Last Seen: 2025-04-28

GeneralInformation

cn-beijing.oss.aliyuncs.com

OpenPorts

1317212425434970809310110210411011312213517517717919526431138944344444645346550251351554155459366674377178981184385387399299399910221023102510801099117711811190119512001234134313641414143314461450145415001515152115571599160417001800180118831901191119261947196219671970198320002001200220082012202020522054205920652067207020812082208320872096210021542181222222592323236224042423243524552552256825692628270927612806300130063012305030603062307630773079308430913095310331113117311931233129313031353142314531683169318031913194319932563260326833013306330733423365338833893408355135623563356635673780379038423951395440004022411741484155424242824321433344334440444444494500455048404899491149494999500150065007500950105025506151725201522252315259526052715278543554395552559255955609561356505672569859025907590959916002602060226134644364826512656065816653666666676697700170037010702270507071709071717434744375487634777177777782798080018009802280358036805080538054806880858089809981058118812681398140814281448147816281638168816981748179818181848195820082038243829183168318833384148422843184328436844384478450845384548467850485068554856285758578860186078649868086868707872887798791880488098815883388348840884288608861886988808889889989058943899990009001901490189021902590309034904290469055907690959100910591109112911391439148915191579169917091819190919892049209921492419256927393099312933393519376938793989410953096009633966397119761979798769898990099269929993099449998999910000100011001910028100291003310035100461005110075101001012310134101811021010225103481039010397103991044310554109111100011112112101121111288113001168012000121051212712128121361214312149121501216312168121701217412187121881221312238122431226412265122711227712278122911230012308123131231712318123191232212328123451238212383123911239312401124201242412426124281245212469124811248212488125141252112531125341253512542125441255312555125561258913333140841414714182142651434414400148941490915000151231550215588160101601416016160191605516061160701607116072160841608716094160991640016403164641688816993170001707017084171821777018008180151801918027180291804218048180591807018079180811808518089180941810718181182001823919000190141901719022200872015120185202562054720894210252108221232212482126021266212732128721293212952130221307213252135721379220002200122022220702222222556230232424524472250822510526657270152701627017270362801528818299843000230003300053001330022300273011130122303033052230894309223102231222314223144332322324443262233060333383524037777383334180042194422084242443200432214415844308443334440044444448184500045002456684708047808480024801848100491524915349686500005000750009500735010050102501135099750999510025123551294514435223052881541385444455000553505544355554577806000160023600306012961613620786208062443632106326065000
13 / tcp
-341265581 | 2025-04-24T23:02:34.532022
17 / tcp
134472555 | 2025-04-18T04:54:08.545620
21 / tcp
179309064 | 2025-04-10T19:30:52.174229
24 / tcp
-1795027372 | 2025-04-19T11:45:40.836727
25 / tcp
-2089734047 | 2025-04-22T19:35:07.630655
43 / tcp
1282941221 | 2025-04-14T21:16:56.187456
49 / tcp
-359657882 | 2025-04-08T06:20:47.381637
70 / tcp
175081126 | 2025-04-18T01:17:41.223987
80 / tcp
1881769185 | 2025-04-18T17:47:55.257161
93 / tcp
-122096153 | 2025-04-06T19:55:06.597405
101 / tcp
-1399940268 | 2025-04-06T16:27:35.506756
102 / tcp
669849225 | 2025-04-12T23:56:20.413879
104 / tcp
-2096652808 | 2025-04-22T23:32:34.676124
110 / tcp
-1399940268 | 2025-04-10T20:18:33.936401
113 / tcp
1921398876 | 2025-04-18T06:04:52.261603
122 / tcp
321971019 | 2025-04-28T17:07:53.465780
135 / tcp
1141948216 | 2025-04-21T09:16:39.975504
175 / tcp
-1399940268 | 2025-04-12T05:02:27.697700
177 / tcp
-1399940268 | 2025-04-12T02:25:40.578406
179 / tcp
-399606100 | 2025-04-17T13:25:27.411787
195 / tcp
2087396567 | 2025-04-28T06:29:32.981657
264 / tcp
-1709030885 | 2025-04-20T01:10:40.124312
311 / tcp
676753056 | 2025-04-07T06:32:58.582735
389 / tcp
-1743283776 | 2025-04-27T06:12:01.894649
443 / tcp
-291104996 | 2025-04-27T20:02:15.080995
444 / tcp
2032042134 | 2025-04-23T17:25:56.474804
446 / tcp
-1399940268 | 2025-04-07T03:17:33.629010
453 / tcp
-2089734047 | 2025-04-28T05:04:09.619258
465 / tcp
897328069 | 2025-04-27T01:08:51.185201
502 / tcp
-1013082686 | 2025-04-18T17:16:49.749068
513 / tcp
-1399940268 | 2025-04-07T18:13:04.226156
515 / tcp
921225407 | 2025-04-25T13:36:55.611996
541 / tcp
-1299118573 | 2025-04-15T09:41:32.523277
554 / tcp
-1142488525 | 2025-04-23T18:33:20.663900
593 / tcp
1308377066 | 2025-04-11T13:27:03.390771
666 / tcp
1300162323 | 2025-04-23T18:04:39.725998
743 / tcp
321971019 | 2025-04-11T18:16:50.286897
771 / tcp
-1399940268 | 2025-04-17T22:19:25.118885
789 / tcp
-1148066627 | 2025-04-17T02:49:01.117379
811 / tcp
-1013082686 | 2025-04-25T11:58:31.722649
843 / tcp
-2004989248 | 2025-04-03T14:40:10.276714
853 / tcp
-1399940268 | 2025-04-26T00:13:34.244055
873 / tcp
-1970692834 | 2025-04-15T03:27:36.567580
992 / tcp
-936692830 | 2025-04-05T10:16:15.232346
993 / tcp
-2089734047 | 2025-04-19T09:21:35.028897
999 / tcp
2061638597 | 2025-04-26T10:29:16.301678
1022 / tcp
819727972 | 2025-04-24T17:18:24.994110
1023 / tcp
-1900404274 | 2025-04-04T19:27:05.797462
1025 / tcp
