Last Seen: 2025-04-28
Tags:
honeypot

GeneralInformation

cn-beijing.oss.aliyuncs.com

OpenPorts

11131517212353667079809410110211011111317517926438942744346246550351351554154859363664666668977177778585387388890295399099299399910021023102510271063108010991110115311771180118112341250133714141433145816041700180018011911195619591970197919862000200220032008201020502067208320852087210321082121212221332134215421812201221123452404244325482554255725622601262827623001300430063016305030623071307930813084316331813192319531973200326833013306331133373342334533883389350035103549355235533556378037903838384240004022406340644072414841504157416042004242428243214333436944004436443744394443444444994500450645104643478648404933494950015003500650075009501050115025517252015230523152545256525852695271527352775279535154355523554455685569559055955630567258585910593859845985598659906001600260066010637963806464655065566600660566336653666266666667666866976775679969987001700670507070707170797080721874157434744174437500763477757777777877908000800980198029803480468049805180558079808180858086808980998101810481078110811581328135813981408154815681658176818181858186819482008252831883338350838284038407840884098423843684438452845484628464846584728500851585458576857985848585860086378649873387658784880288118812881488278834884088458862886488808886888988998905898889899000900590079011901590249029904290439051908690929097910091139123913191349138915191609161916691729188919091949195919992019216922692309247925193039304930693519376938393989400941894439446948895009527953096009633965897349754975897659803981098769898990299099923994399449998999910009100141002110027100321003410044100501005110068100751008410089101341018010225102501044410445105541081010909109111102711075111011111211210112881130012000120011201612084120881212112131121321213812140121411215112153121571215812170121741218012181121901220012204122061220712225122301223712256122581225912275122771228112293122951230112303123171233212344123451234912355123581236412369123831238412393124051241412430124311244212444124701248912521125331254212553125701257512615130001322814147143441500015040160081601016014160151602416062160821608416087160901609816102163111631616401164021640416464166661666716888169931700017010170841710217771180061800818015180261802818029180351805818061180631808018081180821808718098181071810918225182451855319000190131909119200199022000020001200182003020040200872011020256203252054720600208002088020894210022102521027211002127221275212772129021318213222132821379220002200122069222222234522556227032302323424242452447225001250072501025105255652665626657270152701728015300033000630008301123011330222303033045230522307183082230894313223133731622324003244432622327643306033338351003525035522355543721537777380804002941794418004219442443430094308044158443324433644337443654500347984479904915249210496824968850000500075005050070500805011250113509965099951004511065123552536528695293154022541385444454545550005508155443555535555457778577805800058392585855901260001600236012961234616166321063256632606467164738
11 / tcp
550048729 | 2025-04-18T06:22:11.012954
13 / tcp
-2127598635 | 2025-04-18T02:35:20.159813
15 / tcp
-1598265216 | 2025-04-26T16:49:32.411960
17 / tcp
-1296032851 | 2025-04-23T05:59:38.766503
21 / tcp
-1248408558 | 2025-04-25T16:15:35.672742
23 / tcp
164764193 | 2025-04-19T15:58:18.324558
53 / tcp
1024248778 | 2025-04-12T11:55:52.586107
66 / tcp
1574088840 | 2025-04-18T19:47:04.504104
70 / tcp
1412519768 | 2025-04-21T10:08:53.672192
79 / tcp
-2029556872 | 2025-04-19T01:51:52.457182
80 / tcp
1725751942 | 2025-04-23T17:08:21.594498
94 / tcp
1911457608 | 2025-03-31T23:46:40.027943
101 / tcp
-1329831334 | 2025-04-18T21:11:18.768445
102 / tcp
-274082663 | 2025-04-27T09:04:58.788764
110 / tcp
-2089734047 | 2025-04-02T08:17:08.515161
111 / tcp
-971970408 | 2025-04-20T13:58:33.564439
113 / tcp
1057210878 | 2025-04-05T22:48:42.503614
175 / tcp
-1399940268 | 2025-04-09T18:12:19.895599
179 / tcp
-399606100 | 2025-04-20T11:00:02.671479
264 / tcp
-1932800090 | 2025-04-12T13:13:34.758787
389 / tcp
-1639129386 | 2025-04-19T14:39:49.339356
427 / tcp
928665344 | 2025-04-12T01:25:22.364700
443 / tcp
-960214280 | 2025-04-17T14:50:19.528785
462 / tcp
307999478 | 2025-04-21T18:02:17.010016
465 / tcp
897328069 | 2025-04-08T15:08:21.122217
503 / tcp
-1648456501 | 2025-04-18T22:19:11.820445
513 / tcp
-1399940268 | 2025-04-08T20:44:51.801183
515 / tcp
873425297 | 2025-04-18T07:27:49.570677
541 / tcp
268285291 | 2025-04-05T09:21:22.086868
548 / tcp
155249582 | 2025-04-21T22:32:10.725953
593 / tcp
-1805329632 | 2025-04-24T21:33:01.025365
636 / tcp
4146400 | 2025-04-15T21:30:01.666747
646 / tcp
-1600864159 | 2025-04-24T20:52:06.583535
666 / tcp
2098053533 | 2025-04-18T02:27:54.120945
689 / tcp
493955023 | 2025-04-03T07:16:32.491812
771 / tcp
-1399940268 | 2025-04-06T22:55:48.814567
777 / tcp
-2029556872 | 2025-04-23T08:29:06.688710
785 / tcp
-653033013 | 2025-04-01T18:34:32.890762
853 / tcp
-1888448627 | 2025-04-23T15:59:10.285011
873 / tcp
-1598265216 | 2025-04-03T07:19:37.374628
888 / tcp
-262532376 | 2025-04-02T07:10:25.131641
902 / tcp
1956828827 | 2025-04-08T18:37:45.879609
953 / tcp
165188539 | 2025-04-11T01:34:46.412370
990 / tcp
-928473713 | 2025-04-27T18:22:59.030479
992 / tcp
1814656027 | 2025-04-22T09:23:26.313701
993 / tcp
-249504111 | 2025-04-21T23:37:10.022136
999 / tcp
