11 /
tcp
550048729 | 2025-04-18T06:22:11.012954
13 /
tcp
-2127598635 | 2025-04-18T02:35:20.159813
15 /
tcp
-1598265216 | 2025-04-26T16:49:32.411960
17 /
tcp
-1296032851 | 2025-04-23T05:59:38.766503
\x01=\x01À\x06ÿÿ?"<ZDECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x01\x01
21 /
tcp
-1248408558 | 2025-04-25T16:15:35.672742
220 MikroTik FTP server (MikroTik 6.44.3) ready
23 /
tcp
164764193 | 2025-04-19T15:58:18.324558
53 /
tcp
1024248778 | 2025-04-12T11:55:52.586107
9
\x81\x80\x00\x01\x00\x02\x00\x00\x00\x00\x08clients1\x06google\x03com\x00\x00\x01\x00\x01\xc0\x00\x05\x00\x01\x00\x00\x00\xbd\x00\x07clients\x01l\xc0\x15\xc01\x00\x01\x00\x01\x00\x00\x00\xa2\x00\x04\xac٣.
\x00\x06\x85\x80\x00\x01\x00\x01\x00\x00\x00
66 /
tcp
1574088840 | 2025-04-18T19:47:04.504104
">Application and Content Networking Software 3.9</a>)\n</BODY><
70 /
tcp
1412519768 | 2025-04-21T10:08:53.672192
"AP0F1D85"
Connection: close
<HTML><HEAD><TITLE>401 Unauthorized</TITLE></HEAD>
<BODY BGCOLOR
-2029556872 | 2025-04-19T01:51:52.457182
HTTP/1.1 200 OK
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
Content-Type: text/html
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Connection: Keep-Alive
Accept-Ranges: bytes
1725751942 | 2025-04-23T17:08:21.594498
HTTP/1.1 403 Forbidden
Server: AliyunOSS
Date: Wed, 23 Apr 2025 17:08:21 GMT
Content-Type: application/xml
Content-Length: 345
Connection: keep-alive
x-oss-request-id: 68091E85A645AE36320CFAE5
x-oss-server-time: 0
x-oss-ec: 0003-00001201
94 /
tcp
1911457608 | 2025-03-31T23:46:40.027943
\x00[\x00\x00\x00\x00\x00\x00
101 /
tcp
-1329831334 | 2025-04-18T21:11:18.768445
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
102 /
tcp
-274082663 | 2025-04-27T09:04:58.788764
\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01
110 /
tcp
-2089734047 | 2025-04-02T08:17:08.515161
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
111 /
tcp
-971970408 | 2025-04-20T13:58:33.564439
113 /
tcp
1057210878 | 2025-04-05T22:48:42.503614
113 , 41358 : USERID : OTHER :99\r\n
175 /
tcp
-1399940268 | 2025-04-09T18:12:19.895599
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
179 /
tcp
-399606100 | 2025-04-20T11:00:02.671479
BGP Message\nType: 3\nMajor error Code: 6\nMinor error Code: 5\n
-1932800090 | 2025-04-12T13:13:34.758787
389 /
tcp
-1639129386 | 2025-04-19T14:39:49.339356
0%\\x02\\x01\\x01a \n\\x010\\x04\\x00\\x04\\x19anonymous bind disallowed
427 /
tcp
928665344 | 2025-04-12T01:25:22.364700
SAAdvert Response:\nVersion: 2\nFunction: SA Advertisement (11)\nURL: service:service-agent://127.0.0.1\nScopeList: default\nAttrributeList: \n\n\nserviceTypes:\nservice:ipmi\nservice:cdserver\nservice:fdserver\nservice:hdserver\nservice:adviser\nservice:lighttpd\nB://l:87/x\n
-960214280 | 2025-04-17T14:50:19.528785
HTTP/1.1 403 Forbidden
Server: AliyunOSS
Date: Thu, 17 Apr 2025 14:50:19 GMT
Content-Type: application/xml
Content-Length: 345
Connection: keep-alive
x-oss-request-id: 6801152B0AD071393235513F
x-oss-server-time: 0
x-oss-ec: 0003-00001201
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
61:6b:68:69:54:4a:81:bb:93:b4:d7:d1
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=BE, O=GlobalSign nv-sa, CN=GlobalSign GCC R3 OV TLS CA 2024
Validity
Not Before: Jan 2 06:32:06 2025 GMT
Not After : Sep 4 00:00:00 2025 GMT
Subject: C=CN, ST=ZheJiang, L=HangZhou, O=Alibaba (China) Technology Co., Ltd., CN=cn-beijing.oss.aliyuncs.com
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:cb:fd:cb:7f:5f:49:ee:e8:d9:d0:d6:53:d0:a5:
88:fd:fc:56:3c:06:76:2d:ad:ee:c9:65:e1:8c:fd:
ee:ef:a1:a2:34:db:d3:65:1e:4a:9c:f7:9d:a6:ad:
fa:a7:b3:1a:8b:45:f7:13:2a:26:24:9c:50:28:92:
25:54:45:fc:d2:2e:17:7d:c1:47:45:a1:39:bf:ce:
7e:f2:8b:d7:69:2c:b6:94:3f:5c:fc:a9:6e:c3:bd:
a5:a9:f3:6e:65:55:50:ba:b2:8a:df:ee:e9:50:a7:
81:b5:5f:3a:96:f9:74:c3:8a:54:51:d7:eb:02:1c:
58:33:e6:a0:ea:12:10:52:63:c9:df:03:84:cf:a3:
15:9c:50:7b:5e:6e:42:0f:3d:bd:33:3c:f6:6a:eb:
be:30:24:30:72:cb:84:a8:e9:17:aa:6a:45:f8:12:
c2:a1:78:0d:31:f0:45:2b:32:2f:ff:98:a3:03:a2:
5a:b0:8d:e2:d5:ce:e1:35:56:0b:0a:f8:11:bf:18:
44:f7:b8:7b:a0:a0:eb:1d:8d:cf:e8:cc:cf:c4:c5:
54:69:59:53:e1:ee:51:79:04:67:86:cf:8b:e5:c6:
88:a8:cc:9e:61:75:91:90:b5:8a:af:4c:a2:8d:57:
14:8a:f6:54:fb:1e:71:e5:09:e3:0a:12:df:34:8d:
d5:47
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature, Key Encipherment
X509v3 Basic Constraints: critical
CA:FALSE
Authority Information Access:
CA Issuers - URI:http://secure.globalsign.com/cacert/gsgccr3ovtlsca2024.crt
OCSP - URI:http://ocsp.globalsign.com/gsgccr3ovtlsca2024
X509v3 Certificate Policies:
Policy: 2.23.140.1.2.2
Policy: 1.3.6.1.4.1.4146.10.1.2
CPS: https://www.globalsign.com/repository/
X509v3 CRL Distribution Points:
Full Name:
URI:http://crl.globalsign.com/gsgccr3ovtlsca2024.crl
X509v3 Subject Alternative Name:
DNS:cn-beijing.oss.aliyuncs.com, DNS:*.cn-beijing.oss-console.aliyuncs.com, DNS:*.s3.oss-cn-beijing.aliyuncs.com, DNS:*.s3.oss-cn-beijing-internal.aliyuncs.com, DNS:*.cn-beijing.mgw.aliyuncs.com, DNS:*.oss.cn-beijing.privatelink.aliyuncs.com, DNS:*.oss-cn-beijing.oss-object-process.aliyuncs.com, DNS:*.oss-cn-beijing-internal.oss-object-process.aliyuncs.com, DNS:*.oss-cn-beijing.oss-accesspoint.aliyuncs.com, DNS:*.oss-cn-beijing-internal.oss-accesspoint.aliyuncs.com, DNS:*.oss-accesspoint.aliyuncs.com, DNS:*.oss-cn-beijing.aliyuncs.com, DNS:*.img-cn-beijing-internal.aliyuncs.com, DNS:*.oss-cn-beijing-internal-cross.aliyuncs.com, DNS:*.oss-cn-beijing-internal.aliyuncs.com, DNS:*.oss-cn-beijing-cross.aliyuncs.com, DNS:*.img-cn-beijing.aliyuncs.com, DNS:*.vpc100-oss-cn-beijing.aliyuncs.com, DNS:*.cn-beijing.oss.aliyuncs.com, DNS:*.oss-cache-cn-beijing-h.aliyuncs.com, DNS:*.oss-cache-cn-beijing-h-cross.aliyuncs.com, DNS:*.oss-cn-beijing-finance-1-pub-internal.aliyuncs.com, DNS:*.oss-cn-beijing-finance-1-pub.aliyuncs.com, DNS:*.cn-beijing-finance.oss.aliyuncs.com, DNS:*.oss-cn-beijing-finance-1-internal.aliyuncs.com, DNS:*.oss-cn-beijing-finance-1.aliyuncs.com, DNS:*.cn-beijing-finance-1.oss.aliyuncs.com, DNS:*.cn-beijing-vpc.oss.aliyuncs.com, DNS:*.oss-enet-cm.aliyuncs.com, DNS:*.oss-enet-cu.aliyuncs.com, DNS:*.oss-enet-ct.aliyuncs.com, DNS:*.oss-enet-cn-north.aliyuncs.com, DNS:*.aliyuncs.com, DNS:*.oss-enet.aliyuncs.com, DNS:*.oss-internal.aliyuncs.com, DNS:*.oss-internal.aliyun-inc.com, DNS:*.oss-accelerate.aliyuncs.com, DNS:*.oss-accelerate-overseas.aliyuncs.com, DNS:*.s3.oss-accelerate.aliyuncs.com, DNS:*.s3.oss-accelerate-overseas.aliyuncs.com, DNS:*.cn-beijing-cross.mgw.aliyuncs.com, DNS:*.oss-vpc.aliyuncs.com, DNS:*.cn-beijing.oss-vpc.aliyuncs.com, DNS:*.oss.aliyuncs.com
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Authority Key Identifier:
DA:D3:A8:08:48:0C:34:37:58:EE:E5:A7:75:2E:59:FC:D6:DC:3C:38
X509v3 Subject Key Identifier:
C1:58:AC:32:69:71:BB:67:42:6C:42:FE:14:E5:57:72:91:C1:82:D6
CT Precertificate SCTs:
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 1A:04:FF:49:D0:54:1D:40:AF:F6:A0:C3:BF:F1:D8:C4:
67:2F:4E:EC:EE:23:40:68:98:6B:17:40:2E:DC:89:7D
Timestamp : Jan 2 06:32:08.952 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:D4:22:D6:BD:85:6A:79:2B:66:0F:1F:
36:9C:87:35:37:A2:DA:91:B3:41:21:70:33:24:48:B8:
AC:01:B2:4F:8A:02:20:78:33:2F:5E:6C:72:6C:BA:8A:
2A:DB:4A:42:99:29:A1:0C:E4:7B:86:88:C2:7F:9F:BE:
CE:93:8F:5D:00:2F:8C
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 12:F1:4E:34:BD:53:72:4C:84:06:19:C3:8F:3F:7A:13:
F8:E7:B5:62:87:88:9C:6D:30:05:84:EB:E5:86:26:3A
Timestamp : Jan 2 06:32:08.990 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:DE:60:8C:72:69:F8:ED:DD:B5:9B:2F:
88:2B:94:8E:C5:EA:A3:29:CF:5E:76:E1:32:5B:33:E9:
09:55:C0:9B:0A:02:20:72:4F:8B:E6:B3:1A:36:F6:61:
91:02:36:00:EA:76:E0:8C:5C:3C:8C:AF:C1:4A:F2:FD:
CA:7D:2B:6A:A6:5A:A7
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : 0D:E1:F2:30:2B:D3:0D:C1:40:62:12:09:EA:55:2E:FC:
47:74:7C:B1:D7:E9:30:EF:0E:42:1E:B4:7E:4E:AA:34
Timestamp : Jan 2 06:32:08.695 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:21:00:82:E8:40:FB:D2:F4:C7:36:73:02:4A:
CD:8A:B4:A7:3D:E9:DC:7F:23:C7:17:0C:B1:8F:65:59:
3C:89:A5:E4:F0:02:20:2D:57:40:3F:AC:33:84:81:B8:
79:8C:CE:B4:F4:CC:44:29:AE:5A:FA:CD:66:FF:7A:69:
DA:8E:8E:6B:3D:C7:D7
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
4e:88:42:e9:bd:d6:24:7a:b8:0b:08:70:28:8b:e3:90:92:79:
25:1f:f9:ec:83:69:41:21:cb:3f:cc:c6:2c:76:54:44:09:81:
c9:8b:a9:bc:32:e4:5e:d4:72:17:de:fd:a1:50:2b:58:ed:45:
8e:ba:40:ee:f9:54:31:0e:56:0e:7f:9e:36:2d:98:8b:3a:21:
ac:4c:f7:4b:e5:97:32:cd:c3:b4:9d:b7:99:07:f1:4f:bb:81:
14:60:64:c2:01:bb:85:62:e5:8a:7e:84:86:9f:c9:0b:80:80:
c3:95:a2:77:b8:d9:81:73:28:dc:14:f9:af:1b:22:8b:33:2a:
b5:dd:34:fb:a6:90:3d:a1:37:b1:93:f5:d9:93:d0:3c:86:ac:
28:04:f6:71:24:54:fd:0c:42:2d:48:d4:9c:a6:e5:fa:88:71:
e3:dc:e1:a7:c7:8a:d5:39:43:29:5f:5d:2c:02:1a:72:08:e8:
ce:86:a9:22:b1:ed:4f:4e:7f:e5:7d:ea:01:3b:7f:34:2c:e6:
94:3c:5b:6c:64:09:c3:88:e5:08:64:91:8a:17:63:99:dc:0c:
85:ee:6c:4a:67:f4:66:21:e9:7a:a3:95:8c:ed:6c:6f:af:92:
f8:a3:49:8f:de:3b:85:de:68:56:95:f4:e7:e7:7b:1e:c2:0a:
1f:12:b5:15
462 /
tcp
307999478 | 2025-04-21T18:02:17.010016
unknown command \r\nunknown command \r\n
465 /
tcp
897328069 | 2025-04-08T15:08:21.122217
220 mail.scott000.com ESMTP
503 /
tcp
-1648456501 | 2025-04-18T22:19:11.820445
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
513 /
tcp
-1399940268 | 2025-04-08T20:44:51.801183
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
515 /
tcp
873425297 | 2025-04-18T07:27:49.570677
200 NOD32SS 99 (3318497116)
541 /
tcp
268285291 | 2025-04-05T09:21:22.086868
\\x16\\x03\\x01\\x01[\\x01\\x00\\x01W\\x03\\x03\\x86\\x12J\\xac\\xf6e\\xda\\x19A\\xcb\\x18qz\\x90\\xb2\\x89\\xfa\\xa2\\x83\\xf8\\xda\\xfe\xcd\x8d\\x89P\\xe96\\x93@\xcc\xbf E{@\\x8c\\xde\\xbf\\xf84x\x0c\\xb3\x0b\\x91\\x12\\xbc\\xa6\\xe5\\x17\\xe4\\xba\\xe2q\\x92\\xc7\\xdb\\x01\\x129L\\xc6ey\\x002\\x13\\x02\\x13\\x03\\x13\\x01\\x
548 /
tcp
155249582 | 2025-04-21T22:32:10.725953
Fast Copy: Yes\nExtended Sleep: Yes\nUUIDs: Yes\nUTF8 Server Name: Yes\nDirectory Services: Yes\nReconnect: No\nServer Notifications: Yes\nTCP/IP: Yes\nServer Signature: Yes\nServer Message: No\nPassword Saving Prohibited: No\nPassword Changing: No\nCopy File: Yes\nServer Name: NGU\nMachine Type: \rNetatalk3.1.8\nAFP Versions: AFP2.2, AFPX03, AFP3.1, AFP3.2, AFP3.3, AFP3.4\nUAMs: Cleartxt Passwrd\\x04,DHX2\t,DHCAST128\\x00\nServer Signature: 00000000008002000180030002800280
-1805329632 | 2025-04-24T21:33:01.025365
HTTP/1.1 200 OK
Server: nginx/1.13.7
Content-Type: text/html
Connection: keep-alive
Accept-Ranges: bytes
4146400 | 2025-04-15T21:30:01.666747
HTTP/1.1 400 Bad Request
Content-Type: text/html
Cache-Control: no-cache, no-store
Connection: close
X-Iinfo: 8-26086461-0 0NNN RT(1705912253915 115) q(-1 -1 -1 -1) r(0 -1) b1
646 /
tcp
-1600864159 | 2025-04-24T20:52:06.583535
\\x00\\x01\\x00\\x1c\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x01\\x00\\x12\\x00<\xce\x89\\x03\\x00\\x00\n\\x80\\x00\\x00\\x03\\x00\\x00\\x00\\x00\\x00\\x00
2098053533 | 2025-04-18T02:27:54.120945
HTTP/1.1 401 Unauthorized
Server: nginx/1.17.7
Content-Type: text/html
Connection: keep-alive
689 /
tcp
493955023 | 2025-04-03T07:16:32.491812
\x00\x00\x0c\x04\x00\x00\x00\x00\x00\x00\x04\x00\x10\x00\x00\x00\n0\x05\x00\x00@\x00
771 /
tcp
-1399940268 | 2025-04-06T22:55:48.814567
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-2029556872 | 2025-04-23T08:29:06.688710
HTTP/1.1 200 OK
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
Content-Type: text/html
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Connection: Keep-Alive
Accept-Ranges: bytes
785 /
tcp
-653033013 | 2025-04-01T18:34:32.890762
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
853 /
tcp
-1888448627 | 2025-04-23T15:59:10.285011
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
873 /
tcp
-1598265216 | 2025-04-03T07:19:37.374628
-262532376 | 2025-04-02T07:10:25.131641
HTTP/1.1 403 Forbidden
Server: nginx
Content-Type: text/html
Connection: keep-alive
902 /
tcp
1956828827 | 2025-04-08T18:37:45.879609
220 VMware Authentication Daemon Version 1.10: SSL Required, Se
rverDaemonProtocol:SOAP, MKSDisplayProtocol:VNC , , NFCSSL supported/t
953 /
tcp
165188539 | 2025-04-11T01:34:46.412370
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
990 /
tcp
-928473713 | 2025-04-27T18:22:59.030479
220-Welcome to zn1680\'s FTP.\r\n220 -- https://zn1680.idv.tw --\r\n
1814656027 | 2025-04-22T09:23:26.313701
HTTP/1.1 403 Forbidden
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
Keep-Alive: timeout=15; max=19
993 /
tcp
-249504111 | 2025-04-21T23:37:10.022136
-1533995666 | 2025-04-09T03:04:11.751685
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae22af_PS-PEK-01D0O24_75646-39427
1002 /
tcp
-2089734047 | 2025-04-03T07:37:28.628200
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
1023 /
tcp
-146605374 | 2025-04-28T06:26:51.060414
\x00[\xc2\x81\xc2\x8b\xc3\xa7\x7f\x00\x00
-2107996212 | 2025-04-02T05:49:50.984316
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
1027 /
tcp
1911457608 | 2025-04-25T18:29:26.653518
\x00[\x00\x00\x00\x00\x00\x00
1063 /
tcp
-2096652808 | 2025-04-11T06:41:11.142801
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
1080 /
tcp
1362344524 | 2025-04-11T04:21:30.196975
SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.7
1099 /
tcp
819727972 | 2025-04-24T12:14:11.642868
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1893989126 | 2025-04-12T23:57:26.956086
HTTP/1.1 200 OK
Content-Type: text/html
Accept-Ranges: bytes
X-Frame-Options: SAMEORIGIN
1153 /
tcp
-2096652808 | 2025-04-20T12:55:38.416472
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
1177 /
tcp
1632932802 | 2025-04-12T15:18:54.722101
1180 /
tcp
819727972 | 2025-04-21T23:17:09.766065
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1181 /
tcp
-358801646 | 2025-04-16T05:47:35.435251
1234 /
tcp
-339084706 | 2025-04-28T03:14:12.431622
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
1250 /
tcp
-1399940268 | 2025-04-25T16:27:47.833941
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1337 /
tcp
-971970408 | 2025-04-19T00:11:18.086790
1414 /
tcp
-1399940268 | 2025-04-27T16:16:01.973958
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-186520940 | 2025-04-15T12:34:40.229753
1458 /
tcp
-358801646 | 2025-04-07T09:55:07.748936
1604 /
tcp
1842524259 | 2025-04-25T00:28:31.702092
1339260719 | 2025-04-06T20:25:22.722456
HTTP/1.1 404 Not Found
Content-Type: text/html
Server: UPnP/1.0 DLNADOC/1.50 Platinum/1.0.5.13
1800 /
tcp
819727972 | 2025-04-11T03:38:41.497595
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1801 /
tcp
-1299899661 | 2025-04-16T02:35:20.675734
\\x10Z\x0b\\x00LIOR<\\x02\\x00\\x00\\xff\\xff\\xff\\xff\\x00\\x00\\x12\\x00a36a0e421af47074\\x97W\\xcd[\\x98\\xc4\\x1aJ\\xa5\xd1\xbf\\xf9\\xbd\\xc7\\xce\\xfd92d3\\x10\\x01\\x00\\x00ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ
1911 /
tcp
1278527606 | 2025-04-19T09:35:51.588502
1956 /
tcp
819727972 | 2025-04-28T02:55:45.036508
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1959 /
tcp
-805362002 | 2025-04-18T21:36:55.352579
ICAP/1.0 501 Other
Server: Traffic Spicer 7788179225
1970 /
tcp
-1399940268 | 2025-03-31T21:07:35.044923
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1979 /
tcp
-2096652808 | 2025-04-10T11:54:24.598986
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
1986 /
tcp
921225407 | 2025-04-25T06:10:06.391822
\x00\x00\x00\x04\x00\x00\x00\x00\x00
2000 /
tcp
-441419608 | 2025-04-25T07:32:25.465354
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
2002 /
tcp
1632932802 | 2025-04-21T04:43:45.026130
2003 /
tcp
-1399940268 | 2025-04-11T12:20:47.869228
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2008 /
tcp
2087396567 | 2025-04-19T19:55:46.812111
kjnkjabhbanc283ubcsbhdc72
2010 /
tcp
1763259671 | 2025-04-03T19:06:38.299105
{\n"Version": "3.4.18",\n"VersionArray": [\n3,\n4,\n18,\n0\n],\n"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",\n"OpenSSLVersion": "",\n"SysInfo": "",\n"Bits": 64,\n"Debug": false,\n"MaxObjectSize": 16777216\n}\n\n
2050 /
tcp
-2096652808 | 2025-04-28T16:21:45.157756
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
2067 /
tcp
233634112 | 2025-04-27T15:30:54.107418
SSH-98.60-SysaxSSH_81885..42
2083 /
tcp
2087396567 | 2025-04-16T22:34:28.070472
kjnkjabhbanc283ubcsbhdc72
2085 /
tcp
-653033013 | 2025-04-27T15:57:35.972446
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
2087 /
tcp
1082732927 | 2025-04-14T16:20:23.270378
STAT pid 1660
STAT uptime 28884
STAT time 1641290377
STAT version 1.2.1
STAT pointer_size 32
STAT curr_items 14
STAT total_items 3533
STAT bytes 30524
STAT curr_connections 1
STAT total_connections 3542
STAT connection_structures 3
STAT cmd_get 3533
STAT cmd_set 3533
STAT get_hits 3519
STAT get_misses 14
STAT bytes_read 7927780
STAT bytes_written 7848552
STAT limit_maxbytes 67108864
END
2103 /
tcp
826567260 | 2025-04-11T22:02:14.630449
\\x05\\x00\r\\x03\\x10\\x00\\x00\\x00\\x18\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x04\\x00\\x01\\x05\\x00\\x00\\x00\\x00