-2089734047 | 2025-04-22T15:14:14.725452
1080 / tcp
1362344524 | 2025-04-21T06:18:49.365684
1099 / tcp
819727972 | 2025-04-12T09:23:52.900599
1177 / tcp
1842524259 | 2025-04-10T11:22:58.275141
1181 / tcp
398077695 | 2025-04-17T14:02:01.153650
1190 / tcp
1830187220 | 2025-04-19T01:30:05.123956
1195 / tcp
119860953 | 2025-04-06T22:43:19.265312
1200 / tcp
585675468 | 2025-04-27T03:39:50.496789
1234 / tcp
1830697416 | 2025-04-28T17:08:36.278342
1343 / tcp
1911457608 | 2025-04-06T07:13:12.622735
1364 / tcp
-1399940268 | 2025-04-17T20:06:35.822779
1414 / tcp
-1399940268 | 2025-04-27T05:47:29.411814
1433 / tcp
555056254 | 2025-04-25T07:50:35.864667
1446 / tcp
-1399940268 | 2025-04-16T18:30:10.054211
1450 / tcp
-303199180 | 2025-04-12T08:39:05.132189
1454 / tcp
-2046514463 | 2025-04-24T05:10:59.800533
1500 / tcp
-271515508 | 2025-04-09T09:14:12.299541
1515 / tcp
-358801646 | 2025-04-23T03:59:59.723967
1521 / tcp
-541815454 | 2025-04-17T06:27:42.258351
1557 / tcp
-1189269828 | 2025-04-11T00:28:29.567137
1599 / tcp
1353260875 | 2025-04-14T19:53:45.103824
1604 / tcp
-1399940268 | 2025-04-12T05:02:08.469629
1700 / tcp
1727667211 | 2025-04-20T09:39:48.287220
1800 / tcp
-2089734047 | 2025-04-04T18:21:16.314803
1801 / tcp
1692069329 | 2025-04-14T18:15:25.729353
1883 / tcp
-1399940268 | 2025-04-06T03:43:37.554343
1901 / tcp
677934968 | 2025-04-02T20:02:22.177214
1911 / tcp
-585940771 | 2025-04-01T22:52:00.902159
1926 / tcp
104385780 | 2025-04-20T18:57:30.734583
1947 / tcp
291260528 | 2025-04-03T05:41:31.516676
1962 / tcp
117101543 | 2025-04-14T16:01:53.383611
1967 / tcp
-358801646 | 2025-04-17T15:05:39.831893
1970 / tcp
-1626979812 | 2025-04-17T21:04:09.769998
1983 / tcp
-1611764932 | 2025-04-23T00:42:15.043438
2000 / tcp
-1399940268 | 2025-04-05T20:08:35.582347
2001 / tcp
51259122 | 2025-04-02T01:41:02.579326
2002 / tcp
-653033013 | 2025-04-28T06:28:23.611096
2008 / tcp
2087396567 | 2025-04-08T15:19:26.965545
2012 / tcp
-585940771 | 2025-04-26T08:37:21.701099
2020 / tcp
1230697277 | 2025-04-25T06:49:37.820717
2052 / tcp
320677201 | 2025-04-28T16:58:53.010873
2054 / tcp
1308377066 | 2025-04-06T21:46:14.920080
2059 / tcp
165188539 | 2025-04-02T03:58:33.120504
2065 / tcp
-42767839 | 2025-04-01T22:33:23.634934
2067 / tcp
1741579575 | 2025-04-01T22:18:54.861974
2070 / tcp
1911457608 | 2025-04-03T12:42:01.618843
2081 / tcp
-2089734047 | 2025-04-27T11:43:57.594232
2082 / tcp
0 | 2025-04-27T22:59:44.798499
2083 / tcp
2087396567 | 2025-04-27T02:18:24.590519
2087 / tcp
117101543 | 2025-04-18T10:56:24.625949
2096 / tcp
-1399940268 | 2025-04-09T10:52:23.545127
2100 / tcp
-1835475271 | 2025-04-07T21:36:43.788421
2154 / tcp
-1730858130 | 2025-04-17T20:02:36.103136
2181 / tcp
546151771 | 2025-04-06T21:28:41.834316
2222 / tcp
2051656595 | 2025-04-26T12:24:11.933227
2259 / tcp
819727972 | 2025-04-12T08:20:41.533934
2323 / tcp
1662205251 | 2025-04-09T09:50:54.432695
2362 / tcp
-784071826 | 2025-03-29T21:56:39.298166
2404 / tcp
-1888448627 | 2025-04-16T21:07:20.033704
2423 / tcp
-1598265216 | 2025-04-05T19:45:16.679447
2435 / tcp
-1013082686 | 2025-04-19T02:28:25.726244
2455 / tcp
2103111368 | 2025-04-24T07:31:13.764287
2552 / tcp
-1399940268 | 2025-04-06T10:03:29.998411
2568 / tcp
165188539 | 2025-04-23T18:41:28.225244
2569 / tcp
-303199180 | 2025-04-24T09:37:32.798574
2628 / tcp
1911457608 | 2025-04-23T16:51:42.549855
2709 / tcp
-2033111675 | 2025-04-01T19:55:05.737262
2761 / tcp
1134517380 | 2025-04-24T19:49:55.724841
2806 / tcp
-1733645023 | 2025-04-16T12:10:24.645514
3001 / tcp
-1399940268 | 2025-04-11T09:52:57.033934
3006 / tcp
1911457608 | 2025-04-28T12:29:00.026103
3012 / tcp
819727972 | 2025-04-14T23:44:06.048867
3050 / tcp
-1399940268 | 2025-04-06T18:21:44.439981
3060 / tcp
-1487943323 | 2025-04-26T20:51:54.015313
3062 / tcp
-1810987450 | 2025-04-17T16:52:10.569616
3076 / tcp
1623746877 | 2025-04-21T23:45:20.845104
3077 / tcp
198844676 | 2025-04-03T16:48:05.809281
3079 / tcp
-2096652808 | 2025-04-27T22:47:17.943825
3084 / tcp
-2089734047 | 2025-04-24T13:49:43.750852
3091 / tcp
50497985 | 2025-04-12T17:01:05.574639
3095 / tcp
-653033013 | 2025-04-03T21:35:17.324726
3103 / tcp
-457235091 | 2025-04-19T01:37:05.043049
3111 / tcp
165188539 | 2025-04-03T18:15:57.327726
3117 / tcp
-1399940268 | 2025-04-17T00:45:32.369546
3119 / tcp
493955023 | 2025-04-10T20:08:19.881384
3123 / tcp
493955023 | 2025-04-26T19:14:44.949049
3129 / tcp
-345718689 | 2025-04-08T21:57:27.890807
3130 / tcp
-1399940268 | 2025-04-01T06:03:05.287543
3135 / tcp
1911457608 | 2025-04-21T14:30:08.220473
3142 / tcp
-2089734047 | 2025-04-19T13:16:17.650954
3145 / tcp
819727972 | 2025-04-07T09:27:01.569344
3168 / tcp
-1227409554 | 2025-04-27T10:25:19.947827
3169 / tcp
819727972 | 2025-03-31T20:28:31.309282
3180 / tcp
-2089734047 | 2025-04-10T18:31:35.879416
3191 / tcp
1655023012 | 2025-04-02T22:54:57.827072
3194 / tcp
632542934 | 2025-04-09T13:20:44.261701
3199 / tcp
1948301213 | 2025-04-23T11:28:49.394457
3256 / tcp
-1428621233 | 2025-04-06T09:39:44.764142
3260 / tcp
-1914158197 | 2025-04-17T06:47:43.349572
3268 / tcp
-1547976805 | 2025-04-09T01:45:52.977116
3301 / tcp
-1399940268 | 2025-04-06T10:35:38.749172
3306 / tcp
1801207137 | 2025-04-26T06:12:26.363753
3307 / tcp
-1399940268 | 2025-04-03T15:02:54.898884
3342 / tcp
-274082663 | 2025-04-01T18:57:48.321913
3365 / tcp
205347087 | 2025-04-28T10:25:02.607110
