Last Seen: 2025-04-29

GeneralInformation

OpenPorts

172123243738437980851001021041131221351431751771791891952213113854274434444654805035135155485545916667437717898438538739479929951023102510801099115313371370143314431452145615151521158816041723180118831911192619501951195319621970198120002003201020482066208120872103210921212130215422002209222222262266232323322345237624042423244424552551255625632566256725692570262827623001301230163048305130603061307230743079309030923096310831093110311431303135313631383143314431483155316331643168318131823193319432003221326032993306331033883389350335233530355035543794400240404072415741594165419042004242428243004321434343694401443344344443448244884500450245064573478648404899491149334949500650095010508350935201520952245225522752355238526752695277543554405444555255965600560356725696585859385984599360006001606061346308635264436500655066036605665366666667666866866755708470867171721873737415744374807537754876347676768777777900794679998001800280128015802080218038803980548072807580778078807980818082808380878089809080938111811381198124812681318139814081438157816981758189819081958197820082918393840384068412841484328443846584808485850085218545856785768581858985928594860686078688870487288805880688158816882588298834883888648883888588918899898090029014901690189021903090409042906090639066907190769077908290959108911091139124912691299150915191529153915791609169918791939199920192039210921192469250930593069311931393989418944394459465948096009674971198769898992299299943994499509955998899989999100011000710022100341004010042100661009010134102101025010397104431055410909109111093511000111011111211210112111128811300116801211012120121451215312166121751217712180121861219912211122241222912234122461224712258122821229012302123111231812319123291234812351123521235812386123881239212394124091242012430124321244212444124501245712468124831249612497125081252412534125441255112562125691258112582129021322814026143441440014403150821508415443155551600216003160091603916042160501605116055160591606416083160901610416464168311699317000170011708417182177781800618009180121801418036180381804118043180461805018058180591808118082180901810018110182451855319000192001922219999200002001820053200872009020151202562044020547208802102521027212492125321283212882130321312213162132521379213812144322000220222208222103225562260922703230232444225565266572701527016270172703628015280172808030001300023000330122303013030330422307183082231017313373144331522317223182232122324003242232722327463276433060333383500036983372153777738080400294144341800424434415844301443994444445788475344799048889488994915249688500005008050100501035012250202505805077751004512355144353482541385444455443600016002161616620786244362865632566367664295
17 / tcp
-1784271535 | 2025-04-24T05:40:01.211050
21 / tcp
-702037155 | 2025-04-20T03:51:58.657182
23 / tcp
460589547 | 2025-04-21T15:10:09.018411
24 / tcp
1189133115 | 2025-04-11T20:08:10.402167
37 / tcp
82767464 | 2025-04-25T18:20:55.519603
38 / tcp
-1399940268 | 2025-04-14T17:24:28.346658
43 / tcp
-971970408 | 2025-04-02T23:58:01.346293
79 / tcp
268196945 | 2025-04-27T18:22:33.170935
80 / tcp
1967118138 | 2025-04-27T22:37:17.510487
85 / tcp
1911457608 | 2025-04-28T11:22:06.425874
100 / tcp
-1399940268 | 2025-04-20T00:26:25.660064
102 / tcp
671605376 | 2025-04-22T07:10:46.378854
104 / tcp
-616720387 | 2025-04-17T00:39:55.024103
113 / tcp
-1698062300 | 2025-04-28T05:41:12.995475
122 / tcp
1623746877 | 2025-04-15T19:54:20.422316
135 / tcp
1141948216 | 2025-04-15T02:13:52.895777
143 / tcp
-398621179 | 2025-04-24T12:18:39.584775
175 / tcp
401555314 | 2025-04-07T09:50:11.613079
177 / tcp
819727972 | 2025-04-21T16:38:47.224975
179 / tcp
-399606100 | 2025-04-03T14:23:58.568302
189 / tcp
-1399940268 | 2025-03-31T21:13:28.429618
195 / tcp
1492413928 | 2025-04-22T05:55:43.348859
221 / tcp
-1795027372 | 2025-04-21T21:03:17.000948
311 / tcp
-1547976805 | 2025-04-15T16:00:26.395798
385 / tcp
-1746074029 | 2025-04-25T04:57:57.477100
427 / tcp
-826599962 | 2025-04-22T15:46:51.212665
443 / tcp
1638645179 | 2025-04-27T10:00:56.572219
444 / tcp
338841907 | 2025-04-03T02:01:50.765802
465 / tcp
897328069 | 2025-04-25T23:39:51.208912
480 / tcp
-616720387 | 2025-04-26T21:36:05.399993
503 / tcp
-653033013 | 2025-04-09T11:19:00.144847
513 / tcp
-1045760528 | 2025-04-27T21:32:30.254364
515 / tcp
1948301213 | 2025-04-25T21:45:18.158830
548 / tcp
444328471 | 2025-04-06T09:21:28.403507
554 / tcp
1060450357 | 2025-04-23T21:22:11.214169
591 / tcp
-1059554316 | 2025-04-20T20:33:46.371707
666 / tcp
1300162323 | 2025-04-20T08:23:51.082057
743 / tcp
1504401647 | 2025-04-25T20:18:29.255917
771 / tcp
-1746074029 | 2025-04-24T07:56:41.792091
789 / tcp
-1013082686 | 2025-04-06T03:12:51.395058
843 / tcp
-2004989248 | 2025-04-19T13:11:34.715398