-1533995666 | 2025-04-09T03:04:11.751685
1002 / tcp
-2089734047 | 2025-04-03T07:37:28.628200
1023 / tcp
-146605374 | 2025-04-28T06:26:51.060414
1025 / tcp
-2107996212 | 2025-04-02T05:49:50.984316
1027 / tcp
1911457608 | 2025-04-25T18:29:26.653518
1063 / tcp
-2096652808 | 2025-04-11T06:41:11.142801
1080 / tcp
1362344524 | 2025-04-11T04:21:30.196975
1099 / tcp
819727972 | 2025-04-24T12:14:11.642868
1110 / tcp
1893989126 | 2025-04-12T23:57:26.956086
1153 / tcp
-2096652808 | 2025-04-20T12:55:38.416472
1177 / tcp
1632932802 | 2025-04-12T15:18:54.722101
1180 / tcp
819727972 | 2025-04-21T23:17:09.766065
1181 / tcp
-358801646 | 2025-04-16T05:47:35.435251
1234 / tcp
-339084706 | 2025-04-28T03:14:12.431622
1250 / tcp
-1399940268 | 2025-04-25T16:27:47.833941
1337 / tcp
-971970408 | 2025-04-19T00:11:18.086790
1414 / tcp
-1399940268 | 2025-04-27T16:16:01.973958
1433 / tcp
-186520940 | 2025-04-15T12:34:40.229753
1458 / tcp
-358801646 | 2025-04-07T09:55:07.748936
1604 / tcp
1842524259 | 2025-04-25T00:28:31.702092
1700 / tcp
1339260719 | 2025-04-06T20:25:22.722456
1800 / tcp
819727972 | 2025-04-11T03:38:41.497595
1801 / tcp
-1299899661 | 2025-04-16T02:35:20.675734
1911 / tcp
1278527606 | 2025-04-19T09:35:51.588502
1956 / tcp
819727972 | 2025-04-28T02:55:45.036508
1959 / tcp
-805362002 | 2025-04-18T21:36:55.352579
1970 / tcp
-1399940268 | 2025-03-31T21:07:35.044923
1979 / tcp
-2096652808 | 2025-04-10T11:54:24.598986
1986 / tcp
921225407 | 2025-04-25T06:10:06.391822
2000 / tcp
-441419608 | 2025-04-25T07:32:25.465354
2002 / tcp
1632932802 | 2025-04-21T04:43:45.026130
2003 / tcp
-1399940268 | 2025-04-11T12:20:47.869228
2008 / tcp
2087396567 | 2025-04-19T19:55:46.812111
2010 / tcp
1763259671 | 2025-04-03T19:06:38.299105
2050 / tcp
-2096652808 | 2025-04-28T16:21:45.157756
2067 / tcp
233634112 | 2025-04-27T15:30:54.107418
2083 / tcp
2087396567 | 2025-04-16T22:34:28.070472
2085 / tcp
-653033013 | 2025-04-27T15:57:35.972446
2087 / tcp
1082732927 | 2025-04-14T16:20:23.270378
2103 / tcp
826567260 | 2025-04-11T22:02:14.630449
2108 / tcp
1911457608 | 2025-04-01T18:30:58.202372
2121 / tcp
141730637 | 2025-04-21T00:46:53.893805
2122 / tcp
-1626979812 | 2025-04-18T07:39:30.508651
2133 / tcp
-2089734047 | 2025-04-22T03:09:33.378856
2134 / tcp
-2089734047 | 2025-04-10T15:40:31.419575
2154 / tcp
-303199180 | 2025-04-28T02:43:35.075165
2181 / tcp
546151771 | 2025-04-11T13:25:00.991472
2201 / tcp
-358801646 | 2025-04-19T20:58:22.521839
2211 / tcp
-1538260461 | 2025-04-17T08:13:56.324545
2345 / tcp
819727972 | 2025-04-02T17:07:06.193646
2404 / tcp
165188539 | 2025-04-21T07:53:28.975301
2443 / tcp
-1399940268 | 2025-04-20T00:18:08.292478
2548 / tcp
-1399940268 | 2025-04-07T08:26:25.054041
2554 / tcp
-1230049476 | 2025-04-01T22:10:57.210301
2557 / tcp
1504401647 | 2025-04-28T03:14:33.941901
2562 / tcp
-1399940268 | 2025-04-16T03:53:47.370450
2601 / tcp
1715665777 | 2025-04-14T15:14:02.448748
2628 / tcp
1220320909 | 2025-04-28T12:11:13.130527
2762 / tcp
-1139539254 | 2025-04-21T21:08:37.408994
3001 / tcp
-2089734047 | 2025-04-07T15:24:31.901743
3004 / tcp
165188539 | 2025-04-17T08:59:04.277778
3006 / tcp
1282941221 | 2025-04-16T06:15:33.472681
3016 / tcp
921225407 | 2025-04-27T21:49:47.416364
3050 / tcp
1911457608 | 2025-04-16T05:41:18.112615
3062 / tcp
-339084706 | 2025-04-28T03:49:18.744094
3071 / tcp
198844676 | 2025-04-26T23:24:16.250212
3079 / tcp
-1399940268 | 2025-04-09T01:11:55.681898
3081 / tcp
-180163620 | 2025-04-15T02:02:47.144570
3084 / tcp
-345718689 | 2025-04-25T11:11:58.074015
3163 / tcp
597764502 | 2025-04-05T00:33:30.547096
3181 / tcp
819727972 | 2025-04-16T14:12:54.254006
3192 / tcp
-1730858130 | 2025-04-04T15:38:14.804908
3195 / tcp
-1399940268 | 2025-04-17T20:42:22.736130
3197 / tcp
819727972 | 2025-04-27T19:44:43.268834
3200 / tcp
-1013082686 | 2025-04-20T17:34:18.473127
3268 / tcp
-1547976805 | 2025-04-24T19:24:04.605051
3301 / tcp
-1099385124 | 2025-04-13T01:27:47.292937
3306 / tcp
1801207137 | 2025-04-28T00:12:41.052304
3311 / tcp
1126993057 | 2025-04-20T21:45:53.593452
3337 / tcp
-1839934832 | 2025-04-24T14:49:10.302935
3342 / tcp
205347087 | 2025-04-12T21:55:03.647770
3345 / tcp
-1399940268 | 2025-04-16T02:39:05.468668
3388 / tcp
-1399940268 | 2025-04-19T15:52:42.028565
3389 / tcp
419073695 | 2025-04-23T15:11:06.854149
3500 / tcp
1911457608 | 2025-04-09T17:09:32.975206
3510 / tcp
-1888448627 | 2025-04-28T18:01:58.218379
3549 / tcp
1620329124 | 2025-04-19T23:33:33.730643
3552 / tcp
897328069 | 2025-04-27T20:48:06.930590
3553 / tcp
-1399940268 | 2025-04-09T02:01:27.154422
3556 / tcp
819727972 | 2025-04-03T05:48:28.932446
3780 / tcp
-653033013 | 2025-04-23T13:31:09.821498
3790 / tcp
660175493 | 2025-04-10T21:52:02.109001
3838 / tcp
-1399940268 | 2025-04-05T01:54:07.348521
3842 / tcp
-1399940268 | 2025-04-15T07:58:07.823661
4000 / tcp
1300162323 | 2025-03-31T21:21:53.840078
4022 / tcp
-2096652808 | 2025-04-27T20:49:58.473354
4063 / tcp
-2017887953 | 2025-04-23T17:55:35.318662
4064 / tcp
-792826324 | 2025-04-22T20:03:04.586302
4072 / tcp
117101543 | 2025-04-02T10:14:31.159928
4148 / tcp
-1399940268 | 2025-04-11T05:28:48.401974
4150 / tcp
-1399940268 | 2025-04-12T21:21:10.378226
4157 / tcp
2087396567 | 2025-04-18T17:09:51.496674
4160 / tcp
1574088840 | 2025-04-18T21:19:07.113609
4200 / tcp
-1279886438 | 2025-04-22T20:59:28.840842
4242 / tcp
-1879056922 | 2025-04-19T01:07:33.745294
4282 / tcp