3388 / tcp
-1810987450 | 2025-04-24T21:09:38.258814
3389 / tcp
740837454 | 2025-04-01T06:00:37.743494
3408 / tcp
1363464823 | 2025-04-16T00:44:51.197687
3551 / tcp
198844676 | 2025-04-12T02:13:28.104774
3562 / tcp
-1947777893 | 2025-04-05T23:32:05.472864
3563 / tcp
632542934 | 2025-04-05T21:22:55.543345
3566 / tcp
707919486 | 2025-04-24T06:54:52.075862
3567 / tcp
-441419608 | 2025-04-05T04:15:48.190761
3780 / tcp
104385780 | 2025-04-09T14:06:02.754678
3790 / tcp
1690634669 | 2025-04-12T04:06:10.669395
3842 / tcp
819727972 | 2025-04-16T03:59:55.342100
3951 / tcp
1911457608 | 2025-04-22T21:55:02.808060
3954 / tcp
-407828767 | 2025-04-10T19:47:35.652844
4000 / tcp
1123187653 | 2025-04-15T21:42:24.638698
4022 / tcp
321971019 | 2025-04-14T22:04:51.137968
4117 / tcp
-1399940268 | 2025-03-29T21:59:34.895958
4148 / tcp
-1026951088 | 2025-04-19T04:44:41.448239
4155 / tcp
1911457608 | 2025-03-31T12:26:03.022833
4242 / tcp
-1341662640 | 2025-04-28T15:40:05.944325
4282 / tcp
-1023516719 | 2025-04-25T23:46:01.548547
4321 / tcp
-1250504565 | 2025-04-25T15:44:31.743332
4333 / tcp
-2031152423 | 2025-04-17T23:06:09.562929
4433 / tcp
957278843 | 2025-04-27T22:08:48.164639
4440 / tcp
820958131 | 2025-04-04T07:04:47.538903
4444 / tcp
51259122 | 2025-04-10T22:57:01.363400
4449 / tcp
198844676 | 2025-04-11T02:40:07.535161
4500 / tcp
819727972 | 2025-04-18T22:01:25.202366
4550 / tcp
-1153110624 | 2025-04-21T13:25:27.886355
4840 / tcp
-1399940268 | 2025-04-19T13:32:07.111267
4899 / tcp
-1316398834 | 2025-04-23T17:23:29.490691
4911 / tcp
1911457608 | 2025-04-15T12:42:18.662219
4949 / tcp
-952165951 | 2025-04-28T15:54:28.819434
4999 / tcp
-1399940268 | 2025-04-10T15:18:21.441952
5001 / tcp
2087396567 | 2025-04-12T15:25:38.965858
5006 / tcp
410249975 | 2025-04-07T15:47:59.115434
5007 / tcp
51259122 | 2025-04-28T01:05:35.844205
5009 / tcp
-2015162143 | 2025-04-25T07:31:42.136199
5010 / tcp
-2089734047 | 2025-04-01T01:23:09.582187
5025 / tcp
819727972 | 2025-04-22T06:39:15.022357
5061 / tcp
1911457608 | 2025-04-17T17:42:04.029663
5172 / tcp
-358801646 | 2025-04-21T09:24:52.828659
5201 / tcp
1282941221 | 2025-04-26T00:55:45.620026
5222 / tcp
819727972 | 2025-04-16T17:05:22.951906
5231 / tcp
-2096652808 | 2025-04-27T02:58:17.622281
5259 / tcp
-358801646 | 2025-04-06T20:12:53.640784
5260 / tcp
-1105333987 | 2025-04-05T06:54:38.821124
5271 / tcp
-1996280214 | 2025-04-23T06:53:40.453264
5278 / tcp
-2089734047 | 2025-04-21T22:02:56.151581
5435 / tcp
1911457608 | 2025-04-26T19:15:55.431577
5439 / tcp
1623746877 | 2025-04-16T15:18:06.266122
5552 / tcp
-2089734047 | 2025-04-06T09:52:13.998906
5592 / tcp
1991883981 | 2025-04-17T05:35:55.044151
5595 / tcp
-1399940268 | 2025-04-15T01:48:50.181490
5609 / tcp
819727972 | 2025-04-10T20:02:16.839250
5613 / tcp
819727972 | 2025-04-20T03:37:12.576354
5650 / tcp
1911457608 | 2025-04-02T13:22:30.808872
5672 / tcp
575925250 | 2025-04-20T04:08:43.218116
5698 / tcp
-1795027372 | 2025-04-27T21:51:25.031641
5902 / tcp
-1730858130 | 2025-04-17T20:03:41.780436
5907 / tcp
-1399940268 | 2025-04-24T16:44:19.306448
5909 / tcp
-358801646 | 2025-03-31T20:17:45.159840
5991 / tcp
580340387 | 2025-04-27T10:42:35.033412
6002 / tcp
-893477759 | 2025-04-28T10:15:01.871810
6020 / tcp
820958131 | 2025-04-02T22:12:13.993637
6022 / tcp
819727972 | 2025-04-04T19:31:13.141319
6134 / tcp
-1399940268 | 2025-04-26T02:23:27.021115
6443 / tcp
-1733106930 | 2025-04-07T21:35:28.104188
6482 / tcp
-1114821551 | 2025-04-27T00:17:22.010370
6512 / tcp
-1013082686 | 2025-04-14T18:47:37.532328
6560 / tcp
-1888448627 | 2025-04-15T19:31:47.951053
6581 / tcp
1911457608 | 2025-04-26T19:18:24.403126
6653 / tcp
1574088840 | 2025-04-04T16:59:07.795305
6666 / tcp
4935895 | 2025-04-24T21:56:25.116886
6667 / tcp
-984990168 | 2025-04-08T06:01:28.419186
6697 / tcp
-1733645023 | 2025-04-17T03:31:36.152886
7001 / tcp
-274925451 | 2025-04-20T15:02:48.040109
7003 / tcp
1911457608 | 2025-04-12T17:45:29.288641
7010 / tcp
-441419608 | 2025-04-15T13:40:39.613949
7022 / tcp
-1189269828 | 2025-04-17T02:47:35.763855
7050 / tcp
-1399940268 | 2025-04-21T11:47:56.560433
7071 / tcp
-905685638 | 2025-04-16T12:56:01.631294
7090 / tcp
-1327660293 | 2025-04-11T17:25:43.264598
7171 / tcp
1911457608 | 2025-04-20T02:34:42.242520
7434 / tcp
-1428621233 | 2025-04-07T08:55:07.625297
7443 / tcp
-584993230 | 2025-04-23T09:31:04.925112
7548 / tcp
-1648456501 | 2025-04-11T02:47:02.173707
7634 / tcp
-527005584 | 2025-04-07T11:07:46.634604
7771 / tcp
-1839934832 | 2025-04-19T14:35:41.869967
7777 / tcp
1391945995 | 2025-04-07T10:12:37.021031
7782 / tcp
819727972 | 2025-04-16T10:29:55.955539
7980 / tcp
1077013874 | 2025-04-15T04:21:08.447138
8001 / tcp
2103111368 | 2025-04-08T15:10:52.012529
8009 / tcp
-784071826 | 2025-04-26T21:37:48.628487
8022 / tcp
819727972 | 2025-03-31T16:13:19.961043
8035 / tcp
1911457608 | 2025-04-06T19:28:50.275891
8036 / tcp
1282941221 | 2025-04-01T19:06:06.381680
8050 / tcp
165188539 | 2025-04-16T22:01:30.791646
8053 / tcp
-832380282 | 2025-04-15T23:06:03.578616
8054 / tcp
1911457608 | 2025-04-15T04:37:25.229757
8068 / tcp
-1399940268 | 2025-04-22T17:24:56.921957
8085 / tcp
2087396567 | 2025-04-02T19:07:16.138392
8089 / tcp
117101543 | 2025-04-12T20:13:34.124261
8099 / tcp
1825545421 | 2025-04-26T12:47:27.500802
8105 / tcp