2108 /
tcp
1911457608 | 2025-04-01T18:30:58.202372
\x00[\x00\x00\x00\x00\x00\x00
141730637 | 2025-04-21T00:46:53.893805
HTTP/1.0 200 OK
Server: Proxy
2122 /
tcp
-1626979812 | 2025-04-18T07:39:30.508651
220 Service ready for new user.
2133 /
tcp
-2089734047 | 2025-04-22T03:09:33.378856
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
2134 /
tcp
-2089734047 | 2025-04-10T15:40:31.419575
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
2154 /
tcp
-303199180 | 2025-04-28T02:43:35.075165
Content-Type: text/rude-rejection\nContent-Length: 24\n\n\nAccess Denied, go away.\nContent-Type: text/disconnect-notice\nC...\n
2181 /
tcp
546151771 | 2025-04-11T13:25:00.991472
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC
Clients:
/*.*.*.*:11264[0](queued=0,recved=1,sent=0)
Latency min/avg/max: 0/0.0/0
Received: 8557
Sent: 11410
Connections: 1
Outstanding: 0
Zxid: 0x332907ad3391
Mode: follower
Node count: 104618
2201 /
tcp
-358801646 | 2025-04-19T20:58:22.521839
2211 /
tcp
-1538260461 | 2025-04-17T08:13:56.324545
2345 /
tcp
819727972 | 2025-04-02T17:07:06.193646
SSH-2.0-OpenSSH_7.4
Vulnerabilities
2404 /
tcp
165188539 | 2025-04-21T07:53:28.975301
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
2443 /
tcp
-1399940268 | 2025-04-20T00:18:08.292478
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2548 /
tcp
-1399940268 | 2025-04-07T08:26:25.054041
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1230049476 | 2025-04-01T22:10:57.210301
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
2557 /
tcp
1504401647 | 2025-04-28T03:14:33.941901
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
2562 /
tcp
-1399940268 | 2025-04-16T03:53:47.370450
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
2601 /
tcp
1715665777 | 2025-04-14T15:14:02.448748
Vty password is not set.\r\n
2628 /
tcp
1220320909 | 2025-04-28T12:11:13.130527
2762 /
tcp
-1139539254 | 2025-04-21T21:08:37.408994
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
3001 /
tcp
-2089734047 | 2025-04-07T15:24:31.901743
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
3004 /
tcp
165188539 | 2025-04-17T08:59:04.277778
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
1282941221 | 2025-04-16T06:15:33.472681
HTTP/1.0 500 Internal Server Error
Content-Length: 20
D
Connection: close
Command server error
3016 /
tcp
921225407 | 2025-04-27T21:49:47.416364
\x00\x00\x00\x04\x00\x00\x00\x00\x00
3050 /
tcp
1911457608 | 2025-04-16T05:41:18.112615
\x00[\x00\x00\x00\x00\x00\x00
3062 /
tcp
-339084706 | 2025-04-28T03:49:18.744094
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
198844676 | 2025-04-26T23:24:16.250212
HTTP/1.1 404 Not Found
Server: Jetty/9.4.31.v20200723
Content-Type: text/plain; charset=utf-8
Connection: close
3079 /
tcp
-1399940268 | 2025-04-09T01:11:55.681898
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3081 /
tcp
-180163620 | 2025-04-15T02:02:47.144570
NPC Telnet permit one connection.\r\n But One connection() already keep alive.\r\nGood Bye !! \r\n
3084 /
tcp
-345718689 | 2025-04-25T11:11:58.074015
3163 /
tcp
597764502 | 2025-04-05T00:33:30.547096
\x00[\xc2\x86\xc2\x9f\xc3\x9d\x7f\x00\x00
3181 /
tcp
819727972 | 2025-04-16T14:12:54.254006
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3192 /
tcp
-1730858130 | 2025-04-04T15:38:14.804908
RFB 003.008
VNC:
Protocol Version: 3.8
3195 /
tcp
-1399940268 | 2025-04-17T20:42:22.736130
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3197 /
tcp
819727972 | 2025-04-27T19:44:43.268834
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1013082686 | 2025-04-20T17:34:18.473127
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
-1547976805 | 2025-04-24T19:24:04.605051
HTTP/1.1 403 Forbidden
Server: nginx
Content-Type: text/html
Connection: close
3301 /
tcp
-1099385124 | 2025-04-13T01:27:47.292937
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
3306 /
tcp
1801207137 | 2025-04-28T00:12:41.052304
F\\x00\\x00\\x00\\xffj\\x04Host \'106.75.96.125\' is not allowed to connect to this MySQL server
3311 /
tcp
1126993057 | 2025-04-20T21:45:53.593452
* OK [CAPABILITY a2,M\\] nBwXk2pPP IMAP4rev1 20qx at
-1839934832 | 2025-04-24T14:49:10.302935
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
3342 /
tcp
205347087 | 2025-04-12T21:55:03.647770
SSH-25453-Cisco-3524665.35\n
3345 /
tcp
-1399940268 | 2025-04-16T02:39:05.468668
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3388 /
tcp
-1399940268 | 2025-04-19T15:52:42.028565
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3389 /
tcp
419073695 | 2025-04-23T15:11:06.854149
Remote Desktop Protocol\n\\x03\\x00\\x00\\x13\\x0e\\xd0\\x00\\x00\\x124\\x00\\x02\\x1f\\x08\\x00\\x08\\x00\\x00\\x00\n\nFlag: PROTOCOL_HYBRID_EX\nTarget_Name: 172_19_32_23\nProduct_Version: 10.0.20348 Ntlm 15\nOS: Windows Server 2022\nNetBIOS_Domain_Name: 172_19_32_23\nNetBIOS_Computer_Name: 172_19_32_23\nDNS_Domain_Name: 172_19_32_23\nDNS_Computer_Name: 172_19_32_23\nSystem_Time: 2024-01-22 08:40:52 +0000 UTC\n\n
3500 /
tcp
1911457608 | 2025-04-09T17:09:32.975206
\x00[\x00\x00\x00\x00\x00\x00
3510 /
tcp
-1888448627 | 2025-04-28T18:01:58.218379
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
3549 /
tcp
1620329124 | 2025-04-19T23:33:33.730643
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\x01\xc3\xbf\xc3\xbb\x03\xc3\xbf\xc3\xbd\x01\xc3\xbf\xc3\xbe\x01Username:
3552 /
tcp
897328069 | 2025-04-27T20:48:06.930590
220 mail.scott000.com ESMTP
3553 /
tcp
-1399940268 | 2025-04-09T02:01:27.154422
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3556 /
tcp
819727972 | 2025-04-03T05:48:28.932446
SSH-2.0-OpenSSH_7.4
Vulnerabilities
3780 /
tcp
-653033013 | 2025-04-23T13:31:09.821498
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
3790 /
tcp
660175493 | 2025-04-10T21:52:02.109001
3838 /
tcp
-1399940268 | 2025-04-05T01:54:07.348521
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
3842 /
tcp
-1399940268 | 2025-04-15T07:58:07.823661
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1300162323 | 2025-03-31T21:21:53.840078
HTTP/1.1 404 Not Found
Content-Type: text/plain; charset=utf-8
X-Content-Type-Options: nosniff
4022 /
tcp
-2096652808 | 2025-04-27T20:49:58.473354
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
4063 /
tcp
-2017887953 | 2025-04-23T17:55:35.318662
SSH-2.0-OpenSSH_7.9
Vulnerabilities
4064 /
tcp
-792826324 | 2025-04-22T20:03:04.586302
220 FTP server ready - login please
4072 /
tcp
117101543 | 2025-04-02T10:14:31.159928
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
4148 /
tcp
-1399940268 | 2025-04-11T05:28:48.401974
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4150 /
tcp
-1399940268 | 2025-04-12T21:21:10.378226
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4157 /
tcp
2087396567 | 2025-04-18T17:09:51.496674
kjnkjabhbanc283ubcsbhdc72
4160 /
tcp
1574088840 | 2025-04-18T21:19:07.113609
">Application and Content Networking Software 3.9</a>)\n</BODY><
4200 /
tcp
-1279886438 | 2025-04-22T20:59:28.840842
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
-1879056922 | 2025-04-19T01:07:33.745294
HTTP/1.1 403 Forbidden
Server: Apache/2.4.41 (Unix) OpenSSL/1.1.1d TST PHP/7.3.11
Content-Type: text/plain; charset=utf-8
Connection: close
4282 /
tcp
819727972 | 2025-04-20T13:44:40.507019
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4321 /
tcp
-269926141 | 2025-04-27T04:13:11.397415
\\x00\\x00\\x12\\x04\\x00\\x00\\x00\\x00\\x00\\x00\\x03\\x00\\x00\\x00\\x80\\x00\\x04\\x00\\x01\\x00\\x00\\x00\\x05\\x00\\xff\\xff\\xff\\x00\\x00\\x04\\x08\\x00\\x00\\x00\\x00\\x00\\x7f\\xff\\x00\\x00\\x00\\x00\\x08\\x07\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x01
4333 /
tcp
819727972 | 2025-04-09T21:57:22.810821
SSH-2.0-OpenSSH_7.4
Vulnerabilities
4369 /
tcp
1767345577 | 2025-04-21T16:21:28.578718
Hello, this is Quagga (version 0T).
Copyright 1996-200
4400 /
tcp
-358801646 | 2025-04-20T00:26:01.532294
4436 /
tcp
921225407 | 2025-04-11T00:07:25.972984
\x00\x00\x00\x04\x00\x00\x00\x00\x00
4437 /
tcp
-1399940268 | 2025-04-22T23:12:33.963127
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4439 /
tcp
1830187220 | 2025-04-04T05:43:54.920553
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
1089570394 | 2025-04-20T03:08:58.838945
HTTP/1.1 403 Forbidden
Server: openresty
Content-Type: text/html
Connection: keep-alive
Deny-Reason: hotload rechange server uri format error!!
Request-Id: 65ae29d9288d03df989018e5e7290002
4444 /
tcp
1911457608 | 2025-04-17T16:11:51.832646
\x00[\x00\x00\x00\x00\x00\x00
4499 /
tcp
-1399940268 | 2025-04-07T09:26:16.123015
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
4500 /
tcp
-1730858130 | 2025-04-03T17:17:27.890480
RFB 003.008
VNC:
Protocol Version: 3.8
4506 /
tcp
740837454 | 2025-04-28T16:16:51.522628
SSH-2.0-OpenSSH_5.3
Vulnerabilities
4510 /
tcp
-653033013 | 2025-04-24T01:40:51.364982
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
4643 /
tcp
-1737707071 | 2025-04-14T17:33:15.678634
\x00b\x00\x01\x00\x00\x00\x00x\x0b\x00\x00\x00\x00z\x00437
-1839934832 | 2025-04-09T13:44:16.133416
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
4840 /
tcp
1911457608 | 2025-04-26T07:17:47.279625
\x00[\x00\x00\x00\x00\x00\x00
4933 /
tcp
-653033013 | 2025-04-02T15:49:20.170050
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
4949 /
tcp
-971970408 | 2025-04-25T06:47:41.777267
5001 /
tcp
-1189269828 | 2025-04-28T00:17:14.914204
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
5003 /
tcp
1911457608 | 2025-04-19T07:35:47.355437
\x00[\x00\x00\x00\x00\x00\x00
5006 /
tcp
-1476017887 | 2025-04-27T20:31:04.610724
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
5007 /
tcp
632542934 | 2025-04-21T11:34:07.226274
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
1017429513 | 2025-04-14T20:54:58.457709
HTTP/1.1 403 Forbidden
Content-Type: text/html
Server: Microsoft-IIS/8.5
X-Powered-By: ASP.NET
5010 /
tcp
819727972 | 2025-04-16T03:13:31.094314
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5011 /
tcp
819727972 | 2025-04-22T05:54:57.502425
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5025 /
tcp
-971970408 | 2025-04-15T17:25:06.009508
5172 /
tcp
-1900404274 | 2025-04-06T22:21:22.104521
5201 /
tcp
321971019 | 2025-04-12T08:10:38.162312
-ERR client ip is not in whitelist\r
5230 /
tcp
-2096652808 | 2025-04-01T16:17:38.377051
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
5231 /
tcp
-1036370807 | 2025-04-10T07:06:09.637075
5254 /
tcp
1911457608 | 2025-03-31T09:11:53.141448
\x00[\x00\x00\x00\x00\x00\x00
-1839934832 | 2025-04-01T08:32:07.459037
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
5258 /
tcp
599074451 | 2025-04-07T19:39:46.231028
756886313 | 2025-04-28T19:39:57.813876
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
-1839934832 | 2025-04-21T21:04:55.535937
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
5273 /
tcp
819727972 | 2025-03-31T20:49:50.595791
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5277 /
tcp
819727972 | 2025-04-23T01:06:02.047502
SSH-2.0-OpenSSH_7.4
Vulnerabilities
5279 /
tcp
-1888448627 | 2025-04-04T12:29:19.353580
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
5351 /
tcp
165188539 | 2025-04-27T00:23:35.597518
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
5435 /
tcp
-1399940268 | 2025-04-22T20:17:22.302182
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5523 /
tcp
-1329831334 | 2025-04-06T04:58:17.471851
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
-1804465946 | 2025-04-06T02:32:14.769896
HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Server: Kestrel
Transfer-Encoding: chunked
Strict-Transport-Security: max-age=2592000
5568 /
tcp
1615193817 | 2025-04-11T14:50:35.899094
Hello, this is FRRouting (version 4.0).\r\r\nCopyright 19\n96-2005 Kunihiro Ishiguro, et al.\r\r\n\r\r\n\r\nUse...\n
5569 /
tcp
-441419608 | 2025-04-17T04:35:34.843619
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
5590 /
tcp
740837454 | 2025-04-02T17:23:38.383664
SSH-2.0-OpenSSH_5.3
Vulnerabilities
5595 /
tcp
-1399940268 | 2025-04-20T22:08:16.787823
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
5630 /
tcp
580340387 | 2025-04-02T20:55:34.971911
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
5672 /
tcp
575925250 | 2025-04-05T22:55:17.791017
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
5858 /
tcp
-1888448627 | 2025-04-18T21:18:58.668419
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
-1056270173 | 2025-04-20T08:34:01.263550
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
5938 /
tcp
-784071826 | 2025-04-09T20:31:22.098045
SSH-2.0-OpenSSH_8.0
Vulnerabilities
1999272906 | 2025-04-26T15:26:38.783676
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
-2118655245 | 2025-04-05T04:42:32.906862
HTTP/1.0 500 Internal Server Error
Content-Length: 20
5986 /
tcp
104385780 | 2025-04-26T22:23:10.338849
5990 /
tcp
-1399940268 | 2025-04-05T23:33:01.173816
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6001 /
tcp
120534451 | 2025-04-16T18:48:32.986238
971933601 | 2025-04-26T13:29:28.869622
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
6006 /
tcp
504717326 | 2025-04-26T16:34:53.285236
SSH-2.0-OpenSSH_8.6
Vulnerabilities
6010 /
tcp
-1888448627 | 2025-04-09T18:05:46.399291
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
6379 /
tcp
321971019 | 2025-04-04T12:13:41.641150
-ERR client ip is not in whitelist\r
6380 /
tcp
321971019 | 2025-04-04T18:47:19.237725
-ERR client ip is not in whitelist\r
6464 /
tcp
-339084706 | 2025-04-11T15:08:47.126588
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
6550 /
tcp
-1399940268 | 2025-04-23T15:42:00.801303
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6556 /
tcp
321971019 | 2025-04-10T16:04:20.217789
-ERR client ip is not in whitelist\r
6600 /
tcp
-1399940268 | 2025-04-23T22:52:38.448585
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
6605 /
tcp
1911457608 | 2025-04-10T16:40:56.928435
\x00[\x00\x00\x00\x00\x00\x00
6633 /
tcp
921225407 | 2025-04-18T12:47:43.416410
\x00\x00\x00\x04\x00\x00\x00\x00\x00
6653 /
tcp
-599252106 | 2025-04-01T21:23:37.921790
6662 /
tcp
1308377066 | 2025-04-01T19:01:53.158392
6666 /
tcp
-696112747 | 2025-04-16T18:00:08.058823
\x00\x0e@\xbdT\xa7\xd0f(*\xd4\x00\x00\x00\x00\x00
6667 /
tcp
-2031152423 | 2025-04-23T11:45:03.275822
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
6668 /
tcp
89142341 | 2025-04-04T04:45:22.566843
\x05\x00\x00\x00\x0b\x08\x05\x1a\x00
6697 /
tcp
1126993057 | 2025-04-12T16:33:39.705182
* OK [CAPABILITY a2,M\\] nBwXk2pPP IMAP4rev1 20qx at
6775 /
tcp
103159425 | 2025-04-24T15:27:55.219042
6799 /
tcp
165188539 | 2025-04-02T06:04:24.991554
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
6998 /
tcp
307999478 | 2025-04-26T17:58:39.009282
unknown command \r\nunknown command \r\n
7001 /
tcp
-1136600457 | 2025-04-15T18:50:57.958350
HELO:10.3.6.0.false
AS:2048
HL:19
7006 /
tcp
-1888448627 | 2025-04-11T21:18:00.603054
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
7050 /
tcp
117101543 | 2025-04-28T17:35:52.919606
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
572436013 | 2025-04-05T17:16:18.123970
HTTP/1.1 404 Not Found
Content-Type: text/plain
7071 /
tcp
2087396567 | 2025-04-12T22:00:31.433880
kjnkjabhbanc283ubcsbhdc72
7079 /
tcp
205347087 | 2025-04-24T05:00:08.966856
SSH-25453-Cisco-3524665.35\n
7080 /
tcp
819727972 | 2025-04-23T14:47:15.598721
SSH-2.0-OpenSSH_7.4
Vulnerabilities
7218 /
tcp
-1311598826 | 2025-04-22T10:55:28.633421
AMQP:
cluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local
copyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.