853 / tcp
2143387245 | 2025-04-14T19:57:19.517773
873 / tcp
-976882525 | 2025-04-26T15:24:00.435723
947 / tcp
-1399940268 | 2025-04-11T09:46:52.146358
992 / tcp
-1718295362 | 2025-04-21T04:40:50.773320
995 / tcp
-2113068813 | 2025-04-13T00:26:41.689517
1023 / tcp
-1626979812 | 2025-04-26T22:23:37.269745
1025 / tcp
575925250 | 2025-04-10T22:00:27.426745
1080 / tcp
1362344524 | 2025-04-28T01:29:55.587029
1099 / tcp
819727972 | 2025-04-24T19:24:35.727375
1153 / tcp
1011407350 | 2025-04-20T21:37:14.649217
1337 / tcp
-971970408 | 2025-04-28T15:24:30.224252
1370 / tcp
-1329831334 | 2025-04-02T07:14:59.030862
1433 / tcp
-271790512 | 2025-04-25T01:07:13.624553
1443 / tcp
-1715152554 | 2025-04-27T10:00:53.319584
1452 / tcp
1991883981 | 2025-04-04T08:26:06.023318
1456 / tcp
-1189269828 | 2025-04-01T13:50:03.626673
1515 / tcp
-1733645023 | 2025-04-16T13:40:51.179540
1521 / tcp
1869192275 | 2025-04-20T08:34:08.016705
1588 / tcp
-274082663 | 2025-04-27T18:17:44.859432
1604 / tcp
1492413928 | 2025-04-23T13:07:16.251745
1723 / tcp
-1608241410 | 2025-03-31T07:53:25.462827
1801 / tcp
1692069329 | 2025-04-24T00:39:30.512590
1883 / tcp
1830187220 | 2025-03-31T06:46:19.214305
1911 / tcp
-1730858130 | 2025-04-26T14:22:20.355113
1926 / tcp
2087396567 | 2025-04-23T18:42:34.580650
1950 / tcp
1911457608 | 2025-04-20T19:35:08.829018
1951 / tcp
-1399940268 | 2025-04-04T00:35:01.801779
1953 / tcp
165188539 | 2025-04-26T22:57:53.210468
1962 / tcp
819727972 | 2025-04-22T06:48:31.216614
1970 / tcp
-2096652808 | 2025-04-15T15:48:29.418678
1981 / tcp
119860953 | 2025-04-25T20:26:20.390991
2000 / tcp
-1399940268 | 2025-04-22T04:56:06.788417
2003 / tcp
-1839934832 | 2025-04-25T10:34:32.377006
2010 / tcp
-1888448627 | 2025-04-24T16:46:53.655642
2048 / tcp
-1399940268 | 2025-04-17T19:46:34.158982
2066 / tcp
-1888448627 | 2025-04-11T23:51:27.567359
2081 / tcp
1363464823 | 2025-04-06T04:42:42.698406
2087 / tcp
-1730858130 | 2025-04-26T06:23:37.424415
2103 / tcp
826567260 | 2025-04-10T13:57:03.787323
2109 / tcp
-1013082686 | 2025-04-09T11:01:31.648851
2121 / tcp
141730637 | 2025-04-21T23:44:08.352093
2130 / tcp
-1888448627 | 2025-04-03T19:44:57.595095
2154 / tcp
-1399940268 | 2025-04-08T23:21:17.897393
2200 / tcp
1023953321 | 2025-04-01T16:03:59.877910
2209 / tcp
1504401647 | 2025-04-08T17:15:18.559116
2222 / tcp
58083962 | 2025-04-20T01:06:07.811830
2226 / tcp
1278527606 | 2025-04-21T22:12:24.133211
2266 / tcp
819727972 | 2025-04-10T02:56:12.981260
2323 / tcp
1662205251 | 2025-04-17T23:15:28.772441
2332 / tcp
897328069 | 2025-04-16T00:44:00.476264
2345 / tcp
1213931722 | 2025-04-06T15:49:13.522849
2376 / tcp
819727972 | 2025-04-04T16:27:08.701371
2404 / tcp
632542934 | 2025-04-12T19:27:10.269140
2423 / tcp
819727972 | 2025-04-21T18:43:14.128448
2444 / tcp
1911457608 | 2025-04-21T02:54:43.614643
2455 / tcp
117101543 | 2025-04-28T23:16:23.815915
2551 / tcp
-1399940268 | 2025-04-02T02:41:14.064107
2556 / tcp
945910976 | 2025-04-17T20:29:52.423951
2563 / tcp
1492413928 | 2025-04-21T23:53:34.343414
2566 / tcp
1543809371 | 2025-04-10T18:21:15.755016
2567 / tcp
1189133115 | 2025-04-05T10:11:47.980304
2569 / tcp
1762042191 | 2025-04-12T21:44:05.100046
2570 / tcp
504717326 | 2025-04-23T09:03:03.514966
2628 / tcp
178736976 | 2025-04-23T00:25:52.322302
2762 / tcp
-904840257 | 2025-04-22T20:35:34.949081
3001 / tcp
-1900404274 | 2025-04-08T22:06:49.607991
3012 / tcp
2098371729 | 2025-04-25T06:07:22.133968
3016 / tcp
-2107996212 | 2025-04-28T03:35:54.104149
3048 / tcp
-1888448627 | 2025-04-23T18:40:02.144756
3051 / tcp
819727972 | 2025-04-04T10:07:47.584738
3060 / tcp
1504401647 | 2025-04-23T03:43:24.867481
3061 / tcp
493955023 | 2025-04-03T08:47:09.058594
3072 / tcp
-1105333987 | 2025-04-17T02:47:18.605229
3074 / tcp
-445721795 | 2025-04-22T04:06:10.146816
3079 / tcp
1911457608 | 2025-04-06T15:30:36.670130
3090 / tcp
722711397 | 2025-04-20T09:28:10.012444
3092 / tcp
-1099385124 | 2025-04-02T10:37:07.859403
3096 / tcp
1911457608 | 2025-04-04T21:46:17.896879
3108 / tcp
-1327660293 | 2025-04-21T04:42:05.796100
3109 / tcp
-2033111675 | 2025-04-06T11:05:19.528953
3110 / tcp
-2089734047 | 2025-04-27T16:46:52.073270
3114 / tcp
-653033013 | 2025-04-25T08:45:32.085674
3130 / tcp
-2089734047 | 2025-04-26T23:11:24.784926
3135 / tcp
-1888448627 | 2025-04-22T04:18:28.811201
3136 / tcp
1381121983 | 2025-04-01T05:50:58.968589
3138 / tcp
-1032713145 | 2025-04-17T21:12:55.020172
3143 / tcp
-1297953727 | 2025-04-15T13:46:59.058437
3144 / tcp
-441419608 | 2025-04-26T20:27:29.552436
3148 / tcp
-1947777893 | 2025-04-09T19:30:05.651089
3155 / tcp
-1297953727 | 2025-04-18T19:56:07.485329
3163 / tcp
-1399940268 | 2025-04-01T23:55:55.975527
3164 / tcp
-891714208 | 2025-04-06T19:37:42.227927
3168 / tcp
-1227409554 | 2025-04-03T12:15:18.097314
