39.103.20.14

Regular View Raw Data Timeline
Last Seen: 2025-04-06

GeneralInformation

Country China
City Beijing
Organization Aliyun Computing Co., LTD
ISP Hangzhou Alibaba Advertising Co.,Ltd.
ASN AS37963

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2025(1)
CVE-2025-26465
6.8A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
2024(1)
CVE-2024-6387
8.1A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
2023(4)
CVE-2023-51767
7.0OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
CVE-2023-51385
6.5In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
CVE-2023-48795
5.9The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
CVE-2023-38408
9.8The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
2021(2)
CVE-2021-41617
7.0sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
CVE-2021-36368
3.7An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass, since nothing is being bypassed.
2020(2)
CVE-2020-15778
7.8scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
CVE-2020-14145
5.9The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
2019(4)
CVE-2019-16905
7.8OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
CVE-2019-6111
5.9An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
CVE-2019-6110
6.8In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
CVE-2019-6109
6.8An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
2018(3)
CVE-2018-20685
5.3In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
CVE-2018-15919
5.3Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
CVE-2018-15473
5.3OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
2017(1)
CVE-2017-15906
5.3The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
2016(9)
CVE-2016-20012
5.3OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
CVE-2016-10708
7.5sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
CVE-2016-10012
7.8The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
CVE-2016-10011
5.5authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
CVE-2016-10010
7.0sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
CVE-2016-10009
7.3Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
CVE-2016-3115
6.4Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
CVE-2016-1908
9.8The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
CVE-2016-0777
6.5The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
2015(4)
CVE-2015-6564
6.9Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
CVE-2015-6563
1.9The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
CVE-2015-5600
8.5The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
CVE-2015-5352
4.3The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
2014(3)
CVE-2014-2653
5.8The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
CVE-2014-2532
4.9sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
CVE-2014-1692
7.5The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.
2012(1)
CVE-2012-0814
3.5The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
2011(2)
CVE-2011-5000
3.5The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
CVE-2011-4327
2.1ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.
2010(3)
CVE-2010-5107
5.0The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
CVE-2010-4755
4.0The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
CVE-2010-4478
7.5OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
2008(1)
CVE-2008-3844
9.3Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
2007(1)
CVE-2007-2768
4.3OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.

OpenPorts

1113171920212223434953707980859397101102104110111119122143175179180189190243264311347389427443451480502515556602636666771789801830992993100010231080111911531177119312001433144314471459152115991723180018011830188319111926195219581962196620002002200320302057206320642067208120832087209121212200220122222323233223452376240424352443245524802557255925602562276228502995300130503066307330753083309731013103310831123116312431313138314731673179318731903196319832003256326832993306338833893503354937803790395040004002408541504157424242824321440144364443444444994500450645244530457247004786484048994911494950015007500950105025505350895122514051725223522452275240525052515253525952635269527152735275528054325443544655235558560556725721585859065938598660006002601063086505654465566633665366666668675567897001701270157018702070717170717171727173721874347474748075487634777377777788788780008001800480098017802280318061806480738079808380858087808980908099812681278128813581408145815781668171818181868199820082308237828382848291830083188333834383848385840984328443846584808504851385218545854885548556856085668574858185838590864386498728873287718810881288138817883188348841884788578864886888708872887588788880888689068999901090149017901890419042904690489051906490669076909190929095910391319137913891519159916191649167917791879218923692419257929193069307931093339398941894439480950595159527960096339690973499019926994399669981998899979998999910003100061001110015100231002610028100301003310051101341025010302104431044410554108921089410909109351100011002112101121111288114341148011601120001205612082120881210612118121241213512152121531215912175122001220712210122111222312229122351226312273122741228912292123