information:Licensed under the MPL 2.0. Website: https://rabbitmq.com
platform:Erlang/OTP 24.1
product:RabbitMQ
version:3.9.7
Capabilities:
publisher_confirms:true
exchange_exchange_bindings:true
basic.nack:true
consumer_cancel_notify:true
connection.blocked:true
consumer_priorities:true
authentication_failure_close:true
per_consumer_qos:true
direct_reply_to:tru
7415 /
tcp
-297128567 | 2025-04-05T11:51:27.346811
\x04\x01\xc3\xb4\x00\x15Internal Server Error\x00\x00\x00AB\x00\x02\x05\x00
7434 /
tcp
472902042 | 2025-04-08T09:10:40.316240
"Magic:ActiveMQ
Version:12
<ActiveMQ*TcpNoDelayEnabledSizePrefixDisabled CacheSizeProviderName ActiveMQStackTraceEnabledPlatformDetails JavaCacheEnabledTightEncodingEnabledMaxFrameSize@MaxInac
7441 /
tcp
-1327660293 | 2025-04-19T21:05:32.153312
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
-512831750 | 2025-04-19T10:08:38.424567
HTTP/1.1 403 Forbidden
Server: openresty
Content-Type: text/html
Connection: keep-alive
via: CHN-GDdongguan-GLOBAL1-CACHE105[2]
X-CCDN-ERRCODE-SRC: 01
X-CCDN-FORBID-CODE: 040001
7500 /
tcp
-1888448627 | 2025-04-15T14:35:46.597283
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
7634 /
tcp
504717326 | 2025-04-25T02:47:17.257980
SSH-2.0-OpenSSH_8.6
Vulnerabilities
7775 /
tcp
-653033013 | 2025-04-22T04:58:01.705620
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
1391945995 | 2025-04-07T11:52:57.125421
HTTP/1.1 403 Forbidden
Content-Type: text/plain; charset=utf-8
Proxy-Authenticate: Basic realm=""
7778 /
tcp
165188539 | 2025-04-17T22:38:38.065293
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
7790 /
tcp
-1428621233 | 2025-04-24T17:27:57.600348
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
8000 /
tcp
-1204391172 | 2025-04-09T03:21:43.240961
8009 /
tcp
-1730858130 | 2025-04-23T10:36:59.383220
RFB 003.008
VNC:
Protocol Version: 3.8
8019 /
tcp
1624217396 | 2025-04-04T12:32:27.401729
HELO:10.3.6.0.false\nAS:2048\nHL:19
8029 /
tcp
321971019 | 2025-04-23T20:31:45.759200
-ERR client ip is not in whitelist\r
8034 /
tcp
-1399940268 | 2025-04-28T17:57:47.285598
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8046 /
tcp
-358801646 | 2025-04-28T11:42:48.680993
8049 /
tcp
-1428621233 | 2025-04-24T08:58:12.882332
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
1077013874 | 2025-04-10T17:02:24.413846
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
8055 /
tcp
1919228981 | 2025-04-18T18:50:15.806128
\x00\x1e\x00\x06\xc2\x81\xc2\x85\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
8079 /
tcp
-1810987450 | 2025-04-27T19:55:38.761501
8081 /
tcp
-971970408 | 2025-04-24T01:44:34.270395
8085 /
tcp
-2031152423 | 2025-04-18T05:47:44.046626
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
-2118655245 | 2025-04-02T20:00:19.138846
HTTP/1.0 500 Internal Server Error
Content-Length: 20
8089 /
tcp
119860953 | 2025-04-20T03:13:48.774156
* OK ArGoSoft Mail Server IMAP Module v.YW at
-1249500036 | 2025-04-23T23:34:00.251019
HTTP/1.1 200 OK
Server: nginx
Content-Type: text/html
Connection: keep-alive
Accept-Ranges: bytes
8101 /
tcp
1911457608 | 2025-04-15T06:52:44.459855
\x00[\x00\x00\x00\x00\x00\x00
8104 /
tcp
575925250 | 2025-04-26T16:05:54.827366
AMQP:\ncluster_name:rabbit@rabbitmq-0.rabbitmq-headless.rabbitmq.svc.cluster.local\ncopyright:Copyright (c) 2007-2021 VMware, Inc. or its affiliates.\ninformation:Licensed under the MPL 2.0. Website: https://rabbitmq.com\nplatform:Erlang/OTP 24.1\nproduct:RabbitMQ\nversion:3.9.7\nCapabilities:\npublisher_confirms:true\nexchange_exchange_bindings:true\nbasic.nack:true\nconsumer_cancel_notify:true\nconnection.blocked:true\nconsumer_priorities:true\nauthentication_failure_close:true\nper_consumer_qos:true\ndirect_reply_to:tru
8107 /
tcp
819727972 | 2025-04-28T02:09:38.217401
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8110 /
tcp
-1399940268 | 2025-04-21T13:51:20.290085
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8115 /
tcp
321971019 | 2025-04-25T17:20:30.821905
-ERR client ip is not in whitelist\r
2103111368 | 2025-04-17T08:08:49.512677
HTTP/1.0 403 Access denied
Server: tinyproxy/1.8.3
0AContent-Type: text/html
Connection: close
<?...
8135 /
tcp
-1399940268 | 2025-04-15T19:58:04.459610
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8139 /
tcp
1978059005 | 2025-04-22T23:49:37.188384
Sorry, that nickname format is invalid.
8140 /
tcp
671605376 | 2025-04-24T10:32:33.551944
8154 /
tcp
-1399940268 | 2025-04-27T03:18:56.305021
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8156 /
tcp
-438503381 | 2025-04-27T20:36:48.204027
WORLD OF WARCRAFT CONNECTION - SERVER TO CLIENT - V2
8165 /
tcp
1208318993 | 2025-03-31T18:59:58.664491
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
8176 /
tcp
-2017887953 | 2025-04-25T18:50:30.817015
SSH-2.0-OpenSSH_7.9
Vulnerabilities
8181 /
tcp
-1148066627 | 2025-04-28T13:29:49.981023
\x00[\xc2\x84\xc2\x86\xc3\xb2\x7f\x00\x00
8185 /
tcp
819727972 | 2025-04-04T02:53:40.752764
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8186 /
tcp
1208318993 | 2025-04-16T06:26:20.689130
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
8194 /
tcp
819727972 | 2025-04-25T01:15:27.104677
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8200 /
tcp
-877598700 | 2025-04-26T18:36:34.580979
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\\x01\xc3\xbf\xc3\xbb\\x03\xc3\xbf\xc3\xbd\\x01\xc3\xbf\xc3\xbe\\x01Username:
8252 /
tcp
1726594447 | 2025-04-24T18:06:14.883667
\r\n\nLantronix MSS100 Version V118/523(045538937)\n\r\nType HELP at the \'Local_61349> \' prompt for assistance.\n\r\n\r\n\nUsername>
8318 /
tcp
408230060 | 2025-04-04T03:33:01.973111
\r\nSorry, that nickname format is invalid.\r\n
1335782347 | 2025-04-20T19:07:23.463901
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
WZWS-RAY: 1249-1705940700.09-waf02bjtp3
8350 /
tcp
-1399940268 | 2025-04-20T10:27:54.174552
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8382 /
tcp
-653033013 | 2025-04-03T22:23:05.190815
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
8403 /
tcp
1989907056 | 2025-04-27T02:37:05.595457
RTSP/1.0 453 Not Enough Bandwidth\r\nServer: AirTunes/7l_wZ\r\n\r\n
8407 /
tcp
1975288991 | 2025-04-06T16:35:59.066486
8408 /
tcp
-1399940268 | 2025-04-12T04:08:29.166500
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8409 /
tcp
1911457608 | 2025-04-25T03:13:54.523227
\x00[\x00\x00\x00\x00\x00\x00
8423 /
tcp
-1611764932 | 2025-04-21T21:33:17.892811
\x03\x00\x00\x10\x08\x02\xc2\x80\x00}\x08\x02\xc2\x80\xc3\xa2\x14\x01\x00
8436 /
tcp
-1399940268 | 2025-04-22T19:58:57.371174
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1753236315 | 2025-04-22T15:49:11.121969
HTTP/1.1 200 OK
Referrer-Policy: no-referrer
X-Frame-Options: SAMEORIGIN
Strict-Transport-Security: max-age=31536000; includeSubDomains
X-Robots-Tag: none
Cache-Control: no-cache, must-revalidate, no-transform, no-store
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Content-Type: text/html;charset=utf-8
content-length: 3870
8452 /
tcp
-1139539254 | 2025-04-27T08:17:39.743632
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
8454 /
tcp
2063598737 | 2025-04-24T15:12:28.338773
8462 /
tcp
1543809371 | 2025-04-21T18:34:46.847772
220 corpease.net Anti-spam GT for Coremail System (icmhosting[2\n0181212])
8464 /
tcp
-136006866 | 2025-04-21T21:09:39.061257
STAT pid 1660\nSTAT uptime 28884\nSTAT time 1641290377\nSTAT version 1.2.1\nSTAT pointer_size 32\nSTAT curr_items 14\nSTAT total_items 3533\nSTAT bytes 30524\nSTAT curr_connections 1\nSTAT total_connections 3542\nSTAT connection_structures 3\nSTAT cmd_get 3533\nSTAT cmd_set 3533\nSTAT get_hits 3519\nSTAT get_misses 14\nSTAT bytes_read 7927780\nSTAT bytes_written 7848552\nSTAT limit_maxbytes 67108864\nEND
8465 /
tcp
-407828767 | 2025-04-06T00:38:19.975109
\x00[\xc2\xbc/\xc2\x9f\x7f\x00\x00
8472 /
tcp
1911457608 | 2025-03-31T17:50:18.138714
\x00[\x00\x00\x00\x00\x00\x00
8500 /
tcp
-684625978 | 2025-04-18T08:31:28.050300
{Datacenter:dc1 NodeName:consul-dev NodeID:e61aec6b-e338-67fa-3b08-f8185bd5b528 Revision:db839f18b Server:true Version:1.10.1}
8515 /
tcp
819727972 | 2025-04-16T18:28:49.912616
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8545 /
tcp
819727972 | 2025-04-09T04:44:57.221884
SSH-2.0-OpenSSH_7.4
Vulnerabilities
1830697416 | 2025-04-21T21:52:35.059756
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
8579 /
tcp
-1105333987 | 2025-04-23T17:15:34.933852
8584 /
tcp
-454087041 | 2025-04-14T15:58:52.004216
\x1e\xc3\x80\x010\x02\x00\xc2\xa8\xc3\xa3\x00\x00\x00\x00
8585 /
tcp
-2031152423 | 2025-04-25T04:36:23.967480
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
-1086609709 | 2025-04-17T05:17:55.353240
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
WZWS-RAY: 1249-1705938617.274-w-waf03shgt2
8637 /
tcp
1632932802 | 2025-04-06T05:02:56.059916
1489954473 | 2025-04-21T12:51:27.791017
HTTP/1.1 410 Gone
Server: openresty
Transfer-Encoding: chunked
Connection: keep-alive
Via: 1.1 google
8733 /
tcp
1911457608 | 2025-04-28T07:39:48.119549
\x00[\x00\x00\x00\x00\x00\x00
8765 /
tcp
1911457608 | 2025-04-03T01:24:29.600754
\x00[\x00\x00\x00\x00\x00\x00
8784 /
tcp
819727972 | 2025-04-11T20:12:36.230885
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8802 /
tcp
-438503381 | 2025-04-11T12:46:31.704277
WORLD OF WARCRAFT CONNECTION - SERVER TO CLIENT - V2
8811 /
tcp
-1399940268 | 2025-04-15T11:53:07.969615
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8812 /
tcp
-1648456501 | 2025-04-22T20:34:13.600733
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
8814 /
tcp
-1648456501 | 2025-04-27T15:18:14.965770
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
8827 /
tcp
-1538260461 | 2025-04-14T20:43:45.726076
8834 /
tcp
-905685638 | 2025-04-05T05:02:26.092154
8840 /
tcp
921225407 | 2025-04-03T02:57:58.636536
\x00\x00\x00\x04\x00\x00\x00\x00\x00
8845 /
tcp
1911457608 | 2025-04-22T08:09:36.104031
\x00[\x00\x00\x00\x00\x00\x00
8862 /
tcp
51259122 | 2025-04-07T14:29:32.660656
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
8864 /
tcp
1543809371 | 2025-04-19T22:40:38.420073
220 corpease.net Anti-spam GT for Coremail System (icmhosting[2\n0181212])