819727972 | 2025-04-20T13:44:40.507019
4321 / tcp
-269926141 | 2025-04-27T04:13:11.397415
4333 / tcp
819727972 | 2025-04-09T21:57:22.810821
4369 / tcp
1767345577 | 2025-04-21T16:21:28.578718
4400 / tcp
-358801646 | 2025-04-20T00:26:01.532294
4436 / tcp
921225407 | 2025-04-11T00:07:25.972984
4437 / tcp
-1399940268 | 2025-04-22T23:12:33.963127
4439 / tcp
1830187220 | 2025-04-04T05:43:54.920553
4443 / tcp
1089570394 | 2025-04-20T03:08:58.838945
4444 / tcp
1911457608 | 2025-04-17T16:11:51.832646
4499 / tcp
-1399940268 | 2025-04-07T09:26:16.123015
4500 / tcp
-1730858130 | 2025-04-03T17:17:27.890480
4506 / tcp
740837454 | 2025-04-28T16:16:51.522628
4510 / tcp
-653033013 | 2025-04-24T01:40:51.364982
4643 / tcp
-1737707071 | 2025-04-14T17:33:15.678634
4786 / tcp
-1839934832 | 2025-04-09T13:44:16.133416
4840 / tcp
1911457608 | 2025-04-26T07:17:47.279625
4933 / tcp
-653033013 | 2025-04-02T15:49:20.170050
4949 / tcp
-971970408 | 2025-04-25T06:47:41.777267
5001 / tcp
-1189269828 | 2025-04-28T00:17:14.914204
5003 / tcp
1911457608 | 2025-04-19T07:35:47.355437
5006 / tcp
-1476017887 | 2025-04-27T20:31:04.610724
5007 / tcp
632542934 | 2025-04-21T11:34:07.226274
5009 / tcp
1017429513 | 2025-04-14T20:54:58.457709
5010 / tcp
819727972 | 2025-04-16T03:13:31.094314
5011 / tcp
819727972 | 2025-04-22T05:54:57.502425
5025 / tcp
-971970408 | 2025-04-15T17:25:06.009508
5172 / tcp
-1900404274 | 2025-04-06T22:21:22.104521
5201 / tcp
321971019 | 2025-04-12T08:10:38.162312
5230 / tcp
-2096652808 | 2025-04-01T16:17:38.377051
5231 / tcp
-1036370807 | 2025-04-10T07:06:09.637075
5254 / tcp
1911457608 | 2025-03-31T09:11:53.141448
5256 / tcp
-1839934832 | 2025-04-01T08:32:07.459037
5258 / tcp
599074451 | 2025-04-07T19:39:46.231028
5269 / tcp
756886313 | 2025-04-28T19:39:57.813876
5271 / tcp
-1839934832 | 2025-04-21T21:04:55.535937
5273 / tcp
819727972 | 2025-03-31T20:49:50.595791
5277 / tcp
819727972 | 2025-04-23T01:06:02.047502
5279 / tcp
-1888448627 | 2025-04-04T12:29:19.353580
5351 / tcp
165188539 | 2025-04-27T00:23:35.597518
5435 / tcp
-1399940268 | 2025-04-22T20:17:22.302182
5523 / tcp
-1329831334 | 2025-04-06T04:58:17.471851
5544 / tcp
-1804465946 | 2025-04-06T02:32:14.769896
5568 / tcp
1615193817 | 2025-04-11T14:50:35.899094
5569 / tcp
-441419608 | 2025-04-17T04:35:34.843619
5590 / tcp
740837454 | 2025-04-02T17:23:38.383664
5595 / tcp
-1399940268 | 2025-04-20T22:08:16.787823
5630 / tcp
580340387 | 2025-04-02T20:55:34.971911
5672 / tcp
575925250 | 2025-04-05T22:55:17.791017
5858 / tcp
-1888448627 | 2025-04-18T21:18:58.668419
5910 / tcp
-1056270173 | 2025-04-20T08:34:01.263550
5938 / tcp
-784071826 | 2025-04-09T20:31:22.098045
5984 / tcp
1999272906 | 2025-04-26T15:26:38.783676
5985 / tcp
-2118655245 | 2025-04-05T04:42:32.906862
5986 / tcp
104385780 | 2025-04-26T22:23:10.338849
5990 / tcp
-1399940268 | 2025-04-05T23:33:01.173816
6001 / tcp
120534451 | 2025-04-16T18:48:32.986238
6002 / tcp
971933601 | 2025-04-26T13:29:28.869622
6006 / tcp
504717326 | 2025-04-26T16:34:53.285236
6010 / tcp
-1888448627 | 2025-04-09T18:05:46.399291
6379 / tcp
321971019 | 2025-04-04T12:13:41.641150
6380 / tcp
321971019 | 2025-04-04T18:47:19.237725
6464 / tcp
-339084706 | 2025-04-11T15:08:47.126588
6550 / tcp
-1399940268 | 2025-04-23T15:42:00.801303
6556 / tcp
321971019 | 2025-04-10T16:04:20.217789
6600 / tcp
-1399940268 | 2025-04-23T22:52:38.448585
6605 / tcp
1911457608 | 2025-04-10T16:40:56.928435
6633 / tcp
921225407 | 2025-04-18T12:47:43.416410
6653 / tcp
-599252106 | 2025-04-01T21:23:37.921790
6662 / tcp
1308377066 | 2025-04-01T19:01:53.158392
6666 / tcp
-696112747 | 2025-04-16T18:00:08.058823
6667 / tcp
-2031152423 | 2025-04-23T11:45:03.275822
6668 / tcp
89142341 | 2025-04-04T04:45:22.566843
6697 / tcp
1126993057 | 2025-04-12T16:33:39.705182
6775 / tcp
103159425 | 2025-04-24T15:27:55.219042
6799 / tcp
165188539 | 2025-04-02T06:04:24.991554
6998 / tcp
307999478 | 2025-04-26T17:58:39.009282
7001 / tcp
-1136600457 | 2025-04-15T18:50:57.958350
7006 / tcp
-1888448627 | 2025-04-11T21:18:00.603054
7050 / tcp
117101543 | 2025-04-28T17:35:52.919606
7070 / tcp
572436013 | 2025-04-05T17:16:18.123970
7071 / tcp
2087396567 | 2025-04-12T22:00:31.433880
7079 / tcp
205347087 | 2025-04-24T05:00:08.966856
7080 / tcp
819727972 | 2025-04-23T14:47:15.598721
7218 / tcp
-1311598826 | 2025-04-22T10:55:28.633421
7415 / tcp
-297128567 | 2025-04-05T11:51:27.346811
7434 / tcp
472902042 | 2025-04-08T09:10:40.316240
7441 / tcp
-1327660293 | 2025-04-19T21:05:32.153312
7443 / tcp
-512831750 | 2025-04-19T10:08:38.424567
7500 / tcp
-1888448627 | 2025-04-15T14:35:46.597283
7634 / tcp
504717326 | 2025-04-25T02:47:17.257980
7775 / tcp
-653033013 | 2025-04-22T04:58:01.705620
7777 / tcp
1391945995 | 2025-04-07T11:52:57.125421
7778 / tcp
165188539 | 2025-04-17T22:38:38.065293
7790 / tcp
-1428621233 | 2025-04-24T17:27:57.600348
8000 / tcp
-1204391172 | 2025-04-09T03:21:43.240961
8009 / tcp
-1730858130 | 2025-04-23T10:36:59.383220
8019 / tcp
1624217396 | 2025-04-04T12:32:27.401729
8029 / tcp
321971019 | 2025-04-23T20:31:45.759200
8034 / tcp
-1399940268 | 2025-04-28T17:57:47.285598
8046 / tcp
-358801646 | 2025-04-28T11:42:48.680993
8049 / tcp
-1428621233 | 2025-04-24T08:58:12.882332
8051 / tcp
1077013874 | 2025-04-10T17:02:24.413846
8055 / tcp
1919228981 | 2025-04-18T18:50:15.806128
8079 / tcp
-1810987450 | 2025-04-27T19:55:38.761501
8081 / tcp
-971970408 | 2025-04-24T01:44:34.270395