3181 / tcp
-1399940268 | 2025-04-12T11:25:45.311669
3182 / tcp
321971019 | 2025-04-08T13:28:55.642818
3193 / tcp
-1399940268 | 2025-04-05T21:54:47.915589
3194 / tcp
-303199180 | 2025-04-21T21:08:29.359602
3200 / tcp
-2089734047 | 2025-04-02T18:11:40.002337
3221 / tcp
-2019309480 | 2025-04-23T11:41:37.221681
3260 / tcp
-862070606 | 2025-04-20T18:38:18.726149
3299 / tcp
819727972 | 2025-04-15T19:24:33.105738
3306 / tcp
-1036944024 | 2025-04-08T17:36:06.862366
3310 / tcp
-1399940268 | 2025-04-23T03:00:32.561855
3388 / tcp
-2096652808 | 2025-04-07T22:20:17.843746
3389 / tcp
623170236 | 2025-04-24T02:39:22.897206
3503 / tcp
-1399940268 | 2025-04-09T20:07:45.747372
3523 / tcp
-1399940268 | 2025-04-19T21:39:21.291235
3530 / tcp
-249504111 | 2025-04-28T03:48:26.548221
3550 / tcp
-445721795 | 2025-04-24T20:37:32.440523
3554 / tcp
-1139539254 | 2025-04-11T08:18:09.389806
3794 / tcp
-2080784861 | 2025-04-05T11:56:44.241956
4002 / tcp
-303199180 | 2025-04-06T09:08:22.888745
4040 / tcp
-2118655245 | 2025-04-26T05:05:57.656869
4072 / tcp
-2089734047 | 2025-04-24T01:45:11.162573
4157 / tcp
1880683805 | 2025-04-26T20:34:50.798482
4159 / tcp
-1399940268 | 2025-04-06T07:46:47.159755
4165 / tcp
-2096652808 | 2025-04-19T17:48:26.468829
4190 / tcp
1767345577 | 2025-04-28T03:21:41.291440
4200 / tcp
-2089734047 | 2025-04-16T20:13:09.500912
4242 / tcp
-1914158197 | 2025-04-04T13:09:55.463477
4282 / tcp
459162008 | 2025-04-29T00:47:49.808617
4300 / tcp
-122096153 | 2025-04-26T22:57:54.038190
4321 / tcp
-269926141 | 2025-04-01T13:25:47.939533
4343 / tcp
1928678221 | 2025-04-20T22:18:18.935682
4369 / tcp
-1399940268 | 2025-04-23T19:02:44.841008
4401 / tcp
1282941221 | 2025-04-23T21:28:04.164027
4433 / tcp
2087396567 | 2025-04-23T18:37:24.382375
4434 / tcp
2087396567 | 2025-04-28T09:06:54.428073
4443 / tcp
1140068775 | 2025-04-12T18:42:08.894237
4482 / tcp
-2096652808 | 2025-04-16T06:09:42.304488
4488 / tcp
1911457608 | 2025-04-09T15:18:17.741325
4500 / tcp
819727972 | 2025-04-15T17:21:15.339005
4502 / tcp
-1399940268 | 2025-04-26T18:15:55.604910
4506 / tcp
-1136600457 | 2025-04-19T11:18:07.810969
4573 / tcp
-832380282 | 2025-04-09T09:48:03.127521
4786 / tcp
580340387 | 2025-04-22T03:34:45.227992
4840 / tcp
320677201 | 2025-04-18T20:47:36.747656
4899 / tcp
819727972 | 2025-04-19T02:57:44.260838
4911 / tcp
-1230049476 | 2025-04-26T00:53:51.964150
4933 / tcp
-1399940268 | 2025-04-01T15:20:33.708728
4949 / tcp
996960436 | 2025-04-23T15:35:25.755563
5006 / tcp
-616720387 | 2025-04-21T08:27:17.374926
5009 / tcp
1017429513 | 2025-04-15T15:29:12.307805
5010 / tcp
2121220663 | 2025-04-20T02:35:46.027200
5083 / tcp
819727972 | 2025-04-04T16:27:40.146121
5093 / tcp
1911457608 | 2025-04-11T22:06:52.459135
5201 / tcp
1396488228 | 2025-04-28T14:19:08.032369
5209 / tcp
1911457608 | 2025-04-21T12:48:47.617625
5224 / tcp
-1399940268 | 2025-04-14T21:51:52.033477
5225 / tcp
-1249500036 | 2025-04-05T02:58:19.435300
5227 / tcp
-1327660293 | 2025-04-27T18:49:11.174972
5235 / tcp
2098371729 | 2025-04-19T21:01:47.824835
5238 / tcp
1504401647 | 2025-04-23T00:16:32.821855
5267 / tcp
1134517380 | 2025-04-20T00:13:34.574521
5269 / tcp
-1165098486 | 2025-04-22T22:48:42.696855
5277 / tcp
1189133115 | 2025-04-06T17:45:00.051234
5435 / tcp
-1888448627 | 2025-04-20T07:03:57.153536
5440 / tcp
-109488528 | 2025-04-18T12:09:03.626661
5444 / tcp
-375604792 | 2025-04-25T02:57:16.640178
5552 / tcp
-1641514916 | 2025-04-10T04:57:56.017692
5596 / tcp
-1399940268 | 2025-04-07T13:51:57.110754
5600 / tcp
-142686627 | 2025-04-09T22:04:53.620155
5603 / tcp
-1399940268 | 2025-04-14T22:01:50.916534
5672 / tcp
575925250 | 2025-04-24T13:52:06.554725
5696 / tcp
-904840257 | 2025-04-28T13:32:43.450641
5858 / tcp
104385780 | 2025-04-02T10:12:16.553282
5938 / tcp
-441419608 | 2025-04-09T00:41:40.170208
5984 / tcp
1999272906 | 2025-04-21T11:25:44.199252
5993 / tcp
-2096652808 | 2025-04-18T17:18:51.044916
6000 / tcp
-180163620 | 2025-04-01T03:54:00.265433
6001 / tcp
120534451 | 2025-04-28T19:11:04.019330
6060 / tcp
-1810987450 | 2025-04-10T22:24:33.096048
6134 / tcp
632542934 | 2025-04-18T05:39:43.128471
6308 / tcp
321971019 | 2025-04-04T13:41:19.265068
6352 / tcp
1991883981 | 2025-04-15T20:48:59.231551
6443 / tcp
2087396567 | 2025-04-22T20:56:41.727777
6500 / tcp
1975288991 | 2025-04-03T07:22:59.091280
6550 / tcp
-1399940268 | 2025-04-26T18:46:55.757327
6603 / tcp
819727972 | 2025-04-28T14:36:11.911163
6605 / tcp
-1399940268 | 2025-04-21T13:12:55.492654
6653 / tcp
819727972 | 2025-04-21T20:29:01.458815
6666 / tcp
372433470 | 2025-04-28T09:26:26.891755
6667 / tcp
819727972 | 2025-04-15T21:24:09.931765
6668 / tcp
321971019 | 2025-04-27T23:38:05.132115
6686 / tcp
819727972 | 2025-04-11T09:37:59.494580
6755 / tcp
1830187220 | 2025-04-22T23:42:44.349214
7084 / tcp
