | 2025-04-02T07:54:10.981542
4095 / tcp
819727972 | 2025-03-15T10:11:32.704791
4103 / tcp
-1036370807 | 2025-03-24T23:29:48.749338
4150 / tcp
1911457608 | 2025-03-22T04:07:53.233974
4157 / tcp
1975288991 | 2025-03-11T11:00:25.633350
4282 / tcp
819727972 | 2025-04-01T09:23:13.772159
4321 / tcp
-1250504565 | 2025-04-03T07:19:27.593842
4432 / tcp
-2096652808 | 2025-03-23T21:23:30.998340
4433 / tcp
-1810987450 | 2025-03-11T14:21:22.972726
4435 / tcp
1620329124 | 2025-04-02T06:27:08.722030
4437 / tcp
-1888448627 | 2025-03-20T11:29:01.637523
4438 / tcp
-1996280214 | 2025-04-02T23:51:42.076077
4439 / tcp
165188539 | 2025-04-03T23:33:33.363816
4443 / tcp
-1060562267 | 2025-03-22T09:30:54.830272
4444 / tcp
-1399940268 | 2025-03-23T18:17:57.828104
4477 / tcp
-1399940268 | 2025-03-31T06:04:54.191202
4500 / tcp
-1026951088 | 2025-03-10T22:22:26.075487
4506 / tcp
1741579575 | 2025-03-14T22:08:55.858161
4523 / tcp
-1888448627 | 2025-03-13T13:23:27.074470
4786 / tcp
1911457608 | 2025-03-18T20:43:03.050407
4821 / tcp
-441419608 | 2025-04-04T00:39:53.091974
4840 / tcp
-1399940268 | 2025-03-28T17:00:46.153847
4899 / tcp
2087396567 | 2025-03-07T15:48:40.567629
4911 / tcp
669849225 | 2025-03-24T20:23:41.052221
4949 / tcp
1189133115 | 2025-03-25T15:42:39.626203
5001 / tcp
2087396567 | 2025-03-25T11:17:35.270402
5007 / tcp
-339084706 | 2025-03-20T16:04:19.704309
5009 / tcp
567505242 | 2025-04-01T05:32:33.885939
5011 / tcp
119860953 | 2025-03-16T18:15:18.822991
5172 / tcp
971933601 | 2025-03-31T21:03:21.646741
5180 / tcp
-1399940268 | 2025-03-17T22:12:44.711645
5190 / tcp
-1056270173 | 2025-04-01T22:23:51.049701
5222 / tcp
171352214 | 2025-03-12T18:55:07.893007
5226 / tcp
-1327660293 | 2025-04-01T17:47:07.738789
5235 / tcp
-1399940268 | 2025-03-25T20:09:39.135652
5238 / tcp
-136006866 | 2025-03-21T13:35:18.761138
5251 / tcp
-585940771 | 2025-03-17T17:40:20.846043
5263 / tcp
-358801646 | 2025-03-09T09:09:27.140325
5264 / tcp
-2107996212 | 2025-03-08T21:22:15.178969
5269 / tcp
-1854630806 | 2025-03-29T04:33:07.277408
5272 / tcp
1278527606 | 2025-03-13T01:01:58.861392
5432 / tcp
165188539 | 2025-04-03T13:39:23.625161
5435 / tcp
1332894250 | 2025-03-31T20:57:02.803253
5443 / tcp
-2107996212 | 2025-03-22T07:05:37.440887
5446 / tcp
1282941221 | 2025-03-11T09:30:42.086394
5503 / tcp
2103111368 | 2025-03-13T16:46:42.121127
5544 / tcp
-879070264 | 2025-03-17T21:59:58.347054
5556 / tcp
-1399940268 | 2025-03-19T19:44:10.685402
5557 / tcp
-303199180 | 2025-04-02T05:16:38.882901
5591 / tcp
-2031152423 | 2025-03-05T20:27:38.751253
5595 / tcp
-1279886438 | 2025-04-03T16:25:56.535315
5602 / tcp
-1399940268 | 2025-03-25T16:25:55.239888
5604 / tcp
819727972 | 2025-03-15T15:26:37.682874
5620 / tcp
575925250 | 2025-03-23T13:24:19.142771
5672 / tcp
575925250 | 2025-03-17T07:18:08.483197
5698 / tcp
-1099385124 | 2025-03-12T03:25:36.569660
5721 / tcp
-1114821551 | 2025-04-01T01:30:19.958526
5858 / tcp
677934968 | 2025-03-12T21:32:02.755953
5910 / tcp
-1881410605 | 2025-03-29T09:18:39.421597
5938 / tcp
-445721795 | 2025-03-29T03:35:18.687591
5984 / tcp
1999272906 | 2025-03-22T09:52:56.988805
5990 / tcp
-1795027372 | 2025-03-09T21:50:57.440144
6000 / tcp
819727972 | 2025-03-24T18:56:42.705473
6001 / tcp
-1399940268 | 2025-04-02T16:44:50.328234
6002 / tcp
1887224352 | 2025-03-14T18:24:21.038855
6006 / tcp
1492413928 | 2025-03-22T18:18:40.373401
6011 / tcp
819727972 | 2025-04-02T01:58:56.882167
6036 / tcp