321971019 | 2025-04-04T20:50:39.878854
8118 / tcp
1911457608 | 2025-04-22T21:56:09.815131
8126 / tcp
-445721795 | 2025-04-23T09:21:54.780310
8139 / tcp
1189133115 | 2025-04-04T05:00:32.154548
8140 / tcp
2087396567 | 2025-04-24T09:59:06.910009
8142 / tcp
632542934 | 2025-04-20T21:01:14.752376
8144 / tcp
1208318993 | 2025-04-23T16:17:54.017496
8147 / tcp
165188539 | 2025-04-09T10:36:08.012669
8162 / tcp
677934968 | 2025-04-10T22:13:03.365897
8163 / tcp
632542934 | 2025-04-21T15:52:56.617122
8168 / tcp
-2140303521 | 2025-04-03T15:53:05.149363
8169 / tcp
1911457608 | 2025-04-04T14:03:42.119854
8174 / tcp
1126993057 | 2025-04-28T11:12:19.042175
8179 / tcp
599074451 | 2025-04-06T21:07:08.850056
8181 / tcp
-1032713145 | 2025-04-27T16:51:40.511165
8184 / tcp
1126993057 | 2025-04-24T19:02:47.410578
8195 / tcp
-1327660293 | 2025-04-12T21:27:37.746390
8200 / tcp
-877598700 | 2025-04-28T00:39:52.161007
8203 / tcp
1332894250 | 2025-04-27T19:43:20.094573
8243 / tcp
-891714208 | 2025-04-10T20:26:00.907169
8291 / tcp
669849225 | 2025-04-21T03:26:22.575404
8316 / tcp
-1399940268 | 2025-04-22T01:27:44.638072
8318 / tcp
-747911285 | 2025-04-11T19:05:32.695500
8333 / tcp
1723769361 | 2025-04-17T00:56:11.916961
8414 / tcp
-1399940268 | 2025-04-28T13:20:21.103056
8422 / tcp
1911457608 | 2025-04-25T11:27:30.506268
8431 / tcp
-375604792 | 2025-04-23T11:28:20.304331
8432 / tcp
-2031152423 | 2025-04-22T02:37:44.098076
8436 / tcp
-1399940268 | 2025-04-06T08:36:52.460346
8443 / tcp
-1927320086 | 2025-04-11T02:42:30.050055
8447 / tcp
-1810987450 | 2025-04-12T06:54:45.564768
8450 / tcp
-1327660293 | 2025-04-22T20:42:33.834669
8453 / tcp
1911457608 | 2025-04-09T03:25:42.764278
8454 / tcp
-1399940268 | 2025-04-15T08:01:30.409513
8467 / tcp
1189133115 | 2025-04-08T20:15:48.289639
8504 / tcp
-1399940268 | 2025-04-10T04:07:40.923425
8506 / tcp
-1399940268 | 2025-04-03T15:09:00.466557
8554 / tcp
504717326 | 2025-04-07T16:47:12.047929
8562 / tcp
165188539 | 2025-04-09T01:25:10.137445
8575 / tcp
-1230049476 | 2025-04-06T06:50:08.398869
8578 / tcp
-1399940268 | 2025-04-05T04:42:13.945753
8601 / tcp
820958131 | 2025-04-17T22:57:19.470145
8607 / tcp
-1399940268 | 2025-03-29T20:11:41.005005
8649 / tcp
842535728 | 2025-04-10T12:56:30.711602
8680 / tcp
1911457608 | 2025-04-12T05:24:27.675315
8686 / tcp
-2096652808 | 2025-04-09T14:31:22.973390
8707 / tcp
921225407 | 2025-04-14T19:19:25.343553
8728 / tcp
-1888448627 | 2025-04-10T19:46:05.289965
8779 / tcp
-1399940268 | 2025-04-24T22:10:36.169302
8791 / tcp
819727972 | 2025-04-18T03:07:00.783250
8804 / tcp
819727972 | 2025-04-19T01:54:10.664787
8809 / tcp
639175818 | 2025-04-06T09:21:29.614567
8815 / tcp
819727972 | 2025-04-16T07:11:55.307917
8833 / tcp
-1399940268 | 2025-03-31T11:16:43.376116
8834 / tcp
971933601 | 2025-04-25T04:14:53.874864
8840 / tcp
-1373613804 | 2025-04-12T21:43:50.451211
8842 / tcp
-1373613804 | 2025-04-28T17:40:25.453166
8860 / tcp
1543809371 | 2025-04-02T02:39:43.640595
8861 / tcp
1996932384 | 2025-04-26T14:19:11.267099
8869 / tcp
-2046514463 | 2025-04-15T22:26:21.513840
8880 / tcp
-2096652808 | 2025-04-24T17:46:26.699353
8889 / tcp
842535728 | 2025-04-01T03:21:15.980285
8899 / tcp
372433470 | 2025-04-08T09:51:36.663615
8905 / tcp
15018106 | 2025-04-19T10:53:08.025693
8943 / tcp
-1265999252 | 2025-03-31T23:57:37.765591
8999 / tcp
1991883981 | 2025-04-19T20:55:59.356955
9000 / tcp
-2067028711 | 2025-04-24T16:24:51.404923
9001 / tcp
-1026951088 | 2025-04-05T06:00:46.140897
9014 / tcp
-445721795 | 2025-04-07T16:16:57.475863
9018 / tcp
1761482307 | 2025-04-01T15:13:46.981756
9021 / tcp
-1032713145 | 2025-04-11T11:48:12.941886
9025 / tcp
632542934 | 2025-04-19T17:13:15.416027
9030 / tcp
-2089734047 | 2025-04-07T17:51:46.746860
9034 / tcp
-1598265216 | 2025-04-24T09:47:37.380479
9042 / tcp
-893477759 | 2025-04-23T15:13:35.024952
9046 / tcp
-2089734047 | 2025-04-10T20:49:52.807218
9055 / tcp
-1476017887 | 2025-04-17T17:25:54.732934
9076 / tcp
-1399940268 | 2025-04-25T04:36:39.552969
9095 / tcp
-321444299 | 2025-04-11T05:18:41.100372
9100 / tcp
-1399940268 | 2025-04-25T01:05:08.875685
9105 / tcp
1332894250 | 2025-04-12T22:57:33.888978
9110 / tcp
123106056 | 2025-04-21T19:20:43.899759
9112 / tcp
-2096652808 | 2025-04-23T03:49:59.108257
9113 / tcp
-249504111 | 2025-04-24T09:49:51.489753
9143 / tcp
-457235091 | 2025-04-07T13:12:22.645456
9148 / tcp
165188539 | 2025-04-07T21:35:47.841614
9151 / tcp
233634112 | 2025-04-23T00:53:26.589917
9157 / tcp
-1399940268 | 2025-04-17T17:05:31.872929
9169 / tcp
1975288991 | 2025-04-26T22:06:04.401916
9170 / tcp
671605376 | 2025-04-09T04:12:18.778313
9181 / tcp
-1375131644 | 2025-04-19T14:34:32.020422
9190 / tcp
1911457608 | 2025-04-15T10:36:43.109608
9198 / tcp
-904840257 | 2025-04-17T00:19:34.915242
9204 / tcp
-792826324 | 2025-04-03T00:59:37.869067
9209 / tcp
-375604792 | 2025-04-27T19:19:04.369488
9214 / tcp
921225407 | 2025-04-23T04:28:52.851632
9241 / tcp
-358801646 | 2025-04-12T19:11:15.289422
9256 / tcp
632542934 | 2025-04-23T19:47:19.369046
9273 / tcp
819727972 | 2025-04-23T08:17:45.536236
9309 / tcp
-1399940268 | 2025-04-06T05:05:58.622995
9312 / tcp
-1399940268 | 2025-04-10T14:38:24.514478
9333 / tcp
-2140303521 | 2025-04-23T05:53:47.441624
9351 / tcp
-1399940268 | 2025-04-05T11:25:04.781741
9376 / tcp
-1045760528 | 2025-04-02T20:59:57.410738
9387 / tcp