8085 / tcp
-2031152423 | 2025-04-18T05:47:44.046626
8086 / tcp
-2118655245 | 2025-04-02T20:00:19.138846
8089 / tcp
119860953 | 2025-04-20T03:13:48.774156
8099 / tcp
-1249500036 | 2025-04-23T23:34:00.251019
8101 / tcp
1911457608 | 2025-04-15T06:52:44.459855
8104 / tcp
575925250 | 2025-04-26T16:05:54.827366
8107 / tcp
819727972 | 2025-04-28T02:09:38.217401
8110 / tcp
-1399940268 | 2025-04-21T13:51:20.290085
8115 / tcp
321971019 | 2025-04-25T17:20:30.821905
8132 / tcp
2103111368 | 2025-04-17T08:08:49.512677
8135 / tcp
-1399940268 | 2025-04-15T19:58:04.459610
8139 / tcp
1978059005 | 2025-04-22T23:49:37.188384
8140 / tcp
671605376 | 2025-04-24T10:32:33.551944
8154 / tcp
-1399940268 | 2025-04-27T03:18:56.305021
8156 / tcp
-438503381 | 2025-04-27T20:36:48.204027
8165 / tcp
1208318993 | 2025-03-31T18:59:58.664491
8176 / tcp
-2017887953 | 2025-04-25T18:50:30.817015
8181 / tcp
-1148066627 | 2025-04-28T13:29:49.981023
8185 / tcp
819727972 | 2025-04-04T02:53:40.752764
8186 / tcp
1208318993 | 2025-04-16T06:26:20.689130
8194 / tcp
819727972 | 2025-04-25T01:15:27.104677
8200 / tcp
-877598700 | 2025-04-26T18:36:34.580979
8252 / tcp
1726594447 | 2025-04-24T18:06:14.883667
8318 / tcp
408230060 | 2025-04-04T03:33:01.973111
8333 / tcp
1335782347 | 2025-04-20T19:07:23.463901
8350 / tcp
-1399940268 | 2025-04-20T10:27:54.174552
8382 / tcp
-653033013 | 2025-04-03T22:23:05.190815
8403 / tcp
1989907056 | 2025-04-27T02:37:05.595457
8407 / tcp
1975288991 | 2025-04-06T16:35:59.066486
8408 / tcp
-1399940268 | 2025-04-12T04:08:29.166500
8409 / tcp
1911457608 | 2025-04-25T03:13:54.523227
8423 / tcp
-1611764932 | 2025-04-21T21:33:17.892811
8436 / tcp
-1399940268 | 2025-04-22T19:58:57.371174
8443 / tcp
1753236315 | 2025-04-22T15:49:11.121969
8452 / tcp
-1139539254 | 2025-04-27T08:17:39.743632
8454 / tcp
2063598737 | 2025-04-24T15:12:28.338773
8462 / tcp
1543809371 | 2025-04-21T18:34:46.847772
8464 / tcp
-136006866 | 2025-04-21T21:09:39.061257
8465 / tcp
-407828767 | 2025-04-06T00:38:19.975109
8472 / tcp
1911457608 | 2025-03-31T17:50:18.138714
8500 / tcp
-684625978 | 2025-04-18T08:31:28.050300
8515 / tcp
819727972 | 2025-04-16T18:28:49.912616
8545 / tcp
819727972 | 2025-04-09T04:44:57.221884
8576 / tcp
1830697416 | 2025-04-21T21:52:35.059756
8579 / tcp
-1105333987 | 2025-04-23T17:15:34.933852
8584 / tcp
-454087041 | 2025-04-14T15:58:52.004216
8585 / tcp
-2031152423 | 2025-04-25T04:36:23.967480
8600 / tcp
-1086609709 | 2025-04-17T05:17:55.353240
8637 / tcp
1632932802 | 2025-04-06T05:02:56.059916
8649 / tcp
1489954473 | 2025-04-21T12:51:27.791017
8733 / tcp
1911457608 | 2025-04-28T07:39:48.119549
8765 / tcp
1911457608 | 2025-04-03T01:24:29.600754
8784 / tcp
819727972 | 2025-04-11T20:12:36.230885
8802 / tcp
-438503381 | 2025-04-11T12:46:31.704277
8811 / tcp
-1399940268 | 2025-04-15T11:53:07.969615
8812 / tcp
-1648456501 | 2025-04-22T20:34:13.600733
8814 / tcp
-1648456501 | 2025-04-27T15:18:14.965770
8827 / tcp
-1538260461 | 2025-04-14T20:43:45.726076
8834 / tcp
-905685638 | 2025-04-05T05:02:26.092154
8840 / tcp
921225407 | 2025-04-03T02:57:58.636536
8845 / tcp
1911457608 | 2025-04-22T08:09:36.104031
8862 / tcp
51259122 | 2025-04-07T14:29:32.660656
8864 / tcp
1543809371 | 2025-04-19T22:40:38.420073
8880 / tcp
-2096652808 | 2025-04-11T20:11:30.869978
8886 / tcp
-1399940268 | 2025-04-01T06:28:30.571666
8889 / tcp
819727972 | 2025-04-12T22:59:21.683069
8899 / tcp
474736340 | 2025-04-08T09:38:11.543287
8905 / tcp
-1730858130 | 2025-04-17T22:37:31.825479
8988 / tcp
-445721795 | 2025-04-19T00:56:59.329737
8989 / tcp
-1230049476 | 2025-04-26T05:53:46.987230
9000 / tcp
-2067028711 | 2025-04-18T00:36:48.624703
9005 / tcp
-1399940268 | 2025-04-12T17:35:09.679016
9007 / tcp
-2017887953 | 2025-03-29T21:26:40.500431
9011 / tcp
-1399940268 | 2025-04-02T21:01:17.943161
9015 / tcp
-2089734047 | 2025-04-02T11:08:59.606756
9024 / tcp
-1297953727 | 2025-04-01T15:08:42.603984
9029 / tcp
1011407350 | 2025-04-17T16:00:38.203516
9042 / tcp
1426971893 | 2025-04-12T03:44:25.615956
9043 / tcp
321971019 | 2025-04-04T11:19:58.465484
9051 / tcp
819727972 | 2025-04-04T10:06:16.718468
9086 / tcp
307999478 | 2025-04-20T07:24:22.576904
9092 / tcp
2098371729 | 2025-04-08T07:24:02.390953
9097 / tcp
-1888448627 | 2025-04-10T10:56:15.095090
9100 / tcp
580340387 | 2025-04-11T13:02:45.464665
9113 / tcp
-1399940268 | 2025-04-24T15:48:37.914183
9123 / tcp
1911457608 | 2025-04-18T22:45:01.405263
9131 / tcp
-1230049476 | 2025-04-28T01:19:56.839756
9134 / tcp
-1399940268 | 2025-04-01T13:34:44.381871
9138 / tcp
-1399940268 | 2025-04-01T09:18:00.448794
9151 / tcp
-971970408 | 2025-04-05T17:24:01.297742
9160 / tcp
-1399940268 | 2025-04-28T14:09:47.112442
9161 / tcp
-1399940268 | 2025-04-12T18:23:27.517859
9166 / tcp
1189133115 | 2025-04-23T20:34:43.601353
9172 / tcp
-1810987450 | 2025-04-28T10:47:17.959578
9188 / tcp
1975288991 | 2025-04-03T15:34:32.110669
9190 / tcp
-1399940268 | 2025-04-04T21:44:18.391608
9194 / tcp
1911457608 | 2025-04-17T16:31:49.459564
9195 / tcp
-1399940268 | 2025-04-18T03:20:21.532334
9199 / tcp
-1399940268 | 2025-04-19T22:16:18.975936
9201 / tcp
165188539 | 2025-04-06T15:23:48.211077
9216 / tcp
1308377066 | 2025-04-06T22:00:39.410842
9226 / tcp
1911457608 | 2025-04-27T23:27:16.679839
9230 / tcp
819727972 | 2025-04-10T10:40:55.064256
9247 / tcp
119860953 | 2025-04-04T15:43:40.728087
9251 / tcp
-2031152423 | 2025-04-12T13:10:55.804483