-1888448627 | 2025-03-29T17:36:43.052600
6061 / tcp
-1265999252 | 2025-03-11T17:16:21.973163
6161 / tcp
-1746074029 | 2025-03-26T19:30:48.580120
6262 / tcp
-1327660293 | 2025-04-03T23:47:55.826588
6379 / tcp
321971019 | 2025-04-03T00:16:36.260319
6380 / tcp
321971019 | 2025-03-24T18:05:21.535220
6500 / tcp
-1399940268 | 2025-03-08T18:26:06.639554
6561 / tcp
-457235091 | 2025-03-12T22:14:01.157979
6565 / tcp
-367607324 | 2025-03-16T12:17:41.130701
6633 / tcp
1762042191 | 2025-03-19T05:07:39.339952
6666 / tcp
4935895 | 2025-03-07T01:49:23.223462
6667 / tcp
671605376 | 2025-03-25T21:14:32.768460
6697 / tcp
-653033013 | 2025-03-23T14:58:17.349187
6699 / tcp
-1021767858 | 2025-03-23T20:02:38.292073
7001 / tcp
1827807483 | 2025-03-16T00:33:46.948101
7006 / tcp
921225407 | 2025-03-26T06:19:50.838358
7010 / tcp
921225407 | 2025-03-16T07:36:40.042734
7013 / tcp
-1888448627 | 2025-03-20T14:54:12.623466
7016 / tcp
-832380282 | 2025-03-22T07:55:13.254321
7081 / tcp
-274082663 | 2025-03-12T15:20:53.139795
7171 / tcp
-1730858130 | 2025-03-16T21:40:58.687974
7218 / tcp
1308377066 | 2025-03-25T09:07:19.626801
7403 / tcp
117101543 | 2025-03-13T04:55:38.011334
7415 / tcp
-345718689 | 2025-03-15T01:44:44.292831
7434 / tcp
-616720387 | 2025-03-14T14:09:29.469709
7480 / tcp
-1611764932 | 2025-03-21T17:32:34.498884
7548 / tcp
-805362002 | 2025-03-22T18:12:10.136823
7634 / tcp
-992671574 | 2025-03-23T07:11:36.698926
7773 / tcp
-1399940268 | 2025-03-10T11:02:39.644120
7775 / tcp
1996932384 | 2025-04-03T13:15:21.968667
7777 / tcp
1391945995 | 2025-03-27T13:36:52.236440
7790 / tcp
-904840257 | 2025-03-12T21:34:16.042262
7946 / tcp
165188539 | 2025-03-27T21:14:27.711287
7980 / tcp
-2096652808 | 2025-03-23T14:31:17.941042
7998 / tcp
-1477838366 | 2025-03-15T00:42:12.653018
7999 / tcp
-1259524839 | 2025-03-24T01:44:16.610873
8001 / tcp
2103111368 | 2025-03-16T16:58:32.708382
8002 / tcp
493955023 | 2025-03-16T20:26:54.153124
8009 / tcp
165188539 | 2025-03-29T15:11:29.229874
8017 / tcp
-1399940268 | 2025-03-17T07:04:13.059214
8027 / tcp
1911457608 | 2025-04-02T17:45:01.727076
8052 / tcp
575925250 | 2025-03-13T19:53:18.967567
8058 / tcp
-1248408558 | 2025-03-20T14:52:29.584776
8068 / tcp
1991883981 | 2025-03-23T09:59:59.214144
8081 / tcp
819727972 | 2025-03-20T17:26:10.234158
8083 / tcp
-1111515360 | 2025-03-06T07:27:46.413845
8085 / tcp
707919486 | 2025-04-03T12:42:01.282386
8087 / tcp
-1139539254 | 2025-03-31T14:55:24.721247
8089 / tcp
1741579575 | 2025-03-16T16:16:49.551630
8094 / tcp
709622286 | 2025-03-11T15:01:02.890055
8099 / tcp
438715403 | 2025-03-25T16:19:04.702633
8105 / tcp
-441419608 | 2025-03-29T04:05:15.514541
8106 / tcp
-1261090339 | 2025-03-26T22:13:02.450005
8139 / tcp
-971970408 | 2025-03-13T02:53:05.963720
8140 / tcp
1690634669 | 2025-03-13T14:22:35.003070
8143 / tcp
-1839934832 | 2025-03-25T12:53:54.080018
8150 / tcp
117101543 | 2025-03-22T12:26:25.729148
8164 / tcp
597764502 | 2025-03-14T21:24:34.069639
8180 / tcp
-1180882918 | 2025-03-06T18:12:24.171844
8183 / tcp
632542934 | 2025-04-01T20:52:23.615802
8185 / tcp
-1099385124 | 2025-03-25T18:46:27.451432
8192 / tcp
1317779273 | 2025-03-24T09:00:47.274533
8196 / tcp
-2096652808 | 2025-03-23T17:45:06.461396
8230 / tcp
-2140303521 | 2025-04-03T09:08:00.367798
8236 / tcp
-653033013 | 2025-03-14T04:07:11.559978
8251 / tcp
408230060 | 2025-03-13T21:51:26.895119
8252 / tcp
-249504111 | 2025-03-27T12:52:57.500783
8291 / tcp
693973426 | 2025-03-20T01:52:37.091189