8880 /
tcp
-2096652808 | 2025-04-11T20:11:30.869978
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
8886 /
tcp
-1399940268 | 2025-04-01T06:28:30.571666
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
8889 /
tcp
819727972 | 2025-04-12T22:59:21.683069
SSH-2.0-OpenSSH_7.4
Vulnerabilities
8899 /
tcp
474736340 | 2025-04-08T09:38:11.543287
431 Unable to negotiate secure command connection.
8905 /
tcp
-1730858130 | 2025-04-17T22:37:31.825479
RFB 003.008
VNC:
Protocol Version: 3.8
8988 /
tcp
-445721795 | 2025-04-19T00:56:59.329737
\x00[\xc3\xaed\x1a\x7f\x00\x00
-1230049476 | 2025-04-26T05:53:46.987230
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
9000 /
tcp
-2067028711 | 2025-04-18T00:36:48.624703
\x15\x03\x01\x00\x02\x02F
9005 /
tcp
-1399940268 | 2025-04-12T17:35:09.679016
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9007 /
tcp
-2017887953 | 2025-03-29T21:26:40.500431
SSH-2.0-OpenSSH_7.9
Vulnerabilities
9011 /
tcp
-1399940268 | 2025-04-02T21:01:17.943161
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9015 /
tcp
-2089734047 | 2025-04-02T11:08:59.606756
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9024 /
tcp
-1297953727 | 2025-04-01T15:08:42.603984
\x02\x00\x00\x00\x00\x00\x06\x04\x00\x00\x00\x00\x00\x0c\x00\x00\n0\x00\x1c
9029 /
tcp
1011407350 | 2025-04-17T16:00:38.203516
* OK GroupWise IMAP4rev1 Server Ready\r\n
9042 /
tcp
1426971893 | 2025-04-12T03:44:25.615956
\x00[s\xc3\x85\xc3\x93\x7f\x00\x00
9043 /
tcp
321971019 | 2025-04-04T11:19:58.465484
-ERR client ip is not in whitelist\r
9051 /
tcp
819727972 | 2025-04-04T10:06:16.718468
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9086 /
tcp
307999478 | 2025-04-20T07:24:22.576904
unknown command \r\nunknown command \r\n
9092 /
tcp
2098371729 | 2025-04-08T07:24:02.390953
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
9097 /
tcp
-1888448627 | 2025-04-10T10:56:15.095090
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
9100 /
tcp
580340387 | 2025-04-11T13:02:45.464665
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
9113 /
tcp
-1399940268 | 2025-04-24T15:48:37.914183
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9123 /
tcp
1911457608 | 2025-04-18T22:45:01.405263
\x00[\x00\x00\x00\x00\x00\x00
-1230049476 | 2025-04-28T01:19:56.839756
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
9134 /
tcp
-1399940268 | 2025-04-01T13:34:44.381871
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9138 /
tcp
-1399940268 | 2025-04-01T09:18:00.448794
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9151 /
tcp
-971970408 | 2025-04-05T17:24:01.297742
9160 /
tcp
-1399940268 | 2025-04-28T14:09:47.112442
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9161 /
tcp
-1399940268 | 2025-04-12T18:23:27.517859
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9166 /
tcp
1189133115 | 2025-04-23T20:34:43.601353
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
9172 /
tcp
-1810987450 | 2025-04-28T10:47:17.959578
9188 /
tcp
1975288991 | 2025-04-03T15:34:32.110669
9190 /
tcp
-1399940268 | 2025-04-04T21:44:18.391608
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9194 /
tcp
1911457608 | 2025-04-17T16:31:49.459564
\x00[\x00\x00\x00\x00\x00\x00
9195 /
tcp
-1399940268 | 2025-04-18T03:20:21.532334
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9199 /
tcp
-1399940268 | 2025-04-19T22:16:18.975936
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9201 /
tcp
165188539 | 2025-04-06T15:23:48.211077
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
9216 /
tcp
1308377066 | 2025-04-06T22:00:39.410842
9226 /
tcp
1911457608 | 2025-04-27T23:27:16.679839
\x00[\x00\x00\x00\x00\x00\x00
9230 /
tcp
819727972 | 2025-04-10T10:40:55.064256
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9247 /
tcp
119860953 | 2025-04-04T15:43:40.728087
* OK ArGoSoft Mail Server IMAP Module v.YW at
9251 /
tcp
-2031152423 | 2025-04-12T13:10:55.804483
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
9303 /
tcp
-1139539254 | 2025-04-10T11:07:16.217173
\xc3\xbf\xc3\xbb\x01\n\rno data rcvd for version string\n\rrecv version id unsuccessful\n\rSSH Session task 0xY: Version Exchange Failed\n\r
9304 /
tcp
-1399940268 | 2025-04-28T20:45:11.624640
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9306 /
tcp
-339084706 | 2025-04-09T03:13:59.948488
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
9351 /
tcp
-1399940268 | 2025-04-16T00:23:15.445912
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
9376 /
tcp
1632932802 | 2025-04-27T02:38:45.164305
9383 /
tcp
632542934 | 2025-04-04T22:08:28.456495
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
9398 /
tcp
-154107716 | 2025-04-14T15:59:36.444219
220 Microsoft FTP Service
530 User cannot log in.
214-The following commands are recognized (* ==>'s unimplemented).
ABOR
ACCT
ADAT *
ALLO
APPE
AUTH
CCC
CDUP
CWD
DELE
ENC *
EPRT
EPSV
FEAT
HELP
HOST
LANG
LIST ...
9400 /
tcp
820958131 | 2025-04-27T00:55:21.206414
kjnkjabhbanc283ubcsbhdc72\x02
-833168972 | 2025-04-22T03:41:11.882495
HTTP/1.1 200
Content-Type: text/html;charset=UTF-8
Transfer-Encoding: chunked
0 | 2025-04-12T03:24:43.704486
HTTP/1.1 200 OK
Date: Sat, 12 Apr 2025 03:24:43 GMT
Content-Type: application/json
Content-Length: 269
Connection: keep-alive
Ali-Swift-Global-Savetime: 1744428283
Eagleeye-Traceid: aa40bd9c502222c765a6e4a0ad
Eagleid: aa40bd9c502222c765a6e4a0ad
S_group: tao-session
S_ip: 125bbfa1578d1111c1662759d373ec2c
S_status: STATUS_SYS_ERR
S_tag: 565842071841410|488567460^|^^
S_tid: aa40bd9c502222c765a6e4a0ad
S_ucode: CN:CENTER
S_v: 4.0.1.0
Server: Tengine
Strict-Transport-Security: max-age=0
Timing-Allow-Origin: *, *
Location: https://aiotsigning.iot.aliyun.com
Ufe-Result: A7
Via: kunlun33.96kunlun6[475,755,593-0,M], kunlun05.kunlun59[817,0]
X-Cache: MISS TCP_MISS dirn:-2:-2
X-Swift-Cachetime: 0
X-Swift-Savetime: Sat, 12 Apr 2025 03:24:43 GMT
9446 /
tcp
-2080784861 | 2025-04-03T21:34:38.783879
GBPK\xc3\xbb\xc3\xb7n\xc2\x93W\xc2\xaf\xc2\x86\xc2\x93x@\xc2\xa9\x0e\xc3\x8a*\xc2\x9bS\x00
9488 /
tcp
-2089734047 | 2025-03-31T21:14:50.650243
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
9500 /
tcp
-1991224470 | 2025-04-02T00:33:40.763423
\\x00\\x00\\x00\\x01\\x00\\x00\\x00\\x14TP/1.1\r\n\\x00\\x00\\x00\\x00&
9527 /
tcp
1308377066 | 2025-04-20T18:19:12.318901
9530 /
tcp
-249504111 | 2025-04-19T20:47:29.177437
9600 /
tcp
-1279886438 | 2025-04-20T03:30:21.708945
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
9633 /
tcp
1741579575 | 2025-04-22T06:12:31.331090
9658 /
tcp
-1746074029 | 2025-04-28T16:05:02.258598
9734 /
tcp
504717326 | 2025-04-27T15:32:14.368556
SSH-2.0-OpenSSH_8.6
Vulnerabilities
9754 /
tcp
819727972 | 2025-04-01T22:25:25.209484
SSH-2.0-OpenSSH_7.4
Vulnerabilities
9758 /
tcp
1208318993 | 2025-04-22T07:37:08.245268
\x01\x00\x0b\x00\x00\x00=\x00\x01\x00\x00\x00\x00\x00\xc3\x80\x06\xc3\xbf\xc3\xbf?"<Z\x00DECWINDOWS Digital Equipment Corporation Digital UNIX V2eT03T7w_Q6\x00\x00\x01\x01
9765 /
tcp
366084633 | 2025-04-06T05:24:54.842871
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
9803 /
tcp
103159425 | 2025-04-12T13:36:43.707620
9810 /
tcp
1332894250 | 2025-04-08T18:41:00.018574
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
9876 /
tcp
2070013657 | 2025-04-05T01:48:37.783745
\\x00\\x00\\x01+\\x00\\x00\\x00_{"code":0,"flag":1,"language":"JAVA","opaque":0,"serializeTypeCurrentRPC":"JSON","version":433}{"brokerAddrTable":{"broker-a":{"brokerAddrs":{0:"127.63.135.245:10911"},"brokerName":"broker-a","cluster":"DefaultCluster","enableActingMaster":false}},"clusterAddrTable":{"DefaultCluster":["broker-a"]}}
1320285193 | 2025-04-02T16:12:21.843432
HTTP/1.1 404 Not Found
Server: CloudWAF
Content-Type: text/html
Connection: keep-alive
9902 /
tcp
-1477838366 | 2025-04-21T08:28:09.058475
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4
9909 /
tcp
401555314 | 2025-04-25T22:43:33.963696
9923 /
tcp
-1399940268 | 2025-04-07T03:11:55.430937
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
56005235 | 2025-04-20T01:37:01.343423
HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
WZWS-RAY: 1249-1705935860.556-s5jhg
9944 /
tcp
1919228981 | 2025-04-08T07:42:56.511730
\x00\x1e\x00\x06\xc2\x81\xc2\x85\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
-1917695220 | 2025-04-24T22:23:16.055791
HTTP/1.1 200 OK
Server: Jetty(9.4.8.v20171121)
9999 /
tcp
1161309183 | 2025-04-23T23:48:17.111549
10009 /
tcp
1191574520 | 2025-04-22T05:01:10.867919
\\x00[\'\\x19\\xc0\\xa8Y\\xfd
10014 /
tcp
-1399940268 | 2025-04-20T09:46:22.874983
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
-1013082686 | 2025-04-06T17:55:53.566109
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
10027 /
tcp
-904840257 | 2025-04-10T19:20:15.435847
572 Relay not authorized\r\n
10032 /
tcp
921225407 | 2025-04-28T18:37:39.323274
\x00\x00\x00\x04\x00\x00\x00\x00\x00
10034 /
tcp
921225407 | 2025-04-27T01:41:29.260582
\x00\x00\x00\x04\x00\x00\x00\x00\x00
10044 /
tcp
-1399940268 | 2025-04-24T18:28:45.140106
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10050 /
tcp
1082732927 | 2025-04-06T13:29:43.619707
STAT pid 1660
STAT uptime 28884
STAT time 1641290377
STAT version 1.2.1
STAT pointer_size 32
STAT curr_items 14
STAT total_items 3533
STAT bytes 30524
STAT curr_connections 1
STAT total_connections 3542
STAT connection_structures 3
STAT cmd_get 3533
STAT cmd_set 3533
STAT get_hits 3519
STAT get_misses 14
STAT bytes_read 7927780
STAT bytes_written 7848552
STAT limit_maxbytes 67108864
END
10051 /
tcp
2087396567 | 2025-04-06T11:29:24.572290
kjnkjabhbanc283ubcsbhdc72
10068 /
tcp
1726594447 | 2025-04-05T12:04:49.723633
\r\n\nLantronix MSS100 Version V118/523(045538937)\n\r\nType HELP at the \'Local_61349> \' prompt for assistance.\n\r\n\r\n\nUsername>
10075 /
tcp
1911457608 | 2025-04-23T06:02:54.128149
\x00[\x00\x00\x00\x00\x00\x00
10084 /
tcp
819727972 | 2025-04-09T05:19:48.324097
SSH-2.0-OpenSSH_7.4
Vulnerabilities
10089 /
tcp
-1032713145 | 2025-04-21T18:24:37.327604
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
10134 /
tcp
-2031152423 | 2025-04-27T02:49:35.810071
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
10180 /
tcp
830745946 | 2025-03-31T23:55:50.304021
\\x00[\'\\xc4\\xc0\\xa8Y\\xfd
10225 /
tcp
-1097188123 | 2025-04-28T18:42:43.562302
10250 /
tcp
1542849631 | 2025-04-24T23:55:17.357178
* OK [CAPABILITY a2,M\] nBwXk2pPP IMAP4rev1 20qx at
10444 /
tcp
819727972 | 2025-04-27T06:42:32.866983
SSH-2.0-OpenSSH_7.4
Vulnerabilities
10445 /
tcp
819727972 | 2025-04-10T22:00:09.758175
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-2107996212 | 2025-04-20T02:42:14.063399
HTTP/1.0 200 OK
Server: Proxy
Unauthorized ...