-1888448627 | 2025-04-06T06:19:48.681570
9398 / tcp
1761482307 | 2025-04-23T20:46:54.211328
9410 / tcp
-358801646 | 2025-04-22T07:24:00.712185
9530 / tcp
1134517380 | 2025-04-06T09:50:42.970462
9600 / tcp
-2089734047 | 2025-04-25T00:46:48.093032
9633 / tcp
1690634669 | 2025-04-19T02:44:10.090948
9663 / tcp
-142686627 | 2025-04-23T09:12:59.901250
9711 / tcp
-1019343788 | 2025-04-01T03:40:18.568348
9761 / tcp
-1399940268 | 2025-04-01T18:35:46.955513
9797 / tcp
1212285915 | 2025-04-22T03:11:44.064366
9876 / tcp
1977569953 | 2025-04-10T01:57:46.091432
9898 / tcp
1615676803 | 2025-04-19T02:34:31.309174
9900 / tcp
-414819019 | 2025-04-04T00:49:04.139087
9926 / tcp
1308377066 | 2025-04-19T09:11:35.585839
9929 / tcp
-1399940268 | 2025-04-04T15:05:29.263734
9930 / tcp
-1428621233 | 2025-04-03T04:49:20.444409
9944 / tcp
1542849631 | 2025-04-08T07:53:52.688980
9998 / tcp
-696402907 | 2025-04-17T04:37:04.937758
9999 / tcp
1161309183 | 2025-04-22T09:06:06.370257
10000 / tcp
1761482307 | 2025-04-04T18:58:16.764202
10001 / tcp
1492413928 | 2025-04-08T05:49:32.651376
10019 / tcp
-1139539254 | 2025-04-23T00:53:20.654445
10028 / tcp
-1888448627 | 2025-04-18T10:50:16.718970
10029 / tcp
-358801646 | 2025-04-03T15:36:17.534593
10033 / tcp
1363464823 | 2025-04-24T20:27:49.435600
10035 / tcp
-653033013 | 2025-04-22T09:51:19.080223
10046 / tcp
-375604792 | 2025-04-28T11:14:44.523116
10051 / tcp
1282941221 | 2025-04-06T11:59:14.685395
10075 / tcp
677934968 | 2025-04-10T18:10:38.362721
10100 / tcp
-1839934832 | 2025-04-09T08:24:27.148935
10123 / tcp
-1888448627 | 2025-04-12T00:38:43.741590
10134 / tcp
-1477838366 | 2025-04-03T01:00:41.386909
10181 / tcp
1911457608 | 2025-04-27T07:53:16.460133
10210 / tcp
320677201 | 2025-04-17T08:28:43.841690
10225 / tcp
1665283070 | 2025-04-06T10:13:23.115343
10348 / tcp
-1835475271 | 2025-03-31T14:09:24.904664
10390 / tcp
114471724 | 2025-04-24T19:53:46.770810
10397 / tcp
1911457608 | 2025-04-10T22:29:43.423956
10399 / tcp
1911457608 | 2025-04-26T00:21:10.135085
10443 / tcp
-358801646 | 2025-04-27T22:12:02.599777
10554 / tcp
539065883 | 2025-04-17T20:05:14.875276
10911 / tcp
307999478 | 2025-04-21T01:41:17.923022
11000 / tcp
1308377066 | 2025-04-03T09:17:33.544886
11112 / tcp
-1399940268 | 2025-04-20T06:08:57.433077
11210 / tcp
-1265999252 | 2025-04-08T09:10:47.584369
11211 / tcp
-136006866 | 2025-04-12T21:15:48.782117
11288 / tcp
897328069 | 2025-04-28T14:34:15.721292
11300 / tcp
669849225 | 2025-04-10T14:40:45.496226
11680 / tcp
1011407350 | 2025-04-15T14:24:33.033463
12000 / tcp
1734465113 | 2025-04-27T19:08:26.617617
12105 / tcp
-1648456501 | 2025-04-11T22:18:22.248024
12127 / tcp
1504401647 | 2025-04-09T08:54:51.870467
12128 / tcp
-1019343788 | 2025-04-10T04:19:23.680023
12136 / tcp
1911457608 | 2025-04-28T14:13:37.090876
12143 / tcp
-1189269828 | 2025-04-09T18:44:05.871503
12149 / tcp
-1399940268 | 2025-03-31T22:41:07.377791
12150 / tcp
1911457608 | 2025-04-24T09:32:35.200532
12163 / tcp
-345718689 | 2025-04-20T22:33:46.500224
12168 / tcp
1911457608 | 2025-04-17T21:14:40.065636
12170 / tcp
921225407 | 2025-04-12T23:19:22.835134
12174 / tcp
-147424911 | 2025-04-01T19:47:03.341412
12187 / tcp
819727972 | 2025-04-18T10:02:27.349789
12188 / tcp
-122096153 | 2025-04-26T20:08:23.728102
12213 / tcp
-1730858130 | 2025-04-06T20:08:07.812196
12238 / tcp
937756010 | 2025-03-31T23:41:36.468231
12243 / tcp
632542934 | 2025-03-31T07:08:48.104699
12264 / tcp
-345718689 | 2025-04-16T12:34:05.171432
12265 / tcp
1869192275 | 2025-03-31T12:07:46.766239
12271 / tcp
819727972 | 2025-04-20T05:28:53.019365
12277 / tcp
-1099385124 | 2025-04-26T23:42:13.532305
12278 / tcp
-345718689 | 2025-04-25T03:22:26.131228
12291 / tcp
-1399940268 | 2025-04-09T14:26:54.513970
12300 / tcp
-1795027372 | 2025-04-21T17:04:08.414086
12308 / tcp
-2096652808 | 2025-04-15T06:40:53.763560
12313 / tcp
-1476017887 | 2025-04-01T20:15:24.808664
12317 / tcp
1332894250 | 2025-03-31T19:38:22.001599
12318 / tcp
-441419608 | 2025-04-19T16:35:00.303304
12319 / tcp
-1105333987 | 2025-04-21T17:44:51.328386
12322 / tcp
-1032713145 | 2025-04-02T06:40:55.436174
12328 / tcp
-1399940268 | 2025-04-01T15:35:59.359873
12345 / tcp
1748152518 | 2025-04-01T09:36:38.944835
12382 / tcp
632542934 | 2025-04-23T20:09:56.528344
12383 / tcp
-1399940268 | 2025-04-20T18:25:58.576679
12391 / tcp
-457235091 | 2025-04-20T06:18:22.437309
12393 / tcp
-1399940268 | 2025-04-24T04:19:28.368154
12401 / tcp
-1279886438 | 2025-04-20T16:54:20.851036
12420 / tcp
-1399940268 | 2025-04-03T13:31:14.741257
12424 / tcp
1911457608 | 2025-04-17T15:33:51.337453
12426 / tcp
819727972 | 2025-04-12T07:52:11.416269
12428 / tcp
-2140303521 | 2025-04-24T02:03:06.516260
12452 / tcp
1363464823 | 2025-04-27T18:50:19.019022
12469 / tcp
-249504111 | 2025-04-03T17:22:05.526822
12481 / tcp
-1399940268 | 2025-04-11T21:38:02.502216
12482 / tcp
-1399940268 | 2025-04-18T08:50:51.508033
12488 / tcp
-2033111675 | 2025-04-10T14:03:15.268590
12514 / tcp
-1327660293 | 2025-04-23T08:22:39.240980
12521 / tcp
1911457608 | 2025-04-22T14:41:30.499013
12531 / tcp
-375604792 | 2025-04-16T07:06:15.213849
12534 / tcp
1911457608 | 2025-04-04T00:27:27.048196
12535 / tcp
-891714208 | 2025-04-05T16:38:44.426960
12542 / tcp
1911457608 | 2025-04-11T10:16:55.228984
12544 / tcp
-146605374 | 2025-04-09T03:00:54.919027
12553 / tcp