8384 / tcp
1741579575 | 2025-03-27T22:55:11.753648
8426 / tcp
1911457608 | 2025-03-10T08:36:39.972624
8460 / tcp
-1733106930 | 2025-03-23T08:02:04.376892
8481 / tcp
-358801646 | 2025-03-13T08:55:10.976152
8502 / tcp
1210754493 | 2025-03-23T20:50:35.771909
8528 / tcp
677934968 | 2025-04-01T06:28:38.375324
8545 / tcp
290819026 | 2025-03-29T16:51:40.183825
8548 / tcp
-980525298 | 2025-03-09T09:53:14.043218
8549 / tcp
-2096652808 | 2025-03-23T19:05:19.701446
8554 / tcp
472902042 | 2025-03-23T15:56:34.099582
8570 / tcp
-2096652808 | 2025-03-26T16:50:58.757721
8573 / tcp
1189133115 | 2025-03-24T06:20:17.160699
8574 / tcp
1911457608 | 2025-03-11T01:36:30.069881
8575 / tcp
-1399940268 | 2025-03-09T22:33:37.749094
8595 / tcp
2098371729 | 2025-03-23T21:54:18.872356
8649 / tcp
842535728 | 2025-03-25T03:18:10.366397
8700 / tcp
-441419608 | 2025-03-18T16:55:50.456508
8702 / tcp
-1996280214 | 2025-03-19T03:15:19.883758
8731 / tcp
-2089734047 | 2025-03-19T00:15:04.338812
8767 / tcp
1911457608 | 2025-03-24T18:46:08.923180
8791 / tcp
-1399940268 | 2025-03-18T15:14:06.882388
8804 / tcp
819727972 | 2025-03-12T11:27:18.808083
8812 / tcp
-1399940268 | 2025-04-01T19:01:52.185677
8842 / tcp
1615193817 | 2025-03-19T22:32:50.608501
8847 / tcp
-784071826 | 2025-03-16T20:10:09.521328
8859 / tcp
1282941221 | 2025-03-24T21:16:10.946252
8866 / tcp
1919228981 | 2025-03-25T13:58:21.884201
8872 / tcp
921225407 | 2025-03-10T21:43:33.128912
8880 / tcp
-79865617 | 2025-03-11T16:25:45.723421
8887 / tcp
1911457608 | 2025-03-05T23:01:01.409227
8889 / tcp
2087396567 | 2025-03-08T17:03:23.689037
8890 / tcp
-1399940268 | 2025-03-28T18:22:59.398963
8899 / tcp
372433470 | 2025-03-15T15:27:01.681144
8906 / tcp
1911457608 | 2025-04-03T21:40:03.089152
9000 / tcp
-1795676121 | 2025-03-20T10:16:19.688627
9001 / tcp
-1026951088 | 2025-03-13T04:46:21.153664
9002 / tcp
1690634669 | 2025-03-07T09:34:42.827421
9004 / tcp
-1453516345 | 2025-03-10T03:00:24.200374
9019 / tcp
-1399940268 | 2025-03-10T15:51:33.050558
9020 / tcp
-1779118422 | 2025-03-06T02:59:46.275019
9042 / tcp
-457235091 | 2025-03-16T07:51:34.683718
9051 / tcp
1690634669 | 2025-03-31T12:13:46.568213
9052 / tcp
1911457608 | 2025-03-20T17:12:00.660082
9058 / tcp
819727972 | 2025-03-12T18:35:55.460975
9061 / tcp
575925250 | 2025-04-01T05:03:00.648963
9065 / tcp
819727972 | 2025-03-23T22:23:20.108351
9067 / tcp
-1140468363 | 2025-03-20T15:06:07.449225
9075 / tcp
-1230049476 | 2025-03-22T04:27:21.666935
9077 / tcp
-339084706 | 2025-03-31T22:05:14.876181
9095 / tcp
2087396567 | 2025-03-31T13:41:12.027092
9100 / tcp
-1730858130 | 2025-03-05T23:35:01.908637
9102 / tcp
2143387245 | 2025-03-10T23:06:17.056813
9128 / tcp
321971019 | 2025-03-13T02:35:25.659071
9134 / tcp
1911457608 | 2025-03-17T22:03:40.747821
9151 / tcp
171352214 | 2025-03-24T20:19:32.970835
9155 / tcp
1911457608 | 2025-04-03T13:12:54.514340
9158 / tcp
1134517380 | 2025-03-20T22:42:40.773234
9160 / tcp
-2089734047 | 2025-03-19T17:11:56.954395
9162 / tcp
-1428621233 | 2025-03-17T21:10:49.113596
9181 / tcp
-1399940268 | 2025-03-24T08:03:34.855182
9185 / tcp
1332894250 | 2025-03-10T19:43:47.727742
9212 / tcp
307999478 | 2025-03-27T11:32:08.587776
9226 / tcp
-2089734047 | 2025-03-14T17:37:42.737981
9236 / tcp
819727972 | 2025-03-28T12:04:31.604530
9245 / tcp
-1399940268 | 2025-04-02T08:14:10.313865
9248 / tcp
-1399940268 | 2025-04-02T15:42:05.476119
9256 / tcp
819727972 | 2025-03-08T21:25:16.653192
9257 / tcp