IP Address:
10810 /
tcp
-1399940268 | 2025-04-20T18:00:22.783383
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
10909 /
tcp
921225407 | 2025-04-22T16:11:22.924097
\x00\x00\x00\x04\x00\x00\x00\x00\x00
10911 /
tcp
-1399940268 | 2025-04-26T22:52:37.001241
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
11027 /
tcp
-1105333987 | 2025-04-15T14:35:30.564514
11075 /
tcp
-2096652808 | 2025-04-16T04:11:42.199081
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
11101 /
tcp
-1730858130 | 2025-04-19T18:26:30.764697
RFB 003.008
VNC:
Protocol Version: 3.8
11112 /
tcp
1370263973 | 2025-04-27T08:49:55.886990
11210 /
tcp
1655023012 | 2025-04-26T05:02:29.791246
athinfod: invalid query.\n
11288 /
tcp
1574088840 | 2025-04-21T20:07:58.088006
">Application and Content Networking Software 3.9</a>)\n</BODY><
11300 /
tcp
-1105333987 | 2025-04-05T11:11:19.100887
-446385447 | 2025-04-20T21:46:32.292699
HTTP/1.1 400 Bad Request
Server: nginx
Content-Type: text/html
Connection: close
x-ws-request-id: 65ae1efa_PS-CKG-01vQy48_16235-38870
12001 /
tcp
-1888448627 | 2025-04-01T20:09:21.818191
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12016 /
tcp
-2089734047 | 2025-04-10T08:17:26.289453
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12084 /
tcp
-2089734047 | 2025-04-25T15:57:50.179990
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12088 /
tcp
455076604 | 2025-04-12T20:02:07.009252
!\x07version\x04bind7 t{RPowerDNS Recursor 410
1077013874 | 2025-04-10T18:57:24.369450
HTTP/1.1 400 Bad Request
Server: squid/3.5.8
Mime-Version: 1.0
Content-Length: 3510
X-Squid-Error: ERR_INVALID_URL 0
Vary: Accept-Language
Content-Language: en
X-Cache: MISS from p1
Via: 1.1 p1 (squid/3.5.8)
Connection: close
971933601 | 2025-04-17T05:03:09.399772
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
12132 /
tcp
1543809371 | 2025-04-01T10:55:36.043456
220 corpease.net Anti-spam GT for Coremail System (icmhosting[2\n0181212])
12138 /
tcp
-1248408558 | 2025-04-12T20:55:24.436258
220 MikroTik FTP server (MikroTik 6.44.3) ready
12140 /
tcp
-1888448627 | 2025-04-06T14:42:09.348524
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12141 /
tcp
-1399940268 | 2025-04-26T18:22:51.278853
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12151 /
tcp
-2089734047 | 2025-04-11T00:45:55.882753
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12153 /
tcp
-1888448627 | 2025-04-06T08:09:38.906382
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12157 /
tcp
1504401647 | 2025-04-05T19:43:37.494591
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
12158 /
tcp
-1648456501 | 2025-04-21T05:54:38.799082
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
12170 /
tcp
321971019 | 2025-04-11T01:24:02.204821
-ERR client ip is not in whitelist\r
12174 /
tcp
-1101712668 | 2025-04-24T12:12:37.391238
\\x1e\xc3\x80\\x010\\x02\xc2\xa8\xc3\xa3
12180 /
tcp
-441419608 | 2025-04-23T21:18:00.158154
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.3
12181 /
tcp
-1730858130 | 2025-04-28T11:09:28.210303
RFB 003.008
VNC:
Protocol Version: 3.8
12190 /
tcp
-1428621233 | 2025-04-23T04:48:11.988455
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
12200 /
tcp
-122096153 | 2025-04-05T15:30:06.027042
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
12204 /
tcp
632542934 | 2025-04-19T22:14:00.647570
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
12206 /
tcp
-1399940268 | 2025-04-16T20:53:26.948492
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12207 /
tcp
-1428621233 | 2025-04-22T00:32:40.752987
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
12225 /
tcp
-2031152423 | 2025-04-15T20:12:53.404717
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
12230 /
tcp
1911457608 | 2025-04-27T04:48:53.057443
\x00[\x00\x00\x00\x00\x00\x00
12237 /
tcp
-1327660293 | 2025-04-23T11:42:18.472976
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
12256 /
tcp
-1487943323 | 2025-04-01T12:24:55.912783
431 Unable to negotiate secure command connection.\r\n
12258 /
tcp
745343730 | 2025-04-01T02:36:33.544723
220 smtp.qq.com Esmtp QQ Mail Server
12259 /
tcp
-2089734047 | 2025-04-21T11:16:34.597655
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12275 /
tcp
321971019 | 2025-04-26T23:40:43.596441
-ERR client ip is not in whitelist\r
12277 /
tcp
1911457608 | 2025-04-15T19:19:27.745446
\x00[\x00\x00\x00\x00\x00\x00
12281 /
tcp
937756010 | 2025-04-19T02:56:05.923815
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x01\x00\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
12293 /
tcp
-1888448627 | 2025-04-19T07:50:02.820468
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
12295 /
tcp
1308377066 | 2025-04-05T23:48:31.831669
12301 /
tcp
677934968 | 2025-04-26T22:01:28.136369
12303 /
tcp
1911457608 | 2025-04-19T12:23:04.136167
\x00[\x00\x00\x00\x00\x00\x00
12317 /
tcp
819727972 | 2025-04-19T10:58:55.882563
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12332 /
tcp
-1476017887 | 2025-04-02T20:59:02.408855
N\x00\x00\x00\n5.6.40-log\x00\xc3\x85\x00\x00\x00TUNEgVX2\x00\x0c\n\xc2\xa2!\x02\x00\x08\x00\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00xlB...\n
12344 /
tcp
165188539 | 2025-04-19T20:39:01.572939
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
296364507 | 2025-04-20T21:46:34.025247
HTTP/1.1 500 Internal Server Error
SERVER: Trend Chip UPnP/1.0 DMS
CONNECTION: close
CONTENT-LENGTH: 60
CONTENT-TYPE: text/html
12349 /
tcp
819727972 | 2025-04-15T14:15:32.722058
SSH-2.0-OpenSSH_7.4
Vulnerabilities
-1013082686 | 2025-04-28T11:21:39.342823
HTTP/1.1 408 Request Timeout
Content-Length: 0
Co
ntent-Type: text/plain
12358 /
tcp
-122096153 | 2025-04-05T17:26:50.976518
Zookeeper version: 3.7.0-e3704b390a6697bfdf4b0bef79e3da7a4f6bac4b, built on 2021-09-17 18:36 UTC\nClients:\n/*.*.*.*:11264[0](queued=0,recved=1,sent=0)\n\nLatency min/avg/max: 0/0.0/0\nReceived: 8557\nSent: 11410\nConnections: 1\nOutstanding: 0\nZxid: 0x332907ad3391\nMode: follower\nNode count: 104618
12364 /
tcp
-457235091 | 2025-04-19T11:49:59.740339
audio 0 RTP/AVP 18 4 3 8 0 101\r\na
12369 /
tcp
1723769361 | 2025-04-27T17:54:51.488847
ELM Enterprise Manager _l\r\nCopyright \xc2\xa9 18668511-928641920 TNT Software, Inc.\r\n
12383 /
tcp
-801484042 | 2025-04-21T16:41:01.862199
12384 /
tcp
-1399940268 | 2025-04-26T01:46:23.292607
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12393 /
tcp
-1399940268 | 2025-04-21T23:02:04.667310
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12405 /
tcp
632542934 | 2025-04-22T00:38:36.414307
\x0f\x00\x02\x00\x05\x00\r\x00\x00\x00\x00\x00\x01\x00\x00\x00\n0\x00
12414 /
tcp
-1399940268 | 2025-04-19T03:00:34.278876
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
12430 /
tcp
1363464823 | 2025-04-25T15:36:30.801081
12431 /
tcp
1911457608 | 2025-04-21T02:17:41.276360
\x00[\x00\x00\x00\x00\x00\x00
12442 /
tcp
-1810987450 | 2025-04-14T20:24:21.475578
12444 /
tcp
-2089734047 | 2025-04-22T19:16:51.433340
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
12470 /
tcp
1911457608 | 2025-04-16T20:50:19.022213
\x00[\x00\x00\x00\x00\x00\x00
12489 /
tcp
1911457608 | 2025-04-20T11:58:42.198494
\x00[\x00\x00\x00\x00\x00\x00
12521 /
tcp
1911457608 | 2025-04-05T16:05:50.200183
\x00[\x00\x00\x00\x00\x00\x00
12533 /
tcp
1911457608 | 2025-04-17T21:49:22.053013
\x00[\x00\x00\x00\x00\x00\x00
12542 /
tcp
677934968 | 2025-04-24T10:18:09.097001
12553 /
tcp
165188539 | 2025-04-10T23:14:05.567678
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
12570 /
tcp
-904840257 | 2025-04-19T21:38:35.418693
572 Relay not authorized\r\n
12575 /
tcp
819727972 | 2025-04-09T02:20:21.364085
SSH-2.0-OpenSSH_7.4
Vulnerabilities
12615 /
tcp
819727972 | 2025-04-22T08:35:50.275672
SSH-2.0-OpenSSH_7.4
Vulnerabilities
13000 /
tcp
-1059554316 | 2025-04-17T03:34:34.692329
\xc2\xa5A\x00\x01\x00\x00\x00,\x00\x00\x00\x02\x00\x00\x00L\x00\x00\x00\x08Connect\x00\x00\x00\x00x\x00\x00\x00\x0857222\x00\x00\x00
13228 /
tcp
-1428621233 | 2025-04-25T06:31:36.336466
\x00\x00\x18\x04\x00\x00\x00\x00\x00\x00\x04\x00@\x00\x00\x00\x00\n05\x00@\x00\x00\x00\x06\x00\x00 \x00\xc3\xbe\x03\x00\x00\x00\x01\x00\x00...\n
14147 /
tcp
819727972 | 2025-04-23T17:27:48.258156
SSH-2.0-OpenSSH_7.4
Vulnerabilities
14344 /
tcp
1011407350 | 2025-04-26T08:21:53.920198
* OK GroupWise IMAP4rev1 Server Ready\r\n
15000 /
tcp
-1987149711 | 2025-04-19T08:13:13.334479
-ERR wrong number of arguments for \'get\' command\r\n-NOAUTH Authentication required.\r\n-ERR unknown command `Accept:`, with args beginning with: `*/*`, \r\n
15040 /
tcp
-339084706 | 2025-04-07T00:52:00.036185
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
16008 /
tcp
1911457608 | 2025-04-25T16:39:02.905185
\x00[\x00\x00\x00\x00\x00\x00
16010 /
tcp
2087396567 | 2025-04-01T02:19:42.547383
kjnkjabhbanc283ubcsbhdc72
16014 /
tcp
321971019 | 2025-04-20T14:27:01.603544
-ERR client ip is not in whitelist\r
16015 /
tcp
1504401647 | 2025-04-07T00:38:50.858156
:dircproxy NOTICE AUTH :Looking up your hostname...\r\n:dircproxy NOTICE AUTH :Got your hostname.\r\n
16024 /
tcp
321971019 | 2025-04-25T05:04:54.241665
-ERR client ip is not in whitelist\r
16062 /
tcp
2098371729 | 2025-04-14T21:01:45.195146
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
16082 /
tcp
-1399940268 | 2025-04-24T19:16:48.307307
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16084 /
tcp
-1399940268 | 2025-04-02T09:18:48.483117
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16087 /
tcp
-1648456501 | 2025-04-07T16:35:35.767722
\n\r\xc3\xbf\xc3\xbbUDo you want ANSI color? (Y/n)
16090 /
tcp
1574088840 | 2025-04-10T15:52:56.360967
">Application and Content Networking Software 3.9</a>)\n</BODY><
16098 /
tcp
1911457608 | 2025-04-24T16:43:06.142580
\x00[\x00\x00\x00\x00\x00\x00
16102 /
tcp
1911457608 | 2025-04-23T09:10:26.313627
\x00[\x00\x00\x00\x00\x00\x00
16311 /
tcp
-1730858130 | 2025-04-06T08:25:28.889418
RFB 003.008
VNC:
Protocol Version: 3.8
16316 /
tcp
-1399940268 | 2025-04-22T18:57:29.661488
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
16401 /
tcp
117101543 | 2025-04-12T04:10:07.142034
\x18\x01\x00\x00\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\n0\x0c\x00\x04\x00\x00\x00\x08\x00\n\x00\x00\x00d\x04\x00\x00\xc3\xb8\x00...\n
971933601 | 2025-04-20T10:24:11.749375
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
16404 /
tcp
1726594447 | 2025-04-10T00:45:38.144053
\r\n\nLantronix MSS100 Version V118/523(045538937)\n\r\nType HELP at the \'Local_61349> \' prompt for assistance.\n\r\n\r\n\nUsername>
16464 /
tcp
2087396567 | 2025-04-02T09:41:26.452380
kjnkjabhbanc283ubcsbhdc72
16666 /
tcp
-2096652808 | 2025-04-16T12:16:28.228975
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
16667 /
tcp
1911457608 | 2025-04-18T16:34:01.476593
\x00[\x00\x00\x00\x00\x00\x00
16888 /
tcp
819727972 | 2025-04-23T08:58:54.060455
SSH-2.0-OpenSSH_7.4
Vulnerabilities
16993 /
tcp
-321444299 | 2025-04-17T22:49:35.188012
:dircproxy NOTICE AUTH :Looking up your hostname...