1911457608 | 2025-04-24T17:48:05.419405
12555 / tcp
1492413928 | 2025-04-24T23:08:31.041603
12556 / tcp
-1399940268 | 2025-04-05T20:47:49.842842
12589 / tcp
-2033111675 | 2025-04-19T21:10:33.784595
13333 / tcp
-1045760528 | 2025-04-15T18:02:26.791756
14084 / tcp
-1986594217 | 2025-04-27T22:11:45.351167
14147 / tcp
-1399940268 | 2025-04-20T08:31:21.408416
14182 / tcp
677934968 | 2025-04-23T21:05:31.740026
14265 / tcp
1370263973 | 2025-04-17T22:53:49.438166
14344 / tcp
819727972 | 2025-04-25T04:48:37.253585
14400 / tcp
493955023 | 2025-04-03T19:41:46.355141
14894 / tcp
-1327660293 | 2025-04-17T13:21:43.817637
14909 / tcp
671605376 | 2025-04-23T15:40:58.396673
15000 / tcp
-424761848 | 2025-04-24T16:06:59.608543
15123 / tcp
-1399940268 | 2025-04-15T03:53:16.625445
15502 / tcp
722711397 | 2025-04-07T13:33:29.820548
15588 / tcp
-1032713145 | 2025-04-11T16:03:18.783783
16010 / tcp
-1611764932 | 2025-04-01T02:22:11.463636
16014 / tcp
205347087 | 2025-04-10T06:30:27.670565
16016 / tcp
-147424911 | 2025-04-05T17:11:24.365311
16019 / tcp
-1399940268 | 2025-04-16T15:44:55.851267
16055 / tcp
-2089734047 | 2025-04-20T07:45:03.397522
16061 / tcp
819727972 | 2025-04-16T12:39:17.064923
16070 / tcp
-1399940268 | 2025-04-08T18:40:40.849224
16071 / tcp
-1399940268 | 2025-04-15T19:47:44.071166
16072 / tcp
-1888448627 | 2025-04-27T15:20:15.285908
16084 / tcp
165188539 | 2025-04-25T06:30:19.222351
16087 / tcp
819727972 | 2025-04-04T04:01:33.949666
16094 / tcp
-1888448627 | 2025-04-24T08:02:04.198557
16099 / tcp
-1399940268 | 2025-04-23T15:35:32.669294
16400 / tcp
1911457608 | 2025-04-07T06:18:26.428458
16403 / tcp
1492413928 | 2025-04-25T05:23:47.257979
16464 / tcp
-971970408 | 2025-04-02T09:54:23.206038
16888 / tcp
819727972 | 2025-04-16T06:33:48.886016
16993 / tcp
1741579575 | 2025-04-21T16:44:02.689142
17000 / tcp
-1810987450 | 2025-04-03T19:06:13.391003
17070 / tcp
-1013082686 | 2025-04-11T18:02:01.746690
17084 / tcp
-2089734047 | 2025-04-07T19:30:12.332457
17182 / tcp
-2089734047 | 2025-03-31T20:19:50.537027
17770 / tcp
1911457608 | 2025-04-11T08:56:06.717255
18008 / tcp
1911457608 | 2025-04-28T09:28:37.062127
18015 / tcp
639175818 | 2025-04-12T04:46:24.230839
18019 / tcp
-2107996212 | 2025-04-23T19:35:37.078612
18027 / tcp
-1375131644 | 2025-04-02T05:56:40.937075
18029 / tcp
1911457608 | 2025-04-08T09:31:04.438552
18042 / tcp
-1230049476 | 2025-04-08T08:14:12.755008
18048 / tcp
819727972 | 2025-04-07T19:42:33.907785
18059 / tcp
-1810987450 | 2025-04-16T17:37:29.717747
18070 / tcp
-1105333987 | 2025-04-17T02:48:58.426064
18079 / tcp
-2031152423 | 2025-04-02T03:20:43.077034
18081 / tcp
104385780 | 2025-03-31T15:16:27.323326
18085 / tcp
-2089734047 | 2025-04-20T17:37:55.731683
18089 / tcp
-441419608 | 2025-04-05T17:04:14.969136
18094 / tcp
819727972 | 2025-04-21T05:38:25.825683
18107 / tcp
51259122 | 2025-04-28T10:01:28.644459
18181 / tcp
-1888448627 | 2025-04-02T14:27:11.222836
18200 / tcp
1911457608 | 2025-04-28T03:37:17.558731
18239 / tcp
-1399940268 | 2025-04-11T05:56:16.868132
19000 / tcp
-1189269828 | 2025-04-09T05:53:59.375817
19014 / tcp
-1399940268 | 2025-04-22T00:15:41.047001
19017 / tcp
1574088840 | 2025-04-22T22:40:47.508355
19022 / tcp
819727972 | 2025-04-10T19:04:07.380418
20087 / tcp
233634112 | 2025-04-13T01:27:02.840501
20151 / tcp
921225407 | 2025-04-12T23:15:50.173945
20185 / tcp
45131230 | 2025-04-17T21:16:11.115562
20256 / tcp
-154107716 | 2025-04-22T19:01:37.187868
20547 / tcp
-1598265216 | 2025-04-10T09:48:25.650198
20894 / tcp
740837454 | 2025-04-24T20:52:13.872117
21025 / tcp
-1990350878 | 2025-04-23T11:10:06.954731
21082 / tcp
819727972 | 2025-04-10T18:52:35.673481
21232 / tcp
2098371729 | 2025-04-10T16:42:34.754321
21248 / tcp
632542934 | 2025-04-15T01:30:43.074469
21260 / tcp
-1327660293 | 2025-04-10T12:10:59.724525
21266 / tcp
-2031152423 | 2025-04-06T23:39:16.995145
21273 / tcp
-1399940268 | 2025-04-21T12:43:51.177402
21287 / tcp
-1189269828 | 2025-03-31T23:24:09.392555
21293 / tcp
1492413928 | 2025-04-11T10:42:56.562026
21295 / tcp
-1399940268 | 2025-04-12T08:53:57.361928
21302 / tcp
-1730858130 | 2025-04-04T21:58:19.602753
21307 / tcp
-1375131644 | 2025-04-27T23:53:36.571784
21325 / tcp
-445721795 | 2025-04-06T11:14:14.474757
21357 / tcp
-1261090339 | 2025-04-02T02:47:09.161439
21379 / tcp
-2089734047 | 2025-04-26T14:52:38.725214
22000 / tcp
2087396567 | 2025-04-01T18:02:50.426198
22001 / tcp
-971970408 | 2025-04-04T05:53:35.957825
22022 / tcp
-2096652808 | 2025-04-11T20:44:36.522394
22070 / tcp
1492413928 | 2025-04-04T01:35:45.575880
22222 / tcp
-358801646 | 2025-04-12T18:01:31.417529
22556 / tcp
1830187220 | 2025-04-16T09:19:01.716980
23023 / tcp
1746071618 | 2025-04-16T05:55:48.930145
24245 / tcp
1208318993 | 2025-04-06T07:42:22.630262
24472 / tcp
51259122 | 2025-04-16T10:13:30.918437
25082 / tcp
819727972 | 2025-04-07T03:09:38.037942
25105 / tcp
1690634669 | 2025-04-12T10:47:20.020050
26657 / tcp
897328069 | 2025-04-07T15:37:49.063310
27015 / tcp
-1032713145 | 2025-04-12T15:17:33.445728
27016 / tcp
1690634669 | 2025-04-11T22:07:46.055881
27017 / tcp
422524323 | 2025-04-12T07:34:52.084960
27036 / tcp
2087396567 | 2025-04-12T05:49:45.616576
28015 / tcp
-358801646 | 2025-04-19T23:56:17.560565
28818 / tcp
-1230049476 | 2025-04-12T18:10:10.019493
29984 / tcp
1911457608 | 2025-04-27T02:59:19.039112