-1399940268 | 2025-04-16T22:11:02.009091
7086 / tcp
1282941221 | 2025-04-28T19:16:22.638721
7171 / tcp
-1189269828 | 2025-04-22T13:56:25.642526
7218 / tcp
-1229955678 | 2025-04-23T18:21:27.357126
7373 / tcp
-1399940268 | 2025-04-25T13:20:36.302136
7415 / tcp
-1428621233 | 2025-04-17T01:32:40.365814
7443 / tcp
1320285193 | 2025-04-28T06:28:30.267176
7480 / tcp
1210754493 | 2025-04-20T14:25:14.008103
7537 / tcp
-2096652808 | 2025-04-15T07:14:12.421245
7548 / tcp
2087396567 | 2025-04-23T00:38:54.948527
7634 / tcp
2087396567 | 2025-04-23T16:18:28.921948
7676 / tcp
1767345577 | 2025-04-20T11:22:36.140013
7687 / tcp
-1888448627 | 2025-04-25T09:13:22.450720
7777 / tcp
1391945995 | 2025-04-07T09:07:58.387497
7900 / tcp
165188539 | 2025-04-18T17:49:46.140954
7946 / tcp
819727972 | 2025-04-14T16:16:00.481707
7999 / tcp
-1259524839 | 2025-04-21T01:09:14.325659
8001 / tcp
2103111368 | 2025-04-08T14:23:33.393377
8002 / tcp
1741579575 | 2025-04-08T11:15:14.404680
8012 / tcp
819727972 | 2025-04-18T20:44:07.170719
8015 / tcp
819727972 | 2025-04-24T06:50:53.591064
8020 / tcp
-1105333987 | 2025-04-29T01:16:07.149758
8021 / tcp
-73658652 | 2025-04-10T04:17:44.824748
8038 / tcp
2103111368 | 2025-04-15T21:24:19.903358
8039 / tcp
599074451 | 2025-04-22T16:58:44.312812
8054 / tcp
-1399940268 | 2025-04-05T15:24:45.037298
8072 / tcp
-1248408558 | 2025-04-08T12:50:15.840320
8075 / tcp
-274082663 | 2025-03-31T18:48:39.528406
8077 / tcp
-303199180 | 2025-04-03T00:02:07.825316
8078 / tcp
-1373613804 | 2025-04-19T03:25:43.386750
8079 / tcp
819727972 | 2025-04-14T21:07:03.904580
8081 / tcp
-1839934832 | 2025-04-18T01:24:35.909467
8082 / tcp
-1487943323 | 2025-04-22T10:46:16.147353
8083 / tcp
2087396567 | 2025-04-28T03:11:15.479817
8087 / tcp
-653033013 | 2025-04-23T22:52:42.256045
8089 / tcp
745343730 | 2025-04-20T11:12:12.138641
8090 / tcp
0 | 2025-04-22T03:48:23.130861
8093 / tcp
81614701 | 2025-04-17T02:27:31.320424
8111 / tcp
1077013874 | 2025-04-17T13:27:21.243298
8113 / tcp
493955023 | 2025-04-09T17:50:41.095812
8119 / tcp
-1399940268 | 2025-04-16T05:22:05.977317
8124 / tcp
-2089734047 | 2025-04-22T03:41:23.626848
8126 / tcp
-154107716 | 2025-04-16T19:37:50.942713
8131 / tcp
-180163620 | 2025-04-08T20:37:40.049334
8139 / tcp
-1713437100 | 2025-04-22T10:49:58.802050
8140 / tcp
1741579575 | 2025-04-28T20:35:06.012246
8143 / tcp
-653033013 | 2025-04-23T19:15:09.979841
8157 / tcp
-1399940268 | 2025-04-03T17:46:07.476190
8169 / tcp
1911457608 | 2025-04-12T03:05:36.270493
8175 / tcp
-2089734047 | 2025-04-08T18:48:48.528539
8189 / tcp
-2107996212 | 2025-04-24T03:11:46.037803
8190 / tcp
-616720387 | 2025-04-28T19:46:09.007676
8195 / tcp
-653033013 | 2025-04-19T20:24:40.411701
8197 / tcp
1911457608 | 2025-04-11T18:08:30.329625
8200 / tcp
618338916 | 2025-04-22T21:03:02.233535
8291 / tcp
-1598265216 | 2025-04-09T15:30:39.406465
8393 / tcp
-2107996212 | 2025-04-08T10:50:19.533377
8403 / tcp
-1148066627 | 2025-04-27T12:36:53.252063
8406 / tcp
307999478 | 2025-04-26T20:15:36.481324
8412 / tcp
1615193817 | 2025-04-10T19:31:20.899789
8414 / tcp
-1399940268 | 2025-04-10T20:39:29.891886
8432 / tcp
-1399940268 | 2025-04-23T02:03:56.112779
8443 / tcp
1096654864 | 2025-04-12T07:02:11.418297
8465 / tcp
-1019343788 | 2025-04-14T16:47:37.847211
8480 / tcp
-2096652808 | 2025-04-08T05:52:19.883353
8485 / tcp
1282941221 | 2025-04-06T13:01:55.025216
8500 / tcp
-1455149952 | 2025-04-17T05:06:29.604251
8521 / tcp
-1399940268 | 2025-04-18T11:00:50.137154
8545 / tcp
-1810987450 | 2025-04-12T11:38:49.033765
8567 / tcp
-1032713145 | 2025-04-20T14:09:20.006222
8576 / tcp
-1399940268 | 2025-04-09T06:59:55.021633
8581 / tcp
1767345577 | 2025-04-09T18:50:17.462001
8589 / tcp
1189133115 | 2025-04-20T07:30:25.089090
8592 / tcp
740837454 | 2025-04-24T20:31:20.766691
8594 / tcp
-2096652808 | 2025-04-27T05:43:33.394813
8606 / tcp
-136006866 | 2025-04-23T02:12:28.510622
8607 / tcp
-1487943323 | 2025-04-03T03:25:44.356526
8688 / tcp
1911457608 | 2025-04-22T01:07:37.591020
8704 / tcp
-1399940268 | 2025-04-02T00:28:37.329861
8728 / tcp
1911457608 | 2025-04-23T23:39:37.298184
8805 / tcp
-2107996212 | 2025-04-17T00:22:22.121478
8806 / tcp
632542934 | 2025-04-21T21:00:11.926716
8815 / tcp
580340387 | 2025-03-31T11:53:54.422832
8816 / tcp
632542934 | 2025-04-10T16:28:45.613790
8825 / tcp
-1265999252 | 2025-04-16T09:17:48.236069
8829 / tcp
165188539 | 2025-04-01T16:34:34.503346
8834 / tcp
1850902677 | 2025-04-19T05:17:59.616592
8838 / tcp
-1888448627 | 2025-04-25T15:04:07.709153
8864 / tcp
1642597142 | 2025-04-23T21:28:49.247264
8883 / tcp
398077695 | 2025-04-10T10:35:23.774611
8885 / tcp
1911457608 | 2025-04-06T22:56:58.372268
8891 / tcp
819727972 | 2025-04-15T15:08:28.092842
8899 / tcp
372433470 | 2025-04-11T11:42:09.203453
8980 / tcp