-1839934832 | 2025-03-11T02:41:17.415225
9305 / tcp
1767345577 | 2025-03-22T16:50:42.753230
9306 / tcp
1278527606 | 2025-03-26T02:48:34.058227
9308 / tcp
-1428621233 | 2025-03-27T05:25:30.846340
9333 / tcp
1911457608 | 2025-04-03T11:18:38.797948
9398 / tcp
-1373613804 | 2025-03-28T01:20:33.633224
9418 / tcp
-1036370807 | 2025-03-28T11:04:56.178622
9443 / tcp
2087396567 | 2025-03-15T09:18:21.682867
9445 / tcp
1632932802 | 2025-03-16T21:54:05.118449
9488 / tcp
-1114821551 | 2025-03-19T13:34:24.123837
9553 / tcp
-2089734047 | 2025-03-29T05:40:54.751616
9658 / tcp
-1810987450 | 2025-04-02T04:26:29.990805
9743 / tcp
103159425 | 2025-04-01T04:30:53.426416
9761 / tcp
410249975 | 2025-03-13T23:11:05.103241
9802 / tcp
632542934 | 2025-03-10T21:15:35.527480
9898 / tcp
1320285193 | 2025-03-31T09:01:38.376470
9919 / tcp
165188539 | 2025-04-02T19:15:46.870480
9944 / tcp
-1681927087 | 2025-03-28T00:48:30.480731
9991 / tcp
1492413928 | 2025-03-25T09:03:35.961594
9998 / tcp
-1917695220 | 2025-04-04T14:13:33.487680
9999 / tcp
1161309183 | 2025-03-21T21:19:30.220903
10000 / tcp
2033888749 | 2025-03-21T08:29:23.923374
10001 / tcp
1492413928 | 2025-03-11T10:39:28.298610
10010 / tcp
-136006866 | 2025-03-09T11:13:53.077457
10014 / tcp
1911457608 | 2025-03-15T22:16:40.693006
10024 / tcp
-234408721 | 2025-03-29T21:22:41.757545
10027 / tcp
-1327660293 | 2025-03-17T02:56:39.698095
10034 / tcp
165188539 | 2025-03-15T14:53:06.791626
10046 / tcp
1911457608 | 2025-03-20T23:03:24.630473
10050 / tcp
-971970408 | 2025-03-12T13:20:08.735676
10051 / tcp
819727972 | 2025-03-14T15:30:36.687734
10071 / tcp
-1986594217 | 2025-03-11T22:13:26.275677
10086 / tcp
165188539 | 2025-04-01T23:51:51.486875
10134 / tcp
-1265999252 | 2025-03-29T13:12:16.162499
10240 / tcp
-445721795 | 2025-03-07T17:12:44.171901
10256 / tcp
-585940771 | 2025-03-19T16:56:29.413882
10324 / tcp
1975288991 | 2025-03-06T21:12:35.562785
10399 / tcp
-303199180 | 2025-03-15T13:57:21.997261
10443 / tcp
-1730858130 | 2025-04-02T20:43:25.410847
10911 / tcp
1911457608 | 2025-03-19T22:16:08.711425
11000 / tcp
-1279886438 | 2025-03-19T16:44:13.405485
11002 / tcp
-891714208 | 2025-03-11T14:28:07.328332
11112 / tcp
15018106 | 2025-03-12T06:14:35.427155
11288 / tcp
401555314 | 2025-03-26T14:45:56.235231
11300 / tcp
1911457608 | 2025-03-11T18:25:54.011753
11701 / tcp
632542934 | 2025-03-11T16:25:46.031958
12082 / tcp
971933601 | 2025-03-28T00:27:43.991487
12109 / tcp
819727972 | 2025-04-02T21:34:25.128153
12113 / tcp
-1327660293 | 2025-03-08T20:13:21.717190
12143 / tcp
-1839934832 | 2025-03-20T13:47:54.725320
12144 / tcp
-1737707071 | 2025-03-10T23:16:02.579282
12147 / tcp
117101543 | 2025-03-23T05:46:53.685440
12155 / tcp
-1648456501 | 2025-03-11T06:37:17.303672
12171 / tcp
971933601 | 2025-03-27T08:38:02.243909
12178 / tcp
-2031152423 | 2025-03-13T09:57:01.555065
12210 / tcp
1655023012 | 2025-03-24T20:41:55.378169
12219 / tcp
819727972 | 2025-04-04T02:27:18.207775
12221 / tcp
1492413928 | 2025-03-05T22:40:22.943338
12234 / tcp
-2089734047 | 2025-03-29T21:34:57.573030
12258 / tcp
-1399940268 | 2025-04-01T17:43:04.711417
12277 / tcp
-1428621233 | 2025-03-08T20:21:32.840086
12305 / tcp
-1888448627 | 2025-03-16T19:48:48.887330
12310 / tcp
-1279886438 | 2025-04-01T20:16:36.458997
12324 / tcp
-2107996212 | 2025-03-26T23:47:09.432367
12345 / tcp
878900329 | 2025-03-21T07:46:35.990535
12347 / tcp
-2107996212 | 2025-03-14T09:01:42.712583
12350 / tcp
-274082663 | 2025-03-15T12:03:33.965157