30002 / tcp
-1854351412 | 2025-04-11T04:00:28.600737
30003 / tcp
1632932802 | 2025-04-18T21:03:59.418065
30005 / tcp
819727972 | 2025-04-08T17:01:43.245230
30013 / tcp
-1839934832 | 2025-04-19T10:23:44.103532
30022 / tcp
1761482307 | 2025-04-06T00:41:32.609007
30027 / tcp
-2089734047 | 2025-04-02T15:33:52.121089
30111 / tcp
-1428621233 | 2025-04-04T04:35:57.304258
30122 / tcp
-971970408 | 2025-04-06T04:15:43.350292
30303 / tcp
660175493 | 2025-03-31T22:46:29.172645
30522 / tcp
819727972 | 2025-04-06T06:37:48.137012
30894 / tcp
-1737707071 | 2025-03-31T13:08:47.140409
30922 / tcp
-1990350878 | 2025-04-05T22:55:34.219405
31022 / tcp
171352214 | 2025-04-05T17:42:37.724532
31222 / tcp
-1839934832 | 2025-04-05T09:44:46.709294
31422 / tcp
291723434 | 2025-04-05T08:17:40.638829
31443 / tcp
-971970408 | 2025-04-07T17:07:23.142539
32322 / tcp
1984588611 | 2025-04-04T20:48:26.158379
32444 / tcp
921225407 | 2025-04-09T09:50:55.764346
32622 / tcp
1842524259 | 2025-04-04T12:06:47.322755
33060 / tcp
1544300041 | 2025-04-20T13:57:43.773331
33338 / tcp
-971970408 | 2025-04-11T15:02:15.496947
35240 / tcp
-1477838366 | 2025-04-19T23:04:18.327643
37777 / tcp
1911457608 | 2025-04-18T20:38:08.413919
38333 / tcp
-441419608 | 2025-04-07T14:46:46.852069
41800 / tcp
-1399940268 | 2025-04-04T05:51:52.939906
42194 / tcp
-136006866 | 2025-04-08T17:26:54.167218
42208 / tcp
-1032713145 | 2025-03-31T09:31:47.056433
42424 / tcp
1911457608 | 2025-04-01T07:39:23.604342
43200 / tcp
1911457608 | 2025-04-18T06:40:26.664274
43221 / tcp
599074451 | 2025-04-24T11:44:26.334724
44158 / tcp
-433302150 | 2025-04-19T17:55:06.747102
44308 / tcp
-303199180 | 2025-04-25T11:06:50.862699
44333 / tcp
-2031152423 | 2025-04-08T07:08:48.559763
44400 / tcp
1332894250 | 2025-04-25T14:19:25.284168
44444 / tcp
-1399940268 | 2025-04-24T09:16:28.477903
44818 / tcp
-2033111675 | 2025-04-11T05:51:00.646793
45000 / tcp
819727972 | 2025-04-14T16:11:46.001720
45002 / tcp
455076604 | 2025-03-31T18:10:58.464952
45668 / tcp
1911457608 | 2025-04-05T23:55:31.227878
47080 / tcp
1989907056 | 2025-04-16T20:37:52.660467
47808 / tcp
1690634669 | 2025-03-31T11:19:23.242716
48002 / tcp
-1399940268 | 2025-04-27T20:03:49.410016
48018 / tcp
820958131 | 2025-04-02T08:48:29.501434
48100 / tcp
819727972 | 2025-04-07T02:24:18.895651
49152 / tcp
-1292343804 | 2025-03-31T20:52:57.528248
49153 / tcp
1212921144 | 2025-04-02T08:09:35.360947
49686 / tcp
-1888448627 | 2025-04-23T21:26:54.501576
50000 / tcp
1723769361 | 2025-04-09T10:21:38.939023
50007 / tcp
819727972 | 2025-04-06T14:55:01.524807
50009 / tcp
-1399940268 | 2025-04-27T19:10:36.604296
50073 / tcp
820958131 | 2025-04-25T04:50:38.205406
50100 / tcp
677934968 | 2025-04-20T13:34:22.216203
50102 / tcp
-180163620 | 2025-04-22T14:40:37.017252
50113 / tcp
-1265999252 | 2025-04-26T16:03:54.868417
50997 / tcp
921225407 | 2025-04-14T18:54:00.824636
50999 / tcp
-1810987450 | 2025-04-11T15:23:48.664922
51002 / tcp
819727972 | 2025-04-28T07:33:09.790772
51235 / tcp
380146262 | 2025-04-01T19:50:08.098738
51294 / tcp
-2096652808 | 2025-04-28T04:02:39.762514
51443 / tcp
2087396567 | 2025-04-07T02:12:46.304888
52230 / tcp
1830697416 | 2025-04-05T19:30:58.680664
52881 / tcp
1989907056 | 2025-04-06T17:17:09.708977
54138 / tcp
1332894250 | 2025-04-09T22:58:47.137875
54444 / tcp
-1746074029 | 2025-04-07T22:36:25.872437
55000 / tcp
921225407 | 2025-04-23T22:36:45.993655
55350 / tcp
1911457608 | 2025-04-11T00:30:45.828613
55443 / tcp
-971970408 | 2025-04-19T21:31:12.018068
55554 / tcp
2087396567 | 2025-04-01T10:58:30.491291
57780 / tcp
-1399940268 | 2025-04-23T15:41:56.787728
60001 / tcp
546151771 | 2025-04-09T18:50:15.819055
60023 / tcp
-1375131644 | 2025-04-09T00:15:27.752387
60030 / tcp
0 | 2025-03-29T22:08:12.857108
60129 / tcp
819727972 | 2025-04-20T07:49:07.987096
61613 / tcp
-358801646 | 2025-04-25T07:07:34.726137
62078 / tcp
-154616015 | 2025-04-24T16:26:01.628664
62080 / tcp
921225407 | 2025-04-10T21:49:41.429487
62443 / tcp
-2089734047 | 2025-04-10T19:19:34.003846
63210 / tcp
-1508080900 | 2025-04-07T22:57:37.525163
63260 / tcp
819727972 | 2025-04-21T09:26:14.221344
65000 / tcp
1893177623 | 2025-04-11T18:00:21.654500

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2025(1)
CVE-2025-26465
6.8A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
2024(2)
CVE-2024-25117
6.8php-svg-lib is a scalable vector graphics (SVG) file parsing/rendering library. Prior to version 0.5.2, php-svg-lib fails to validate that font-family doesn't contain a PHAR url, which might leads to RCE on PHP < 8.0, and doesn't validate if external references are allowed. This might leads to bypass of restrictions or RCE on projects that are using it, if they do not strictly revalidate the fontName that is passed by php-svg-lib. The `Style::fromAttributes(`), or the `Style::parseCssStyle()` should check the content of the `font-family` and prevents it to use a PHAR url, to avoid passing an invalid and dangerous `fontName` value to other libraries. The same check as done in the `Style::fromStyleSheets` might be reused. Libraries using this library as a dependency might be vulnerable to some bypass of restrictions, or even remote code execution, if they do not double check the value of the `fontName` that is passed by php-svg-lib. Version 0.5.2 contains a fix for this issue.