9303 / tcp
-1139539254 | 2025-04-10T11:07:16.217173
9304 / tcp
-1399940268 | 2025-04-28T20:45:11.624640
9306 / tcp
-339084706 | 2025-04-09T03:13:59.948488
9351 / tcp
-1399940268 | 2025-04-16T00:23:15.445912
9376 / tcp
1632932802 | 2025-04-27T02:38:45.164305
9383 / tcp
632542934 | 2025-04-04T22:08:28.456495
9398 / tcp
-154107716 | 2025-04-14T15:59:36.444219
9400 / tcp
820958131 | 2025-04-27T00:55:21.206414
9418 / tcp
-833168972 | 2025-04-22T03:41:11.882495
9443 / tcp
0 | 2025-04-12T03:24:43.704486
9446 / tcp
-2080784861 | 2025-04-03T21:34:38.783879
9488 / tcp
-2089734047 | 2025-03-31T21:14:50.650243
9500 / tcp
-1991224470 | 2025-04-02T00:33:40.763423
9527 / tcp
1308377066 | 2025-04-20T18:19:12.318901
9530 / tcp
-249504111 | 2025-04-19T20:47:29.177437
9600 / tcp
-1279886438 | 2025-04-20T03:30:21.708945
9633 / tcp
1741579575 | 2025-04-22T06:12:31.331090
9658 / tcp
-1746074029 | 2025-04-28T16:05:02.258598
9734 / tcp
504717326 | 2025-04-27T15:32:14.368556
9754 / tcp
819727972 | 2025-04-01T22:25:25.209484
9758 / tcp
1208318993 | 2025-04-22T07:37:08.245268
9765 / tcp
366084633 | 2025-04-06T05:24:54.842871
9803 / tcp
103159425 | 2025-04-12T13:36:43.707620
9810 / tcp
1332894250 | 2025-04-08T18:41:00.018574
9876 / tcp
2070013657 | 2025-04-05T01:48:37.783745
9898 / tcp
1320285193 | 2025-04-02T16:12:21.843432
9902 / tcp
-1477838366 | 2025-04-21T08:28:09.058475
9909 / tcp
401555314 | 2025-04-25T22:43:33.963696
9923 / tcp
-1399940268 | 2025-04-07T03:11:55.430937
9943 / tcp
56005235 | 2025-04-20T01:37:01.343423
9944 / tcp
1919228981 | 2025-04-08T07:42:56.511730
9998 / tcp
-1917695220 | 2025-04-24T22:23:16.055791
9999 / tcp
1161309183 | 2025-04-23T23:48:17.111549
10009 / tcp
1191574520 | 2025-04-22T05:01:10.867919
10014 / tcp
-1399940268 | 2025-04-20T09:46:22.874983
10021 / tcp
-1013082686 | 2025-04-06T17:55:53.566109
10027 / tcp
-904840257 | 2025-04-10T19:20:15.435847
10032 / tcp
921225407 | 2025-04-28T18:37:39.323274
10034 / tcp
921225407 | 2025-04-27T01:41:29.260582
10044 / tcp
-1399940268 | 2025-04-24T18:28:45.140106
10050 / tcp
1082732927 | 2025-04-06T13:29:43.619707
10051 / tcp
2087396567 | 2025-04-06T11:29:24.572290
10068 / tcp
1726594447 | 2025-04-05T12:04:49.723633
10075 / tcp
1911457608 | 2025-04-23T06:02:54.128149
10084 / tcp
819727972 | 2025-04-09T05:19:48.324097
10089 / tcp
-1032713145 | 2025-04-21T18:24:37.327604
10134 / tcp
-2031152423 | 2025-04-27T02:49:35.810071
10180 / tcp
830745946 | 2025-03-31T23:55:50.304021
10225 / tcp
-1097188123 | 2025-04-28T18:42:43.562302
10250 / tcp
1542849631 | 2025-04-24T23:55:17.357178
10444 / tcp
819727972 | 2025-04-27T06:42:32.866983
10445 / tcp
819727972 | 2025-04-10T22:00:09.758175
10554 / tcp
-2107996212 | 2025-04-20T02:42:14.063399
10810 / tcp
-1399940268 | 2025-04-20T18:00:22.783383
10909 / tcp
921225407 | 2025-04-22T16:11:22.924097
10911 / tcp
-1399940268 | 2025-04-26T22:52:37.001241
11027 / tcp
-1105333987 | 2025-04-15T14:35:30.564514
11075 / tcp
-2096652808 | 2025-04-16T04:11:42.199081
11101 / tcp
-1730858130 | 2025-04-19T18:26:30.764697
11112 / tcp
1370263973 | 2025-04-27T08:49:55.886990
11210 / tcp
1655023012 | 2025-04-26T05:02:29.791246
11288 / tcp
1574088840 | 2025-04-21T20:07:58.088006
11300 / tcp
-1105333987 | 2025-04-05T11:11:19.100887
12000 / tcp
-446385447 | 2025-04-20T21:46:32.292699
12001 / tcp
-1888448627 | 2025-04-01T20:09:21.818191
12016 / tcp
-2089734047 | 2025-04-10T08:17:26.289453
12084 / tcp
-2089734047 | 2025-04-25T15:57:50.179990
12088 / tcp
455076604 | 2025-04-12T20:02:07.009252
12121 / tcp
1077013874 | 2025-04-10T18:57:24.369450
12131 / tcp
971933601 | 2025-04-17T05:03:09.399772
12132 / tcp
1543809371 | 2025-04-01T10:55:36.043456
12138 / tcp
-1248408558 | 2025-04-12T20:55:24.436258
12140 / tcp
-1888448627 | 2025-04-06T14:42:09.348524
12141 / tcp
-1399940268 | 2025-04-26T18:22:51.278853
12151 / tcp
-2089734047 | 2025-04-11T00:45:55.882753
12153 / tcp
-1888448627 | 2025-04-06T08:09:38.906382
12157 / tcp
1504401647 | 2025-04-05T19:43:37.494591
12158 / tcp
-1648456501 | 2025-04-21T05:54:38.799082
12170 / tcp
321971019 | 2025-04-11T01:24:02.204821
12174 / tcp
-1101712668 | 2025-04-24T12:12:37.391238
12180 / tcp
-441419608 | 2025-04-23T21:18:00.158154
12181 / tcp
-1730858130 | 2025-04-28T11:09:28.210303
12190 / tcp
-1428621233 | 2025-04-23T04:48:11.988455
12200 / tcp
-122096153 | 2025-04-05T15:30:06.027042
12204 / tcp
632542934 | 2025-04-19T22:14:00.647570
12206 / tcp
-1399940268 | 2025-04-16T20:53:26.948492
12207 / tcp
-1428621233 | 2025-04-22T00:32:40.752987
12225 / tcp
-2031152423 | 2025-04-15T20:12:53.404717
12230 / tcp
1911457608 | 2025-04-27T04:48:53.057443
12237 / tcp
-1327660293 | 2025-04-23T11:42:18.472976
12256 / tcp
-1487943323 | 2025-04-01T12:24:55.912783
12258 / tcp
745343730 | 2025-04-01T02:36:33.544723
12259 / tcp
-2089734047 | 2025-04-21T11:16:34.597655
12275 / tcp
321971019 | 2025-04-26T23:40:43.596441
12277 / tcp
1911457608 | 2025-04-15T19:19:27.745446
12281 / tcp
937756010 | 2025-04-19T02:56:05.923815
12293 / tcp
-1888448627 | 2025-04-19T07:50:02.820468
12295 / tcp
1308377066 | 2025-04-05T23:48:31.831669
12301 / tcp
677934968 | 2025-04-26T22:01:28.136369
12303 / tcp
1911457608 | 2025-04-19T12:23:04.136167
12317 / tcp
819727972 | 2025-04-19T10:58:55.882563
12332 / tcp
-1476017887 | 2025-04-02T20:59:02.408855
12344 / tcp
165188539 | 2025-04-19T20:39:01.572939
12345 / tcp
296364507 | 2025-04-20T21:46:34.025247