12358 / tcp
897328069 | 2025-03-14T10:28:24.364115
12361 / tcp
-441419608 | 2025-03-27T02:45:36.611403
12362 / tcp
-1399940268 | 2025-03-13T08:23:51.447476
12377 / tcp
-1399940268 | 2025-03-12T15:11:16.504515
12378 / tcp
632542934 | 2025-03-16T22:59:14.819010
12388 / tcp
1332894250 | 2025-03-10T03:30:54.430157
12394 / tcp
-1399940268 | 2025-03-15T01:23:31.276478
12395 / tcp
-1261090339 | 2025-03-19T05:35:23.976479
12397 / tcp
2143387245 | 2025-03-15T20:56:06.305915
12398 / tcp
-1399940268 | 2025-03-08T19:12:48.370302
12424 / tcp
-1399940268 | 2025-03-28T23:41:56.235680
12432 / tcp
-980525298 | 2025-03-23T20:03:29.262489
12433 / tcp
-1399940268 | 2025-03-06T00:10:20.382692
12454 / tcp
-358801646 | 2025-03-27T20:57:35.796917
12460 / tcp
-1795027372 | 2025-03-06T00:42:44.437487
12462 / tcp
-2089734047 | 2025-03-23T09:25:52.610009
12470 / tcp
-1899074860 | 2025-04-03T08:41:00.130970
12473 / tcp
165188539 | 2025-03-17T09:04:08.610262
12474 / tcp
-904840257 | 2025-03-20T02:37:04.721882
12478 / tcp
1011407350 | 2025-03-13T15:07:09.616591
12487 / tcp
-249504111 | 2025-03-17T20:17:48.983583
12500 / tcp
1363464823 | 2025-04-03T05:15:10.967949
12510 / tcp
165188539 | 2025-04-01T07:51:39.795874
12511 / tcp
1623746877 | 2025-04-03T18:55:41.872156
12515 / tcp
819727972 | 2025-03-15T12:29:09.249491
12518 / tcp
-1399940268 | 2025-03-17T02:00:24.057053
12543 / tcp
165188539 | 2025-04-01T22:45:59.430122
12568 / tcp
-1699556818 | 2025-04-03T03:21:43.367362
12574 / tcp
-616720387 | 2025-03-13T17:47:36.224846
12581 / tcp
-980525298 | 2025-03-16T11:27:49.023282
12615 / tcp
1210754493 | 2025-03-15T20:46:27.808030
13001 / tcp
819727972 | 2025-04-03T02:17:53.658107
13128 / tcp
945910976 | 2025-03-27T19:45:27.493857
13333 / tcp
1208318993 | 2025-03-31T19:45:31.813352
14265 / tcp
-2089734047 | 2025-04-04T06:31:58.122899
14344 / tcp
1911457608 | 2025-03-22T08:55:06.070554
14400 / tcp
321971019 | 2025-03-13T14:13:09.135552
14407 / tcp
-1399940268 | 2025-03-22T15:57:32.681432
14523 / tcp
-1487943323 | 2025-03-06T23:29:11.016774
14524 / tcp
1911457608 | 2025-03-16T13:07:22.250607
14873 / tcp
-1327660293 | 2025-03-22T14:47:57.904644
14894 / tcp
-585940771 | 2025-04-01T21:14:31.922591
14901 / tcp
-1399940268 | 2025-04-01T05:26:30.100793
15000 / tcp
-1729774754 | 2025-03-27T20:17:10.581208
15018 / tcp
-1453516345 | 2025-04-02T07:47:21.799889
15443 / tcp
-2096652808 | 2025-03-28T13:54:12.271653
15672 / tcp
671605376 | 2025-04-02T11:15:13.541007
16002 / tcp
921225407 | 2025-04-03T21:01:37.458189
16004 / tcp
1726594447 | 2025-03-24T08:09:42.548401
16006 / tcp
455076604 | 2025-04-01T21:48:48.270686
16029 / tcp
1161309183 | 2025-03-07T17:41:06.925748
16035 / tcp
-1399940268 | 2025-04-03T05:38:12.560899
16038 / tcp
307999478 | 2025-03-10T16:47:02.620975
16040 / tcp
1282941221 | 2025-03-23T10:14:02.545145
16041 / tcp
-441419608 | 2025-03-22T01:55:10.303776
16047 / tcp
-1399940268 | 2025-03-09T05:57:23.513030
16058 / tcp
205347087 | 2025-03-10T13:15:17.184888
16071 / tcp
-122096153 | 2025-03-22T01:46:48.285162
16077 / tcp
1278527606 | 2025-03-19T16:23:14.811076
16079 / tcp
-1737707071 | 2025-03-29T15:42:12.671133
16093 / tcp
-784071826 | 2025-04-02T04:23:53.233693
16104 / tcp
-1327660293 | 2025-03-27T13:42:16.009201
16402 / tcp
2063598737 | 2025-03-26T16:11:32.051123
16464 / tcp
-1626979812 | 2025-04-02T09:16:29.514276
17000 / tcp
-1810987450 | 2025-03-26T00:48:45.018990
17001 / tcp