:dircproxy NOTICE AUTH :Got your hostname.
17000 /
tcp
-1810987450 | 2025-04-03T19:38:05.803778
17010 /
tcp
398077695 | 2025-04-05T02:24:50.014125
17084 /
tcp
-1329831334 | 2025-04-07T15:08:38.692795
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00 \x00\x00\n04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00\\...\n
17102 /
tcp
-1888448627 | 2025-04-18T15:12:16.432123
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
17771 /
tcp
1308377066 | 2025-04-11T21:24:49.375641
18006 /
tcp
1212285915 | 2025-04-16T12:09:17.524790
\x00K\x00\x00\x02\x00\x00\x00%~)J/\\tHjU(IAGENT = (AGENT_VERSION = 2388790170)(RPC_VERSION = 5..722))
18008 /
tcp
819727972 | 2025-04-05T09:00:04.942376
SSH-2.0-OpenSSH_7.4
Vulnerabilities
18015 /
tcp
-1375131644 | 2025-04-18T04:51:44.817340
\x00[v\xc3\xbdC\x7f\x00\x00
18026 /
tcp
639175818 | 2025-04-12T04:45:44.386516
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
18028 /
tcp
-616720387 | 2025-04-16T16:46:08.447208
18029 /
tcp
937756010 | 2025-04-01T07:00:48.139478
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x00\x00\x01\x00\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
18035 /
tcp
-1399940268 | 2025-04-23T01:53:41.782652
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18058 /
tcp
401555314 | 2025-04-25T18:55:33.580538
18061 /
tcp
580340387 | 2025-04-26T18:10:40.752393
220 Microsoft FTP Service\n530 User cannot log in.\n214-The following commands are recognized (* ==>\'s unimplemented).\n ABOR \n ACCT \n ADAT *\n ALLO \n APPE \n AUTH \n CCC \n CDUP \n CWD \n DELE \n ENC *\n EPRT \n EPSV \n FEAT \n HELP \n HOST \n LANG \n LIST ...
18063 /
tcp
51259122 | 2025-04-23T04:31:25.145888
\r\nCP2E Control Console\r\nConnected to Host: gZI\r\n
18080 /
tcp
-971970408 | 2025-04-08T20:57:25.155163
18081 /
tcp
-653033013 | 2025-04-10T05:20:19.512002
\xc3\xbf\x00\x00\x00\x00\x00\x00\x00\x01\x7f
18082 /
tcp
-1105333987 | 2025-04-19T06:20:39.011999
18087 /
tcp
45131230 | 2025-04-04T12:33:29.826454
inv2W\x04\x0f\x00\x00\x00\x01\x00\t\x00\x00\x00
18098 /
tcp
-1099385124 | 2025-04-27T08:31:26.997630
"Magic:ActiveMQ\nVersion:12\n\x00\x00\x01<\x01ActiveMQ\x00\x00\x00\x0c\x01\x00\x00\x01*\x00\x00\x00\x0c\x00\x11TcpNoDelayEnabled\x01\x01\x00\x12SizePrefixDisabled\x01\x00\x00 CacheSize\x05\x00\x00\x04\x00\x00\x0cProviderName \x00\x08ActiveMQ\x00\x11StackTraceEnabled\x01\x01\x00\x0fPlatformDetails \x00\x04Java\x00\x0cCacheEnabled\x01\x01\x00\x14TightEncodingEnabled\x01\x01\x00\x0cMaxFrameSize\x06\x00\x00\x00\x00\x06@\x00\x00\x00\x15MaxInac
18107 /
tcp
709622286 | 2025-04-17T01:02:09.136578
OK Welcome <299685> on DirectUpdate server 7286\r\n
18109 /
tcp
401555314 | 2025-04-04T12:57:46.274874
18225 /
tcp
-1399940268 | 2025-04-11T16:08:00.173431
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
18245 /
tcp
2063598737 | 2025-04-24T15:54:26.757919
18553 /
tcp
-1189269828 | 2025-04-06T20:27:27.000081
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
19000 /
tcp
1332894250 | 2025-04-07T16:27:29.699127
\xc3\xbf\xc3\xbb\x01SOYO_SIP VBNQyQSKc settings\r\nPassword:
19013 /
tcp
-585940771 | 2025-04-07T12:26:32.209565
19091 /
tcp
-1399940268 | 2025-04-20T20:20:48.201836
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
19200 /
tcp
2033888749 | 2025-04-04T03:10:42.540958
Content-Type: text/rude-rejection
Content-Length: 24
Access Denied, go away.
Content-Type: text/disconnect-notice
C...
19902 /
tcp
-1399940268 | 2025-04-06T11:58:00.215413
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1900503736 | 2025-04-24T02:06:56.827831
HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Server: Microsoft-HTTPAPI/2.0
20001 /
tcp
677934968 | 2025-04-23T15:50:18.775560
20018 /
tcp
-1399940268 | 2025-03-31T15:38:46.709015
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
20030 /
tcp
1911457608 | 2025-04-25T01:35:36.982412
\x00[\x00\x00\x00\x00\x00\x00
20040 /
tcp
-2089734047 | 2025-04-16T15:56:45.976887
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
20087 /
tcp
2087396567 | 2025-04-13T01:14:51.185461
kjnkjabhbanc283ubcsbhdc72
20110 /
tcp
819727972 | 2025-04-19T05:47:58.668035
SSH-2.0-OpenSSH_7.4
Vulnerabilities
20256 /
tcp
1189133115 | 2025-04-15T06:58:50.117733
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
20325 /
tcp
-2089734047 | 2025-04-03T11:58:44.972785
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
20547 /
tcp
-1279886438 | 2025-04-18T18:55:20.693171
GET / HTTP/1.0 : USERID : UNIX : TKUXZmP\r\n : USERID : UNIX : Cr8\r\n
20600 /
tcp
1911457608 | 2025-04-26T00:16:02.250416
\x00[\x00\x00\x00\x00\x00\x00
20800 /
tcp
1620329124 | 2025-04-19T21:36:27.855288
\r\nSiemens 2766190798 T1E1 [COMBO] Router (7-382-) v13708 Ready\r\n\xc3\xbf\xc3\xbb\x01\xc3\xbf\xc3\xbb\x03\xc3\xbf\xc3\xbd\x01\xc3\xbf\xc3\xbe\x01Username:
20880 /
tcp
1370263973 | 2025-04-01T22:14:03.206026
20894 /
tcp
1632932802 | 2025-04-03T08:20:14.129093
21002 /
tcp
-2089734047 | 2025-04-08T20:31:36.671228
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
21025 /
tcp
-1036370807 | 2025-04-28T10:13:12.758098
-1453516345 | 2025-04-04T09:05:20.056919
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Pragma: no-cache
Server: nginx
Vary: Accept-Encoding
X-Frame-Options: SAMEORIGIN
21100 /
tcp
-1399940268 | 2025-04-08T12:59:35.554161
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21272 /
tcp
1655023012 | 2025-04-11T09:51:54.320514
athinfod: invalid query.\n
21275 /
tcp
1492413928 | 2025-04-11T10:05:27.996018
SSH-2.0-OpenSSH_7.5
Vulnerabilities
21277 /
tcp
1126993057 | 2025-04-17T22:41:56.003859
* OK [CAPABILITY a2,M\\] nBwXk2pPP IMAP4rev1 20qx at
21290 /
tcp
165188539 | 2025-04-11T14:58:42.682293
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
21318 /
tcp
-1399940268 | 2025-04-26T02:05:28.035790
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
21322 /
tcp
-2017887953 | 2025-03-29T21:11:38.168573
SSH-2.0-OpenSSH_7.9
Vulnerabilities
21328 /
tcp
1011407350 | 2025-04-18T20:41:23.766347
* OK GroupWise IMAP4rev1 Server Ready\r\n
21379 /
tcp
921225407 | 2025-04-23T09:37:57.319218
\x00\x00\x00\x04\x00\x00\x00\x00\x00
22000 /
tcp
-454087041 | 2025-04-01T18:19:17.219730
\x1e\xc3\x80\x010\x02\x00\xc2\xa8\xc3\xa3\x00\x00\x00\x00
22001 /
tcp
-971970408 | 2025-04-04T05:13:53.530847
22069 /
tcp
-2031152423 | 2025-04-01T05:46:36.237959
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3
22222 /
tcp
-358801646 | 2025-04-03T09:18:58.107109
22345 /
tcp
119860953 | 2025-04-19T06:17:27.280975
* OK ArGoSoft Mail Server IMAP Module v.YW at
22556 /
tcp
1723769361 | 2025-04-16T13:12:27.489725
ELM Enterprise Manager _l\r\nCopyright \xc2\xa9 18668511-928641920 TNT Software, Inc.\r\n
22703 /
tcp
819727972 | 2025-04-23T04:44:47.281045
SSH-2.0-OpenSSH_7.4
Vulnerabilities
23023 /
tcp
1231376952 | 2025-04-20T08:15:50.738140
23424 /
tcp
1690634669 | 2025-04-12T09:06:30.409446
24245 /
tcp
-971970408 | 2025-04-06T07:37:22.382661
24472 /
tcp
366084633 | 2025-04-14T20:00:08.449296
<HTML><HEAD><TITLE>Error</TITLE></HEAD><BODY><H1>Error</H1>Bad request or resource not found.</BODY></HTML>
25001 /
tcp
408230060 | 2025-04-12T01:11:28.612365
\r\nSorry, that nickname format is invalid.\r\n
25007 /
tcp
165188539 | 2025-04-10T03:59:06.337790
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
25010 /
tcp
1911457608 | 2025-04-17T08:29:07.436384
\x00[\x00\x00\x00\x00\x00\x00
25105 /
tcp
660175493 | 2025-04-03T05:47:14.284422
25565 /
tcp
2087396567 | 2025-04-12T15:58:06.440731
kjnkjabhbanc283ubcsbhdc72
26656 /
tcp
-801484042 | 2025-04-07T19:20:20.141496
26657 /
tcp
2087396567 | 2025-04-07T15:06:14.098615
kjnkjabhbanc283ubcsbhdc72
27015 /
tcp
819727972 | 2025-04-28T02:46:20.572686
SSH-2.0-OpenSSH_7.4
Vulnerabilities
27017 /
tcp
422524323 | 2025-03-31T16:59:17.712870
{
"Version": "3.4.18",
"VersionArray": [
3,
4,
18,
0
],
"GitVersion": "4410706bef6463369ea2f42399e9843903b31923",
"OpenSSLVersion": "",
"SysInfo": "",
"Bits": 64,
"Debug": false,
"MaxObjectSize": 16777216
}
28015 /
tcp
2087396567 | 2025-04-11T23:49:24.099382
kjnkjabhbanc283ubcsbhdc72
30003 /
tcp
-154107716 | 2025-04-21T04:03:26.023145
220 Microsoft FTP Service
530 User cannot log in.
214-The following commands are recognized (* ==>'s unimplemented).