12349 / tcp
819727972 | 2025-04-15T14:15:32.722058
12355 / tcp
-1013082686 | 2025-04-28T11:21:39.342823
12358 / tcp
-122096153 | 2025-04-05T17:26:50.976518
12364 / tcp
-457235091 | 2025-04-19T11:49:59.740339
12369 / tcp
1723769361 | 2025-04-27T17:54:51.488847
12383 / tcp
-801484042 | 2025-04-21T16:41:01.862199
12384 / tcp
-1399940268 | 2025-04-26T01:46:23.292607
12393 / tcp
-1399940268 | 2025-04-21T23:02:04.667310
12405 / tcp
632542934 | 2025-04-22T00:38:36.414307
12414 / tcp
-1399940268 | 2025-04-19T03:00:34.278876
12430 / tcp
1363464823 | 2025-04-25T15:36:30.801081
12431 / tcp
1911457608 | 2025-04-21T02:17:41.276360
12442 / tcp
-1810987450 | 2025-04-14T20:24:21.475578
12444 / tcp
-2089734047 | 2025-04-22T19:16:51.433340
12470 / tcp
1911457608 | 2025-04-16T20:50:19.022213
12489 / tcp
1911457608 | 2025-04-20T11:58:42.198494
12521 / tcp
1911457608 | 2025-04-05T16:05:50.200183
12533 / tcp
1911457608 | 2025-04-17T21:49:22.053013
12542 / tcp
677934968 | 2025-04-24T10:18:09.097001
12553 / tcp
165188539 | 2025-04-10T23:14:05.567678
12570 / tcp
-904840257 | 2025-04-19T21:38:35.418693
12575 / tcp
819727972 | 2025-04-09T02:20:21.364085
12615 / tcp
819727972 | 2025-04-22T08:35:50.275672
13000 / tcp
-1059554316 | 2025-04-17T03:34:34.692329
13228 / tcp
-1428621233 | 2025-04-25T06:31:36.336466
14147 / tcp
819727972 | 2025-04-23T17:27:48.258156
14344 / tcp
1011407350 | 2025-04-26T08:21:53.920198
15000 / tcp
-1987149711 | 2025-04-19T08:13:13.334479
15040 / tcp
-339084706 | 2025-04-07T00:52:00.036185
16008 / tcp
1911457608 | 2025-04-25T16:39:02.905185
16010 / tcp
2087396567 | 2025-04-01T02:19:42.547383
16014 / tcp
321971019 | 2025-04-20T14:27:01.603544
16015 / tcp
1504401647 | 2025-04-07T00:38:50.858156
16024 / tcp
321971019 | 2025-04-25T05:04:54.241665
16062 / tcp
2098371729 | 2025-04-14T21:01:45.195146
16082 / tcp
-1399940268 | 2025-04-24T19:16:48.307307
16084 / tcp
-1399940268 | 2025-04-02T09:18:48.483117
16087 / tcp
-1648456501 | 2025-04-07T16:35:35.767722
16090 / tcp
1574088840 | 2025-04-10T15:52:56.360967
16098 / tcp
1911457608 | 2025-04-24T16:43:06.142580
16102 / tcp
1911457608 | 2025-04-23T09:10:26.313627
16311 / tcp
-1730858130 | 2025-04-06T08:25:28.889418
16316 / tcp
-1399940268 | 2025-04-22T18:57:29.661488
16401 / tcp
117101543 | 2025-04-12T04:10:07.142034
16402 / tcp
971933601 | 2025-04-20T10:24:11.749375
16404 / tcp
1726594447 | 2025-04-10T00:45:38.144053
16464 / tcp
2087396567 | 2025-04-02T09:41:26.452380
16666 / tcp
-2096652808 | 2025-04-16T12:16:28.228975
16667 / tcp
1911457608 | 2025-04-18T16:34:01.476593
16888 / tcp
819727972 | 2025-04-23T08:58:54.060455
16993 / tcp
-321444299 | 2025-04-17T22:49:35.188012
17000 / tcp
-1810987450 | 2025-04-03T19:38:05.803778
17010 / tcp
398077695 | 2025-04-05T02:24:50.014125
17084 / tcp
-1329831334 | 2025-04-07T15:08:38.692795
17102 / tcp
-1888448627 | 2025-04-18T15:12:16.432123
17771 / tcp
1308377066 | 2025-04-11T21:24:49.375641
18006 / tcp
1212285915 | 2025-04-16T12:09:17.524790
18008 / tcp
819727972 | 2025-04-05T09:00:04.942376
18015 / tcp
-1375131644 | 2025-04-18T04:51:44.817340
18026 / tcp
639175818 | 2025-04-12T04:45:44.386516
18028 / tcp
-616720387 | 2025-04-16T16:46:08.447208
18029 / tcp
937756010 | 2025-04-01T07:00:48.139478
18035 / tcp
-1399940268 | 2025-04-23T01:53:41.782652
18058 / tcp
401555314 | 2025-04-25T18:55:33.580538
18061 / tcp
580340387 | 2025-04-26T18:10:40.752393
18063 / tcp
51259122 | 2025-04-23T04:31:25.145888
18080 / tcp
-971970408 | 2025-04-08T20:57:25.155163
18081 / tcp
-653033013 | 2025-04-10T05:20:19.512002
18082 / tcp
-1105333987 | 2025-04-19T06:20:39.011999
18087 / tcp
45131230 | 2025-04-04T12:33:29.826454
18098 / tcp
-1099385124 | 2025-04-27T08:31:26.997630
18107 / tcp
709622286 | 2025-04-17T01:02:09.136578
18109 / tcp
401555314 | 2025-04-04T12:57:46.274874
18225 / tcp
-1399940268 | 2025-04-11T16:08:00.173431
18245 / tcp
2063598737 | 2025-04-24T15:54:26.757919
18553 / tcp
-1189269828 | 2025-04-06T20:27:27.000081
19000 / tcp
1332894250 | 2025-04-07T16:27:29.699127
19013 / tcp
-585940771 | 2025-04-07T12:26:32.209565
19091 / tcp
-1399940268 | 2025-04-20T20:20:48.201836
19200 / tcp
2033888749 | 2025-04-04T03:10:42.540958
19902 / tcp
-1399940268 | 2025-04-06T11:58:00.215413
20000 / tcp
1900503736 | 2025-04-24T02:06:56.827831
20001 / tcp
677934968 | 2025-04-23T15:50:18.775560
20018 / tcp
-1399940268 | 2025-03-31T15:38:46.709015
20030 / tcp
1911457608 | 2025-04-25T01:35:36.982412
20040 / tcp
-2089734047 | 2025-04-16T15:56:45.976887
20087 / tcp
2087396567 | 2025-04-13T01:14:51.185461
20110 / tcp
819727972 | 2025-04-19T05:47:58.668035
20256 / tcp
1189133115 | 2025-04-15T06:58:50.117733
20325 / tcp
-2089734047 | 2025-04-03T11:58:44.972785
20547 / tcp
-1279886438 | 2025-04-18T18:55:20.693171
20600 / tcp
1911457608 | 2025-04-26T00:16:02.250416
20800 / tcp
1620329124 | 2025-04-19T21:36:27.855288
20880 / tcp
1370263973 | 2025-04-01T22:14:03.206026
20894 / tcp
1632932802 | 2025-04-03T08:20:14.129093
21002 / tcp
-2089734047 | 2025-04-08T20:31:36.671228
21025 / tcp
-1036370807 | 2025-04-28T10:13:12.758098
21027 / tcp
-1453516345 | 2025-04-04T09:05:20.056919
21100 / tcp
-1399940268 | 2025-04-08T12:59:35.554161
21272 / tcp
1655023012 | 2025-04-11T09:51:54.320514
21275 / tcp
1492413928 | 2025-04-11T10:05:27.996018
21277 / tcp
1126993057 | 2025-04-17T22:41:56.003859
21290 / tcp
165188539 | 2025-04-11T14:58:42.682293