011230212310123121232112322123451235812371124001241112421124401246312468124701247112474124861248812493124971249812541125461255012556125601256112566125691257012579125821258812590130471414714184143441440614900150021504015044151231544315673160101601216020160261604116056160741607616084160861609716098163111680016992169931777718001180031800418043180551805718081180941824518443185531900019200192332000020030201062020820256205472080020880210252123221255212602127121277212812128421288212942129821302213032132321379214002144322000220012202222067220692210722206222222240322556230232318223424244722500125082251052556526656266572701527016270172703628015280172808030003300113001930021300223002330222303033042230444305223071830722308223092231022312223132231337314223144331522316223182231922320223220232222323223240032422325223272232764329223306033222333223342233622337223402234122343223462234722349223500035100352223552235524357223582235922360223612236222366223672236982374223752237722378223812238322383333882238922393223952240722419224242044158443034430644307443204481845002450224544445822458864600147001478084782247990480224889949152491535000050003500065001250070501005010750202511065123551443534805413854984550005544355553555545555557780577826000160021601296044361613616166201662078632566326065432
11 / tcp
539065883 | 2025-03-27T16:16:26.179560
13 / tcp
285774454 | 2025-04-05T00:53:37.218591
17 / tcp
-1559123399 | 2025-03-31T09:35:47.879568
19 / tcp
829384519 | 2025-03-13T07:55:20.558794
20 / tcp
819727972 | 2025-04-03T18:18:27.276648
21 / tcp
1564456597 | 2025-03-20T21:32:07.343540
22 / tcp
-649223323 | 2025-03-21T07:24:56.591913
23 / tcp
676675086 | 2025-04-02T14:53:48.490238
43 / tcp
-784071826 | 2025-04-03T16:17:10.485483
49 / tcp
-1909001798 | 2025-03-14T16:07:01.084825
53 / tcp
1024248778 | 2025-03-29T07:12:45.313244
70 / tcp
-833941849 | 2025-03-17T20:50:44.928110
79 / tcp
-746345752 | 2025-03-21T16:29:58.710742
80 / tcp
-1663316578 | 2025-03-22T21:16:01.138790
85 / tcp
165188539 | 2025-03-29T00:20:50.410695
93 / tcp
-1399940268 | 2025-04-02T13:58:16.740471
97 / tcp
-1730858130 | 2025-04-06T02:16:23.156908
101 / tcp
819727972 | 2025-03-10T16:08:25.305867
102 / tcp
599074451 | 2025-03-26T15:42:52.342535
104 / tcp
-1399940268 | 2025-03-14T18:06:58.479596
110 / tcp
-1839934832 | 2025-03-27T21:27:55.939276
111 / tcp
-1497296514 | 2025-03-27T11:30:14.810713
119 / tcp
141730637 | 2025-03-22T04:58:26.564187
122 / tcp
597764502 | 2025-04-02T19:13:49.449480
143 / tcp
-398621179 | 2025-03-31T10:50:42.699325
175 / tcp
1134517380 | 2025-03-25T02:28:58.220689
179 / tcp
-399606100 | 2025-03-12T17:47:49.124960
180 / tcp
-358801646 | 2025-03-13T11:05:56.707272
189 / tcp
1282941221 | 2025-03-31T14:09:12.610989
190 / tcp
1363464823 | 2025-03-27T01:52:26.618607
243 / tcp
-1399940268 | 2025-03-11T04:56:17.523415
264 / tcp
-1932800090 | 2025-04-04T04:32:05.629956
311 / tcp
67948279 | 2025-03-15T02:58:50.075495
347 / tcp
-1730858130 | 2025-03-23T16:40:59.584385
389 / tcp
-1907080992 | 2025-03-31T07:05:07.054795
427 / tcp
1388449297 | 2025-03-19T00:11:02.374864
443 / tcp
1638645179 | 2025-03-16T04:50:16.270057
451 / tcp
-1399940268 | 2025-03-16T21:34:17.973210
480 / tcp
819727972 | 2025-03-23T20:24:10.962923
502 / tcp
1911457608 | 2025-03-22T10:28:36.939318
515 / tcp
2087396567 | 2025-04-04T20:21:31.348990
556 / tcp
-1399940268 | 2025-03-11T01:40:58.310280
602 / tcp
-2089734047 | 2025-03-14T10:14:12.925611
636 / tcp
826560219 | 2025-03-29T10:52:44.473392
666 / tcp
-1420968138 | 2025-03-23T12:19:25.503677
771 / tcp
-358801646 | 2025-03-25T07:29:14.818800
789 / tcp
165188539 | 2025-03-19T23:48:49.043405
801 / tcp
-1399940268 | 2025-03-13T03:23:48.842471
830 / tcp
103159425 | 2025-03-20T01:41:01.139156
992 / tcp
-936692830 | 2025-03-10T06:51:51.458372
993 / tcp
-1733645023 | 2025-03-28T09:31:37.876268
1000 / tcp
677934968 | 2025-04-04T16:56:07.245263
1023 / tcp
1830697416 | 2025-03-28T18:53:48.646195
1080 / tcp
1362344524 | 2025-03-21T03:30:01.443289
1119 / tcp
470305186 | 2025-04-02T18:28:57.296554
1153 / tcp
493955023 | 2025-04-04T17:13:43.491129
1177 / tcp
599074451 | 2025-04-05T11:46:55.734061
1193 / tcp
921225407 | 2025-03-08T20:03:43.353303
1200 / tcp
-2107996212 | 2025-04-04T07:27:11.617343
1433 / tcp
555056254 | 2025-03-15T02:01:39.587082
1443 / tcp
-1715152554 | 2025-03-16T04:50:14.416361
1447 / tcp
-1399940268 | 2025-03-24T09:39:15.181290
1459 / tcp
-1399940268 | 2025-03-22T11:38:45.258188
1521 / tcp
-1184558916 | 2025-03-25T01:02:24.909679
1599 / tcp
2087396567 | 2025-03-08T19:52:21.270420
1723 / tcp
-1608241410 | 2025-03-19T00:17:18.270864
1800 / tcp
-1189269828 | 2025-04-03T18:36:11.622938
1801 / tcp
-1299899661 | 2025-03-23T06:13:56.663413
1830 / tcp
-1399940268 | 2025-03-14T04:28:53.732601
1883 / tcp
819727972 | 2025-03-27T09:12:03.580713
1911 / tcp
819727972 | 2025-03-09T13:38:48.706599
1926 / tcp
819727972 | 2025-04-02T07:21:59.565931
1952 / tcp
1332894250 | 2025-03-29T13:23:18.539926
1958 / tcp
-1611764932 | 2025-03-16T06:58:18.506989
1962 / tcp
-1230049476 | 2025-03-27T01:59:13.373840
1966 / tcp
-1839934832 | 2025-03-26T18:20:07.311382
2000 / tcp
-2017887953 | 2025-04-05T10:00:14.334935
2002 / tcp
-1626979812 | 2025-03-18T15:17:09.631150