-1810987450 | 2025-04-02T18:00:18.550888
17084 / tcp
-1399940268 | 2025-03-31T14:32:48.356478
17770 / tcp
921225407 | 2025-03-28T21:20:45.367696
17774 / tcp
819727972 | 2025-04-03T18:58:29.749209
18002 / tcp
-122096153 | 2025-03-23T17:17:10.062983
18009 / tcp
-1399940268 | 2025-03-23T23:18:59.658664
18012 / tcp
632542934 | 2025-04-04T00:39:13.393048
18016 / tcp
15018106 | 2025-03-17T05:30:50.153313
18029 / tcp
897328069 | 2025-03-24T13:41:34.033078
18033 / tcp
-2089734047 | 2025-03-25T16:26:49.265221
18039 / tcp
819727972 | 2025-03-12T17:11:30.235329
18043 / tcp
-358801646 | 2025-03-26T19:26:00.648453
18052 / tcp
-249504111 | 2025-03-09T05:08:56.575947
18063 / tcp
-2096652808 | 2025-03-26T12:38:11.507345
18065 / tcp
-1399940268 | 2025-03-29T21:03:27.622244
18072 / tcp
-274082663 | 2025-03-07T18:09:28.001720
18080 / tcp
539065883 | 2025-03-29T01:56:14.589742
18096 / tcp
1126993057 | 2025-03-15T14:24:15.092806
18100 / tcp
-1032713145 | 2025-03-27T15:40:54.695923
18245 / tcp
-1477838366 | 2025-03-21T20:45:01.137604
19017 / tcp
-653033013 | 2025-03-27T23:52:29.474834
19080 / tcp
-1888448627 | 2025-03-05T20:40:35.246217
19902 / tcp
-784071826 | 2025-03-28T20:13:00.076288
19930 / tcp
1690634669 | 2025-03-14T10:16:00.011266
20000 / tcp
1900503736 | 2025-04-03T20:57:42.345057
20080 / tcp
1543809371 | 2025-03-23T02:26:01.787057
20087 / tcp
1741579575 | 2025-04-03T00:08:17.273659
20151 / tcp
-1399940268 | 2025-03-24T00:09:27.685339
20202 / tcp
921225407 | 2025-03-20T18:53:44.472908
20208 / tcp
-358801646 | 2025-03-14T16:28:33.689527
20500 / tcp
1353260875 | 2025-03-23T03:54:01.559006
20547 / tcp
-1399940268 | 2025-04-03T15:30:21.027015
20880 / tcp
1370263973 | 2025-03-11T11:08:52.880367
21025 / tcp
819727972 | 2025-03-29T10:51:49.728769
21236 / tcp
-1730858130 | 2025-03-10T03:17:58.226033
21238 / tcp
-2089734047 | 2025-03-21T04:52:08.131425
21250 / tcp
-441419608 | 2025-03-28T02:57:34.657126
21262 / tcp
632542934 | 2025-04-03T19:27:16.143113
21264 / tcp
-1399940268 | 2025-03-21T04:46:24.502667
21270 / tcp
-2033111675 | 2025-03-15T01:23:25.141509
21277 / tcp
-1013082686 | 2025-03-05T22:10:18.625179
21296 / tcp
-358801646 | 2025-04-04T01:12:08.762308
21299 / tcp
1911457608 | 2025-03-07T08:55:41.219181
21309 / tcp
-1598265216 | 2025-03-06T03:11:58.393544
21330 / tcp
321971019 | 2025-03-21T06:07:48.751328
21379 / tcp
171352214 | 2025-04-03T10:40:51.761928
21935 / tcp
-1297953727 | 2025-03-19T20:05:43.637225
22000 / tcp
1690634669 | 2025-04-01T17:24:47.899276
22001 / tcp
-2107996212 | 2025-04-04T04:31:04.053168
22067 / tcp
2103111368 | 2025-03-27T17:25:45.186866
22107 / tcp
-441419608 | 2025-03-21T19:20:13.750176
23023 / tcp
-971970408 | 2025-03-23T22:32:35.268249
23084 / tcp
-1114821551 | 2025-03-07T08:04:41.238590
23182 / tcp
-438503381 | 2025-03-20T00:31:53.699184
23184 / tcp
-2089734047 | 2025-03-10T17:59:17.394252
23424 / tcp
0 | 2025-03-18T19:33:23.269229
25001 / tcp
820958131 | 2025-03-18T14:37:55.799853
25006 / tcp
1189133115 | 2025-04-01T12:38:55.801250
25565 / tcp
-441419608 | 2025-04-03T03:37:33.811334
25782 / tcp
1911457608 | 2025-03-20T23:30:18.145185
26656 / tcp
-1428621233 | 2025-03-28T23:57:55.804436
26657 / tcp
1741579575 | 2025-03-28T02:28:32.172173
27015 / tcp
-971970408 | 2025-03-25T12:17:15.208003
27016 / tcp
-1441741890 | 2025-03-25T13:59:48.280633
27017 / tcp
422524323 | 2025-03-31T17:09:19.550831
27036 / tcp
1690634669 | 2025-03-25T09:07:08.942064
28001 / tcp
1726594447 | 2025-03-26T15:20:01.724881