-1399940268 | 2025-03-31T08:18:24.410796
9002 / tcp
819727972 | 2025-04-28T22:28:12.104901
9014 / tcp
-1399940268 | 2025-04-14T16:55:41.609648
9016 / tcp
-1399940268 | 2025-04-12T22:01:03.878776
9018 / tcp
-1428621233 | 2025-04-16T06:51:44.304964
9021 / tcp
165188539 | 2025-04-12T21:28:52.186802
9030 / tcp
165188539 | 2025-04-27T17:00:13.380418
9040 / tcp
-753880919 | 2025-04-20T05:43:03.787911
9042 / tcp
2087396567 | 2025-04-14T16:25:48.587653
9060 / tcp
819727972 | 2025-04-25T12:53:45.771686
9063 / tcp
1396488228 | 2025-04-06T20:16:46.313946
9066 / tcp
-792826324 | 2025-04-05T17:54:29.357592
9071 / tcp
-1056270173 | 2025-04-27T19:01:50.032507
9076 / tcp
-1810987450 | 2025-04-20T18:05:04.757467
9077 / tcp
-792826324 | 2025-04-25T00:48:15.837304
9082 / tcp
321971019 | 2025-04-11T22:49:48.900761
9095 / tcp
819727972 | 2025-04-23T11:15:54.731086
9108 / tcp
1911457608 | 2025-04-06T00:07:43.761287
9110 / tcp
1095204583 | 2025-04-15T02:26:51.667913
9113 / tcp
1655023012 | 2025-04-21T23:13:00.835198
9124 / tcp
-1839934832 | 2025-04-07T20:29:02.415176
9126 / tcp
-2089734047 | 2025-04-25T04:38:18.010764
9129 / tcp
1911457608 | 2025-04-23T04:11:48.831896
9150 / tcp
-445721795 | 2025-04-05T17:12:54.651519
9151 / tcp
472902042 | 2025-04-03T22:12:55.417957
9152 / tcp
-2033111675 | 2025-04-21T16:48:59.150334
9153 / tcp
-2033111675 | 2025-04-23T16:58:50.867224
9157 / tcp
-1013082686 | 2025-04-16T10:20:54.030351
9160 / tcp
-1399940268 | 2025-04-12T09:01:11.187385
9169 / tcp
-1327660293 | 2025-04-08T22:47:59.998430
9187 / tcp
-1032713145 | 2025-04-21T13:19:46.918222
9193 / tcp
-441419608 | 2025-04-07T22:09:56.763823
9199 / tcp
1911457608 | 2025-04-19T21:03:16.234046
9201 / tcp
321971019 | 2025-04-09T21:00:46.313250
9203 / tcp
1011407350 | 2025-04-21T02:50:48.858872
9210 / tcp
-1399940268 | 2025-04-19T18:37:31.446792
9211 / tcp
-1399940268 | 2025-04-05T21:25:38.552634
9246 / tcp
1208318993 | 2025-04-28T09:26:43.228265
9250 / tcp
820958131 | 2025-04-21T20:01:49.390180
9305 / tcp
671605376 | 2025-04-28T18:38:20.069611
9306 / tcp
-358801646 | 2025-04-25T23:09:25.346665
9311 / tcp
-146605374 | 2025-04-06T21:22:24.761656
9313 / tcp
-1399940268 | 2025-04-20T19:58:04.696701
9398 / tcp
1077013874 | 2025-04-27T02:08:00.391356
9418 / tcp
-833168972 | 2025-04-27T19:50:46.624277
9443 / tcp
1137782177 | 2025-03-31T15:28:46.191319
9445 / tcp
1210754493 | 2025-04-10T22:56:20.405672
9465 / tcp
819727972 | 2025-04-06T15:45:00.175125
9480 / tcp
-1399940268 | 2025-04-22T19:06:47.966385
9600 / tcp
165188539 | 2025-04-15T19:20:00.444992
9674 / tcp
165188539 | 2025-04-15T18:40:07.604227
9711 / tcp
1911457608 | 2025-04-06T05:30:39.207918
9876 / tcp
-1709563712 | 2025-04-17T19:45:35.487997
9898 / tcp
1320285193 | 2025-04-15T20:53:39.728020
9922 / tcp
819727972 | 2025-04-07T20:48:22.048837
9929 / tcp
-2017887953 | 2025-04-25T04:33:20.120327
9943 / tcp
-1839864261 | 2025-04-09T08:16:30.526610
9944 / tcp
-1872120160 | 2025-04-08T07:47:50.611580
9950 / tcp
1911457608 | 2025-04-10T23:45:23.789815
9955 / tcp
401555314 | 2025-04-10T00:15:23.491869
9988 / tcp
1761482307 | 2025-04-11T00:36:15.257524
9998 / tcp
1637038794 | 2025-04-19T22:34:23.157896
9999 / tcp
1161309183 | 2025-04-23T12:45:47.021631
10001 / tcp
1492413928 | 2025-04-24T09:44:50.913769
10007 / tcp
-1399940268 | 2025-04-18T18:01:15.630814
10022 / tcp
819727972 | 2025-04-27T06:16:31.117091
10034 / tcp
-1746074029 | 2025-04-06T00:11:44.780804
10040 / tcp
-1453516345 | 2025-04-10T16:33:30.452324
10042 / tcp
-1810987450 | 2025-04-07T19:05:53.844395
10066 / tcp
1911457608 | 2025-04-20T07:13:27.958887
10090 / tcp
-1399940268 | 2025-04-20T14:46:37.085550
10134 / tcp
-2089734047 | 2025-04-26T00:55:48.809740
10210 / tcp
-1399940268 | 2025-03-31T17:08:05.220516
10250 / tcp
290819026 | 2025-04-03T03:19:58.520064
10397 / tcp
1282941221 | 2025-03-31T13:37:50.801028
10443 / tcp
-2096652808 | 2025-04-08T10:33:58.249948
10554 / tcp
2087396567 | 2025-04-19T09:30:51.769105
10909 / tcp
-1730858130 | 2025-04-09T04:39:51.482960
10911 / tcp
-1839934832 | 2025-04-15T19:45:47.587017
10935 / tcp
1574088840 | 2025-04-25T14:11:36.555547
11000 / tcp
-303199180 | 2025-04-19T17:22:23.447711
11101 / tcp
-2107996212 | 2025-04-17T23:55:07.228091
11112 / tcp
1492413928 | 2025-04-16T05:32:02.160663
11210 / tcp
-1746074029 | 2025-04-19T10:49:48.449127
11211 / tcp
-136006866 | 2025-04-22T19:21:39.538613
11288 / tcp
-1399940268 | 2025-04-28T08:19:05.827072
11300 / tcp
1911457608 | 2025-04-18T00:10:52.226157
11680 / tcp
-747911285 | 2025-04-25T13:53:43.604237
12110 / tcp
1911457608 | 2025-04-14T18:32:34.818743
12120 / tcp
1212285915 | 2025-04-06T23:29:09.313543
12145 / tcp
1911457608 | 2025-04-04T08:52:10.804760
12153 / tcp
-1105333987 | 2025-04-16T16:51:27.076254
12166 / tcp
945910976 | 2025-04-02T16:35:31.213039