2003 / tcp
819727972 | 2025-03-25T16:28:07.554122
2030 / tcp
-877598700 | 2025-04-02T16:43:12.086116
2057 / tcp
1308377066 | 2025-03-25T04:01:40.702807
2063 / tcp
165188539 | 2025-03-15T17:14:27.439201
2064 / tcp
-1399940268 | 2025-03-31T09:53:44.004124
2067 / tcp
2033888749 | 2025-03-22T05:07:56.374736
2081 / tcp
103159425 | 2025-03-31T08:25:34.783699
2083 / tcp
1741579575 | 2025-04-02T09:23:54.239560
2087 / tcp
104385780 | 2025-03-24T19:16:51.166296
2091 / tcp
-2089734047 | 2025-04-03T11:53:19.007294
2121 / tcp
141730637 | 2025-03-14T12:04:12.852192
2200 / tcp
1023953321 | 2025-03-26T21:38:41.072945
2201 / tcp
-358801646 | 2025-04-03T22:05:23.494671
2222 / tcp
2036221768 | 2025-04-05T17:45:25.339123
2323 / tcp
1662205251 | 2025-03-19T18:42:31.342697
2332 / tcp
1960438949 | 2025-03-22T23:41:42.194216
2345 / tcp
-1399940268 | 2025-03-29T01:41:25.313973
2376 / tcp
671605376 | 2025-03-31T15:33:50.914013
2404 / tcp
819727972 | 2025-03-07T18:11:30.271940
2435 / tcp
-1261090339 | 2025-03-29T02:15:04.744624
2443 / tcp
-1795027372 | 2025-03-15T12:58:48.012027
2455 / tcp
740837454 | 2025-04-04T21:12:52.422165
2480 / tcp
-2118655245 | 2025-03-23T11:08:04.035174
2557 / tcp
-1804465946 | 2025-03-13T16:11:15.831635
2559 / tcp
-1899074860 | 2025-04-01T02:14:56.475429
2560 / tcp
819727972 | 2025-03-29T18:29:11.232438
2562 / tcp
1911457608 | 2025-03-18T12:36:12.507848
2762 / tcp
50497985 | 2025-04-05T19:01:43.430540
2850 / tcp
1911457608 | 2025-03-31T11:35:14.076808
2995 / tcp
117101543 | 2025-03-25T22:44:19.197700
3001 / tcp
921225407 | 2025-03-12T21:13:24.120937
3050 / tcp
-2089734047 | 2025-03-13T23:23:31.549662
3066 / tcp
819727972 | 2025-03-31T22:30:01.402635
3073 / tcp
819727972 | 2025-03-31T16:25:41.989429
3075 / tcp
1208318993 | 2025-04-06T07:43:02.232854
3083 / tcp
1911457608 | 2025-03-13T00:07:55.190062
3097 / tcp
-1399940268 | 2025-03-25T08:08:29.469563
3101 / tcp
-1399940268 | 2025-03-18T03:06:19.592297
3103 / tcp
-303199180 | 2025-03-24T21:10:06.333161
3108 / tcp
1919228981 | 2025-03-11T06:43:04.263730
3112 / tcp
2098371729 | 2025-03-14T01:27:43.114144
3116 / tcp
-1399940268 | 2025-04-05T21:25:54.315871
3124 / tcp
921225407 | 2025-03-15T21:22:24.426875
3131 / tcp
1919228981 | 2025-03-15T19:49:56.684550
3138 / tcp
1282941221 | 2025-03-09T19:15:08.220810
3147 / tcp
-441419608 | 2025-03-11T04:12:15.759984
3167 / tcp
-1399940268 | 2025-03-15T22:28:54.685540
3179 / tcp
819727972 | 2025-03-31T08:58:16.512035
3187 / tcp
1208318993 | 2025-03-21T20:04:13.028146
3190 / tcp
-2089734047 | 2025-03-20T18:31:02.208227
3196 / tcp
1911457608 | 2025-03-25T01:32:03.819958
3198 / tcp
-2089734047 | 2025-04-04T19:09:58.695552
3200 / tcp
1761482307 | 2025-03-19T21:21:03.690279
3256 / tcp
-1261090339 | 2025-03-14T19:05:29.766524
3268 / tcp
1727372229 | 2025-04-04T13:31:15.058987
3299 / tcp
1208318993 | 2025-03-19T22:26:32.129723
3306 / tcp
292351399 | 2025-03-29T04:54:20.480049
3388 / tcp
1911457608 | 2025-03-23T22:07:17.574968
3389 / tcp
848680996 | 2025-04-05T01:46:00.107729
3503 / tcp
-1399940268 | 2025-03-20T12:56:24.658868
3549 / tcp
1134517380 | 2025-04-05T23:01:05.489946
3780 / tcp
819727972 | 2025-03-27T08:33:32.167286
3790 / tcp
1308377066 | 2025-04-05T21:24:36.293508
3950 / tcp
-1626979812 | 2025-03-26T00:04:42.098185
4000 / tcp
-1960639992 | 2025-04-05T08:05:32.380733
4002 / tcp
-339084706 | 2025-03-16T19:44:49.527865
4085 / tcp
-1399940268 | 2025-03-11T15:19:56.583903
4150 / tcp
1189133115 | 2025-03-19T12:09:33.635585
4157 / tcp
-546659243 | 2025-04-01T17:56:33.560730
4242 / tcp
-1879056922 | 2025-03-24T18:43:02.399274
4282 / tcp
1220320909 | 2025-04-01T03:55:21.589772
4321 / tcp
-1250504565 | 2025-03-25T02:48:22.093520
4401 / tcp
707919486 | 2025-03-31T12:03:42.637804
4436 / tcp
1665283070 | 2025-03-22T22:01:18.352504
4443 / tcp
-1060562267 | 2025-04-04T13:29:51.356531
4444 / tcp
-1329831334 | 2025-03-21T15:55:56.504623
4499 / tcp
1911457608 | 2025-03-07T18:36:24.085636
4500 / tcp
1911457608 | 2025-03-14T04:38:10.070460
4506 / tcp
1996932384 | 2025-04-06T02:54:00.965118
4524 / tcp
-1399940268 | 2025-03-15T02:38:01.130626
4530 / tcp
-1399940268 | 2025-03-26T15:38:28.923242
4572 / tcp
1504401647 | 2025-03-31T15:36:04.359849
4700 / tcp
-1399940268 | 2025-03-19T19:33:23.641359
4786 / tcp
1830697416 | 2025-03-12T17:16:13.567070
4840 / tcp
-1399940268 | 2025-04-05T19:11:13.111137
4899 / tcp
1842524259 | 2025-03-13T05:44:29.795421
4911 / tcp
-1399940268 | 2025-03-23T22:33:52.667856
4949 / tcp
2087396567 | 2025-03-19T05:56:49.613333
5001 / tcp
-1839934832 | 2025-04-02T21:20:22.628782
5007 / tcp
-1327660293 | 2025-04-04T03:56:36.178166
5009 / tcp
-1413918021 | 2025-04-06T02:41:20.863814
5010 / tcp
165188539 | 2025-04-04T07:38:43.277308
5025 / tcp
-1399940268 | 2025-03-13T00:45:18.839566
5053 / tcp
-2089734047 | 2025-03-11T14:19:18.825922
5089 / tcp
1911457608 | 2025-03-31T08:56:31.192465
5122 / tcp
-904840257 | 2025-03-22T09:44:13.111765
5140 / tcp
-1399940268 | 2025-03-26T11:04:57.080250
5172 / tcp
1887224352 | 2025-04-02T08:34:11.020703
5223 / tcp
-1399940268 | 2025-03-13T12:30:47.899959
5224 / tcp
632542934 | 2025-03-11T20:27:40.746847
5227 / tcp
1189133115 | 2025-03-26T18:51:57.966795
5240 / tcp
-1399940268 | 2025-03-29T20:08:32.803077