28015 / tcp
-2096652808 | 2025-03-18T07:29:13.414805
28080 / tcp
-1136600457 | 2025-03-28T05:35:43.150120
30002 / tcp
1308377066 | 2025-03-10T09:17:33.616175
30003 / tcp
1544300041 | 2025-03-09T21:35:21.027358
30004 / tcp
1911457608 | 2025-04-01T01:11:11.926927
30009 / tcp
1282941221 | 2025-03-07T01:42:55.377413
30022 / tcp
-319440554 | 2025-03-18T21:24:34.493966
30122 / tcp
1741579575 | 2025-03-19T20:07:09.935960
30222 / tcp
2087396567 | 2025-03-25T16:11:07.098955
30301 / tcp
233634112 | 2025-03-15T20:07:48.424031
30443 / tcp
722711397 | 2025-03-23T03:54:10.033187
30718 / tcp
1589691163 | 2025-04-03T00:02:39.297756
30722 / tcp
-319440554 | 2025-03-13T13:17:03.229620
31122 / tcp
2087396567 | 2025-03-09T12:31:24.308062
31422 / tcp
-1887823886 | 2025-03-25T03:46:26.625099
31444 / tcp
-2031152423 | 2025-03-16T07:45:49.498893
31522 / tcp
2087396567 | 2025-03-13T00:57:27.404563
31622 / tcp
-68075478 | 2025-03-12T23:00:36.487757
31722 / tcp
2087396567 | 2025-03-21T16:28:13.433647
31822 / tcp
863754335 | 2025-03-20T19:28:07.958310
31922 / tcp
2087396567 | 2025-03-11T06:01:41.942994
32022 / tcp
1741579575 | 2025-03-12T04:15:06.924855
32222 / tcp
2087396567 | 2025-03-23T18:28:52.379106
32422 / tcp
-445721795 | 2025-03-23T13:57:17.215094
32522 / tcp
1282941221 | 2025-03-22T03:43:03.491957
32622 / tcp
233634112 | 2025-04-04T11:33:00.110570
32722 / tcp
-1990350878 | 2025-04-04T09:48:43.892802
32764 / tcp
-971970408 | 2025-03-28T09:42:51.069686
32822 / tcp
-1733645023 | 2025-03-23T03:56:17.153727
33060 / tcp
819727972 | 2025-04-01T21:37:30.251261
33338 / tcp
2087396567 | 2025-04-02T17:12:30.332696
33389 / tcp
-904840257 | 2025-03-13T17:40:59.110372
33622 / tcp
740837454 | 2025-03-21T05:08:43.874125
34422 / tcp
819727972 | 2025-03-15T00:40:12.491011
34922 / tcp
1690634669 | 2025-03-18T19:40:05.496161
35000 / tcp
-2089734047 | 2025-03-18T17:09:22.440587
35322 / tcp
291723434 | 2025-03-17T08:28:31.590941
35422 / tcp
740837454 | 2025-03-18T23:07:16.391479
35522 / tcp
-321444299 | 2025-03-17T01:32:34.561360
35524 / tcp
-1399940268 | 2025-03-25T12:22:41.872053
35531 / tcp
1911457608 | 2025-03-06T16:25:36.432610
35822 / tcp
2087396567 | 2025-03-17T17:36:41.612333
35922 / tcp
1741579575 | 2025-03-16T22:03:53.804936
36022 / tcp
1519486042 | 2025-03-17T21:07:06.670359
36122 / tcp
1282941221 | 2025-03-13T09:49:37.890346
36222 / tcp
1189133115 | 2025-03-17T19:51:48.487982
37122 / tcp
1741579575 | 2025-03-16T23:06:47.526716
37215 / tcp
1426971893 | 2025-04-02T15:24:41.211365
37322 / tcp
-1648456501 | 2025-03-16T11:04:35.339636
37622 / tcp
2087396567 | 2025-03-16T01:58:23.679658
37722 / tcp
-1839934832 | 2025-03-16T00:09:50.274475
37777 / tcp
2087396567 | 2025-04-02T13:26:42.971097
37922 / tcp
1261582754 | 2025-03-18T00:27:11.130753
38022 / tcp
2087396567 | 2025-03-17T22:44:00.871176
38333 / tcp
1308377066 | 2025-03-28T18:37:28.433388
38522 / tcp
660175493 | 2025-03-13T23:44:20.697111
38880 / tcp
819727972 | 2025-04-02T16:58:10.483019
39122 / tcp
1741579575 | 2025-03-13T19:22:53.449467
39522 / tcp
2087396567 | 2025-03-11T09:09:15.448471
39622 / tcp
2087396567 | 2025-03-11T08:28:41.767167
40022 / tcp
-358801646 | 2025-03-09T10:40:05.478989
41022 / tcp
1632932802 | 2025-03-08T22:55:47.721869
41443 / tcp
2087396567 | 2025-03-14T03:13:16.507314
43009 / tcp
-1140468363 | 2025-03-27T02:32:49.757941
44158 / tcp
-433302150 | 2025-03-15T07:41:27.497445
44222 / tcp
-1013082686 | 2025-03-10T22:29:38.891670