12175 / tcp
-1839934832 | 2025-04-11T19:26:51.184141
12177 / tcp
669849225 | 2025-04-22T22:50:44.069799
12180 / tcp
-1399940268 | 2025-04-19T04:10:18.620818
12186 / tcp
455076604 | 2025-04-12T15:42:44.206765
12199 / tcp
-1399940268 | 2025-04-24T17:29:11.641288
12211 / tcp
1911457608 | 2025-04-22T00:26:33.769948
12224 / tcp
-1399940268 | 2025-04-18T19:56:40.926037
12229 / tcp
-1888448627 | 2025-04-23T14:38:16.157237
12234 / tcp
-303199180 | 2025-04-11T22:59:35.775689
12246 / tcp
1911457608 | 2025-04-27T09:46:14.433633
12247 / tcp
-2107996212 | 2025-04-17T22:38:17.508556
12258 / tcp
-1399940268 | 2025-04-03T11:51:37.142719
12282 / tcp
50497985 | 2025-03-31T10:40:49.528701
12290 / tcp
165188539 | 2025-04-24T09:20:08.909866
12302 / tcp
205347087 | 2025-04-20T17:16:32.162498
12311 / tcp
-1399940268 | 2025-04-27T20:10:46.187921
12318 / tcp
1911457608 | 2025-04-18T11:56:25.933741
12319 / tcp
1574088840 | 2025-04-27T11:15:40.721045
12329 / tcp
-1327660293 | 2025-03-31T10:23:59.362227
12348 / tcp
2143387245 | 2025-04-19T04:30:00.284108
12351 / tcp
-2089734047 | 2025-04-07T17:50:06.886065
12352 / tcp
677934968 | 2025-04-19T01:32:20.169341
12358 / tcp
-1399940268 | 2025-04-11T04:59:01.578352
12386 / tcp
-2096652808 | 2025-04-12T13:38:19.949033
12388 / tcp
-2096652808 | 2025-04-22T17:29:23.761070
12392 / tcp
-891714208 | 2025-04-03T17:50:45.087350
12394 / tcp
-1399940268 | 2025-04-27T04:45:36.914243
12409 / tcp
1767345577 | 2025-04-06T13:42:31.786828
12420 / tcp
-1839934832 | 2025-04-19T14:06:21.857143
12430 / tcp
-1598265216 | 2025-04-18T09:39:13.241344
12432 / tcp
-1598265216 | 2025-04-27T06:57:07.275777
12442 / tcp
-1996280214 | 2025-03-31T19:03:12.293184
12444 / tcp
-2089734047 | 2025-04-20T22:30:22.236861
12450 / tcp
321971019 | 2025-04-11T07:35:12.098196
12457 / tcp
-1399940268 | 2025-04-08T21:29:44.406338
12468 / tcp
1911457608 | 2025-04-09T20:00:21.422128
12483 / tcp
307999478 | 2025-04-16T10:27:56.825308
12496 / tcp
-1099385124 | 2025-04-20T08:15:59.139338
12497 / tcp
1911457608 | 2025-04-15T04:50:24.282355
12508 / tcp
-1399940268 | 2025-04-23T12:05:43.383813
12524 / tcp
-1399940268 | 2025-04-16T18:43:46.572880
12534 / tcp
-1399940268 | 2025-04-16T11:42:10.960668
12544 / tcp
119860953 | 2025-04-27T11:29:57.329020
12551 / tcp
-454087041 | 2025-04-27T11:11:23.401993
12562 / tcp
1911457608 | 2025-04-09T11:25:04.664226
12569 / tcp
-454087041 | 2025-04-24T16:18:38.590556
12581 / tcp
-1399940268 | 2025-04-04T06:32:35.256842
12582 / tcp
-1399940268 | 2025-04-11T20:10:28.141856
12902 / tcp
745343730 | 2025-04-09T17:49:52.858000
13228 / tcp
-653033013 | 2025-04-15T14:19:52.453211
14026 / tcp
-1399940268 | 2025-04-26T19:04:44.119114
14344 / tcp
1911457608 | 2025-04-07T13:51:34.524593
14400 / tcp
-1487943323 | 2025-04-16T23:06:03.733046
14403 / tcp
921225407 | 2025-04-20T23:38:00.675204
15082 / tcp
740837454 | 2025-04-28T09:45:17.774525
15084 / tcp
819727972 | 2025-04-09T18:04:33.504325
15443 / tcp
-1598265216 | 2025-04-06T23:38:01.357999
15555 / tcp
165188539 | 2025-04-22T02:05:53.404465
16002 / tcp
1543809371 | 2025-04-05T15:19:10.160383
16003 / tcp
819727972 | 2025-04-06T17:06:29.381643
16009 / tcp
-1996280214 | 2025-04-12T08:28:25.283228
16039 / tcp
819727972 | 2025-04-04T03:03:35.458925
16042 / tcp
-616720387 | 2025-04-03T21:45:48.840904
16050 / tcp
-2089734047 | 2025-04-16T02:04:34.614947
16051 / tcp
-2089734047 | 2025-04-22T06:37:01.605962
16055 / tcp
-1839934832 | 2025-04-10T21:44:25.432218
16059 / tcp
820958131 | 2025-04-21T03:54:50.560986
16064 / tcp
-2089734047 | 2025-04-27T03:02:06.600624
16083 / tcp
671605376 | 2025-04-05T00:59:45.191156
16090 / tcp
1830187220 | 2025-04-06T16:01:28.856931
16104 / tcp
1911457608 | 2025-04-25T19:07:16.258028
16464 / tcp
2087396567 | 2025-04-02T09:21:54.624015
16831 / tcp
-1399940268 | 2025-04-16T19:54:05.750490
16993 / tcp
-641479109 | 2025-03-31T23:49:34.750297
17000 / tcp
-1810987450 | 2025-04-03T18:42:57.700755
17001 / tcp
-1810987450 | 2025-04-07T17:05:32.862490
17084 / tcp
-1835475271 | 2025-04-02T11:35:54.268412
17182 / tcp
-1888448627 | 2025-04-28T01:20:57.754217
17778 / tcp
1308377066 | 2025-04-28T13:33:07.561384
18006 / tcp
1381121983 | 2025-04-23T09:57:01.650426
18009 / tcp
2098371729 | 2025-04-19T23:16:09.495374
18012 / tcp
1126993057 | 2025-04-19T12:35:19.444957
18014 / tcp
321971019 | 2025-04-18T18:58:18.798772
18036 / tcp
-445721795 | 2025-04-20T07:19:06.525314
18038 / tcp
1911457608 | 2025-04-02T03:48:48.187255
18041 / tcp
1308377066 | 2025-04-16T22:51:04.568465
18043 / tcp
89142341 | 2025-04-17T19:11:10.786090
18046 / tcp
-1399940268 | 2025-04-07T10:09:15.681084
18050 / tcp
-2089734047 | 2025-04-25T11:35:24.624748
18058 / tcp
-1327660293 | 2025-04-11T00:48:28.269170
18059 / tcp
819727972 | 2025-04-12T21:43:22.164056
18081 / tcp