5250 / tcp
-454087041 | 2025-03-09T10:04:01.853229
5251 / tcp
-2080784861 | 2025-03-24T09:18:20.195907
5253 / tcp
-585940771 | 2025-03-24T07:32:09.376393
5259 / tcp
320677201 | 2025-03-22T20:02:25.506159
5263 / tcp
-2089734047 | 2025-03-29T02:08:49.359167
5269 / tcp
-1165098486 | 2025-03-15T06:30:46.355477
5271 / tcp
671605376 | 2025-03-09T10:54:24.667851
5273 / tcp
819727972 | 2025-03-15T16:08:56.739817
5275 / tcp
-801484042 | 2025-03-20T13:05:06.577778
5280 / tcp
-2084705145 | 2025-03-09T10:26:53.032403
5432 / tcp
669849225 | 2025-04-03T06:28:05.012517
5443 / tcp
-1737707071 | 2025-03-17T14:56:37.043329
5446 / tcp
-1538260461 | 2025-03-08T14:58:39.206286
5523 / tcp
1911457608 | 2025-03-19T02:39:48.765548
5558 / tcp
-2031152423 | 2025-03-23T15:59:25.601076
5605 / tcp
-1428621233 | 2025-04-05T09:14:12.556120
5672 / tcp
575925250 | 2025-04-01T10:28:16.909534
5721 / tcp
165188539 | 2025-03-20T22:08:34.546477
5858 / tcp
-1399940268 | 2025-03-25T01:09:44.791373
5906 / tcp
-840053751 | 2025-04-05T15:34:08.693246
5938 / tcp
1919228981 | 2025-04-03T12:01:06.155459
5986 / tcp
2087396567 | 2025-03-23T09:26:35.830630
6000 / tcp
1504401647 | 2025-04-02T23:56:34.056595
6002 / tcp
1231376952 | 2025-04-05T12:14:58.761307
6010 / tcp
-1947777893 | 2025-03-09T19:34:54.887100
6308 / tcp
1308377066 | 2025-04-02T01:32:15.547383
6505 / tcp
-1105333987 | 2025-03-23T09:47:43.045311
6544 / tcp
-1888448627 | 2025-03-21T22:30:00.002642
6556 / tcp
1615193817 | 2025-03-10T13:41:35.337540
6633 / tcp
-1045760528 | 2025-03-26T22:09:55.553952
6653 / tcp
165188539 | 2025-03-13T00:16:19.097106
6666 / tcp
4935895 | 2025-03-14T23:04:08.353853
6668 / tcp
1363464823 | 2025-03-20T05:44:31.185745
6755 / tcp
1492413928 | 2025-03-10T21:23:38.513367
6789 / tcp
-2089734047 | 2025-03-11T21:36:03.675120
7001 / tcp
-829704895 | 2025-04-03T13:33:05.556433
7012 / tcp
165188539 | 2025-03-23T04:42:57.547672
7015 / tcp
819727972 | 2025-03-20T17:14:41.609620
7018 / tcp
-1399940268 | 2025-03-19T21:22:18.774531
7020 / tcp
-1733645023 | 2025-03-23T10:16:09.545008
7071 / tcp
-441419608 | 2025-03-16T17:17:48.701467
7170 / tcp
897328069 | 2025-03-28T17:24:08.862246
7171 / tcp
1282941221 | 2025-04-02T05:35:52.383401
7172 / tcp
-1888448627 | 2025-03-25T23:47:24.638347
7173 / tcp
-1399940268 | 2025-04-06T03:19:23.871238
7218 / tcp
1492413928 | 2025-03-11T01:33:52.544289
7434 / tcp
1996932384 | 2025-04-01T18:12:30.559946
7474 / tcp
-2118655245 | 2025-03-27T11:43:49.339042
7480 / tcp
165188539 | 2025-03-23T12:59:50.031065
7548 / tcp
660175493 | 2025-04-01T11:29:51.358365
7634 / tcp
1741579575 | 2025-04-01T15:29:46.810143
7773 / tcp
-2046514463 | 2025-03-14T18:12:34.055732
7777 / tcp
1391945995 | 2025-03-27T14:32:06.533605
7788 / tcp
-441419608 | 2025-03-28T17:28:55.074458
7887 / tcp
-1746074029 | 2025-04-06T00:15:40.178592
8000 / tcp
-1204391172 | 2025-03-16T06:19:58.169502
8001 / tcp
2103111368 | 2025-03-10T20:06:08.586965
8004 / tcp
921225407 | 2025-03-28T15:06:42.215214
8009 / tcp
539065883 | 2025-03-18T10:20:16.084307
8017 / tcp
1911457608 | 2025-03-19T02:36:41.281419
8022 / tcp
819727972 | 2025-03-11T02:40:25.047208
8031 / tcp
-18839499 | 2025-03-18T02:54:24.569081
8061 / tcp
-303199180 | 2025-03-31T07:02:49.997937
8064 / tcp
937756010 | 2025-04-04T01:29:53.327280
8073 / tcp
819727972 | 2025-03-17T02:55:53.369048
8079 / tcp
-2089734047 | 2025-04-01T00:23:18.419035
8083 / tcp
-2017887953 | 2025-04-01T08:30:56.636142
8085 / tcp
-345718689 | 2025-04-01T16:35:42.234321
8087 / tcp
165188539 | 2025-04-04T04:54:30.305076
8089 / tcp
-2096652808 | 2025-03-26T10:04:59.464003
8090 / tcp
0 | 2025-03-12T16:50:13.903723
8099 / tcp
623236583 | 2025-04-03T18:15:06.193517
8126 / tcp
-971970408 | 2025-03-21T13:39:28.623591
8127 / tcp
117101543 | 2025-03-31T05:47:45.194812
8128 / tcp
-1476017887 | 2025-04-01T02:35:31.134427
8135 / tcp
-1453516345 | 2025-03-24T02:56:11.049006
8140 / tcp
2087396567 | 2025-04-01T21:31:49.000969
8145 / tcp
51259122 | 2025-03-08T18:43:18.537769
8157 / tcp
117101543 | 2025-03-20T23:19:18.519382
8166 / tcp
-1399940268 | 2025-03-21T16:15:14.922105
8171 / tcp
1381121983 | 2025-04-06T00:17:46.823550
8181 / tcp
2087396567 | 2025-03-26T21:00:24.592584
8186 / tcp
1615193817 | 2025-03-12T23:38:44.522046
8199 / tcp
-1598265216 | 2025-03-11T08:01:38.440535
8200 / tcp
1320285193 | 2025-03-28T12:34:53.185006
8230 / tcp
-1013082686 | 2025-04-01T01:05:30.589411
8237 / tcp
165188539 | 2025-03-13T22:59:37.806365
8283 / tcp
-2140303521 | 2025-03-13T16:04:29.222363
8284 / tcp
-1032713145 | 2025-03-21T20:35:24.629124
8291 / tcp
-2089734047 | 2025-03-24T00:13:05.591093
8300 / tcp
-734440417 | 2025-03-16T11:45:40.124374
8318 / tcp
-122096153 | 2025-04-03T22:27:53.098382
8333 / tcp
-1729028106 | 2025-04-06T00:16:40.882381
8343 / tcp
1911457608 | 2025-04-02T00:57:31.241000
8384 / tcp
2087396567 | 2025-04-04T07:02:56.246191
8385 / tcp
1911457608 | 2025-04-05T20:48:38.055015
8409 / tcp
-980525298 | 2025-04-05T00:32:37.152718
8432 / tcp
165188539 | 2025-03-20T06:10:18.505200
8443 / tcp
-1959042930 | 2025-03-07T12:32:28.325585
8465 / tcp
-136006866 | 2025-03-23T04:08:11.137130
8480 / tcp
1543809371 | 2025-03-25T19:00:14.936130
8504 / tcp
-1399940268 | 2025-03-29T11:56:31.857290