21318 / tcp
-1399940268 | 2025-04-26T02:05:28.035790
21322 / tcp
-2017887953 | 2025-03-29T21:11:38.168573
21328 / tcp
1011407350 | 2025-04-18T20:41:23.766347
21379 / tcp
921225407 | 2025-04-23T09:37:57.319218
22000 / tcp
-454087041 | 2025-04-01T18:19:17.219730
22001 / tcp
-971970408 | 2025-04-04T05:13:53.530847
22069 / tcp
-2031152423 | 2025-04-01T05:46:36.237959
22222 / tcp
-358801646 | 2025-04-03T09:18:58.107109
22345 / tcp
119860953 | 2025-04-19T06:17:27.280975
22556 / tcp
1723769361 | 2025-04-16T13:12:27.489725
22703 / tcp
819727972 | 2025-04-23T04:44:47.281045
23023 / tcp
1231376952 | 2025-04-20T08:15:50.738140
23424 / tcp
1690634669 | 2025-04-12T09:06:30.409446
24245 / tcp
-971970408 | 2025-04-06T07:37:22.382661
24472 / tcp
366084633 | 2025-04-14T20:00:08.449296
25001 / tcp
408230060 | 2025-04-12T01:11:28.612365
25007 / tcp
165188539 | 2025-04-10T03:59:06.337790
25010 / tcp
1911457608 | 2025-04-17T08:29:07.436384
25105 / tcp
660175493 | 2025-04-03T05:47:14.284422
25565 / tcp
2087396567 | 2025-04-12T15:58:06.440731
26656 / tcp
-801484042 | 2025-04-07T19:20:20.141496
26657 / tcp
2087396567 | 2025-04-07T15:06:14.098615
27015 / tcp
819727972 | 2025-04-28T02:46:20.572686
27017 / tcp
422524323 | 2025-03-31T16:59:17.712870
28015 / tcp
2087396567 | 2025-04-11T23:49:24.099382
30003 / tcp
-154107716 | 2025-04-21T04:03:26.023145
30006 / tcp
-1399940268 | 2025-04-01T05:22:49.110109
30008 / tcp
320677201 | 2025-04-22T23:09:53.604148
30112 / tcp
165188539 | 2025-04-02T20:13:46.813273
30113 / tcp
-1888448627 | 2025-04-27T15:20:15.304288
30222 / tcp
819727972 | 2025-04-05T19:17:29.335174
30303 / tcp
2087396567 | 2025-04-09T13:31:32.011936
30452 / tcp
-2017887953 | 2025-04-25T16:44:30.778336
30522 / tcp
740837454 | 2025-04-06T05:49:02.974732
30718 / tcp
-1719756037 | 2025-04-11T20:19:19.171276
30822 / tcp
-971970408 | 2025-04-05T15:49:09.951743
30894 / tcp
-1399940268 | 2025-04-18T01:45:04.049858
31322 / tcp
2087396567 | 2025-04-05T10:40:31.158140
31337 / tcp
-1992519278 | 2025-04-24T21:20:56.699111
31622 / tcp
819727972 | 2025-04-04T16:15:45.100771
32400 / tcp
-1681927087 | 2025-04-12T03:22:33.273351
32444 / tcp
-585940771 | 2025-04-10T15:49:19.225432
32622 / tcp
-971970408 | 2025-04-04T11:56:09.195914
32764 / tcp
1690634669 | 2025-04-11T16:33:50.645663
33060 / tcp
819727972 | 2025-04-11T18:20:57.573265
33338 / tcp
1353260875 | 2025-04-11T14:52:24.559058
35100 / tcp
1830187220 | 2025-04-20T05:41:39.888258
35250 / tcp
-1399940268 | 2025-04-19T07:53:33.190578
35522 / tcp
-980525298 | 2025-04-25T02:30:35.573011
35554 / tcp
165188539 | 2025-04-23T22:13:35.096575
37215 / tcp
-952165951 | 2025-04-02T15:48:36.625507
37777 / tcp
165188539 | 2025-04-19T23:28:38.898865
38080 / tcp
165188539 | 2025-04-24T21:23:43.499667
40029 / tcp
-375604792 | 2025-04-25T18:44:05.649147
41794 / tcp
2087396567 | 2025-04-11T11:28:53.077175
41800 / tcp
-2096652808 | 2025-04-04T03:10:39.652875
42194 / tcp
-1996280214 | 2025-04-08T17:18:30.716344
42443 / tcp
-2089734047 | 2025-04-22T15:02:45.701663
43009 / tcp
1911457608 | 2025-04-22T05:57:27.452116
43080 / tcp
-1996280214 | 2025-04-28T10:53:35.110866
44158 / tcp
-433302150 | 2025-04-28T06:12:39.529820
44332 / tcp
-1399940268 | 2025-04-11T23:45:52.896349
44336 / tcp
1919228981 | 2025-04-22T20:46:52.265560
44337 / tcp
-1399940268 | 2025-04-08T19:21:41.795422
44365 / tcp
-1032713145 | 2025-04-18T20:31:46.624627
45003 / tcp
1911457608 | 2025-04-11T14:18:25.869625
47984 / tcp
-1399940268 | 2025-04-20T05:42:03.993498
47990 / tcp
2087396567 | 2025-04-21T18:38:07.230190
49152 / tcp
1449779382 | 2025-03-31T22:00:28.165992
49210 / tcp
-1230049476 | 2025-04-02T19:49:41.306605
49682 / tcp
165188539 | 2025-04-24T07:04:12.663394
49688 / tcp
-2096652808 | 2025-04-02T01:15:01.174778
50000 / tcp
-2089734047 | 2025-04-26T17:04:09.037586
50007 / tcp
-1399940268 | 2025-04-27T06:57:28.089401
50050 / tcp
677934968 | 2025-04-10T23:13:45.003960
50070 / tcp
-786044033 | 2025-04-10T16:05:37.349930
50080 / tcp
2098371729 | 2025-04-16T14:20:01.939840
50112 / tcp
-1189269828 | 2025-03-31T20:18:45.648280
50113 / tcp
1761482307 | 2025-04-25T11:22:12.713683
50996 / tcp
819727972 | 2025-04-17T17:18:41.708868
50999 / tcp
1492413928 | 2025-04-27T23:22:54.978132
51004 / tcp
1911457608 | 2025-04-11T10:03:56.219617
51106 / tcp
410249975 | 2025-04-10T19:31:01.037899
51235 / tcp
50497985 | 2025-04-28T12:38:01.167276
52536 / tcp
-1399940268 | 2025-04-18T04:23:38.120909
52869 / tcp
-949565575 | 2025-04-10T13:22:52.443456
52931 / tcp
-339084706 | 2025-04-15T21:25:36.339853
54022 / tcp
1948301213 | 2025-04-22T09:14:28.090814
54138 / tcp
-1737707071 | 2025-04-16T12:50:46.303692
54444 / tcp
-1399940268 | 2025-04-07T23:42:58.732286
54545 / tcp
1210754493 | 2025-04-24T20:39:32.179062
55000 / tcp
-1114821551 | 2025-04-23T11:18:39.542537
55081 / tcp
410249975 | 2025-04-23T10:08:28.239937
55443 / tcp
-1248408558 | 2025-04-17T16:55:18.791611
55553 / tcp
1741579575 | 2025-04-07T22:12:40.775661
55554 / tcp
550048729 | 2025-04-27T19:11:20.236425
57778 / tcp
205347087 | 2025-04-04T00:46:49.579220
57780 / tcp
-1399940268 | 2025-04-07T20:28:47.423176
58000 / tcp
1830697416 | 2025-04-16T21:33:13.108194
58392 / tcp
-1839934832 | 2025-04-03T15:09:20.773099
58585 / tcp
1623746877 | 2025-04-01T14:30:49.288255
59012 / tcp
971933601 | 2025-04-12T01:24:40.961135
60001 / tcp
2087396567 | 2025-04-09T18:38:42.874754