-1730858130 | 2025-04-28T10:52:35.828537
18082 / tcp
-1626979812 | 2025-04-04T07:57:38.440223
18090 / tcp
-1399940268 | 2025-04-22T05:09:16.129999
18100 / tcp
-339084706 | 2025-04-12T23:44:12.006649
18110 / tcp
-180163620 | 2025-04-01T22:08:15.100342
18245 / tcp
-2096652808 | 2025-04-19T16:19:34.627206
18553 / tcp
2087396567 | 2025-04-06T19:56:28.270814
19000 / tcp
-1399940268 | 2025-04-16T10:20:27.225828
19200 / tcp
1286504516 | 2025-04-04T02:39:18.724025
19222 / tcp
-1327660293 | 2025-04-25T15:57:55.189147
19999 / tcp
-454087041 | 2025-04-29T00:15:57.988569
20000 / tcp
1900503736 | 2025-04-03T21:02:40.800649
20018 / tcp
1308377066 | 2025-04-12T00:55:56.885419
20053 / tcp
-653033013 | 2025-04-27T16:02:05.826034
20087 / tcp
2087396567 | 2025-04-03T00:18:25.549686
20090 / tcp
921225407 | 2025-04-03T10:26:59.983578
20151 / tcp
-1139539254 | 2025-04-10T23:25:47.212762
20256 / tcp
819727972 | 2025-04-26T14:07:04.814685
20440 / tcp
1911457608 | 2025-04-17T09:08:22.945935
20547 / tcp
321971019 | 2025-04-24T22:05:57.345494
20880 / tcp
1370263973 | 2025-04-26T01:54:28.778916
21025 / tcp
1321679546 | 2025-04-22T20:49:34.236515
21027 / tcp
-971970408 | 2025-04-04T08:35:44.962036
21249 / tcp
2063598737 | 2025-04-24T01:43:52.158364
21253 / tcp
-1399940268 | 2025-04-24T11:41:22.803270
21283 / tcp
-1399940268 | 2025-04-19T15:25:47.580640
21288 / tcp
1278527606 | 2025-04-09T19:59:47.714746
21303 / tcp
1504401647 | 2025-04-27T14:57:05.749908
21312 / tcp
1723769361 | 2025-04-08T00:10:37.220823
21316 / tcp
1975288991 | 2025-04-18T20:40:40.772536
21325 / tcp
1911457608 | 2025-04-02T19:29:39.637768
21379 / tcp
-1399940268 | 2025-04-25T14:57:03.811335
21381 / tcp
-358801646 | 2025-04-11T17:22:23.794721
21443 / tcp
-358801646 | 2025-04-07T15:00:40.833874
22000 / tcp
171352214 | 2025-04-01T18:55:27.688574
22022 / tcp
-1399940268 | 2025-04-06T18:31:57.412564
22082 / tcp
709622286 | 2025-04-23T03:50:01.538932
22103 / tcp
1278527606 | 2025-04-22T18:34:45.421990
22556 / tcp
2063598737 | 2025-04-21T02:32:35.388835
22609 / tcp
455076604 | 2025-04-07T03:23:39.045856
22703 / tcp
-1399940268 | 2025-04-25T12:21:47.451753
23023 / tcp
-1681927087 | 2025-04-27T07:45:38.356729
24442 / tcp
-1399940268 | 2025-04-04T12:09:20.294529
25565 / tcp
-2046514463 | 2025-04-23T14:00:57.951222
26657 / tcp
-1375131644 | 2025-04-07T14:34:30.200020
27015 / tcp
921225407 | 2025-04-29T01:59:34.364022
27016 / tcp
1741579575 | 2025-04-11T22:09:31.568738
27017 / tcp
1763259671 | 2025-04-24T21:06:30.290971
27036 / tcp
1690634669 | 2025-04-12T05:00:40.118316
28015 / tcp
819727972 | 2025-04-28T06:07:04.496542
28017 / tcp
2087396567 | 2025-04-12T00:48:15.552347
28080 / tcp
-358801646 | 2025-04-07T06:56:55.304283
30001 / tcp
-1746074029 | 2025-04-05T02:50:56.166090
30002 / tcp
1231376952 | 2025-04-18T15:13:10.606229
30003 / tcp
1492413928 | 2025-04-11T11:34:22.681510
30122 / tcp
819727972 | 2025-04-24T11:47:11.352969
30301 / tcp
2087396567 | 2025-03-31T18:29:40.969662
30303 / tcp
660175493 | 2025-04-09T13:02:23.788227
30422 / tcp
1842524259 | 2025-04-05T21:30:50.494840
30718 / tcp
-512818614 | 2025-04-11T19:35:01.645009
30822 / tcp
-971970408 | 2025-04-05T15:48:25.042599
31017 / tcp
819727972 | 2025-04-20T04:14:59.851314
31337 / tcp
-147424911 | 2025-04-28T21:03:50.684753
31443 / tcp
2087396567 | 2025-04-07T16:23:16.955599
31522 / tcp
539065883 | 2025-04-04T21:53:14.770346
31722 / tcp
-2096652808 | 2025-04-04T23:39:50.473851
31822 / tcp
2087396567 | 2025-04-04T13:41:30.037766
32122 / tcp
1984588611 | 2025-04-04T16:50:35.781229
32400 / tcp
2087396567 | 2025-04-12T03:34:14.552912
32422 / tcp
398077695 | 2025-04-04T18:21:29.967478
32722 / tcp
-2096652808 | 2025-04-04T09:43:05.368384
32746 / tcp
-375604792 | 2025-04-16T05:46:28.312186
32764 / tcp
1308377066 | 2025-04-24T23:36:22.274234
33060 / tcp
-2080784861 | 2025-04-01T20:57:36.150128
33338 / tcp
2087396567 | 2025-04-11T14:42:37.420915
35000 / tcp
1077013874 | 2025-04-06T08:20:30.482161
36983 / tcp
-1399940268 | 2025-04-28T04:56:08.158034
37215 / tcp
1308377066 | 2025-04-02T17:41:46.993197
37777 / tcp
-1730858130 | 2025-04-17T03:35:57.564482
38080 / tcp
1189133115 | 2025-04-05T17:15:28.115091
40029 / tcp
-375604792 | 2025-04-02T21:00:03.618695
41443 / tcp
-971970408 | 2025-04-07T20:13:54.610103
41800 / tcp
-1399940268 | 2025-04-28T01:09:50.775008
42443 / tcp
-2089734047 | 2025-04-17T10:26:39.208471
44158 / tcp
-433302150 | 2025-04-20T15:58:07.340565
44301 / tcp
-1399940268 | 2025-04-08T05:36:10.039159
44399 / tcp
-1899074860 | 2025-04-28T09:27:12.993369
44444 / tcp
1911457608 | 2025-04-24T10:19:19.373212
45788 / tcp
819727972 | 2025-04-10T22:19:17.394831
47534 / tcp
-1888448627 | 2025-04-11T07:58:59.705418
47990 / tcp
1353260875 | 2025-04-21T11:13:07.370001
48889 / tcp
-2089734047 | 2025-04-15T22:33:52.788608