8513 / tcp
-1453516345 | 2025-03-26T15:02:56.769385
8521 / tcp
-1713437100 | 2025-04-04T14:47:33.666882
8545 / tcp
819727972 | 2025-03-19T05:07:28.461652
8548 / tcp
1911457608 | 2025-03-14T19:55:46.221010
8554 / tcp
-971970408 | 2025-03-31T14:22:32.688918
8556 / tcp
819727972 | 2025-03-17T21:41:34.489819
8560 / tcp
-980525298 | 2025-03-24T05:26:28.669006
8566 / tcp
-1996280214 | 2025-04-02T00:20:42.125141
8574 / tcp
-1598265216 | 2025-03-26T00:48:52.511329
8581 / tcp
1632932802 | 2025-03-27T17:54:46.660829
8583 / tcp
1632932802 | 2025-04-03T01:04:19.492589
8590 / tcp
819727972 | 2025-03-19T23:24:31.148685
8643 / tcp
1911457608 | 2025-03-20T07:35:54.989041
8649 / tcp
1489954473 | 2025-04-05T05:05:43.147363
8728 / tcp
-2107996212 | 2025-04-01T01:39:53.972319
8732 / tcp
819727972 | 2025-03-26T05:12:42.301204
8771 / tcp
1911457608 | 2025-04-02T16:54:59.001871
8810 / tcp
2098371729 | 2025-03-29T20:26:01.808743
8812 / tcp
504717326 | 2025-03-17T13:03:05.406666
8813 / tcp
366084633 | 2025-04-05T00:02:04.997320
8817 / tcp
-2089734047 | 2025-03-22T00:42:27.451657
8831 / tcp
455076604 | 2025-03-31T19:44:26.459128
8834 / tcp
104385780 | 2025-04-03T22:56:31.798667
8841 / tcp
-1013082686 | 2025-03-12T09:48:26.560415
8847 / tcp
1911457608 | 2025-04-03T22:38:29.410654
8857 / tcp
575925250 | 2025-03-26T03:07:56.238264
8864 / tcp
819727972 | 2025-03-14T10:21:13.753642
8868 / tcp
-1399940268 | 2025-03-16T20:05:39.540771
8870 / tcp
-1399940268 | 2025-03-24T05:23:57.185031
8872 / tcp
-1399940268 | 2025-04-03T15:02:00.707958
8875 / tcp
897328069 | 2025-03-13T23:35:46.794574
8878 / tcp
-1399940268 | 2025-03-12T20:59:35.772640
8880 / tcp
897328069 | 2025-04-05T09:29:12.404497
8886 / tcp
1208318993 | 2025-03-08T21:23:13.526024
8906 / tcp
-1399940268 | 2025-03-22T08:15:20.432673
8999 / tcp
971933601 | 2025-03-07T17:19:23.377180
9010 / tcp
971933601 | 2025-03-13T20:20:57.869138
9014 / tcp
1574088840 | 2025-03-18T11:54:14.231628
9017 / tcp
1761482307 | 2025-03-28T17:32:53.792297
9018 / tcp
1911457608 | 2025-03-27T18:38:08.435813
9041 / tcp
-1839934832 | 2025-03-19T19:46:14.462118
9042 / tcp
-154107716 | 2025-03-20T10:20:50.457129
9046 / tcp
1332894250 | 2025-03-24T19:15:49.456944
9048 / tcp
-1399940268 | 2025-03-19T16:19:33.960218
9051 / tcp
-971970408 | 2025-03-13T18:59:48.120374
9064 / tcp
1208318993 | 2025-03-13T20:23:28.851586
9066 / tcp
321971019 | 2025-03-21T03:15:51.915524
9076 / tcp
-1399940268 | 2025-03-29T20:10:00.315118
9091 / tcp
-971970408 | 2025-03-27T18:39:21.431288
9092 / tcp
2098371729 | 2025-03-27T02:05:40.074701
9095 / tcp
1948301213 | 2025-04-04T13:56:05.284890
9103 / tcp
819727972 | 2025-04-03T01:26:31.857217
9131 / tcp
-1435414831 | 2025-03-15T10:34:43.576474
9137 / tcp
165188539 | 2025-03-24T21:54:30.846624
9138 / tcp
1911457608 | 2025-04-02T15:02:30.829931
9151 / tcp
-138733098 | 2025-03-22T16:17:30.348899
9159 / tcp
-1114821551 | 2025-04-02T16:26:32.127389
9161 / tcp
-1399940268 | 2025-04-04T21:23:46.595631
9164 / tcp
1911457608 | 2025-03-23T14:38:26.918731
9167 / tcp
-1399940268 | 2025-04-03T11:56:05.834505
9177 / tcp
165188539 | 2025-03-25T11:39:21.346136
9187 / tcp
-2031152423 | 2025-03-10T21:59:52.018735
9218 / tcp
-1399940268 | 2025-03-11T20:21:17.018541
9236 / tcp
-1611764932 | 2025-04-05T20:21:37.237883
9241 / tcp
-2031152423 | 2025-03-26T00:19:28.842503
9257 / tcp
-1888448627 | 2025-03-20T17:43:05.388604
9291 / tcp
-136006866 | 2025-03-11T21:01:43.784997
9306 / tcp
819727972 | 2025-04-02T19:57:46.814135
9307 / tcp
-1399940268 | 2025-03-13T20:45:27.197838
9310 / tcp
-2089734047 | 2025-03-16T12:59:34.602202
9333 / tcp
-345718689 | 2025-03-29T13:43:39.597503
9398 / tcp
-1872120160 | 2025-04-02T09:49:47.425019
9418 / tcp
694512854 | 2025-04-02T15:51:08.811054
9443 / tcp
1314075639 | 2025-03-12T10:03:25.765455
9480 / tcp
-2096652808 | 2025-03-31T16:33:17.642483
9505 / tcp
165188539 | 2025-03-15T20:24:33.523109
9515 / tcp
-358801646 | 2025-03-12T04:31:40.787152
9527 / tcp
-1737707071 | 2025-04-02T06:03:42.980474
9600 / tcp
-1899074860 | 2025-03-21T08:57:43.749729
9633 / tcp
2087396567 | 2025-04-05T11:15:35.557874
9690 / tcp
-1327660293 | 2025-03-21T22:47:06.788797
9734 / tcp
-407828767 | 2025-04-04T21:28:28.423014
9901 / tcp
-1399940268 | 2025-04-03T18:12:23.369759
9926 / tcp
-1428621233 | 2025-03-16T12:24:00.640195
9943 / tcp
751610770 | 2025-03-24T17:12:13.633089
9966 / tcp
-1399940268 | 2025-03-29T07:57:49.800326
9981 / tcp
0 | 2025-03-20T08:51:09.849171
9988 / tcp
-445721795 | 2025-03-23T18:42:07.790254
9997 / tcp
-1399940268 | 2025-04-02T18:35:52.420998
9998 / tcp
-1901729922 | 2025-03-31T16:13:25.800096
9999 / tcp
1161309183 | 2025-04-03T17:12:30.885069
10003 / tcp
-904840257 | 2025-03-20T20:45:06.430342
10006 / tcp
-1399940268 | 2025-03-28T16:47:46.976161
10011 / tcp
165188539 | 2025-03-10T23:14:24.549376
10015 / tcp
-1428621233 | 2025-03-09T04:28:36.861385
10023 / tcp
1623746877 | 2025-03-22T09:42:19.838253
10026 / tcp
-1399940268 | 2025-03-14T03:04:11.624135
10028 / tcp
321971019 | 2025-03-13T05:12:52.809218
10030 / tcp
819727972 | 2025-03-27T20:26:51.283212
10033 / tcp
819727972 | 2025-03-27T14:19:30.258785
10051 / tcp
1189133115 | 2025-03-14T16:31:24.455527
10134 / tcp
-616720387 | 2025-03-22T20:34:03.988923