60023 / tcp
639175818 | 2025-04-25T10:37:34.667040
60129 / tcp
-641479109 | 2025-04-06T19:30:17.913325
61234 / tcp
-904840257 | 2025-04-09T22:07:22.019099
61616 / tcp
-1641514916 | 2025-04-02T17:10:40.378123
63210 / tcp
211952361 | 2025-04-23T19:45:53.737156
63256 / tcp
1778988322 | 2025-04-14T21:36:17.745820
63260 / tcp
-1327660293 | 2025-04-21T21:45:04.004341
64671 / tcp
-1399940268 | 2025-04-26T22:43:15.036369
64738 / tcp
-801484042 | 2025-03-31T05:53:12.634533

Vulnerabilities

Note: the device may not be impacted by all of these issues. The vulnerabilities are implied based on the software and version.

2025(1)
CVE-2025-26465
6.8A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
2024(1)
CVE-2024-6387
8.1A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
2023(4)
CVE-2023-51767
7.0OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.
CVE-2023-51385
6.5In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
CVE-2023-48795
5.9The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
CVE-2023-38408
9.8The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
2021(2)
CVE-2021-41617
7.0sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
CVE-2021-36368
3.7An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is "this is not an authentication bypass, since nothing is being bypassed.
2020(2)
CVE-2020-15778
7.8scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows."
CVE-2020-14145
5.9The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
2019(4)
CVE-2019-16905
7.8OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.
CVE-2019-6111
5.9An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
CVE-2019-6110
6.8In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
CVE-2019-6109
6.8An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
2018(3)
CVE-2018-20685
5.3In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
CVE-2018-15919
5.3Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or "oracle") as a vulnerability.'
CVE-2018-15473
5.3OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
2017(1)
CVE-2017-15906
5.3The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
2016(9)
CVE-2016-20012
5.3OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product
CVE-2016-10708
7.5sshd in OpenSSH before 7.4 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence NEWKEYS message, as demonstrated by Honggfuzz, related to kex.c and packet.c.
CVE-2016-10012
7.8The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
CVE-2016-10011
5.5authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
CVE-2016-10010
7.0sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
CVE-2016-10009
7.3Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
CVE-2016-3115
6.4Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
CVE-2016-1908
9.8The client in OpenSSH before 7.2 mishandles failed cookie generation for untrusted X11 forwarding and relies on the local X11 server for access-control decisions, which allows remote X11 clients to trigger a fallback and obtain trusted X11 forwarding privileges by leveraging configuration issues on this X11 server, as demonstrated by lack of the SECURITY extension on this X11 server.
CVE-2016-0777
6.5The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
2015(4)
CVE-2015-6564
6.9Use-after-free vulnerability in the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0 on non-OpenBSD platforms might allow local users to gain privileges by leveraging control of the sshd uid to send an unexpectedly early MONITOR_REQ_PAM_FREE_CTX request.
CVE-2015-6563
1.9The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
CVE-2015-5600
8.5The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumption) via a long and duplicative list in the ssh -oKbdInteractiveDevices option, as demonstrated by a modified client that provides a different password for each pam element on this list.
CVE-2015-5352
4.3The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time window.
2014(3)
CVE-2014-2653
5.8The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and earlier allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
CVE-2014-2532
4.9sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
CVE-2014-1692
7.5The hash_buffer function in schnorr.c in OpenSSH through 6.4, when Makefile.inc is modified to enable the J-PAKE protocol, does not initialize certain data structures, which might allow remote attackers to cause a denial of service (memory corruption) or have unspecified other impact via vectors that trigger an error condition.
2012(1)
CVE-2012-0814
3.5The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite. NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
2011(2)
CVE-2011-5000
3.5The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. NOTE: there may be limited scenarios in which this issue is relevant.
CVE-2011-4327
2.1ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call.
2010(3)
CVE-2010-5107
5.0The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
CVE-2010-4755
4.0The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.
CVE-2010-4478
7.5OpenSSH 5.6 and earlier, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol, a related issue to CVE-2010-4252.
2008(1)
CVE-2008-3844
9.3Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.
2007(1)
CVE-2007-2768
4.3OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.



Contact Us

Shodan ® - All rights reserved