48899 / tcp
1082732927 | 2025-03-31T08:53:01.702254
49152 / tcp
-447260792 | 2025-04-11T03:54:12.926575
49688 / tcp
-1399940268 | 2025-04-22T22:39:17.035672
50000 / tcp
-154107716 | 2025-04-22T20:29:42.617424
50080 / tcp
1830187220 | 2025-04-14T22:11:09.687784
50100 / tcp
-747911285 | 2025-04-25T04:01:02.215757
50103 / tcp
819727972 | 2025-04-12T23:18:12.238308
50122 / tcp
-1373613804 | 2025-04-24T19:47:05.621325
50202 / tcp
819727972 | 2025-04-06T01:20:19.830018
50580 / tcp
-980525298 | 2025-04-22T11:54:33.338124
50777 / tcp
1911457608 | 2025-04-02T08:21:49.744828
51004 / tcp
-1730858130 | 2025-04-26T02:05:27.391396
51235 / tcp
493955023 | 2025-04-26T21:53:38.493259
51443 / tcp
-971970408 | 2025-04-07T01:30:13.169995
53482 / tcp
165188539 | 2025-04-14T15:16:42.328999
54138 / tcp
-980525298 | 2025-04-25T01:22:31.399356
54444 / tcp
819727972 | 2025-04-07T22:07:11.193847
55443 / tcp
1161309183 | 2025-04-23T14:52:23.018352
60001 / tcp
-893477759 | 2025-04-09T18:41:47.906947
60021 / tcp
-792826324 | 2025-04-09T17:26:37.186236
61616 / tcp
971933601 | 2025-04-03T11:31:27.178711
62078 / tcp
-1113435755 | 2025-04-17T06:21:07.136530
62443 / tcp
971933601 | 2025-04-22T19:53:01.588813
62865 / tcp
-1713437100 | 2025-04-22T09:43:18.224393
63256 / tcp
366084633 | 2025-04-20T01:43:06.482753
63676 / tcp
-2031152423 | 2025-04-21T01:52:21.864257
64295 / tcp
-1899074860 | 2025-04-11T07:53:23.939989

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2025(1)
CVE-2025-26465
6.8A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
2024(1)
CVE-2024-6387
8.1A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
2023(4)
CVE-2023-51767
7.0OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
CVE-2023-51385
6.5In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
CVE-2023-48795
5.9The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
CVE-2023-38408
9.8The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
2021(2)
CVE-2021-41617
7.0sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
CVE-2021-36368
3.7An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass, since nothing is being bypassed.
2020(2)
CVE-2020-15778
7.8scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
CVE-2020-14145
5.9The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
2019(4)
CVE-2019-16905
7.8OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
CVE-2019-6111
5.9An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
CVE-2019-6110
6.8In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
CVE-2019-6109
6.8An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
2018(3)
CVE-2018-20685
5.3In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
CVE-2018-15919
5.3Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
CVE-2018-15473
5.3OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
2017(1)
CVE-2017-15906
5.3The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
2016(9)
CVE-2016-20012
5.3OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
CVE-2016-10708
7.5sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
CVE-2016-10012
7.8The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
CVE-2016-10011
5.5authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
CVE-2016-10010
7.0sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
CVE-2016-10009
7.3Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
CVE-2016-3115
6.4Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
CVE-2016-1908
9.8The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
CVE-2016-0777
6.5The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
2015(4)
CVE-2015-6564
6.9Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
CVE-2015-6563
1.9The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
CVE-2015-5600
8.5The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
CVE-2015-5352
4.3The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
2014(3)
CVE-2014-2653
5.8The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
CVE-2014-2532
4.9sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
CVE-2014-1692
7.5The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.
2012(1)
CVE-2012-0814
3.5The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
2011(2)
CVE-2011-5000
3.5The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
CVE-2011-4327
2.1ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.
2010(3)
CVE-2010-5107
5.0The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
CVE-2010-4755
4.0The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
CVE-2010-4478
7.5OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
2008(1)
CVE-2008-3844
9.3Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
2007(1)
CVE-2007-2768
4.3OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.



Contact Us

Shodan ® - All rights reserved