10250 / tcp
-407828767 | 2025-03-22T18:49:04.278878
10302 / tcp
1911457608 | 2025-03-14T20:47:02.649269
10443 / tcp
819727972 | 2025-03-13T14:06:30.611233
10444 / tcp
819727972 | 2025-03-24T06:47:02.650915
10554 / tcp
1082732927 | 2025-03-27T18:31:44.994212
10892 / tcp
-1327660293 | 2025-03-09T07:46:51.082688
10894 / tcp
1911457608 | 2025-04-04T18:05:02.926409
10909 / tcp
2063598737 | 2025-04-02T18:14:56.800565
10935 / tcp
1543809371 | 2025-03-13T13:13:22.783782
11000 / tcp
-1399940268 | 2025-03-23T06:44:02.201160
11002 / tcp
-1036370807 | 2025-03-11T17:15:25.829231
11210 / tcp
-1399940268 | 2025-03-15T14:31:49.279096
11211 / tcp
-136006866 | 2025-04-04T04:43:50.698002
11288 / tcp
-1399940268 | 2025-04-02T18:36:59.918393
11434 / tcp
0 | 2025-03-25T14:48:49.906757
11480 / tcp
117101543 | 2025-03-12T20:44:38.692765
11601 / tcp
1975288991 | 2025-03-12T21:31:01.101888
12000 / tcp
-1368104760 | 2025-04-01T16:35:29.238650
12056 / tcp
-1839934832 | 2025-04-04T19:42:35.087486
12082 / tcp
-1230049476 | 2025-03-11T22:07:07.185376
12088 / tcp
819727972 | 2025-03-12T20:34:11.098168
12106 / tcp
-358801646 | 2025-03-18T17:55:28.912187
12118 / tcp
819727972 | 2025-03-12T05:53:53.747974
12124 / tcp
-1373613804 | 2025-04-01T13:38:18.041705
12135 / tcp
1208318993 | 2025-04-03T20:19:20.947291
12152 / tcp
-1399940268 | 2025-03-31T19:12:35.457291
12153 / tcp
-1839934832 | 2025-03-31T10:01:52.655066
12159 / tcp
-1099385124 | 2025-03-25T03:21:36.249875
12175 / tcp
-345718689 | 2025-03-25T00:24:18.827028
12200 / tcp
1282941221 | 2025-04-05T16:11:18.515155
12207 / tcp
-441419608 | 2025-03-19T02:37:23.900802
12210 / tcp
-1399940268 | 2025-03-19T15:14:10.684924
12211 / tcp
1911457608 | 2025-03-14T16:33:46.097217
12223 / tcp
740837454 | 2025-03-26T23:26:26.994472
12229 / tcp
-1059554316 | 2025-03-19T16:44:22.929198
12235 / tcp
321971019 | 2025-03-16T07:28:25.289675
12263 / tcp
-2107996212 | 2025-04-04T11:57:36.755943
12273 / tcp
-1810987450 | 2025-03-10T23:11:15.356849
12274 / tcp
-2031152423 | 2025-03-14T10:25:37.526571
12289 / tcp
-1598265216 | 2025-03-18T19:23:52.419967
12292 / tcp
1332894250 | 2025-03-25T07:03:41.658340
12301 / tcp
401555314 | 2025-03-13T09:28:46.802690
12302 / tcp
-2033111675 | 2025-03-24T20:12:09.236519
12310 / tcp
819727972 | 2025-03-20T19:48:28.962249
12312 / tcp
-1105333987 | 2025-04-01T18:23:19.839252
12321 / tcp
2103111368 | 2025-03-29T01:53:06.885788
12322 / tcp
709622286 | 2025-03-11T05:08:18.161378
12345 / tcp
488204803 | 2025-03-27T18:15:32.200004
12358 / tcp
1332894250 | 2025-04-05T15:46:34.858804
12371 / tcp
-2096652808 | 2025-03-12T16:37:25.409210
12400 / tcp
-1888448627 | 2025-03-16T09:19:18.660561
12411 / tcp
-1327660293 | 2025-03-29T08:34:27.318303
12421 / tcp
1911457608 | 2025-04-03T18:44:19.368327
12440 / tcp
-1399940268 | 2025-03-12T22:34:54.273881
12463 / tcp
1911457608 | 2025-04-02T00:29:11.755250
12468 / tcp
-1538260461 | 2025-03-16T15:43:45.910165
12470 / tcp
-1399940268 | 2025-03-12T11:07:04.315106
12471 / tcp
1911457608 | 2025-03-22T20:28:36.058096
12474 / tcp
921225407 | 2025-03-22T23:48:18.692399
12486 / tcp
165188539 | 2025-03-11T15:29:44.597638
12488 / tcp
819727972 | 2025-03-22T21:55:22.025506
12493 / tcp
-1611764932 | 2025-03-11T11:18:32.459955
12497 / tcp
165188539 | 2025-03-21T18:22:00.169618
12498 / tcp
1911457608 | 2025-03-22T01:07:21.078889
12541 / tcp
1989907056 | 2025-03-15T08:38:14.453261
12546 / tcp
504717326 | 2025-03-08T18:48:55.132663
12550 / tcp
-136006866 | 2025-03-25T08:10:40.851331
12556 / tcp
-146605374 | 2025-03-17T00:00:15.071165
12560 / tcp
-1399940268 | 2025-03-15T00:55:19.925065
12561 / tcp
-1399940268 | 2025-03-25T18:04:01.827372
12566 / tcp
-1730858130 | 2025-03-10T14:22:46.728543
12569 / tcp
1911457608 | 2025-03-25T04:02:18.895994
12570 / tcp
-2096652808 | 2025-03-15T11:32:28.004469
12579 / tcp
-904840257 | 2025-04-04T22:17:22.350257
12582 / tcp
165188539 | 2025-04-05T15:29:48.330033
12588 / tcp
1210754493 | 2025-03-29T07:34:20.617954
12590 / tcp
-1399940268 | 2025-03-13T05:17:27.746414
13047 / tcp
-1036370807 | 2025-03-11T23:44:31.670483
14147 / tcp
-345718689 | 2025-03-25T05:31:15.453429
14184 / tcp
-1399940268 | 2025-03-24T10:59:29.795764
14344 / tcp
1504401647 | 2025-03-29T17:58:34.550840
14406 / tcp
1504401647 | 2025-03-10T05:08:17.151583
14900 / tcp
-1399940268 | 2025-03-20T21:07:13.235413
15002 / tcp
-147424911 | 2025-04-01T20:29:29.782113
15040 / tcp
1620329124 | 2025-03-25T00:37:34.460548
15044 / tcp
-1810987450 | 2025-03-25T20:05:31.042379
15123 / tcp
671605376 | 2025-03-20T20:00:26.333059
15443 / tcp
2087396567 | 2025-03-14T06:24:29.792907
15673 / tcp
-1888448627 | 2025-03-26T21:44:10.454475
16010 / tcp
-971970408 | 2025-04-01T02:28:30.942120
16012 / tcp
-829363896 | 2025-03-07T15:48:13.704453
16020 / tcp
1308377066 | 2025-03-29T10:48:57.974218
16026 / tcp
2098371729 | 2025-03-18T11:04:49.680425
16041 / tcp
1991883981 | 2025-03-17T04:23:31.431126
16056 / tcp
-2089734047 | 2025-03-31T17:59:46.444337
16074 / tcp
2063598737 | 2025-04-04T19:48:15.634754
16076 / tcp
819727972 | 2025-03-28T09:04:28.709641
16084 / tcp
398077695 | 2025-03-09T04:33:36.269359
16086 / tcp
-1779118422 | 2025-03-19T08:44:03.493202
16097 / tcp
-1399940268 | 2025-03-13T20:41:43.416115