ABOR
ACCT
ADAT *
ALLO
APPE
AUTH
CCC
CDUP
CWD
DELE
ENC *
EPRT
EPSV
FEAT
HELP
HOST
LANG
LIST ...
30006 /
tcp
-1399940268 | 2025-04-01T05:22:49.110109
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
30008 /
tcp
320677201 | 2025-04-22T23:09:53.604148
H\x00\x00\x00\xc3\xbfj\x04Host \'101.133.140.114\' is not allowed to \nconnect to this MySQL server
30112 /
tcp
165188539 | 2025-04-02T20:13:46.813273
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
30113 /
tcp
-1888448627 | 2025-04-27T15:20:15.304288
\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
30222 /
tcp
819727972 | 2025-04-05T19:17:29.335174
SSH-2.0-OpenSSH_7.4
Vulnerabilities
30303 /
tcp
2087396567 | 2025-04-09T13:31:32.011936
kjnkjabhbanc283ubcsbhdc72
30452 /
tcp
-2017887953 | 2025-04-25T16:44:30.778336
SSH-2.0-OpenSSH_7.9
Vulnerabilities
30522 /
tcp
740837454 | 2025-04-06T05:49:02.974732
SSH-2.0-OpenSSH_5.3
Vulnerabilities
30718 /
tcp
-1719756037 | 2025-04-11T20:19:19.171276
LH\xdb\xc6\xdd\xf6g\x10\x19\x00\x00\x00\x18\x00\x01\x02\x00\x10\x00\x04\x00\x00\x00\x01\x8fm\x0fN\xc7\x1e\x88"\xee\xd9\xd7\xf2x{\x04\x85
30822 /
tcp
-971970408 | 2025-04-05T15:49:09.951743
30894 /
tcp
-1399940268 | 2025-04-18T01:45:04.049858
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
31322 /
tcp
2087396567 | 2025-04-05T10:40:31.158140
kjnkjabhbanc283ubcsbhdc72
31337 /
tcp
-1992519278 | 2025-04-24T21:20:56.699111
\xc3\xbf\xc3\xbb\\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
31622 /
tcp
819727972 | 2025-04-04T16:15:45.100771
SSH-2.0-OpenSSH_7.4
Vulnerabilities
32400 /
tcp
-1681927087 | 2025-04-12T03:22:33.273351
kjnkjabhbanc283ubcsbhdc72
32444 /
tcp
-585940771 | 2025-04-10T15:49:19.225432
32622 /
tcp
-971970408 | 2025-04-04T11:56:09.195914
32764 /
tcp
1690634669 | 2025-04-11T16:33:50.645663
33060 /
tcp
819727972 | 2025-04-11T18:20:57.573265
SSH-2.0-OpenSSH_7.4
Vulnerabilities
33338 /
tcp
1353260875 | 2025-04-11T14:52:24.559058
\x00[g\xc2\x95N\x7f\x00\x00
35100 /
tcp
1830187220 | 2025-04-20T05:41:39.888258
\xc3\xbf\xc3\xbb\x01\r\n-> GET / HTTP/1.0\r\nGET / HTTP/1.0\r\nundefined symbol: GET\r\n-> \r\n->
35250 /
tcp
-1399940268 | 2025-04-19T07:53:33.190578
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
35522 /
tcp
-980525298 | 2025-04-25T02:30:35.573011
\x01\x00\x00\x00\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00
35554 /
tcp
165188539 | 2025-04-23T22:13:35.096575
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
37215 /
tcp
-952165951 | 2025-04-02T15:48:36.625507
37777 /
tcp
165188539 | 2025-04-19T23:28:38.898865
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
38080 /
tcp
165188539 | 2025-04-24T21:23:43.499667
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
40029 /
tcp
-375604792 | 2025-04-25T18:44:05.649147
220 Microsoft FTP Service
41794 /
tcp
2087396567 | 2025-04-11T11:28:53.077175
kjnkjabhbanc283ubcsbhdc72
41800 /
tcp
-2096652808 | 2025-04-04T03:10:39.652875
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
42194 /
tcp
-1996280214 | 2025-04-08T17:18:30.716344
42443 /
tcp
-2089734047 | 2025-04-22T15:02:45.701663
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
43009 /
tcp
1911457608 | 2025-04-22T05:57:27.452116
\x00[\x00\x00\x00\x00\x00\x00
43080 /
tcp
-1996280214 | 2025-04-28T10:53:35.110866
44158 /
tcp
-433302150 | 2025-04-28T06:12:39.529820
44332 /
tcp
-1399940268 | 2025-04-11T23:45:52.896349
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
44336 /
tcp
1919228981 | 2025-04-22T20:46:52.265560
\x00\x1e\x00\x06\xc2\x81\xc2\x85\x00\x01\x00\x00\x00\x00\x00\x00\x07version\x04bind\x00\x00\x10\x00\x03
44337 /
tcp
-1399940268 | 2025-04-08T19:21:41.795422
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
44365 /
tcp
-1032713145 | 2025-04-18T20:31:46.624627
\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x04\x08\x00\x00\x00\n0\x00\x00\x00\x0e\xc3\xbf\xc3\xb1
45003 /
tcp
1911457608 | 2025-04-11T14:18:25.869625
\x00[\x00\x00\x00\x00\x00\x00
47984 /
tcp
-1399940268 | 2025-04-20T05:42:03.993498
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
47990 /
tcp
2087396567 | 2025-04-21T18:38:07.230190
kjnkjabhbanc283ubcsbhdc72
1449779382 | 2025-03-31T22:00:28.165992
HTTP/1.1 500 Internal Server Error
CONTENT-LENGTH: 411
CONTENT-TYPE: text/xml; charset="utf-8"
DATE: Mon, 22 Jan 2024 08:04:18 GMT
EXT:
SERVER: Linux/3.3.0, UPnP/1.0, Portable SDK for UPnP devices/1.6.18
X-User-Agent: redsonic
<s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">
<s:Body>
<s:Fault>
<faultcode>s:Client</faultcode>
<faultstring>UPnPError</faultstring>
<detail>
<UPnPError xmlns="urn:schemas-upnp-org:control-1-0">
<
-1230049476 | 2025-04-02T19:49:41.306605
HTTP/1.0 200 OK
Connection: close
X-Powered-By: Undertow/1
Server: JBoss-EAP/7
Content-Type: text/html
Content-Length: 98
Accept-Ranges: bytes
49682 /
tcp
165188539 | 2025-04-24T07:04:12.663394
\x00\x00\x06\x04\x00\x00\x00\x00\x00\x00\x05\x00\x00@\x00
49688 /
tcp
-2096652808 | 2025-04-02T01:15:01.174778
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\x10\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
50000 /
tcp
-2089734047 | 2025-04-26T17:04:09.037586
\x02\t\x00\x01\x00\x00\x00\x00\x00\x00
50007 /
tcp
-1399940268 | 2025-04-27T06:57:28.089401
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
50050 /
tcp
677934968 | 2025-04-10T23:13:45.003960
50070 /
tcp
-786044033 | 2025-04-10T16:05:37.349930
OK Welcome <299685> on DirectUpdate server 7286
50080 /
tcp
2098371729 | 2025-04-16T14:20:01.939840
<?xml version="1.0" encoding="ISO-8859-1" standalone="yes"?>\nA<!DOCTYPE GANGLIA_XML [\n <!ELEMENT GANGLIA_XML (GRID|CLUSTER|H...\n
50112 /
tcp
-1189269828 | 2025-03-31T20:18:45.648280
\x00\x00\x12\x04\x00\x00\x00\x00\x00\x00\x03\x7f\xc3\xbf\xc3\xbf\xc3\xbf\x00\n0\x04\x00\xc2\x80\x00\x00\x00\x06\x00\x00 \x00\x00\x00\x04\x08\x00\x00\x00...\n
50113 /
tcp
1761482307 | 2025-04-25T11:22:12.713683
\x00[\xc2\xa5\t\xc2\xbe\x7f\x00\x00
50996 /
tcp
819727972 | 2025-04-17T17:18:41.708868
SSH-2.0-OpenSSH_7.4
Vulnerabilities
50999 /
tcp
1492413928 | 2025-04-27T23:22:54.978132
SSH-2.0-OpenSSH_7.5
Vulnerabilities
51004 /
tcp
1911457608 | 2025-04-11T10:03:56.219617
\x00[\x00\x00\x00\x00\x00\x00
51106 /
tcp
410249975 | 2025-04-10T19:31:01.037899
51235 /
tcp
50497985 | 2025-04-28T12:38:01.167276
\x00[\xc3\x88\xc3\x9dS\x7f\x00\x00
52536 /
tcp
-1399940268 | 2025-04-18T04:23:38.120909
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
52869 /
tcp
-949565575 | 2025-04-10T13:22:52.443456
\x19\x02\x02\x07Protocol version mismatch
52931 /
tcp
-339084706 | 2025-04-15T21:25:36.339853
200 ArGoSoft News Server for WinNT/2000/XP v 59869648 ready\r\n
54022 /
tcp
1948301213 | 2025-04-22T09:14:28.090814
RFB 003.003
VNC:
Protocol Version: 3.3
54138 /
tcp
-1737707071 | 2025-04-16T12:50:46.303692
\x00b\x00\x01\x00\x00\x00\x00x\x0b\x00\x00\x00\x00z\x00437
54444 /
tcp
-1399940268 | 2025-04-07T23:42:58.732286
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
54545 /
tcp
1210754493 | 2025-04-24T20:39:32.179062
0\x0c\x02\x01\x01a\x07\n\x01\x00\x04\x00\x04\x00
55000 /
tcp
-1114821551 | 2025-04-23T11:18:39.542537
\xc3\xa3\r\n\r\n\x00\x01\x00K\x00vInvalid protocol verification, illegal ORMI request or request performed with an incompatible version of this protocol
55081 /
tcp
410249975 | 2025-04-23T10:08:28.239937
55443 /
tcp
-1248408558 | 2025-04-17T16:55:18.791611
220 MikroTik FTP server (MikroTik 6.44.3) ready
55553 /
tcp
1741579575 | 2025-04-07T22:12:40.775661
55554 /
tcp
550048729 | 2025-04-27T19:11:20.236425
57778 /
tcp
205347087 | 2025-04-04T00:46:49.579220
SSH-25453-Cisco-3524665.35\n
57780 /
tcp
-1399940268 | 2025-04-07T20:28:47.423176
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
1830697416 | 2025-04-16T21:33:13.108194
HTTP/1.0 200 OK
Cache-Control: must-revalidate
Content-Length: 243
Content-Type: application/json
Server: CouchDB/3.2.0 (Erlang OTP/20)
X-Cloudant-Action: cloudantnosqldb.account-meta-info.read
X-Couch-Request-ID: a2da79eef6
X-Content-Type-Options: nosniff
X-Cloudant-Request-Class: unlimited
X-Cloudant-Backend: bm-cc-uk-01
Via: 1.0 lb1.bm-cc-uk-01 (Glum/1.101.1)
-1839934832 | 2025-04-03T15:09:20.773099
HTTP/1.0 408 Request Time-out
Cache-Control: no-cache
D
Connection: close
Content-Type: text/html
...
58585 /
tcp
1623746877 | 2025-04-01T14:30:49.288255
500 Permission denied - closing connection.\r\n
971933601 | 2025-04-12T01:24:40.961135
HTTP/1.0 404 Not Found
Content-Length: 0
Server: HTTPD
Connection: close
Content-Type: text/html
60001 /
tcp
2087396567 | 2025-04-09T18:38:42.874754
kjnkjabhbanc283ubcsbhdc72
60023 /
tcp
639175818 | 2025-04-25T10:37:34.667040
\r\nSurnom.\r\nSorry, that nickname format is invalid.\r\n
60129 /
tcp
-641479109 | 2025-04-06T19:30:17.913325
61234 /
tcp
-904840257 | 2025-04-09T22:07:22.019099
572 Relay not authorized\r\n
61616 /
tcp
-1641514916 | 2025-04-02T17:10:40.378123
* OK Merak 1dFUa2 IMAP4rev1
63210 /
tcp
211952361 | 2025-04-23T19:45:53.737156
63256 /
tcp
1778988322 | 2025-04-14T21:36:17.745820
* OK GroupWise IMAP4rev1 Server Ready
63260 /
tcp
-1327660293 | 2025-04-21T21:45:04.004341
ceph v2\n\x10\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x00
64671 /
tcp
-1399940268 | 2025-04-26T22:43:15.036369
kjnkjabhbanc283ubcsbhdc72\x00\x00\x00\x02
64738 /
tcp
-801484042 | 2025-03-31T05:53:12.634533