CVE-2024-6387
8.1A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
2023(4)
CVE-2023-51767
7.0OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
CVE-2023-51385
6.5In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
CVE-2023-48795
5.9The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
CVE-2023-38408
9.8The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
2022(3)
CVE-2022-31629
6.5In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables network and same-site attackers to set a standard insecure cookie in the victim's browser which is treated as a `__Host-` or `__Secure-` cookie by PHP applications.
CVE-2022-31628
2.3In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the phar uncompressor code would recursively uncompress "quines" gzip files, resulting in an infinite loop.
CVE-2022-4900
6.2A vulnerability was found in PHP where setting the environment variable PHP_CLI_SERVER_WORKERS to a large value leads to a heap buffer overflow.
2021(2)
CVE-2021-41617
7.0sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
CVE-2021-36368
3.7An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass, since nothing is being bypassed.
2020(3)
CVE-2020-15778
7.8scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
CVE-2020-14145
5.9The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
CVE-2020-11579
7.5An issue was discovered in Chadha PHPKB 9.0 Enterprise Edition. installer/test-connection.php (part of the installation process) allows a remote unauthenticated attacker to disclose local files on hosts running PHP before 7.2.16, or on hosts where the MySQL ALLOW LOCAL DATA INFILE option is enabled.
2019(8)
CVE-2019-16905
7.8OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
CVE-2019-9641
9.8An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_TIFF.
CVE-2019-9639
7.5An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the data_len variable.
CVE-2019-9638
7.5An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the maker_note->offset relationship to value_len.
CVE-2019-9637
7.5An issue was discovered in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. Due to the way rename() across filesystems is implemented, it is possible that file being renamed is briefly available with wrong permissions while the rename is ongoing, thus enabling unauthorized users to access the data.
CVE-2019-6111
5.9An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
CVE-2019-6110
6.8In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
CVE-2019-6109
6.8An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
2018(5)
CVE-2018-20685
5.3In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
CVE-2018-19396
7.5ext/standard/var_unserializer.c in PHP 5.x through 7.1.24 allows attackers to cause a denial of service (application crash) via an unserialize call for the com, dotnet, or variant class.
CVE-2018-19395
7.5ext/standard/var.c in PHP 5.x through 7.1.24 on Windows allows attackers to cause a denial of service (NULL pointer dereference and application crash) because com and com_safearray_proxy return NULL in com_properties_get in ext/com_dotnet/com_handlers.c, as demonstrated by a serialize call on COM("WScript.Shell").
CVE-2018-15919
5.3Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
CVE-2018-15473
5.3OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
2017(4)
CVE-2017-15906
5.3The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
CVE-2017-8923
9.8The zend_string_extend function in Zend/zend_string.h in PHP through 7.1.5 does not prevent changes to string objects that result in a negative length, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact by leveraging a script's use of .= with a long string.
CVE-2017-7963
7.5The GNU Multiple Precision Arithmetic Library (GMP) interfaces for PHP through 7.1.4 allow attackers to cause a denial of service (memory consumption and application crash) via operations on long strings. NOTE: the vendor disputes this, stating "There is no security issue here, because GMP safely aborts in case of an OOM condition. The only attack vector here is denial of service. However, if you allow attacker-controlled, unbounded allocations you have a DoS vector regardless of GMP's OOM behavior.
CVE-2017-7272
7.4PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.
2016(9)
CVE-2016-20012
5.3OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
CVE-2016-10708
7.5sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
CVE-2016-10012
7.8The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
CVE-2016-10011
5.5authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
CVE-2016-10010
7.0sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
CVE-2016-10009
7.3Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
CVE-2016-3115
6.4Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
CVE-2016-1908
9.8The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
CVE-2016-0777
6.5The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
2015(5)
CVE-2015-9253
6.5An issue was discovered in PHP 7.3.x before 7.3.0alpha3, 7.2.x before 7.2.8, and before 7.1.20. The php-fpm master process restarts a child process in an endless loop when using program execution functions (e.g., passthru, exec, shell_exec, or system) with a non-blocking STDIN stream, causing this master process to consume 100% of the CPU, and consume disk space with a large volume of error logs, as demonstrated by an attack by a customer of a shared-hosting facility.
CVE-2015-6564
6.9Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
CVE-2015-6563
1.9The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
CVE-2015-5600
8.5The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
CVE-2015-5352
4.3The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
2014(3)
CVE-2014-2653
5.8The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
CVE-2014-2532
4.9sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
CVE-2014-1692
7.5The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.
2013(1)
CVE-2013-2220
7.5Buffer overflow in the radius_get_vendor_attr function in the Radius extension before 1.2.7 for PHP allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large Vendor Specific Attributes (VSA) length value.
2012(1)
CVE-2012-0814
3.5The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
2011(2)
CVE-2011-5000
3.5The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
CVE-2011-4327
2.1ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.
2010(3)
CVE-2010-5107
5.0The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
CVE-2010-4755
4.0The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
CVE-2010-4478
7.5OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
2008(1)
CVE-2008-3844
9.3Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
2007(2)
CVE-2007-3205
5.0The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.
CVE-2007-2768
4.3OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.



Contact Us

Shodan ® - All rights reserved