16098 / tcp
-1839934832 | 2025-03-18T06:56:07.396269
16311 / tcp
165188539 | 2025-04-03T06:44:17.981381
16800 / tcp
820958131 | 2025-03-10T12:11:20.761736
16992 / tcp
-1840324437 | 2025-03-31T07:56:15.808650
16993 / tcp
660175493 | 2025-03-22T16:00:31.399847
17777 / tcp
-653033013 | 2025-03-29T06:10:36.647847
18001 / tcp
-2107996212 | 2025-04-02T15:33:01.304438
18003 / tcp
-2089734047 | 2025-04-01T03:03:51.661810
18004 / tcp
-784071826 | 2025-03-13T02:28:07.213830
18043 / tcp
1911457608 | 2025-03-20T04:01:32.401750
18055 / tcp
1726594447 | 2025-04-06T00:35:31.790445
18057 / tcp
321971019 | 2025-03-24T23:23:15.563808
18081 / tcp
-1399940268 | 2025-03-31T16:38:28.040745
18094 / tcp
-2033111675 | 2025-04-05T22:39:38.207333
18245 / tcp
-1461540015 | 2025-04-03T23:55:42.829682
18443 / tcp
171352214 | 2025-03-15T11:11:30.986404
18553 / tcp
-971970408 | 2025-03-26T21:56:12.615984
19000 / tcp
-1013082686 | 2025-03-18T19:34:52.209017
19200 / tcp
2087396567 | 2025-03-27T19:54:33.484837
19233 / tcp
632542934 | 2025-03-26T17:55:58.316886
20000 / tcp
1900503736 | 2025-03-27T02:35:52.318143
20030 / tcp
-1730858130 | 2025-03-27T07:29:51.217137
20106 / tcp
1763259671 | 2025-04-03T06:07:12.405680
20208 / tcp
-1737707071 | 2025-03-12T08:52:24.045267
20256 / tcp
1308377066 | 2025-04-03T04:40:31.941770
20547 / tcp
-1839934832 | 2025-03-24T01:02:27.803742
20800 / tcp
-1399940268 | 2025-03-26T16:58:50.361905
20880 / tcp
1370263973 | 2025-03-16T01:24:36.053475
21025 / tcp
819727972 | 2025-03-29T14:09:02.388333
21232 / tcp
-1428621233 | 2025-03-15T14:53:18.857844
21255 / tcp
-1399940268 | 2025-03-18T12:29:57.977157
21260 / tcp
-832380282 | 2025-03-11T11:56:11.302922
21271 / tcp
-2089734047 | 2025-03-23T19:38:06.918841
21277 / tcp
1911457608 | 2025-03-25T21:39:49.765312
21281 / tcp
1208318993 | 2025-03-19T20:34:12.356348
21284 / tcp
1911457608 | 2025-03-11T19:58:55.923043
21288 / tcp
1911457608 | 2025-04-04T17:55:43.399780
21294 / tcp
597764502 | 2025-03-31T12:10:56.307440
21298 / tcp
-1399940268 | 2025-03-20T20:17:39.660040
21302 / tcp
1911457608 | 2025-04-04T01:10:39.438547
21303 / tcp
-1399940268 | 2025-03-10T17:01:00.764083
21323 / tcp
-1839934832 | 2025-03-18T02:53:06.952285
21379 / tcp
-1045760528 | 2025-04-03T11:21:34.419294
21400 / tcp
-1888448627 | 2025-03-19T22:41:45.477952
21443 / tcp
321971019 | 2025-03-26T23:57:20.109820
22000 / tcp
-971970408 | 2025-04-01T18:13:20.638803
22001 / tcp
-653033013 | 2025-04-04T05:12:45.013533
22022 / tcp
1911457608 | 2025-03-23T23:04:45.025821
22067 / tcp
-2096652808 | 2025-04-02T04:01:09.490234
22069 / tcp
-971970408 | 2025-03-25T02:19:50.330369
22107 / tcp
-1189269828 | 2025-03-24T15:09:22.668013
22206 / tcp
1911457608 | 2025-03-16T22:38:14.592326
22222 / tcp
-358801646 | 2025-03-18T14:08:16.515086
22403 / tcp
-1327660293 | 2025-03-17T13:00:31.821406
22556 / tcp
-345718689 | 2025-03-11T21:08:00.020855
23023 / tcp
819727972 | 2025-03-23T23:22:53.271392
23182 / tcp
-2089734047 | 2025-04-01T20:42:30.710180
23424 / tcp
2087396567 | 2025-04-03T08:05:38.403868
24472 / tcp
-1399940268 | 2025-04-05T04:46:24.991041
25001 / tcp
-1435414831 | 2025-03-26T19:05:49.176728
25082 / tcp
-904840257 | 2025-03-09T07:18:45.951861
25105 / tcp
-1453516345 | 2025-04-03T06:10:54.711952
25565 / tcp
1911457608 | 2025-03-24T21:20:13.555271
26656 / tcp
2087396567 | 2025-03-13T06:49:37.902715
26657 / tcp
1492413928 | 2025-03-28T03:12:07.377431
27015 / tcp
-80321085 | 2025-04-01T02:14:28.487828
27016 / tcp
2087396567 | 2025-03-29T09:54:19.188030
27017 / tcp
422524323 | 2025-03-25T11:58:26.919989
27036 / tcp
-971970408 | 2025-03-25T10:30:08.461873
28015 / tcp
1911457608 | 2025-03-28T02:02:14.995750
28017 / tcp
1082732927 | 2025-04-02T11:40:21.882860
28080 / tcp
819727972 | 2025-03-28T05:07:25.318173
30003 / tcp
-1448296133 | 2025-03-24T01:11:56.315979
30011 / tcp
1975288991 | 2025-04-03T19:03:17.662835
30019 / tcp
165188539 | 2025-03-21T14:29:18.668609
30021 / tcp
1911457608 | 2025-03-28T23:02:46.645819
30022 / tcp
-2081419599 | 2025-04-06T00:47:11.723480
30023 / tcp
1911457608 | 2025-04-01T13:47:30.398655
30222 / tcp
1282941221 | 2025-03-25T16:50:28.726778
30303 / tcp
-1713437100 | 2025-03-19T22:33:36.979096
30422 / tcp
2087396567 | 2025-03-26T08:15:51.294063
30444 / tcp
897328069 | 2025-03-08T18:45:24.671624
30522 / tcp
660175493 | 2025-04-06T06:05:15.222943
30718 / tcp
-305970756 | 2025-04-02T23:01:38.497941
30722 / tcp
-971970408 | 2025-04-05T06:12:39.731207
30822 / tcp
401555314 | 2025-03-12T20:14:49.928338
30922 / tcp
819727972 | 2025-04-05T23:01:24.618161
31022 / tcp
1690634669 | 2025-04-05T21:30:43.171934
31222 / tcp
819727972 | 2025-04-05T09:13:49.111028
31322 / tcp
-971970408 | 2025-03-25T07:49:13.959493
31337 / tcp
-1835577706 | 2025-03-25T00:03:27.666844
31422 / tcp
842535728 | 2025-03-25T04:06:29.309575
31443 / tcp
2087396567 | 2025-03-12T18:26:56.168839
31522 / tcp
-971970408 | 2025-04-04T22:40:10.910009
31622 / tcp
-971970408 | 2025-03-23T10:40:37.264467
31822 / tcp
-321444299 | 2025-04-04T14:12:06.224884
31922 / tcp
-321444299 | 2025-04-05T02:54:38.935567
32022 / tcp
1842524259 | 2025-04-05T04:01:47.633066
32202 / tcp
-2089734047 | 2025-03-10T13:33:24.452704
32222 / tcp
1278527606 | 2025-03-23T17:57:10.346656