44303 / tcp
921225407 | 2025-04-02T15:49:45.532656
44307 / tcp
945910976 | 2025-04-01T18:54:24.763407
44350 / tcp
1761482307 | 2025-04-03T11:39:45.117695
44400 / tcp
-1399940268 | 2025-03-25T20:51:51.936907
44818 / tcp
1353260875 | 2025-03-24T23:36:36.983217
45006 / tcp
921225407 | 2025-04-01T04:30:00.858200
45022 / tcp
740837454 | 2025-03-10T15:51:17.965936
45777 / tcp
-1399940268 | 2025-03-12T00:28:29.859913
45786 / tcp
-1428621233 | 2025-03-08T18:51:09.461702
45822 / tcp
2087396567 | 2025-03-10T12:56:32.782830
45922 / tcp
819727972 | 2025-03-10T14:37:12.035734
47808 / tcp
-2096652808 | 2025-03-31T11:02:55.191270
47822 / tcp
1919228981 | 2025-03-10T09:28:50.150309
48019 / tcp
1426971893 | 2025-03-10T04:20:04.387658
48222 / tcp
819727972 | 2025-03-10T03:45:40.763287
48522 / tcp
2087396567 | 2025-03-09T22:34:24.860020
48889 / tcp
-1888448627 | 2025-03-05T20:22:10.665337
48899 / tcp
1332894250 | 2025-03-31T08:58:54.227745
49152 / tcp
-726970723 | 2025-03-31T21:22:47.391083
49153 / tcp
819727972 | 2025-03-22T13:14:09.601048
49501 / tcp
-1399940268 | 2025-04-01T22:12:41.165256
49684 / tcp
1632932802 | 2025-03-19T01:51:24.018474
50000 / tcp
-1392039491 | 2025-04-02T05:17:18.132357
50022 / tcp
819727972 | 2025-03-28T14:42:25.534223
50042 / tcp
-1399940268 | 2025-03-22T20:02:00.191309
50070 / tcp
-358801646 | 2025-03-28T11:37:23.122122
50073 / tcp
575925250 | 2025-03-19T22:15:50.151654
50080 / tcp
-146605374 | 2025-03-15T20:31:14.735648
50100 / tcp
1996932384 | 2025-04-04T13:25:48.187708
50113 / tcp
-2096652808 | 2025-03-15T02:10:05.450629
51002 / tcp
-2089734047 | 2025-03-27T19:35:41.053329
51235 / tcp
-1887823886 | 2025-03-21T17:39:09.416656
52022 / tcp
819727972 | 2025-03-07T01:34:14.927211
53413 / tcp
1761482307 | 2025-03-29T08:13:24.084474
53481 / tcp
1911457608 | 2025-03-15T18:36:22.490892
53484 / tcp
1208318993 | 2025-03-09T21:13:16.149372
54138 / tcp
-971970408 | 2025-04-01T15:39:59.411210
54984 / tcp
1741579575 | 2025-03-21T07:12:51.312434
55222 / tcp
-1730858130 | 2025-03-07T02:15:34.913816
55422 / tcp
-1461540015 | 2025-03-06T17:54:21.414030
55443 / tcp
819727972 | 2025-03-24T19:09:26.766450
55553 / tcp
660175493 | 2025-03-29T08:05:30.750989
55822 / tcp
2087396567 | 2025-03-06T21:06:09.400095
57522 / tcp
-358801646 | 2025-03-06T13:11:32.478432
57778 / tcp
165188539 | 2025-03-28T19:55:31.960962
57781 / tcp
580340387 | 2025-04-02T10:19:43.420657
57787 / tcp
-358801646 | 2025-03-19T03:32:53.069433
58422 / tcp
819727972 | 2025-03-06T01:16:38.084700
58522 / tcp
-1428621233 | 2025-03-05T19:42:46.201044
58532 / tcp
-1399940268 | 2025-03-18T09:11:33.791113
58822 / tcp
472902042 | 2025-03-05T16:17:54.026882
59012 / tcp
1208318993 | 2025-03-06T23:34:59.229425
60001 / tcp
-1189269828 | 2025-03-15T02:59:29.641974
60099 / tcp
1332894250 | 2025-04-04T03:53:48.383323
60129 / tcp
2087396567 | 2025-03-31T18:54:30.341388
60443 / tcp
-262532376 | 2025-03-21T05:21:10.325738
61613 / tcp
-1399940268 | 2025-04-01T03:09:51.574331
61616 / tcp
1741579575 | 2025-03-24T17:20:34.059889
62016 / tcp
-1888448627 | 2025-03-25T21:05:01.915580
62078 / tcp
1978059005 | 2025-04-01T07:05:38.782390
63210 / tcp
-1681927087 | 2025-03-11T02:46:06.792301
63256 / tcp
1231376952 | 2025-03-16T14:31:49.866865
63260 / tcp
2087396567 | 2025-03-28T07:58:25.477033
63443 / tcp
321971019 | 2025-03-10T12:58:31.672915
64738 / tcp
2087396567 | 2025-03-15T05:16:03.698959



Contact Us

Shodan ® - All rights reserved