32322 / tcp
380146262 | 2025-04-04T20:55:11.850530
32400 / tcp
2087396567 | 2025-03-31T16:28:10.732031
32422 / tcp
2087396567 | 2025-03-23T13:58:52.013545
32522 / tcp
897328069 | 2025-03-08T16:39:59.095951
32722 / tcp
-2017887953 | 2025-03-23T06:40:01.683865
32764 / tcp
1830697416 | 2025-04-02T21:16:39.854501
32922 / tcp
819727972 | 2025-03-23T02:22:19.876717
33060 / tcp
-971970408 | 2025-04-01T18:57:34.089250
33222 / tcp
1741579575 | 2025-03-20T00:17:24.278776
33322 / tcp
-1477838366 | 2025-03-22T07:59:10.307256
33422 / tcp
171352214 | 2025-03-19T17:20:15.624984
33622 / tcp
-527005584 | 2025-03-21T06:07:53.347535
33722 / tcp
-1059554316 | 2025-03-08T18:23:01.875975
34022 / tcp
1830187220 | 2025-03-20T17:45:39.492399
34122 / tcp
2087396567 | 2025-03-20T16:02:15.053008
34322 / tcp
2087396567 | 2025-03-19T19:16:41.662538
34622 / tcp
-1114821551 | 2025-03-19T10:18:03.525921
34722 / tcp
2087396567 | 2025-03-19T08:33:42.030824
34922 / tcp
1690634669 | 2025-03-18T20:19:38.649483
35000 / tcp
-1947777893 | 2025-03-16T23:38:33.469377
35100 / tcp
-1779118422 | 2025-03-27T02:32:04.432987
35222 / tcp
819727972 | 2025-03-18T10:22:34.472575
35522 / tcp
339872247 | 2025-03-17T02:01:34.603216
35524 / tcp
-1399940268 | 2025-03-15T18:26:10.960407
35722 / tcp
1212921144 | 2025-03-17T10:52:52.641405
35822 / tcp
1282941221 | 2025-03-17T18:16:02.211073
35922 / tcp
1723769361 | 2025-03-16T21:57:00.749030
36022 / tcp
-653033013 | 2025-03-17T21:43:49.580213
36122 / tcp
171352214 | 2025-03-13T10:31:32.193086
36222 / tcp
-971970408 | 2025-03-17T20:04:51.209241
36622 / tcp
422524323 | 2025-03-16T08:13:13.382031
36722 / tcp
2087396567 | 2025-03-17T05:46:04.657002
36982 / tcp
401555314 | 2025-03-10T01:42:12.121895
37422 / tcp
819727972 | 2025-03-15T12:32:57.576232
37522 / tcp
320677201 | 2025-03-16T10:06:53.457169
37722 / tcp
-319440554 | 2025-03-16T00:50:36.777791
37822 / tcp
-971970408 | 2025-03-14T02:10:17.591222
38122 / tcp
-1036370807 | 2025-03-15T17:57:14.275879
38322 / tcp
660175493 | 2025-03-15T14:14:45.430393
38333 / tcp
1282941221 | 2025-03-15T21:46:06.224916
38822 / tcp
2087396567 | 2025-03-12T16:38:13.201978
38922 / tcp
819727972 | 2025-03-13T15:58:11.647534
39322 / tcp
-952165951 | 2025-03-11T12:18:49.006215
39522 / tcp
1308377066 | 2025-03-11T09:50:12.485346
40722 / tcp
819727972 | 2025-03-08T15:16:26.085750
41922 / tcp
-746114901 | 2025-03-07T16:35:50.592750
42420 / tcp
1426971893 | 2025-03-23T18:44:42.766109
44158 / tcp
-433302150 | 2025-03-17T13:33:31.822261
44303 / tcp
-891714208 | 2025-03-19T04:49:19.108348
44306 / tcp
-1399940268 | 2025-03-27T10:44:57.386728
44307 / tcp
-904840257 | 2025-03-20T20:24:16.034170
44320 / tcp
-1399940268 | 2025-03-28T02:56:38.261668
44818 / tcp
819727972 | 2025-03-23T10:15:53.467475
45002 / tcp
-136006866 | 2025-03-29T09:35:51.673733
45022 / tcp
1690634669 | 2025-03-10T16:31:30.086709
45444 / tcp
-616720387 | 2025-04-02T16:54:19.723227
45822 / tcp
-2033111675 | 2025-03-10T13:04:36.789981
45886 / tcp
1996932384 | 2025-03-08T20:55:55.837719
46001 / tcp
1212285915 | 2025-03-27T20:06:28.300978
47001 / tcp
1911457608 | 2025-03-16T16:07:34.737142
47808 / tcp
1426971893 | 2025-03-24T04:33:58.186656
47822 / tcp
-2017887953 | 2025-03-10T09:35:31.093623
47990 / tcp
-2096652808 | 2025-03-09T09:52:19.929648
48022 / tcp
-2096652808 | 2025-03-07T11:36:46.531951
48899 / tcp
660175493 | 2025-03-31T09:39:48.921282
49152 / tcp
1686199642 | 2025-03-31T21:25:25.045911
49153 / tcp
-1375131644 | 2025-04-02T08:33:48.561385
50000 / tcp
2087396567 | 2025-04-05T08:40:04.827231
50003 / tcp
597764502 | 2025-03-29T17:48:20.368340
50006 / tcp
-147424911 | 2025-03-08T18:35:53.006127
50012 / tcp
-1399940268 | 2025-03-24T23:51:43.254826
50070 / tcp
-792826324 | 2025-03-22T00:58:23.881799
50100 / tcp
1919228981 | 2025-04-02T03:34:15.619714
50107 / tcp
1911457608 | 2025-03-24T21:39:51.624397
50202 / tcp
1332894250 | 2025-03-18T16:08:20.179663
51106 / tcp
-358801646 | 2025-03-29T20:56:16.618752
51235 / tcp
-1461540015 | 2025-04-01T20:29:30.276776
51443 / tcp
-971970408 | 2025-03-12T01:17:15.621354
53480 / tcp
-297128567 | 2025-03-28T14:57:50.838552
54138 / tcp
-154107716 | 2025-04-01T16:35:56.152894
54984 / tcp
-971970408 | 2025-03-28T22:59:05.038889
55000 / tcp
117101543 | 2025-03-17T20:29:56.215010
55443 / tcp
-1230049476 | 2025-03-18T03:07:44.696228
55553 / tcp
104385780 | 2025-04-03T01:32:42.095587
55554 / tcp
233634112 | 2025-04-04T20:25:53.323725
55555 / tcp
-147424911 | 2025-03-07T10:24:49.748873
57780 / tcp
-1327660293 | 2025-03-21T08:07:20.284740
57782 / tcp
-1399940268 | 2025-03-20T00:30:15.142769
60001 / tcp
1852418385 | 2025-03-29T06:24:26.548751
60021 / tcp
-792826324 | 2025-03-25T19:26:47.419889
60129 / tcp
2087396567 | 2025-04-03T12:38:48.014973
60443 / tcp
115332119 | 2025-03-16T20:06:36.068775
61613 / tcp
1911457608 | 2025-03-17T15:07:40.206011
61616 / tcp
585675468 | 2025-03-29T03:56:33.092171
62016 / tcp
-1036370807 | 2025-03-28T08:23:36.833751
62078 / tcp
-860824904 | 2025-03-25T10:39:53.923918
63256 / tcp
1189133115 | 2025-03-31T15:55:28.029652
63260 / tcp
-1148066627 | 2025-03-28T08:37:42.718572
65432 / tcp
632542934 | 2025-03-14T22:25:10.009796



Contact Us

Shodan ® - All rights reserved